2017

Ren, M., Zhang, J., Khoukhi, L., Labiod, H., & Vèque, V. (2017). A Unified Framework of Clustering Approach in vehicular ad-hoc networks (VANETs). IEEE Transactions on Intelligent Transportation Systems. (Online)

Tan, H. C., Ma, M., Labiod, H., Chong, P. H. J., & Zhang, J. (2017). A nonbiased trust model for wireless mesh networks. International Journal of Communication Systems30(9).

L. Pang, X. Chen, Y. Shi, Z. Xue, R. Khatoun. Localization of multiple jamming attackers in vehicular ad hoc network. International Journal of Distributed Sensor Networks, volume 13, issue 8, 2017

B. Hammi, R. Khatoun; S. Zeadally,  A. Fayad, L. Khoukh: 'Internet of Things (IoT) Technologies for Smart Cities', IET Networks, 2017, IET Digital Library,

B. Hammi, H. Labiod, G. Segarra, A. Servel et J. Monteuuis. CAM-Infrastructure: a novel solution for service advertise- ment in Cooperative Intelligent Transportation Systems.  Advances in Science, Technology and Engineering Systems Journal. Special Issue on Recent Advances in Engineering Systems 2017 

M. Rmayti, R. Khatoun, Y. Begriche and D. Gaïti. A Stochastic Approach for Packet Dropping Attacks Detection in Mobile Ad hoc Networks, Journal of Computer Networks, April 2017. 

R. Khatoun and S. Zeadally, "Cybersecurity and Privacy Solutions in Smart Cities". IEEE Communications Magazine, 55(3): 51-59, 2017. 

R. Khatoun, Y. Begriche, L. Khoukhi. A Statistical Detection Mechanism for Node Misbehaviors in Wireless Mesh Networks (WMNs), to appear in the International Journal of Ad Hoc and Ubiquitous Computing, 2017. 

J. Dromard, R. Khatoun, L. Khoukhi and Y. Begriche. Towards combining Admission Control and Link Scheduling in 802.11-based Wireless Mesh Networks. Telecommunication Systems journal, 2017

2016

Mohamed T. Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni and Pascale Minet, (2016), "MAC Sub Layer Node Authentication in OCARI", PEMWN2016, pp. 6.

J. Monteuuis, J. Huor, E-S Daniel and R. Khatoun. Security of the Intelligent Transportation Systems (ITS), to appear in the Multi-System & Internet Security Cookbook (MISC), November 2016. 

Ren, M., Khoukhi, L., Labiod, H., Zhang, J., & Vèque, V. (2016). A mobility-based scheme for dynamic clustering in vehicular ad-hoc networks (VANETs). Vehicular Communications.

Tan, H., Ma, M., Labiod, H., Boudguiga, A., Zhang, J., & Chong, P. H. J. (2016). A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks. IEEE Transactions on Vehicular Technology, 65(12), 9570-9584.

Zhioua, G., Zhang, J., Labiod, H., Tabbane, N., & Tabbane, S. (2016). A joint active time and flow selection model for cellular content retrieval through ITS. Computer Networks, 107, 220-232.

R. Khatoun and S. Zeadally, "Smart Cities: Basic Concepts, Architectural Issues, and Research Opportunities". Communications of the ACM (CACM) journal, Volume 59, Issue 8, Pages 46-57, August 2016. 

 

2015

G.e.m Zhioua, N. Tabbane, H. Labiod, S. Tabbane, A Fuzzy Multi-metric QoS-balancing Gateway Selection Algorithm in a Clustered VANET to LTE Advanced Hybrid Cellular Network, IEEE Transactions on Vehicular Technology, Volume 64, Issue n°2, pp. 804-817, February 2015.

Mounira Msahli, Mohamed T. Hammi and Ahmed Serhrouchni, (2015), "Safe box cloud authentication using TLS extesion", Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, pp. 1 6.

R. Khatoun, Youcef Begriche, Juliette Dromard, Lyes Khoukhi and Ahmed Serhrouchni, (2015), "A Statistical Trust System in Wireless Mesh Networks", Annals of Telecommunications.

Nan Zhao, Loïc Baud and Patrick Bellot, (2014), "Exploring Video Sharing Websites Content With Machine Learning", International Journal of Distributed Systems and Technologies (IJDST), pp. 1 10.

Nan Zhao, Loïc Baud and Patrick Bellot, (2014), "Exploring Cyberlockers Content", International Journal of Multimedia and Image Processing (IJMIP), pp. 1 12.

 

2014

H. Labiod, S. Zeadally, E. Tebchrany, Performance Analysis of a Cross-Layered Incremental Redundancy Hybrid Automatic Repeat Request (CL IR-HARQ) Mechanism, Elsevier Ad Hoc Networks Journal, volume 23, pp. 109-120, December 2014

Mounira Msahli and Ahmed Serhrouchni, (2014), "Profile Centric Model. ", International Journal of Internet Technology and Secured Transactions, vol. 5, n° ISSN online: 1748 5703.

Soumia Natouri, Chidung Lac and Ahmed Serhrouchni, (2014), "A Model Based Resilience Analysis for IMS. ", Journal of Networks, vol. 9, n° 3, pp. 588 603.

Hassane Aissaoui Mehrez, Guy Pujolle and pascal urien, (2014), "Implementation Software To Secure Virtual Machines With Remote Grid of Secure Elements", IEEExplore, pp. 282   287 .

Hassane Aissaoui Mehrez, Guy Pujolle and pascal urien, (2014), "Framework Implementation Based On Grid of Smartcards To Authenticate Users and Virtual Machines", SCITEPRESS Digital Library, pp. 285   290 .

Hassane Aissaoui Mehrez, Guy Pujolle and pascal urien, (2014), "Global identity management of virtual machines based on remote secure elements", IEEExplore, pp. 1 4.

P. Urien and Selwyn Piramuthu, (2014), "Elliptic curve based RFID/NFC authentication with temperature sensor input for relay attacks.", Decision Support Systems, vol. 59, pp. 28  36.

Hassane Aissaoui Mehrez, Guy Pujolle, P. Urien et al., (2014), "Security for Future Networks: A Prospective Study of AAIs", Int. J. on Recent Trends in Engineering and Technology, vol. 10, n° 1, pp. 203 212.

J. Monteuuis , J. Huor, M. Hofmann, V. Beauvisage and R. Khatoun. Génération automatique de règles Snort pour la détection des réseaux Fast-Flux. Multi-System & Internet Security Cookbook (MISC), number 76, December 2014.

2013

G.e.m Zhioua, H. Labiod, N. Tabbane, S. Tabbane, LTE Advanced Relaying Standard: A Survey, Wireless Personal Communications Journal, Ed. Springer, Volume 72, Issue 4, pp. 2445-2463, April 2013.

N.Maslekar, M. Boussedjra, J.Mouzna, H.Labiod, CATS: an adaptive traffic signal system based on car-to-car communication, Elsevier Journal of network and computer applications, Special issue on vehicular communications and applications, Volume 36, pp. 1308-1315, June 2013.

Hassane Aissaoui Mehrez, pascal urien and Guy Pujolle, (2013), "Low Latency of Re Authentication During Handover: Re Authentication Using a Signed Token in Heterogeneous Wireless Access Networks", SCITEPRESS.

Mounira Msahli and Ahmed Serhrouchni. Profile centric modelling, International Journal of Internet Technology and Secured Transactions, 2014.

2012

P. Urien et al., (2012), "Security challenges for Security Information and Event Management Systems in mobile money transfer services", SAR SSI 2012, ISBN 978 2 9542630 0 7.

D. Fotue, H. Labiod and T. Engel, Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireless Sensor Networks,  International Journal of Computer Science and Security (IJCSS), Volume 6, and Issue 3, June 2012.

2011

Loïc Baud and Patrick Bellot, (2011), "Small world routing in ROSA   An interesting property of the Chain of Lumps", GSTF Journal on Computing, vol. 1, n° 3.

Patrick Bellot and Loïc Baud, (2011), "Java Autonomous Web Applications with Standalone Entities", GSTF Journal on Computing, vol. 1, n° 3.

H. Lin and H. Labiod, Aggregation methods for integrated services, International Journal of Communication Systems, 24(8), pp 978-1001, Volume 24, Number 8, August 2011.

S Ktari, A. Hecker, H. Labiod, Symmetric routing in DHT overlays, Telecommunication Systems Journal, ed Springer, Volume 48, Numéro (1-2): pp. 163-172, 2011.

2010

H. Labiod, H. Lin and R. Nonni, Analytical Study of Intra-domain handover in Multihomed mobile routers based multihomed NEMO Networks, Elsevier Computer Networks Journal, 54 Issue 18, pp3280-3294, January 2010.

V. Toubiana, H. Labiod, L. Raynaud, Y. Gourhant, A Global Security Architecture for Operated Hybrid WLAN Mesh Networks, Elsevier Computer Networks Journal, Elsevier Publishing, Volume 54, Issue 2, Pages 218-230, February 2010.