Mohamed Hadded

Orcid: 0000-0003-2294-2237

According to our database1, Mohamed Hadded authored at least 50 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Fuzzy-Based Greedy Behaviour Attack Detection Approach in VANETs.
SN Comput. Sci., October, 2024

Blockchain-cloud integration: Comprehensive survey and open research issues.
Concurr. Comput. Pract. Exp., July, 2024

A Comprehensive Survey on Vehicular Communication Security.
J. Cyber Secur. Mobil., 2024

Anomaly Detection in Connected and Autonomous Vehicles: A Survey, Analysis, and Research Challenges.
IEEE Access, 2024

Anomaly Detection in Autonomous Vehicle's Lidar Sensor Data Using Variational Autoencoders.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024

Collaborative CNN-Based Federated Learning for Steering Control in Diverse Driving Conditions.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024

Context-aware Communication in C-ITS for Road Safety: Survey and Open Research Directions.
Proceedings of the International Conference on Software, 2024

A Decentralized Blockchain-Based Platform for Secure Data Sharing in Cloud Storage Model.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking.
Comput. Networks, November, 2023

A comprehensive survey on blockchain-based C-ITS applications: Classification, challenges, and open issues.
Veh. Commun., October, 2023

2022
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking.
Comput., 2022

An Assessment Platform of Cybersecurity Attacks against the MQTT Protocol using SIEM.
Proceedings of the 30th International Conference on Software, 2022

Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN).
Proceedings of the Computational Science and Its Applications - ICCSA 2022, 2022

A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture.
Proceedings of the Advanced Information Networking and Applications, 2022

A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks.
J. Cyber Secur. Mobil., 2021

A game theory-based route planning approach for automated vehicle collection.
Concurr. Comput. Pract. Exp., 2021

Performance evaluation of an active signaling based time-slot scheduling scheme for connected vehicles.
Ann. des Télécommunications, 2021

Cache Pollution Attacks in the NDN Architecture: Impact and Analysis.
Proceedings of the International Conference on Software, 2021

Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks.
Proceedings of the 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks, 2021

Evaluation of a new Radio Technology and Visible Light Communication for a Platooning Application.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

An Analytical Model of Bluetooth Performance Considering Physical and MAC Layers' Effects.
Proceedings of the 22nd IEEE International Conference on High Performance Switching and Routing, 2021

An Efficient Cross-Layer Design for Multi-hop Broadcast of Emergency Warning Messages in Vehicular Networks.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
A Trust Framework for Centralized TDMA Scheduling Mechanism in Vehicular Ad hoc Networks.
Int. J. Interdiscip. Telecommun. Netw., 2020

Physical and MAC Layer Design for Active Signaling Schemes in Vehicular Networks.
Proceedings of the 16th International Conference on Wireless and Mobile Computing, 2020

MAC-aware Routing Protocols for Vehicular Ad Hoc Networks: A Survey.
Proceedings of the 28th International Conference on Software, 2020

Coexistence of IEEE 802.11p and the TDMA-based AS-DTMAC Protocol.
Proceedings of the 28th International Conference on Software, 2020

Performance Impact Analysis of Security Attacks on Cross-Layer Routing Protocols in Vehicular Ad hoc Networks.
Proceedings of the 28th International Conference on Software, 2020

Using visible light links in combination with radio communication in a vehicular network.
Proceedings of the 9th IFIP International Conference on Performance Evaluation and Modeling in Wireless Networks, 2020

Security attacks impact for collective perception based roadside assistance: A study of a highway on-ramp merging case.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
An Analytical Model for Performance Analysis of an Active Signaling-based TDMA MAC Protocol for Vehicular Networks.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Augmented Perception by V2X Cooperation (PAC-V2X): Security issues and misbehavior detection solutions.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

An Active Signaling Mechanism to Reduce Access Collisions in a Distributed TDMA Based MAC Protocol for Vehicular Networks.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Hybrid centralised MAC protocol for reliable broadcast of safety messages in vehicular ad hoc network.
Int. J. Space Based Situated Comput., 2018

TDMA Scheduling Strategies for Vehicular Ad Hoc Networks: From a Distributed to a Centralized Approach.
Proceedings of the 26th International Conference on Software, 2018

Platoon Route Optimization for Picking up Automated Vehicles in an Urban Network.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

An Optimized Multi-hop Broadcast Scheme for Mesh Networks with Node Failures.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

QCH-MAC: A Qos-Aware Centralized Hybrid MAC Protocol for Vehicular Ad Hoc NETworks.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
TDMA-Aware Routing Protocol for Multi-Hop Communications in Vehicular Ad Hoc Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Performance evaluation of a TDMA-based multi-hop communication scheme for reliable delivery of warning messages in vehicular networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2016
Design and optimization of access control protocols in Vehicular Ad Hoc Networks (VANETs). (Conception et optimisation de protocoles de contrôle d'accès pour les réseaux véhiculaires VANETs).
PhD thesis, 2016

An Infrastructure-Free Slot Assignment Algorithm for Reliable Broadcast of Periodic Messages in Vehicular Ad Hoc Networks.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

A centralized TDMA based scheduling algorithm for real-time communications in vehicular ad hoc networks.
Proceedings of the 24th International Conference on Software, 2016

2015
TDMA-Based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis, and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2015

Optimized trajectories of multi-robot deploying wireless sensor nodes.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Using road IDs to enhance clustering in vehicular ad hoc networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A multi-objective genetic algorithm-based Adaptive Weighted Clustering Protocol in VANET.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

2014
Hybridisation of genetic algorithms and tabu search approach for reconstructing convex binary images from discrete orthogonal projections.
Int. J. Metaheuristics, 2014

Optimized trajectory of a robot deploying wireless sensor nodes.
Proceedings of the 2014 IFIP Wireless Days, 2014

2013
Combining Genetic Algorithm and Simulated Annealing Methods for Reconstructing HV-Convex Binary Matrices.
Proceedings of the Hybrid Metaheuristics - 8th International Workshop, 2013


  Loading...