default search action
Abdelouahid Derhab
Person information
- affiliation: King Saud University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j79]Waleed Halboob, Hamdi Altaheri, Abdelouahid Derhab, Jalal Al-Muhtadi:
Crowd Management Intelligence Framework: Umrah Use Case. IEEE Access 12: 6752-6767 (2024) - [j78]Abdelouahid Derhab, Irfan Mohiuddin, Waleed Halboob, Jalal Al-Muhtadi:
Crowd Congestion Forecasting Framework Using Ensemble Learning Model and Decision Making Algorithm: Umrah Use Case. IEEE Access 12: 67453-67469 (2024) - [j77]Abdelouahab Amira, Abdelouahid Derhab, Elmouatez Billah Karbab, Omar Nouali:
A Survey of Malware Analysis Using Community Detection Algorithms. ACM Comput. Surv. 56(2): 40:1-40:29 (2024) - [j76]Rahmoune Bitit, Abdelouahid Derhab, Mohamed Guerroumi, Farrukh Aslam Khan:
DDoS attack forecasting based on online multiple change points detection and time series analysis. Multim. Tools Appl. 83(18): 53655-53685 (2024) - [j75]Abdelouahab Amira, Abdelouahid Derhab, Samir Hadjar, Mustapha Merazka, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan:
Detection and Analysis of Fake News Users' Communities in Social Media. IEEE Trans. Comput. Soc. Syst. 11(4): 5050-5059 (2024) - 2023
- [j74]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab:
SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features. Expert Syst. Appl. 225: 120017 (2023) - [j73]Amine Boulemtafes, Abdelouahid Derhab, Yacine Challal:
PRIviLY: Private Remote Inference over fulLY connected deep networks for pervasive health monitoring with constrained client-side. J. Inf. Secur. Appl. 77: 103552 (2023) - [j72]Amine Boulemtafes, Abdelouahid Derhab, Nassim Ait Ali Braham, Yacine Challal:
Privacy-preserving remote deep-learning-based inference under constrained client-side environment. J. Ambient Intell. Humaniz. Comput. 14(1): 553-566 (2023) - [j71]Ibrahim Mutambik, Abdullah Almuqrin, Yulong David Liu, Waleed Halboob, Abdullah Alakeel, Abdelouahid Derhab:
Increasing Continuous Engagement With Open Government Data: Learning From the Saudi Experience. J. Glob. Inf. Manag. 31(1): 1-21 (2023) - [j70]Samah Almutlaq, Abdelouahid Derhab, Mohammad Mehedi Hassan, Kuljeet Kaur:
Two-Stage Intrusion Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks. IEEE Trans. Intell. Transp. Syst. 24(12): 15687-15701 (2023) - [j69]Abdelouahid Derhab, Omar Cheikhrouhou, Azza Allouch, Anis Koubaa, Basit Qureshi, Mohamed Amine Ferrag, Leandros Maglaras, Farrukh Aslam Khan:
Internet of drones security: Taxonomies, open issues, and future directions. Veh. Commun. 39: 100552 (2023) - 2022
- [j68]Noureddine Seddari, Abdelouahid Derhab, Mohamed Belaoued, Waleed Halboob, Jalal Al-Muhtadi, Abdelghani Bouras:
A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media. IEEE Access 10: 62097-62109 (2022) - [j67]Alaeddine Mihoub, Ouissem Ben Fredj, Omar Cheikhrouhou, Abdelouahid Derhab, Moez Krichen:
Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Comput. Electr. Eng. 98: 107716 (2022) - [j66]Abdelouahid Derhab, Mohamed Belaoued, Irfan Mohiuddin, Fajri Kurniawan, Muhammad Khurram Khan:
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks. IEEE Trans. Intell. Transp. Syst. 23(3): 2366-2379 (2022) - [c33]Abdelouahid Derhab:
Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles. SIN 2022: 1 - 2021
- [b1]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence. Advances in Information Security 86, Springer 2021, ISBN 978-3-030-74663-6, pp. 1-198 - [j65]Farrukh Aslam Khan, Khan Zeb, Mabrook Al-Rakhami, Abdelouahid Derhab, Syed Ahmad Chan Bukhari:
Detection and Prediction of Diabetes Using Data Mining: A Comprehensive Review. IEEE Access 9: 43711-43735 (2021) - [j64]Abdelouahid Derhab, Rahaf Alawwad, Khawlah Dehwah, Noshina Tariq, Farrukh Aslam Khan, Jalal Al-Muhtadi:
Tweet-Based Bot Detection Using Big Data Analytics. IEEE Access 9: 65988-66005 (2021) - [j63]Ayesha Altaf, Haider Abbas, Faiza Iqbal, Farrukh Aslam Khan, Saddaf Rubab, Abdelouahid Derhab:
Context-oriented trust computation model for industrial Internet of Things. Comput. Electr. Eng. 92: 107123 (2021) - [j62]Wilayat Khan, Farrukh Aslam Khan, Abdelouahid Derhab, Adi Alhudhaif:
CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover. Complex. 2021: 5525539:1-5525539:12 (2021) - [j61]Abdelouahab Amira, Abdelouahid Derhab, ElMouatez Billah Karbab, Omar Nouali, Farrukh Aslam Khan:
TriDroid: a triage and classification framework for fast detection of mobile threats in android markets. J. Ambient Intell. Humaniz. Comput. 12(2): 1731-1755 (2021) - [j60]Nassima Bougueroua, Smaine Mazouzi, Mohamed Belaoued, Noureddine Seddari, Abdelouahid Derhab, Abdelghani Bouras:
A Survey on Multi-Agent Based Collaborative Intrusion Detection Systems. J. Artif. Intell. Soft Comput. Res. 11(2): 111-142 (2021) - [j59]Noshina Tariq, Muhammad Asim, Farrukh Aslam Khan, Thar Baker, Umair Khalid, Abdelouahid Derhab:
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things. Sensors 21(1): 23 (2021) - [j58]Abdelouahid Derhab, Mohamed Guerroumi, Mohamed Belaoued, Omar Cheikhrouhou:
BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks. Wirel. Commun. Mob. Comput. 2021: 9984666:1-9984666:12 (2021) - [c32]Amine Boulemtafes, Abdelouahid Derhab, Nassim Ait Ali Braham, Yacine Challal:
PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring. AICCSA 2021: 1-8 - 2020
- [j57]Mohamed Belaoued, Abdelouahid Derhab, Smaine Mazouzi, Farrukh Aslam Khan:
MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance. IEEE Access 8: 14329-14343 (2020) - [j56]Abdelouahid Derhab, Mohamed Belaoued, Mohamed Guerroumi, Farrukh Aslam Khan:
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing. IEEE Access 8: 28956-28969 (2020) - [j55]Mohamed Amine Ferrag, Lei Shu, Xing Yang, Abdelouahid Derhab, Leandros Maglaras:
Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges. IEEE Access 8: 32031-32053 (2020) - [j54]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning. Comput. Secur. 96: 101932 (2020) - [j53]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning. Comput. Secur. 97: 101965 (2020) - [j52]Amine Boulemtafes, Abdelouahid Derhab, Yacine Challal:
A review of privacy-preserving techniques for deep learning. Neurocomputing 384: 21-45 (2020) - [j51]Souhila Aoufi, Abdelouahid Derhab, Mohamed Guerroumi:
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. J. Inf. Secur. Appl. 54: 102518 (2020) - [j50]Arwa Aldweesh, Abdelouahid Derhab, Ahmed Z. Emam:
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowl. Based Syst. 189 (2020) - [j49]Naila Belhadj Aissa, Mohamed Guerroumi, Abdelouahid Derhab:
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset. Neural Comput. Appl. 32(8): 3475-3501 (2020) - [j48]Abdelouahid Derhab, Abdelghani Bouras, Mohamed Belaoued, Leandros Maglaras, Farrukh Aslam Khan:
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors 20(21): 6106 (2020) - [j47]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke:
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues. Telecommun. Syst. 73(2): 317-348 (2020) - [j46]Abdelouahid Derhab, Arwa Aldweesh, Ahmed Z. Emam, Farrukh Aslam Khan:
Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering. Wirel. Commun. Mob. Comput. 2020: 6689134:1-6689134:16 (2020) - [c31]Ouissem Ben Fredj, Omar Cheikhrouhou, Moez Krichen, Habib Hamam, Abdelouahid Derhab:
An OWASP Top Ten Driven Survey on Web Application Protection Methods. CRiSIS 2020: 235-252 - [c30]Ouissem Ben Fredj, Alaeddine Mihoub, Moez Krichen, Omar Cheikhrouhou, Abdelouahid Derhab:
CyberSecurity Attack Prediction: A Deep Learning Approach. SIN 2020: 5:1-5:6 - [i6]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Clustering using Community Detection on Android Packages Similarity Network. CoRR abs/2005.06075 (2020)
2010 – 2019
- 2019
- [j45]Wilayat Khan, Muhammad Kamran, Aakash Ahmad, Farrukh Aslam Khan, Abdelouahid Derhab:
Formal Analysis of Language-Based Android Security Using Theorem Proving Approach. IEEE Access 7: 16550-16560 (2019) - [j44]Farrukh Aslam Khan, Abdu Gumaei, Abdelouahid Derhab, Amir Hussain:
TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection. IEEE Access 7: 30373-30385 (2019) - [j43]Zahid Wadud, Muhammad Ismail, Abdul Baseer Qazi, Farrukh Aslam Khan, Abdelouahid Derhab, Ibrar Ahmad, Arbab Masood Ahmad:
An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks. IEEE Access 7: 175980-175999 (2019) - [j42]Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan, Abdelouahid Derhab:
Toward an optimal solution against Denial of Service attacks in Software Defined Networks. Future Gener. Comput. Syst. 92: 444-453 (2019) - [j41]Muhammad Tariq, Hammad Majeed, Mirza Omer Beg, Farrukh Aslam Khan, Abdelouahid Derhab:
Accurate detection of sitting posture activities in a secure IoT based assisted living environment. Future Gener. Comput. Syst. 92: 745-757 (2019) - [j40]Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan, Abdelouahid Derhab:
Reducing the effects of DoS attacks in software defined networks using parallel flow installation. Hum. centric Comput. Inf. Sci. 9: 16 (2019) - [j39]Mohamed Belaoued, Abdelaziz Boukellal, Mohamed Amir Koalal, Abdelouahid Derhab, Smaine Mazouzi, Farrukh Aslam Khan:
Combined dynamic multi-feature and rule-based behavior for accurate malware detection. Int. J. Distributed Sens. Networks 15(11) (2019) - [j38]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros A. Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet Things J. 6(2): 2188-2204 (2019) - [j37]Ayesha Altaf, Haider Abbas, Faiza Iqbal, Abdelouahid Derhab:
Trust models of internet of smart things: A survey, open issues, and future directions. J. Netw. Comput. Appl. 137: 93-111 (2019) - [j36]Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab:
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. Secur. Commun. Networks 2019: 5452870:1-5452870:20 (2019) - [j35]Abdelouahid Derhab, Mohamed Guerroumi, Abdu Gumaei, Leandros A. Maglaras, Mohamed Amine Ferrag, Mithun Mukherjee, Farrukh Aslam Khan:
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors 19(14): 3119 (2019) - [j34]Farrukh Aslam Khan, Ashfaq Hussain Farooqi, Abdelouahid Derhab:
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks. J. Supercomput. 75(4): 2221-2242 (2019) - [c29]Mourad Benmalek, Yacine Challal, Abdelouahid Derhab:
An Improved Key Graph based Key Management Scheme for Smart Grid AMI systems. WCNC 2019: 1-6 - [c28]Mourad Benmalek, Yacine Challal, Abdelouahid Derhab:
Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges. WETICE 2019: 208-213 - [i5]Leandros A. Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures. CoRR abs/1901.03899 (2019) - [i4]Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab:
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends. CoRR abs/1901.09374 (2019) - 2018
- [j33]Muneeb Ahmed Sahi, Haider Abbas, Kashif Saleem, Xiaodong Yang, Abdelouahid Derhab, Mehmet A. Orgun, Mian Muhammad Waseem Iqbal, Imran Rashid, Asif Yaseen:
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions. IEEE Access 6: 464-478 (2018) - [j32]Jalal Al-Muhtadi, Ma Qiang, Khan Zeb, Junaid Ahsenali Chaudhry, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Rajan Shankaran, Muhammad Imran, Maruf Pasha:
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems. IEEE Access 6: 16363-16376 (2018) - [j31]Mourad Benmalek, Yacine Challal, Abdelouahid Derhab, Abdelmadjid Bouabdallah:
VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems. Comput. Networks 132: 161-179 (2018) - [j30]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
MalDozer: Automatic framework for android malware detection using deep learning. Digit. Investig. 24 Supplement: S48-S59 (2018) - [j29]Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. EAI Endorsed Trans. Security Safety 5(16): e1 (2018) - [j28]Muhammad Yaseen, Kashif Saleem, Mehmet A. Orgun, Abdelouahid Derhab, Haider Abbas, Jalal Al-Muhtadi, Mian Muhammad Waseem Iqbal, Imran Rashid:
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art. Telematics Informatics 35(4): 702-726 (2018) - [c27]Mohamed Belaoued, Bouchra Guelib, Yasmine Bounaas, Abdelouahid Derhab, Mahmoud Boufaïda:
Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers. MLN 2018: 166-180 - [c26]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Abdelaziz Amara Korba:
Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices. PAIS 2018: 1-8 - [p1]Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, Awais Yousaf:
Vulnerability Assessment of Cyber Security for SCADA Systems. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 59-80 - [i3]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Athanasios V. Vasilakos, Stylianos Rallis, Helge Janicke:
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues. CoRR abs/1803.10281 (2018) - [i2]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. CoRR abs/1806.09099 (2018) - 2017
- [j27]Abdelouahid Derhab, Mohamed Guerroumi, Mohamed F. Younis:
Wireless and mobile sensing technologies for the future Internet. Ann. des Télécommunications 72(3-4): 117-118 (2017) - [j26]Muhammad Umair Aslam, Abdelouahid Derhab, Kashif Saleem, Haider Abbas, Mehmet A. Orgun, Mian Muhammad Waseem Iqbal, Baber Aslam:
A Survey of Authentication Schemes in Telecare Medicine Information Systems. J. Medical Syst. 41(1): 14:1-14:26 (2017) - [j25]Zakaria Gheid, Yacine Challal, Xun Yi, Abdelouahid Derhab:
Efficient and privacy-aware multi-party classification protocol for human activity recognition. J. Netw. Comput. Appl. 98: 84-96 (2017) - [j24]Mohamed Guerroumi, Al-Sakib Khan Pathan, Abdelouahid Derhab, Nadjib Badache, Samira Moussaoui:
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness. Wirel. Pers. Commun. 96(4): 4973-5010 (2017) - [c25]Abdelouahab Amira, Abdelraouf Ouadjaout, Abdelouahid Derhab, Nadjib Badache:
Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications. CODASPY 2017: 139-141 - [i1]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Deep Learning on API Method Sequences. CoRR abs/1712.08996 (2017) - 2016
- [j23]Abdelouahid Derhab, Abdelghani Bouras:
Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 30(3-4): 201-217 (2016) - [j22]Abdelouahid Derhab, Kashif Saleem, Jalal Al-Muhtadi, Mehmet A. Orgun:
Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices. Comput. Hum. Behav. 59: 9-17 (2016) - [j21]Shaker Alanazi, Kashif Saleem, Jalal Al-Muhtadi, Abdelouahid Derhab:
Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network. Mob. Inf. Syst. 2016: 4853924:1-4853924:19 (2016) - [j20]Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Jalal Al-Muhtadi, Joel J. P. C. Rodrigues, Mohammed Sayim Khalil, Adel Ali Ahmed:
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks. Sensors 16(4): 460 (2016) - [c24]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Cypider: building community-based cyber-defense infrastructure for android malware detection. ACSAC 2016: 348-362 - [c23]Kashif Saleem, Khan Zeb, Abdelouahid Derhab, Haider Abbas, Jalal Al-Muhtadi, Mehmet A. Orgun, Amjad Gawanmeh:
Survey on cybersecurity issues in wireless mesh networks based eHealthcare. HealthCom 2016: 1-7 - [c22]Mohamed Guerroumi, Abdelouahid Derhab, Al-Sakib Khan Pathan, Nadjib Badache, Samira Moussaoui:
MMSMAC: A multi-mode medium access control protocol for Wireless Sensor Networks. WCNC 2016: 1-7 - 2015
- [j19]Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi, Basit Shahzad, Mehmet A. Orgun:
Secure transfer of environmental data to enhance human decision accuracy. Comput. Hum. Behav. 51: 632-639 (2015) - [j18]Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi, Basit Shahzad:
Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society. Comput. Hum. Behav. 51: 977-985 (2015) - [j17]Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi, Mehmet A. Orgun:
Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience. Comput. Hum. Behav. 51: 1340-1350 (2015) - [j16]Mohammed B. Abazeed, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Norsheila Binti Fisal, Jalal Al-Muhtadi, Suleiman Zubair:
A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks. Int. J. Distributed Sens. Networks 11: 524038:1-524038:22 (2015) - [j15]AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran, Abdelouahid Derhab:
Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks. Int. J. Distributed Sens. Networks 11: 542856:1-542856:13 (2015) - [j14]Abdelouahid Derhab, Abdelghani Bouras:
Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems. Secur. Commun. Networks 8(7): 1193-1212 (2015) - [j13]Miloud Bagaa, Mohamed F. Younis, Djamel Djenouri, Abdelouahid Derhab, Nadjib Badache:
Distributed Low-Latency Data Aggregation Scheduling in Wireless Sensor Networks. ACM Trans. Sens. Networks 11(3): 49:1-49:36 (2015) - [c21]Shaker Alanazi, Jalal Al-Muhtadi, Abdelouahid Derhab, Kashif Saleem, Afnan N. AlRomi, Hanan S. Alholaibah, Joel J. P. C. Rodrigues:
On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. HealthCom 2015: 205-210 - [c20]Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Jalal Al-Muhtadi:
Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks. ITNG 2015: 234-239 - [c19]Mohamed Guerroumi, Abdelouahid Derhab, Kashif Saleem:
Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink. ITNG 2015: 307-313 - 2014
- [j12]Miloud Bagaa, Mohamed F. Younis, Abdelouahid Derhab, Nadjib Badache:
Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN. Comput. Networks 75: 331-350 (2014) - [j11]Miloud Bagaa, Yacine Challal, Adlen Ksentini, Abdelouahid Derhab, Nadjib Badache:
Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges. IEEE Commun. Surv. Tutorials 16(3): 1339-1368 (2014) - [j10]Abdelouahid Derhab, Abdelghani Bouras, Mustapha Réda Senouci, Muhammad Imran:
Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c18]Noureddine Lasla, Abdelouahid Derhab, Abdelraouf Ouadjaout, Miloud Bagaa, Yacine Challal:
SMART: Secure Multi-pAths Routing for wireless sensor neTworks. ADHOC-NOW 2014: 332-345 - [c17]Abdelraouf Ouadjaout, Noureddine Lasla, Miloud Bagaa, Messaoud Doudou, Cherif Zizoua, Mohamed Amine Kafi, Abdelouahid Derhab, Djamel Djenouri, Nadjib Badache:
DZ50: Energy-efficient Wireless Sensor Mote Platform for Low Data Rate Applications. EUSPN/ICTH 2014: 189-195 - [c16]Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi:
Low delay and secure M2M communication mechanism for eHealthcare. Healthcom 2014: 105-110 - [c15]Abdelouahid Derhab, Abdelghani Bouras, Fahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang:
Spam Trapping System: Novel security framework to fight against spam botnets. ICT 2014: 467-471 - [c14]Abdelouahid Derhab, Kashif Saleem, Ahmed E. Youssef:
Third line of defense strategy to fight against SMS-based malware in android smartphones. IWCMC 2014: 542-547 - 2013
- [j9]Abdelouahid Derhab, Djamel Djenouri, Jianguo Ding:
Editorial. Int. J. Commun. Networks Distributed Syst. 11(2): 117-119 (2013) - 2012
- [c13]Abdelouahid Derhab, Fatma Ounini, Badis Remli:
MOB-TOSSIM: An Extension Framework for TOSSIM Simulator to Support Mobility in Wireless Sensor and Actuator Networks. DCOSS 2012: 300-305 - [c12]Miloud Bagaa, Abdelouahid Derhab, Noureddine Lasla, Abdelraouf Ouadjaout, Nadjib Badache:
Semi-structured and unstructured data aggregation scheduling in wireless sensor networks. INFOCOM 2012: 2671-2675 - [c11]Noureddine Lasla, Abdelouahid Derhab, Abdelraouf Ouadjaout, Miloud Bagaa, Adlen Ksentini, Nadjib Badache:
Half-Symmetric Lens based localization algorithm for wireless sensor networks. LCN 2012: 320-323 - 2011
- [c10]Abdelouahid Derhab, Noureddine Lasla:
Distributed algorithm for the actor coverage problem in WSN-based precision irrigation applications. DCOSS 2011: 1-6 - 2010
- [c9]Mohamed Hamdy El-Eliemy, Abdelouahid Derhab, Birgitta König-Ries:
A Comparison on MANETs' Service Replication Schemes: Interest versus Topology Prediction. WiMo 2010: 202-216
2000 – 2009
- 2009
- [j8]Abdelouahid Derhab, Nadjib Badache:
Data replication protocols for mobile ad-hoc networks: a survey and taxonomy. IEEE Commun. Surv. Tutorials 11(2): 33-51 (2009) - [c8]Mustapha Réda Senouci, Abdelouahid Derhab, Nadjib Badache:
Efficient Monitoring Mechanisms for Cooperative Storage in Mobile Ad-Hoc Networks: Detection Time and Accuracy Tradeoffs. ICDCS Workshops 2009: 130-136 - 2008
- [j7]Abdelouahid Derhab, Nadjib Badache:
Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service. Ad Hoc Networks 6(7): 1013-1030 (2008) - [j6]Abdelouahid Derhab, Nadjib Badache:
Self-stabilizing algorithm for high service availability in spite of concurrent topology changes in ad hoc mobile networks. J. Parallel Distributed Comput. 68(6): 752-768 (2008) - [j5]Abdelouahid Derhab, Nadjib Badache:
A distributed mutual exclusion algorithm over multi-routing protocol for mobile ad hoc networks. Int. J. Parallel Emergent Distributed Syst. 23(3): 197-218 (2008) - [j4]Abdelouahid Derhab, Nadjib Badache:
A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks. IEEE Trans. Parallel Distributed Syst. 19(7): 926-939 (2008) - [c7]Abdelouahid Derhab:
Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks. ADHOC-NOW 2008: 401-412 - [c6]Abdelouahid Derhab:
SQUIRREL: Self-Organizing Qos-roUting for IntRa-flow Contention in Ad-Hoc wiRELess Networks. IWSOS 2008: 269-274 - 2007
- [j3]Zakaria Maamar, Qusay H. Mahmoud, Abdelouahid Derhab:
Enabling ad-hoc collaboration between mobile users in the MESSENGER project. Clust. Comput. 10(1): 67-79 (2007) - [j2]Abdelouahid Derhab, Nadjib Badache:
Mobile Networks A pull-based service replication protocol in mobile ad hoc networks. Eur. Trans. Telecommun. 18(1): 1-11 (2007) - 2006
- [j1]Djamel Djenouri, Abdelouahid Derhab, Nadjib Badache:
Ad Hoc Networks Routing Protocols and Mobility. Int. Arab J. Inf. Technol. 3(2): 126-133 (2006) - [c5]Zakaria Maamar, Qusay H. Mahmoud, Abdelouahid Derhab:
On Promoting Ad-Hoc Collaboration Among Messengers. AINA (1) 2006: 785-790 - [c4]Abdelouahid Derhab, Nadjib Badache:
Localized Hybrid Data Delivery Scheme using K-hop Clustering Algorithm in Ad Hoc Networks. MASS 2006: 668-673 - [c3]Zakaria Maamar, Qusay H. Mahmoud, Abdelouahid Derhab, Wathiq Mansoor:
Ad-Hoc Collaboration Between Messengers: Operations and Incentives. MDM 2006: 10 - [c2]Abdelouahid Derhab, Nadjib Badache, Karim Tari, Sihem Sami:
ELS: Energy-Aware Some-for-Some Location Service for Ad Hoc Mobile Networks. WASA 2006: 240-251 - 2005
- [c1]Abdelouahid Derhab, Nadjib Badache, Abdelmadjid Bouabdallah:
A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks. WONS 2005: 236-245
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint