FANET: Communication, mobility models and security issues A Chriki, H Touati, H Snoussi, F Kamoun Computer Networks 163, 106877, 2019 | 264 | 2019 |
SVM-based indoor localization in wireless sensor networks A Chriki, H Touati, H Snoussi 2017 13th international wireless communications and mobile computing …, 2017 | 126 | 2017 |
Deep learning and handcrafted features for one-class anomaly detection in UAV video A Chriki, H Touati, H Snoussi, F Kamoun Multimedia Tools and Applications 80, 2599-2620, 2021 | 55 | 2021 |
Efficient forwarding strategy in a NDN-based internet of things A Aboud, H Touati, B Hnich Cluster Computing(2018) https://doi.org/10.1007/s10586-018-2859-7, 2018 | 49 | 2018 |
UAV-GCS centralized data-oriented communication architecture for crowd surveillance applications A Chriki, H Touati, H Snoussi, F Kamoun 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 35 | 2019 |
Uav-based surveillance system: an anomaly detection approach A Chriki, H Touati, H Snoussi, F Kamoun 2020 IEEE Symposium on computers and communications (ISCC), 1-6, 2020 | 25 | 2020 |
Deep neural networks for indoor localization using WiFi fingerprints S BelMannoubi, H Touati Mobile, Secure, and Programmable Networking: 5th International Conference …, 2019 | 25 | 2019 |
Geographic Interest Forwarding in NDN-Based Wireless Sensor Networks A Aboud, H Touati The 13th ACS/IEEE International Conference on Computer Systems and …, 2016 | 23 | 2016 |
Hop-by-hop interest rate notification and adjustment in named data networks S Mejri, H Touati, F Kamoun 2018 IEEE wireless communications and networking conference (WCNC), 1-6, 2018 | 21 | 2018 |
Hop-by-hop congestion control for named data networks S Mejri, H Touati, N Malouch, F Kamoun 2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017 | 21 | 2017 |
A survey on security attacks and intrusion detection mechanisms in named data networking A Hidouri, N Hajlaoui, H Touati, M Hadded, P Muhlethaler Computers 11 (12), 186, 2022 | 19 | 2022 |
Cognitive Radio and Dynamic TDMA for efficient UAVs swarm communications H Touati, A Chriki, H Snoussi, F Kamoun Computer Networks 196, 108264, 2021 | 17 | 2021 |
Anomaly Detection in Connected and Autonomous Vehicles: A Survey, Analysis, and Research Challenges S Baccari, M Hadded, H Ghazzai, H Touati, M Elhadef IEEE Access, 2024 | 16 | 2024 |
Named Data Networking‐based communication model for Internet of Things using energy aware forwarding strategy and smart sleep mode H Touati, A Aboud, B Hnich Concurrency and Computation: Practice and Experience 34 (3), e6584, 2022 | 16 | 2022 |
Stacked auto-encoder for scalable indoor localization in wireless sensor networks S BelMannoubi, H Touati, H Snoussi 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 16 | 2019 |
Preventing unnecessary interests retransmission in named data networking S Mejri, H Touati, F Kamoun 2016 International Symposium on Networks, Computers and Communications …, 2016 | 14 | 2016 |
Cache pollution attacks in the NDN architecture: Impact and analysis A Hidouri, M Hadded, N Hajlaoui, H Touati, P Muhlethaler 2021 International Conference on Software, Telecommunications and Computer …, 2021 | 13 | 2021 |
MAC-aware routing protocols for vehicular ad hoc networks: A survey A Rebei, M Hadded, H Touati, F Boukhalfa, P Muhlethaler 2020 International Conference on Software, Telecommunications and Computer …, 2020 | 12 | 2020 |
A secure data storage in multi-cloud architecture using blowfish encryption algorithm H Ghanmi, N Hajlaoui, H Touati, M Hadded, P Muhlethaler International Conference on Advanced Information Networking and Applications …, 2022 | 11 | 2022 |
Performance impact analysis of security attacks on cross-layer routing protocols in vehicular ad hoc networks S Baccari, H Touati, M Hadded, P Muhlethaler 2020 International Conference on Software, Telecommunications and Computer …, 2020 | 11 | 2020 |