default search action
Tarek Bejaoui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Tarek Ali, Amna Eleyan, Tarek Bejaoui, Mohammed Al-Khalidi:
Lightweight Intrusion Detection System with GAN-Based Knowledge Distillation. SmartNets 2024: 1-7 - [c36]Dina Jrab, Derar Eleyan, Amna Eleyan, Tarek Bejaoui:
Heart Disease Prediction Using Machine Learning Algorithms. SmartNets 2024: 1-8 - [c35]Abdallah Mohammad, Derar Eleyan, Amna Eleyan, Tarek Bejaoui:
IoT-Based Plant Disease Detection using Machine Learning: A Systematic Literature Review. SmartNets 2024: 1-7 - 2023
- [j7]Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan, Mohammed Al-Khalidi:
A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity. Inf. 14(5): 263 (2023) - [c34]Ali Adnan Abubaker, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Norliza Katuk, Mohammed Al-Khalidi:
Social Engineering in Social Network: A Systematic Literature Review. ISNCC 2023: 1-7 - [c33]Anas AliAhmad, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Mohamad Fadli Zolkipli, Mohammed Al-Khalidi:
Malware Detection Issues, Future Trends and Challenges: A Survey. ISNCC 2023: 1-6 - [c32]Tarek Ali, Amna Eleyan, Tarek Bejaoui:
Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review. ISNCC 2023: 1-7 - [c31]Rim Moussa, Riad Ouechtatti, Ahmed Rezgui, Tarek Bejaoui:
Exploration of Document-Oriented Stores' Capacities for Managing Community e-Mailing Lists: Elastic Stack as a Case Study. ISNCC 2023: 1-6 - [c30]Tasneem Durid, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Mahmoud Jazzar:
Cybersecurity in Fitness Devices-A Systematic Literature Review. SmartNets 2023: 1-6 - [c29]Ruwa F. Abu Hweidi, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui:
SATA M.2 on Forensics: Trim Function Effect on Recovering Permanently Deleted Files. SmartNets 2023: 1-6 - [c28]Ruwa F. Abu Hweidi, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui:
Forensics Investigation on Social Media Apps and Web Apps Messaging in Android Smartphone. SmartNets 2023: 1-7 - [c27]Rasheed Yousef, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui:
A Machine Learning Framework & Development for Insider Cyber-crime Threats Detection. SmartNets 2023: 1-6 - 2022
- [c26]Dhia Eddine Bejaoui, Hela Mahersia, Tarek Bejaoui:
A Novel Nodule Tracking System and Convolutional Neural Networks for Medical Internet of Things. MENACOMM 2022: 197-202 - [c25]Zaina AlSaed, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui, Segun I. Popoola:
An Integrated Framework Implementation For Cloud Forensics Investigation Using Logging Tool. SmartNets 2022: 1-6 - [c24]Paul Samuel Christopherson, Amna Eleyan, Tarek Bejaoui, Mahmoud Jazzar:
Smart Stick for Visually Impaired People using Raspberry Pi with Deep Learning. SmartNets 2022: 1-6 - [c23]Ammar Dawabsheh, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui, Segun I. Popoola:
An Enhanced Phishing Detection Tool Using Deep Learning From URL. SmartNets 2022: 1-6 - [c22]Raghad Khweiled, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui:
Using SQLite Structure Analysis To Retrieve Unsent Messages On WhatsApp Messaging Application. SmartNets 2022: 1-6 - 2020
- [c21]Abderazek Chaka Bannour, Rim Moussa, Tarek Bejaoui:
Real-Time Tracking of Aircrafts in Crowdsourced Air Traffic Networks with Simple Localization Estimates. ISNCC 2020: 1-6 - [c20]Fatima Lamia Haddi, Mahfoud Benchaïba, Jihene Rezgui, Tarek Bejaoui:
Peers Classification and Monitoring in a P2P System. ISNCC 2020: 1-6
2010 – 2019
- 2019
- [j6]Imen Achour, Tarek Bejaoui, Anthony Busson, Sami Tabbane:
Performance modeling of SEAD protocol in vehicular environment. Wirel. Networks 25(6): 3115-3132 (2019) - 2018
- [c19]Rim Moussa, Ahmed Haddad, Tarek Bejaoui:
The Quest for Scalable and Intelligent Trajectory Data Analytics Systems: Status Report and Future Directions. SmartNets 2018: 1-6 - 2017
- [c18]Imen Achour, Tarek Bejaoui, Anthony Busson, Sami Tabbane:
Network Coding scheme behavior in a Vehicle-to-Vehicle safety message dissemination. ICC Workshops 2017: 441-446 - 2016
- [j5]Imen Achour, Tarek Bejaoui, Anthony Busson, Sami Tabbane:
SEAD: A simple and efficient adaptive data dissemination protocol in vehicular ad-hoc networks. Wirel. Networks 22(5): 1673-1683 (2016) - [c17]Imen Achour, Tarek Bejaoui, Anthony Busson, Sami Tabbane:
Delay-based strategy for safety message dissemination in Vehicular Ad hoc NETworks: Slotted or continuous? IWCMC 2016: 268-274 - 2015
- [j4]Nidal Nasser, Reid Miller, Amir Esmailpour, Abd-Elhamid M. Taha, Tarek Bejaoui:
Optimized bandwidth allocation in broadband wireless access networks. Wirel. Commun. Mob. Comput. 15(17): 2111-2124 (2015) - [c16]Imen Achour, Tarek Bejaoui, Anthony Busson, Sami Tabbane:
A Redundancy-Based Protocol for Safety Message Dissemination in Vehicular Ad Hoc Networks. VTC Fall 2015: 1-6 - 2014
- [c15]Imen Achour, Tarek Bejaoui, Sami Tabbane:
Network coding-based dissemination protocols for inter-vehicle communication. ISNCC 2014: 1-6 - [c14]Imen Achour, Tarek Bejaoui, Sami Tabbane:
Network coding approach for vehicle-to-vehicle communication: Principles, protocols and benefits. SoftCOM 2014: 154-159 - 2013
- [c13]Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
A weighted QoS aware multipath routing process in Mobile Ad hoc networks. ISCC 2013: 336-341 - [c12]Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
An enhanced Quality Aware Multi path routing protocol over MA-NETs based on cross layer approach. ISWCS 2013: 1-5 - [c11]Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
An enhanced routing protocol for 802.11s-LTE communications. ISWCS 2013: 1-5 - [c10]Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
A Cross Layer Balanced Routing Protocol for Differentiated Traffics over Mobile Ad Hoc Networks. NEW2AN 2013: 407-419 - 2012
- [j3]Soumaya Hamouda, Tarek Bejaoui:
Enhanced Relay Selection and Scheduling for Better Load Balancing in Multi-Hop Networks. Int. J. Bus. Data Commun. Netw. 8(4): 17-31 (2012) - [c9]Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
Enhanced Backtracking Chord protocol for mobile Ad hoc networks. ICCIT 2012: 191-195 - 2011
- [c8]Mariem Thaalbi, Ahmed Meddahi, Tarek Bejaoui, Nabil Tabbane:
An enhanced chord-based P2P lookup protocol for mobile Ad hoc networks. Wireless Days 2011: 1-5
2000 – 2009
- 2009
- [j2]Tarek Bejaoui, Nidal Nasser:
Efficient call admission control scheme for 4G wireless networks. Wirel. Commun. Mob. Comput. 9(4): 489-499 (2009) - [c7]Tarek Bejaoui, Lynda Mokdad:
Adaptive Hybrid Call Admission Control Policy for UMTS with Underlying Tunnel-WLANs Heterogeneous Networks. ICC 2009: 1-5 - 2008
- [c6]Tarek Bejaoui, Nidal Nasser:
Handover and class-based Call Admission Control policy for 4G-heterogeneous mobile networks. AICCSA 2008: 373-380 - 2007
- [c5]Asma Ben Letaifa, Tarek Bejaoui, Sami Tabbane, Zièd Choukair:
Optimal Routing Approaches for Radio Mobile Multimedia Services. CCNC 2007: 1092-1097 - [c4]Nidal Nasser, Tarek Bejaoui:
User satisfaction based scheduling algorithm for high-speed wireless networks. IWCMC 2007: 164-169 - 2006
- [j1]Tarek Bejaoui, Véronique Vèque, Sami Tabbane:
Combined fair packet scheduling policy and multi-class adaptive CAC scheme for QoS provisioning in multimedia cellular networks. Int. J. Commun. Syst. 19(2): 121-139 (2006) - [c3]Tarek Bejaoui, Nidal Nasser, Véronique Vèque:
Enhanced Class-based Packet Scheduling Policy for QoS Provisioning in Multimedia Cellular Networks. AICCSA 2006: 62-69 - [c2]Nidal Nasser, Tarek Bejaoui:
Adaptive resource management for cellular-based multimedia wireless networks. IWCMC 2006: 641-646 - 2005
- [c1]Tarek Bejaoui, Véronique Vèque, Sami Tabbane:
Multi-class adaptive radio resource management policy for multimedia cellular networks. IPCCC 2005: 555-560
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-24 20:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint