default search action
Haifa Touati
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Sihem Baccari, Mohamed Hadded, Hakim Ghazzai, Haifa Touati, Mourad Elhadef:
Anomaly Detection in Connected and Autonomous Vehicles: A Survey, Analysis, and Research Challenges. IEEE Access 12: 19250-19276 (2024) - [j14]Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler, Saadi Boudjit:
Blockchain-cloud integration: Comprehensive survey and open research issues. Concurr. Comput. Pract. Exp. 36(15) (2024) - [j13]Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane, Leïla Azouz Saïdane:
A Comprehensive Survey on Vehicular Communication Security. J. Cyber Secur. Mobil. 13(5): 1007-1038 (2024) - [j12]Tayssir Ismail, Nasreddine Hajlaoui, Haifa Touati, Mohamed Elhadad, Paul Muhlethaler, Leïla Azouz Saïdane:
A Fuzzy-Based Greedy Behaviour Attack Detection Approach in VANETs. SN Comput. Sci. 5(7): 822 (2024) - [c35]Henda Hnaien, Ahmed Aboud, Haifa Touati, Hichem Snoussi:
Path Planning in UAV-Assisted Wireless Networks: A Comprehensive Survey and Open Research Issues. AINA (6) 2024: 286-297 - [c34]Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler, Saadi Boudjit:
A Decentralized Blockchain-Based Platform for Secure Data Sharing in Cloud Storage Model. AINA (4) 2024: 338-348 - 2023
- [j11]Abdelhak Hidouri, Haifa Touati, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler, Samia Bouzefrane:
Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking. Comput. Networks 235: 109998 (2023) - [j10]Ahmed Aboud, Haifa Touati, Brahim Hnich:
Hybrid 802.11p-cellular architecture for NDN-based VANET. Int. J. Commun. Syst. 36(3) (2023) - [j9]Souad BelMannoubi, Haifa Touati, Mohamed Hadded, Khalifa Toumi, Oyunchimeg Shagdar, Farouk Kamoun:
A comprehensive survey on blockchain-based C-ITS applications: Classification, challenges, and open issues. Veh. Commun. 43: 100607 (2023) - [c33]Yosra Hassine, Haifa Touati:
Vehicular Platoons Security: A Review with an Emphasis on Sybil Attacks. PEMWN 2023: 1-6 - 2022
- [j8]Abdelhak Hidouri, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler:
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking. Comput. 11(12): 186 (2022) - [j7]Haifa Touati, Ahmed Aboud, Brahim Hnich:
Named Data Networking-based communication model for Internet of Things using energy aware forwarding strategy and smart sleep mode. Concurr. Comput. Pract. Exp. 34(3) (2022) - [c32]Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler:
A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm. AINA (2) 2022: 398-408 - [c31]Abdelhak Hidouri, Haifa Touati, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler:
A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture. AINA (1) 2022: 435-446 - [c30]Abdelhak Hidouri, Mohamed Hadded, Haifa Touati, Nasreddine Hajlaoui, Paul Muhlethaler:
Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN). ICCSA (1) 2022: 310-323 - [c29]Salwa Abdelwahed, Haifa Touati:
LSTM-Based Congestion Detection in Named Data Networks. ISDA (4) 2022: 132-142 - 2021
- [j6]Haifa Touati, Safa Mejri, Naceur Malouch, Farouk Kamoun:
Fair hop-by-hop interest rate control to mitigate congestion in named data networks. Clust. Comput. 24(3): 2213-2230 (2021) - [j5]Haifa Touati, Amira Chriki, Hichem Snoussi, Farouk Kamoun:
Cognitive Radio and Dynamic TDMA for efficient UAVs swarm communications. Comput. Networks 196: 108264 (2021) - [j4]Sihem Baccari, Mohamed Hadded, Haifa Touati, Paul Mühlethaler:
A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks. J. Cyber Secur. Mobil. 10(2): 377-402 (2021) - [j3]Amira Chriki, Haifa Touati, Hichem Snoussi, Farouk Kamoun:
Deep learning and handcrafted features for one-class anomaly detection in UAV video. Multim. Tools Appl. 80(2): 2599-2620 (2021) - [c28]Abir Rebei, Fouzi Boukhalfa, Haifa Touati, Mohamed Hadded, Paul Mühlethaler:
An Efficient Cross-Layer Design for Multi-hop Broadcast of Emergency Warning Messages in Vehicular Networks. AINA (1) 2021: 25-38 - [c27]Ahmed Aboud, Haifa Touati, Brahim Hnich:
Handover Optimization for VANET in 5G Networks. CCNC 2021: 1-2 - [c26]Ahmed Aboud, Haifa Touati, Brahim Hnich:
Markov Chain based Predictive Model for Efficient handover Management in Vehicle-to-Infrastructure Communications. IWCMC 2021: 1117-1122 - [c25]Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane, Leïla Azouz Saïdane:
Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks. PEMWN 2021: 1-6 - [c24]Abdelhak Hidouri, Mohamed Hadded, Nasreddine Hajlaoui, Haifa Touati, Paul Mühlethaler:
Cache Pollution Attacks in the NDN Architecture: Impact and Analysis. SoftCOM 2021: 1-6 - 2020
- [c23]Haifa Touati, Boughariou Jihene, Sellemi Lamia, Ben Hamida Ahmed:
e-ASPECTS for early detection and diagnosis of ischemic stroke. ATSIP 2020: 1-5 - [c22]Hend Hnaien, Haifa Touati:
Q-Learning Based Forwarding Strategy in Named Data Networks. ICCSA (1) 2020: 434-444 - [c21]Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Hassen Hamdi:
Hybrid and Secure E-Health Data Sharing Architecture in Multi-Clouds Environment. ICOST 2020: 249-258 - [c20]Amira Chriki, Haifa Touati, Hichem Snoussi, Farouk Kamoun:
UAV-based Surveillance System: an Anomaly Detection Approach. ISCC 2020: 1-6 - [c19]Sihem Baccari, Haifa Touati, Mohamed Hadded, Paul Mühlethaler:
Performance Impact Analysis of Security Attacks on Cross-Layer Routing Protocols in Vehicular Ad hoc Networks. SoftCOM 2020: 1-6 - [c18]Abir Rebei, Mohamed Hadded, Haifa Touati, Fouzi Boukhalfa, Paul Mühlethaler:
MAC-aware Routing Protocols for Vehicular Ad Hoc Networks: A Survey. SoftCOM 2020: 1-6
2010 – 2019
- 2019
- [j2]Ahmed Aboud, Haifa Touati, Brahim Hnich:
Efficient forwarding strategy in a NDN-based internet of things. Clust. Comput. 22(3): 805-818 (2019) - [j1]Amira Chriki, Haifa Touati, Hichem Snoussi, Farouk Kamoun:
FANET: Communication, mobility models and security issues. Comput. Networks 163 (2019) - [c17]Ahmed Aboud, Haifa Touati, Brahim Hnich:
Power Saving Extension for the NDN-Based GIF Protocol for the Internet of Things. IWCMC 2019: 525-530 - [c16]Hanen Ferjani, Haifa Touati:
Efficient Data Dissemination in Electromagnetic Wireless Nano-Sensor Networks. IWCMC 2019: 531-536 - [c15]Souad BelMannoubi, Haifa Touati, Hichem Snoussi:
Stacked Auto-Encoder for Scalable Indoor Localization in Wireless Sensor Networks. IWCMC 2019: 1245-1250 - [c14]Amira Chriki, Haifa Touati, Hichem Snoussi, Farouk Kamoun:
Centralized Cognitive Radio Based Frequency Allocation for UAVs Communication. IWCMC 2019: 1674-1679 - [c13]Amira Chriki, Haifa Touati, Hichem Snoussi, Farouk Kamoun:
UAV-GCS Centralized Data-Oriented Communication Architecture for Crowd Surveillance Applications. IWCMC 2019: 2064-2069 - [c12]Hanen Ferjani, Haifa Touati:
Data Communication in Electromagnetic Nano-networks for Healthcare Applications. MSPN 2019: 140-152 - [c11]Souad BelMannoubi, Haifa Touati:
Deep Neural Networks for Indoor Localization Using WiFi Fingerprints. MSPN 2019: 247-258 - 2018
- [c10]Haifa Touati, Kais Khaldi:
Speech Denoising by Adaptive Filter LMS in the EMD Framework. SSD 2018: 1-4 - [c9]Safa Mejri, Haifa Touati, Farouk Kamoun:
Are NDN Congestion Control Solutions Compatible with Big Data Traffic? HPCS 2018: 978-984 - [c8]Safa Mejri, Haifa Touati, Farouk Kamoun:
Hop-by-hop interest rate notification and adjustment in named data networks. WCNC 2018: 1-6 - 2017
- [c7]Safa Mejri, Haifa Touati, Naceur Malouch, Farouk Kamoun:
Hop-by-Hop Congestion Control for Named Data Networks. AICCSA 2017: 114-119 - [c6]Amira Chriki, Haifa Touati, Hichem Snoussi:
SVM-based indoor localization in Wireless Sensor Networks. IWCMC 2017: 1144-1149 - 2016
- [c5]Ahmed Aboud, Haifa Touati:
Geographic interest forwarding in NDN-based wireless sensor networks. AICCSA 2016: 1-8 - [c4]Safa Mejri, Haifa Touati, Farouk Kamoun:
Preventing unnecessary interests retransmission in named data networking. ISNCC 2016: 1-6
2000 – 2009
- 2009
- [c3]Haifa Touati, Ilhem Lengliz, Farouk Kamoun:
Adapting TCP exponential backoff to multihop ad hoc networks. ISCC 2009: 612-617 - 2007
- [c2]Haifa Touati, Ilhem Lengliz, Farouk Kamoun:
Performance of TCP Adaptive RTO in ad-hoc networks based on different routing protocols. MWCN 2007: 176-180 - 2004
- [c1]Ilhem Lengliz, Haifa Touati, Fehmi Sanàa, Farouk Kamoun, Medy Sanadidi:
Measurements of TCPW ABSE Fairness and Friendliness. ICETE (2) 2004: 175-182
Coauthor Index
aka: Paul Muhlethaler
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint