Mohamed Elboukhari

According to our database1, Mohamed Elboukhari authored at least 14 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FOTA-MAC: A Novel Traffic Adaptive MAC Protocol for Wireless Body Area Networks.
Int. J. Interact. Mob. Technol., January, 2024

2022
Log Data Integrity Solution based on Blockchain Technology and IPFS.
Int. J. Interact. Mob. Technol., August, 2022

2021
Wireless Body Area Networks for Healthcare: Application Trends and MAC Technologies.
Int. J. Bus. Data Commun. Netw., 2021

Comparative Study Between Network Layer Attacks in Mobile Ad Hoc Networks.
Proceedings of the Networking, Intelligent Systems and Security, 2021

2020
A Novel Greedy Forwarding Mechanism Based on Density, Speed and Direction Parameters for Vanets.
Int. J. Interact. Mob. Technol., 2020

Data Flooding Intrusion Detection System for MANETs Using Deep Learning Approach.
Proceedings of the SITA'20: Theories and Applications, 2020

2019
A simulation analysis of MANET's link-spoofing and replay attacks with ns-3.
Proceedings of the 4th International Conference on Smart City Applications, 2019

A simulation analyse of MANET's RREQ Flooding and HELLO Flooding attacks with ns-3.
Proceedings of the 2nd International Conference on Networking, 2019

2018
Classification of Mobile Ad Hoc Networks Attacks.
Proceedings of the 5th IEEE International Congress on Information Science and Technology, 2018

Simulation of MANET's Single and Multiple Blackhole Attack with NS-3.
Proceedings of the 5th IEEE International Congress on Information Science and Technology, 2018

Performance Evaluation of VANETs Routing Protocols Using SUMO and NS3.
Proceedings of the 5th IEEE International Congress on Information Science and Technology, 2018

2010
Analysis of the Security of BB84 by Model Checking
CoRR, 2010

Improving the Security of CHAP Protocol by Quantum Cryptography.
Proceedings of the Intelligent Distributed Computing IV - Proceedings of the 4th International Symposium on Intelligent Distributed Computing, 2010

2008
Security Oriented Analysis of B92 by Model Checking.
Proceedings of the NTMS 2008, 2008


  Loading...