default search action
Amel Meddeb-Makhlouf
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Zainab Shaker Matar Al-Husseini, Hussain K. Chaiel, Amel Meddeb, Ahmed Fakhfakh:
A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammers. Serv. Oriented Comput. Appl. 18(3): 225-247 (2024) - 2023
- [j11]Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai:
CADS-ML/DL: efficient cloud-based multi-attack detection system. Int. J. Inf. Sec. 22(6): 1989-2013 (2023) - [j10]Amel Meddeb-Makhlouf, Saadia Ghribi, Faouzi Zarai:
Layer-based cooperation for intrusion detection in mobile cloud environment. Int. J. Mob. Commun. 21(3): 365-384 (2023) - [c42]Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai:
Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset. ICISSP 2023: 287-295 - [c41]Mariem Fourati, Amel Meddeb-Makhlouf, Faouzi Zarai:
Blockchain-Based Trust Management for IoMT Environment. VECoS 2023: 149-162 - [c40]Frikha Hounaida, Larbi Chrifi-Alaoui, Odette Fokapu, Amel Meddeb-Makhlouf, Faouzi Zarai:
COVID-19 Patient Secure Classification Based on ANN and Risk Analysis. WETICE 2023: 1-7 - [c39]Frikha Hounaida, Larbi Chrifi-Alaoui, Odette Fokapu, Amel Meddeb-Makhlouf, Faouzi Zarai:
QTc-Based Machine Learning Analysis of COVID-19 and Post-COVID-19 Patients. WETICE 2023: 1-6 - 2022
- [j9]Rania Chokri, Wasma Hanini, Wided Ben Daoud, Samia Allaoua Chelloug, Amel Meddeb-Makhlouf:
Secure IoT Assistant-Based System for Alzheimer's Disease. IEEE Access 10: 44305-44314 (2022) - [j8]Saadia Ghribi, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohsen Guizani:
Fog-cloud distributed intrusion detection and cooperation. Trans. Emerg. Telecommun. Technol. 33(8) (2022) - [c38]Mbarka Belhaj Mohamed, Amel Meddeb-Makhlouf, Ahmed Fakhfakh, Olfa Kanoun:
Robust Jamming Attacks Detection Algorithm for Healthcare Applications. SSD 2022: 1333-1340 - [c37]Nozha Dhibi, Amel Meddeb-Makhlouf, Faouzi Zerai:
Reputation management for trusted VCC architecture. IWCMC 2022: 737-742 - [c36]Mays A. Hamdan, Amel Meddeb-Makhlouf, Hassène Mnif:
Review of Authentication with Privacy-preserving Schemes for 5G-enabled Vehicular Networks. SIN 2022: 1-6 - 2021
- [j7]Nesrine Meddeb, Amel Meddeb-Makhlouf, Mohamed Ali Ben Ayed:
Secure and Efficient Video Transmission in VANET. Int. J. Commun. Networks Inf. Secur. 13(1) (2021) - [c35]Wided Ben Daoud, Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Sami Mahfoudhi:
SACP: Secure Access Control Protocol. IWCMC 2021: 935-941 - [c34]Ferdaous Kamoun-Abid, Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai:
Secure architecture for Cloud/Fog computing based on firewalls and controllers. KES 2021: 822-833 - 2020
- [c33]Mbarka Belhaj Mohamed, Amel Meddeb-Makhlouf, Ahmed Fakhfakh, Olfa Kanoun:
Intrusion Detection based on Correlation of Multiple Health Signals in WBSN. SSD 2020: 372-377 - [c32]Achraf Jmal, Rim Barioul, Amel Meddeb-Makhlouf, Ahmed Fakhfakh, Olfa Kanoun:
An Embedded ANN Raspberry PI for Inertial Sensor Based Human Activity Recognition. ICOST 2020: 375-385 - [c31]Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai:
Comparative Study of Classification Algorithms for Cloud IDS using NSL-KDD Dataset in WEKA. IWCMC 2020: 445-450 - [c30]Hanan Idriss, Hend Marouane, Amel Meddeb-Makhlouf, Ahmed Fakhfakh, Abdel-Mehsen Ahmad, Zouhair El-Bazzal, Hussein Hijazi:
Trust-Based NOMA for Resource Allocation in Vehicular Communications. IWCMC 2020: 1246-1251 - [c29]Rim Aloulou, Amel Meddeb-Makhlouf, Bilel Gassara, Ahmed Fakhfakh:
Securing a power management chain for Smart Grids. IWCMC 2020: 1713-1718 - [c28]Amal Hadrich, Amel Meddeb-Makhlouf, Faouzi Zarai:
Learning-Based Evaluation of Routing Protocol in Vehicular Network Using WEKA. NPC 2020: 55-67 - [c27]Frikha Hounaida, Wided Ben Daoud, Amel Meddeb-Makhlouf, Faouzi Zarai:
A Learning based Secure Anomaly Detection for Healthcare Applications. WETICE 2020: 124-130
2010 – 2019
- 2019
- [j6]Wided Ben Daoud, Mohammad S. Obaidat, Amel Meddeb-Makhlouf, Faouzi Zarai, Kuei-Fang Hsiao:
TACRM: trust access control and resource management mechanism in fog computing. Hum. centric Comput. Inf. Sci. 9: 28 (2019) - [j5]Amel Meddeb-Makhlouf, Mohsen Guizani:
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications. Int. J. Inf. Sec. 18(5): 665-676 (2019) - [j4]Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Petros Nicopolitidis:
OAP-WMN: optimised and secure authentication protocol for wireless mesh networks. Int. J. Secur. Networks 14(4): 205-220 (2019) - [j3]Ferdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohsen Guizani:
DVF-fog: distributed virtual firewall in fog computing based on risk analysis. Int. J. Sens. Networks 30(4): 242-253 (2019) - [c26]Wided Ben Daoud, Amel Meddeb-Makhlouf, Mohammad S. Obaidat, Faouzi Zarai, Kuei-Fang Hsiao:
Service Management Algorithm-based on Security Monitoring Mechanism for Fog IoT Users in Fog Networks. ICETE (1) 2019: 13-19 - [c25]Mbarka Belhaj Mohamed, Amel Meddeb-Makhlouf, Ahmed Fakhfakh:
Intrusion cancellation for anomaly detection in healthcare applications. IWCMC 2019: 313-318 - [c24]Ala Din Trabelsi, Hend Marouane, Faouzi Zarai, Amel Meddeb-Makhlouf:
Dynamic Scheduling Algorithm based on Priority Assignment for LTE-V2X vehicular Networks. IWCMC 2019: 483-488 - [c23]Nesrine Meddeb, Amel Meddeb-Makhlouf, Mohamed Ali Ben Ayed:
Priority based Safety Management and Slot Reservation for Authenticated Vehicle. IWCMC 2019: 1977-1982 - 2018
- [j2]Malek Rekik, Amel Makhlouf, Faouzi Zarai, Mohammad S. Obaidat:
Improved Mutual Authentication in VANETs. Ad Hoc Sens. Wirel. Networks 42(1-2): 63-85 (2018) - [c22]Ferdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohsen Guizani:
Distributed and Cooperative firewall/controller in cloud environments. ARES 2018: 24:1-24:10 - [c21]Wided Ben Daoud, Amel Meddeb-Makhlouf, Faouzi Zarai:
A Trust-based Access Control Scheme for e-Health Cloud. AICCSA 2018: 1-7 - [c20]Ferdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai:
Distributed Firewall and Controller for Mobile Cloud Computing. AICCSA 2018: 1-9 - [c19]Malek Rekik, Mohammad S. Obaidat, Amel Makhlouf, Faouzi Zarai:
An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks. ICC 2018: 1-6 - [c18]Wided Ben Daoud, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohammad S. Obaidat, Kuei-Fang Hsiao:
A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments. ICETE (1) 2018: 462-468 - [c17]Saadia Ghribi, Amel Meddeb-Makhlouf, Faouzi Zarai:
C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environment. IWCMC 2018: 267-272 - [c16]Wided Ben Daoud, Amel Meddeb-Makhlouf, Faouzi Zarai:
A Model of Role-Risk Based Intrusion Prevention for Cloud Environment. IWCMC 2018: 530-535 - [c15]Mbarka Belhaj Mohamed, Amel Meddeb-Makhlouf, Ahmed Fakhfakh:
Correlation for efficient anomaly detection in medical environment. IWCMC 2018: 548-553 - [c14]Nesrine Meddeb, Amel Meddeb-Makhlouf, Mohamed Ali Ben Ayed:
A Multilevel Authentication Protocol (MAP) for Human Safety in VANET. IWCMC 2018: 916-921 - [c13]Ferdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai:
Risk-based Decision for a Distributed and Cooperative network policy in Cloud Computing. IWCMC 2018: 1161-1166 - 2017
- [c12]Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohammad S. Obaidat:
Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks. AICCSA 2017: 1133-1140 - [c11]Amel Meddeb-Makhlouf, Nesrine Meddeb, Mohamed Ali Ben Ayed:
An Enhanced Multilevel Authentication Protocol for VANETs. AICCSA 2017: 1232-1238 - [c10]Saadia Ghribi, Amel Meddeb-Makhlouf, Faouzi Zarai:
Multi-layer Cooperative Intrusion Detection System for Cloud Environment. WINSYS 2017: 36-44 - 2015
- [c9]Sihem Châabouni, Amel Meddeb-Makhlouf:
Error/Intrusion Target Identification on the Physical Layer over a BICM Scheme. ARES 2015: 205-210 - [c8]Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohammad S. Obaidat:
A MSCTP-Based Authentication Protocol: MSCTPAP. DSDIS 2015: 617-623 - 2014
- [c7]Malek Rekik, Amel Makhlouf, Mohammad S. Obaidat, Faouzi Zarai:
A Robust Stream Control Transmission Protocol (SCTP)-Based Authentication Protocol. ICETE (Selected Papers) 2014: 34-57 - [c6]Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohammad S. Obaidat, Kuei-Fang Hsiao:
A SCTP-based Authentication Protocol: SCTPAP. DCNET 2014: 47-53
2000 – 2009
- 2009
- [j1]Mohamed Hamdi, Amel Meddeb-Makhlouf, Noureddine Boudriga:
Multilayer Statistical Intrusion Detection in Wireless Networks. EURASIP J. Adv. Signal Process. 2009 (2009) - 2007
- [c5]Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga:
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. AICCSA 2007: 825-832 - [c4]Amel Meddeb-Makhlouf, Noureddine Boudriga, Mohammad S. Obaidat:
Radio-Based Cooperation for Wireless Intrusion Detection. GLOBECOM 2007: 946-950 - [c3]Amel Meddeb-Makhlouf, Noureddine Boudriga, Mohammad S. Obaidat:
Radio-based Cooperation Scheme for DDoS Detection. ICECS 2007: 1051-1054 - [c2]Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga:
Global intrusion detection and tolerance in networked systems. SAC 2007: 188-189 - 2005
- [c1]Amel Meddeb-Makhlouf, Sihem Guemara-ElFatmi, Sihem Barrah:
New correlation method for an efficient intrusion detection system. ICECS 2005: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 19:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint