Haifa Touati

Orcid: 0000-0002-8391-3061

According to our database1, Haifa Touati authored at least 50 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Fuzzy-Based Greedy Behaviour Attack Detection Approach in VANETs.
SN Comput. Sci., October, 2024

Blockchain-cloud integration: Comprehensive survey and open research issues.
Concurr. Comput. Pract. Exp., July, 2024

A Comprehensive Survey on Vehicular Communication Security.
J. Cyber Secur. Mobil., 2024

Anomaly Detection in Connected and Autonomous Vehicles: A Survey, Analysis, and Research Challenges.
IEEE Access, 2024

Path Planning in UAV-Assisted Wireless Networks: A Comprehensive Survey and Open Research Issues.
Proceedings of the Advanced Information Networking and Applications, 2024

A Decentralized Blockchain-Based Platform for Secure Data Sharing in Cloud Storage Model.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking.
Comput. Networks, November, 2023

A comprehensive survey on blockchain-based C-ITS applications: Classification, challenges, and open issues.
Veh. Commun., October, 2023

Hybrid 802.11p-cellular architecture for NDN-based VANET.
Int. J. Commun. Syst., 2023

Vehicular Platoons Security: A Review with an Emphasis on Sybil Attacks.
Proceedings of the 12th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, 2023

2022
Named Data Networking-based communication model for Internet of Things using energy aware forwarding strategy and smart sleep mode.
Concurr. Comput. Pract. Exp., 2022

A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking.
Comput., 2022

LSTM-Based Congestion Detection in Named Data Networks.
Proceedings of the Intelligent Systems Design and Applications - 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022, 2022

Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN).
Proceedings of the Computational Science and Its Applications - ICCSA 2022, 2022

A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture.
Proceedings of the Advanced Information Networking and Applications, 2022

A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Deep learning and handcrafted features for one-class anomaly detection in UAV video.
Multim. Tools Appl., 2021

A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks.
J. Cyber Secur. Mobil., 2021

Cognitive Radio and Dynamic TDMA for efficient UAVs swarm communications.
Comput. Networks, 2021

Fair hop-by-hop interest rate control to mitigate congestion in named data networks.
Clust. Comput., 2021

Cache Pollution Attacks in the NDN Architecture: Impact and Analysis.
Proceedings of the International Conference on Software, 2021

Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks.
Proceedings of the 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks, 2021

Markov Chain based Predictive Model for Efficient handover Management in Vehicle-to-Infrastructure Communications.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Handover Optimization for VANET in 5G Networks.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

An Efficient Cross-Layer Design for Multi-hop Broadcast of Emergency Warning Messages in Vehicular Networks.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
MAC-aware Routing Protocols for Vehicular Ad Hoc Networks: A Survey.
Proceedings of the 28th International Conference on Software, 2020

Performance Impact Analysis of Security Attacks on Cross-Layer Routing Protocols in Vehicular Ad hoc Networks.
Proceedings of the 28th International Conference on Software, 2020

UAV-based Surveillance System: an Anomaly Detection Approach.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Hybrid and Secure E-Health Data Sharing Architecture in Multi-Clouds Environment.
Proceedings of the Impact of Digital Technologies on Public Health in Developed and Developing Countries, 2020

Q-Learning Based Forwarding Strategy in Named Data Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2020, 2020

e-ASPECTS for early detection and diagnosis of ischemic stroke.
Proceedings of the 5th International Conference on Advanced Technologies for Signal and Image Processing, 2020

2019
FANET: Communication, mobility models and security issues.
Comput. Networks, 2019

Efficient forwarding strategy in a NDN-based internet of things.
Clust. Comput., 2019

Data Communication in Electromagnetic Nano-networks for Healthcare Applications.
Proceedings of the Mobile, Secure, and Programmable Networking, 2019

Deep Neural Networks for Indoor Localization Using WiFi Fingerprints.
Proceedings of the Mobile, Secure, and Programmable Networking, 2019

Efficient Data Dissemination in Electromagnetic Wireless Nano-Sensor Networks.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

UAV-GCS Centralized Data-Oriented Communication Architecture for Crowd Surveillance Applications.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Centralized Cognitive Radio Based Frequency Allocation for UAVs Communication.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Stacked Auto-Encoder for Scalable Indoor Localization in Wireless Sensor Networks.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Power Saving Extension for the NDN-Based GIF Protocol for the Internet of Things.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
Hop-by-hop interest rate notification and adjustment in named data networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Are NDN Congestion Control Solutions Compatible with Big Data Traffic?
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

Speech Denoising by Adaptive Filter LMS in the EMD Framework.
Proceedings of the 15th International Multi-Conference on Systems, Signals & Devices, 2018

2017
SVM-based indoor localization in Wireless Sensor Networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Hop-by-Hop Congestion Control for Named Data Networks.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Preventing unnecessary interests retransmission in named data networking.
Proceedings of the 2016 International Symposium on Networks, Computers and Communications, 2016

Geographic interest forwarding in NDN-based wireless sensor networks.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2009
Adapting TCP exponential backoff to multihop ad hoc networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2007
Performance of TCP Adaptive RTO in ad-hoc networks based on different routing protocols.
Proceedings of the 9th IFIP International Conference on Mobile Wireless Communications Networks, 2007

2004
Measurements of TCPW ABSE Fairness and Friendliness.
Proceedings of the ICETE 2004, 2004


  Loading...