default search action
Abdelhak Mourad Guéroui
Person information
- affiliation: University of Versailles, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Yasmine Harbi, Zibouda Aliouat, Saad Harous, Abdelhak Mourad Guéroui:
Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment. Comput. Commun. 221: 90-105 (2024) - 2023
- [j36]Jocelyn Edinio Zacko Gbadouissa, Ado Adamou Abba Ari, Emanuel Radoi, Abdelhak Mourad Guéroui:
M-Ary Direct Modulation Chirp Spread Spectrum for Spectrally Efficient Communications. Inf. 14(6): 323 (2023) - [c37]Abderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui:
5GC-Observer Demonstrator: a Non-intrusive Observability Prototype for Cloud Native 5G System. NOMS 2023: 1-3 - [c36]Abderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui:
5GC-Observer: a Non-intrusive Observability Framework for Cloud Native 5G System. NOMS 2023: 1-10 - [c35]Gérard Kponhinto, Ousmane Thiare, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui, Sondès Khemiri-Kallel, Junseok Hwang:
Bio-inspired Solution for Cluster-Tree Based Data Collection Protocol in Wireless Sensors Networks. NOMS 2023: 1-6 - [c34]Ado Adamou Abba Ari, Yekoniya Ndjekiltemai, Jocelyn Edinio Zacko Gbadouissa, Arouna Ndam Njoya, Lyse Naomi Wamba Momo, Ousmane Thiare, Sondès Khemiri-Kallel, Abdelhak Mourad Guéroui:
Correlation Clustering Adapted for Cell Site Management of Mobile Networks in Developing Countries. SAFER-TEA 2023: 108-127 - [c33]Mounirah Djam-Doudou, Ado Adamou Abba Ari, Hortense Boudjou Tchapgnouo, Abdelhak Mourad Guéroui, Alidou Mohamadou, Nabila Labraoui, Ousmane Thiare:
A Lightweight Authenticated Key Agreement Scheme for Resource-Constrained Devices Based on Implicit Certificates and Finite Graphs. SAFER-TEA 2023: 128-155 - 2022
- [j35]Arouna Ndam Njoya, Allassan A Nken Tchangmena, Ado Adamou Abba Ari, Abdelhak Guéroui, Christopher Thron, Berthine Nyunga Mpinda, Ousmane Thiare, Emmanuel Tonyé:
Data Prediction Based Encoder-Decoder Learning in Wireless Sensor Networks. IEEE Access 10: 109340-109356 (2022) - [j34]Arouna Ndam Njoya, Christopher Thron, Marah Nana Awa, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui:
Lifetime optimization of dense wireless sensor networks using continuous ring-sector model. Future Gener. Comput. Syst. 129: 212-224 (2022) - [j33]Arouna Ndam Njoya, Christopher Thron, Marah Nana Awa, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui:
Power-saving system designs for hexagonal cell based wireless sensor networks with directional transmission. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 7911-7919 (2022) - [j32]Sarra Hammoudi, Hamza Ourzeddine, Mourad Guéroui, Saad Harous, Zibouda Aliouat:
A Collision-Free Scheduling Algorithm with Minimum Data Redundancy Transmission for TSCH. Wirel. Pers. Commun. 124(4): 3159-3188 (2022) - [c32]Abderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui:
Cloud Native 5G: an Efficient Orchestration of Cloud Native 5G System. NOMS 2022: 1-9 - [c31]Marah Nana Awa, Arouna Ndam Njoya, Ado Adamou Abba Ari, Abdelhak Guéroui, Christopher Thron, Wahabou Abdou:
QoS Path Planning Strategy in Internet of Things. SITIS 2022: 486-493 - 2021
- [j31]Lazhar Khamer, Nabila Labraoui, Abdelhak Mourad Guéroui, Ado Adamou Abba Ari:
Enhancing video dissemination over urban VANETs using line of sight and QoE awareness mechanisms. Ann. des Télécommunications 76(9-10): 759-775 (2021) - [j30]Ranida Hamidouche, Zibouda Aliouat, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui:
Optimized data gathering in a heterogeneous Internet of Things network. Int. J. Commun. Syst. 34(18) (2021) - [j29]Ranida Hamidouche, Zibouda Aliouat, Ado Adamou Abba Ari, Abdelhak Guéroui:
Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme. KSII Trans. Internet Inf. Syst. 15(6): 2225-2239 (2021) - [j28]Hadjer Goumidi, Saad Harous, Zibouda Aliouat, Abdelhak Mourad Guéroui:
Lightweight Secure Authentication and Key Distribution Scheme for Vehicular Cloud Computing. Symmetry 13(3): 484 (2021) - [j27]Lazhar Khamer, Nabila Labraoui, Abdelhak Mourad Guéroui, Sofiane Zaidi, Ado Adamou Abba Ari:
Road network layout based multi-hop broadcast protocols for Urban Vehicular Ad-hoc Networks. Wirel. Networks 27(2): 1369-1388 (2021) - [c30]Jamal Laknifli, Abdelhak Mourad Guéroui, Abderrezak Rachedi, Yacine Benallouche:
Taxonomy of Machine learning techniques and elastic resource optimization in sliced networks. GLOBECOM 2021: 1-6 - 2020
- [j26]Jocelyn Edinio Zacko Gbadouissa, Ado Adamou Abba Ari, Chafiq Titouna, Abdelhak Mourad Guéroui, Ousmane Thiare:
HGC: HyperGraph based Clustering scheme for power aware wireless sensor networks. Future Gener. Comput. Syst. 105: 175-183 (2020) - [j25]Jocelyn Edinio Zacko Gbadouissa, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui:
Efficient k-means based clustering scheme for mobile networks cell sites management. J. King Saud Univ. Comput. Inf. Sci. 32(9): 1063-1070 (2020) - [j24]Asside Christian Djedouboum, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui, Alidou Mohamadou, Ousmane Thiare, Zibouda Aliouat:
A Framework of Modeling Large-Scale Wireless Sensor Networks for Big Data Collection. Symmetry 12(7): 1113 (2020) - [j23]Arouna Ndam Njoya, Ado Adamou Abba Ari, Marah Nana Awa, Chafiq Titouna, Nabila Labraoui, Joseph Yves Effa, Wahabou Abdou, Abdelhak Guéroui:
Hybrid Wireless Sensors Deployment Scheme with Connectivity and Coverage Maintaining in Wireless Sensor Networks. Wirel. Pers. Commun. 112(3): 1893-1917 (2020)
2010 – 2019
- 2019
- [j22]Ranida Hamidouche, Zibouda Aliouat, Ado Adamou Abba Ari, Mourad Guéroui:
An Efficient Clustering Strategy Avoiding Buffer Overflow in IoT Sensors: A Bio-Inspired Based Approach. IEEE Access 7: 156733-156751 (2019) - [j21]Ado Adamou Abba Ari, Abdelhak Guéroui, Chafiq Titouna, Ousmane Thiare, Zibouda Aliouat:
Resource allocation scheme for 5G C-RAN: a Swarm Intelligence based approach. Comput. Networks 165 (2019) - [j20]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui:
Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles. Int. J. Strateg. Inf. Technol. Appl. 10(4): 33-54 (2019) - 2018
- [j19]Ado Adamou Abba Ari, Nabila Labraoui, Blaise Omer Yenke, Abdelhak Mourad Guéroui:
Clustering algorithm for wireless sensor networks: the honeybee swarms nest-sites selection process based approach. Int. J. Sens. Networks 27(1): 1-13 (2018) - [j18]Ranida Hamidouche, Zibouda Aliouat, Abdelhak Mourad Guéroui, Ado Adamou Abba Ari, Lemia Louail:
Classical and bio-inspired mobility in sensor networks for IoT applications. J. Netw. Comput. Appl. 121: 70-88 (2018) - [j17]Asside Christian Djedouboum, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui, Alidou Mohamadou, Zibouda Aliouat:
Big Data Collection in Large-Scale Wireless Sensor Networks. Sensors 18(12): 4474 (2018) - [j16]Abdelkader Aissioui, Adlen Ksentini, Abdelhak Mourad Guéroui, Tarik Taleb:
On Enabling 5G Automotive Systems Using Follow Me Edge-Cloud Concept. IEEE Trans. Veh. Technol. 67(6): 5302-5316 (2018) - [j15]Ranida Hamidouche, Zibouda Aliouat, Abdelhak Mourad Guéroui:
Genetic Algorithm for Improving the Lifetime and QoS of Wireless Sensor Networks. Wirel. Pers. Commun. 101(4): 2313-2348 (2018) - [c29]Ranida Hamidouche, Manel Khentout, Zibouda Aliouat, Abdelhak Mourad Guéroui, Ado Adamou Abba Ari:
Sink Mobility Based on Bacterial Foraging Optimization Algorithm. CIIA 2018: 352-363 - [c28]Ranida Hamidouche, Zibouda Aliouat, Abdelhak Mourad Guéroui:
Bio-Inspired vs Classical Solutions to Overcome the IoT Challenges. CIoT 2018: 1-7 - [c27]Zibouda Aliouat, Makhlouf Aliouat, Mourad Guéroui:
Dependability Aware Protocol for Urgency Messages Delivery in Internet of Vehicles. IOV 2018: 60-73 - [c26]Ranida Hamidouche, Zibouda Aliouat, Abdelhak Guéroui:
Low Energy-Efficient Clustering and Routing Based on Genetic Algorithm in WSNs. MSPN 2018: 143-156 - 2017
- [j14]Chafiq Titouna, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Ado Adamou Abba Ari, Amine Adouane:
Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 9(2) (2017) - [j13]Ado Adamou Abba Ari, Irepran Damakoa, Abdelhak Guéroui, Chafiq Titouna, Nabila Labraoui, Guidedi Kaladzavi, Blaise Omer Yenke:
Bacterial Foraging Optimization Scheme for Mobile Sensing in Wireless Sensor Networks. Int. J. Wirel. Inf. Networks 24(3): 254-267 (2017) - [c25]Ado Adamou Abba Ari, Irepran Damakoa, Chafiq Titouna, Nabila Labraoui, Abdelhak Guéroui:
Efficient and Scalable ACO-Based Task Scheduling for Green Cloud Computing Environment. SmartCloud 2017: 66-71 - 2016
- [j12]Blaise Omer Yenke, Damien Wohwe Sambo, Ado Adamou Abba Ari, Abdelhak Guéroui:
MMEDD: Multithreading Model for an Efficient Data Delivery in wireless sensor networks. Int. J. Commun. Networks Inf. Secur. 8(3) (2016) - [j11]Ado Adamou Abba Ari, Blaise Omer Yenke, Nabila Labraoui, Irepran Damakoa, Abdelhak Mourad Guéroui:
A power efficient cluster-based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach. J. Netw. Comput. Appl. 69: 77-97 (2016) - [j10]Chafiq Titouna, Makhlouf Aliouat, Abdelhak Mourad Guéroui:
FDS: Fault Detection Scheme for Wireless Sensor Networks. Wirel. Pers. Commun. 86(2): 549-562 (2016) - [j9]Nabila Labraoui, Abdelhak Mourad Guéroui, Larbi Sekhri:
A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks. Wirel. Pers. Commun. 87(3): 1037-1055 (2016) - [c24]Ado Adamou Abba Ari, Abdelhak Mourad Guéroui, Nabila Labraoui, Blaise Omer Yenke, Chafiq Titouna, Irepran Damakoa:
Adaptive scheme for collaborative mobile sensing in wireless sensor networks: Bacterial foraging optimization approach. PIMRC 2016: 1-6 - 2015
- [j8]Abdelkader Aissioui, Adlen Ksentini, Abdelhak Mourad Guéroui, Tarik Taleb:
Toward Elastic Distributed SDN/NFV Controller for 5G Mobile Cloud Management Systems. IEEE Access 3: 2055-2064 (2015) - [j7]Chafiq Titouna, Makhlouf Aliouat, Abdelhak Mourad Guéroui:
Outlier Detection Approach Using Bayes Classifiers in Wireless Sensor Networks. Wirel. Pers. Commun. 85(3): 1009-1023 (2015) - [c23]Nabila Labraoui, Abdelhak Mourad Guéroui, Larbi Sekhri:
On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks. CIIA 2015: 406-415 - [c22]Abdelkader Aissioui, Adlen Ksentini, Abdelhak Mourad Guéroui:
PMIPv6-Based Follow Me Cloud. GLOBECOM 2015: 1-6 - [c21]Abdelkader Aissioui, Adlen Ksentini, Abdelhak Mourad Guéroui:
An efficient elastic distributed SDN controller for follow-me cloud. WiMob 2015: 876-881 - [i1]Ado Adamou Abba Ari, Abdelhak Mourad Guéroui, Nabila Labraoui, Blaise Omer Yenke:
Concepts and evolution of research in the field of wireless sensor networs. CoRR abs/1502.03561 (2015) - 2013
- [j6]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Jonathan Petit:
Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommun. Syst. 54(1): 3-17 (2013) - 2012
- [j5]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat:
Secure DV-Hop localization scheme against wormhole attacks in wireless sensor networks. Trans. Emerg. Telecommun. Technol. 23(4): 303-316 (2012) - [c20]Sidi ould Cheikh, Abdelhak Guéroui:
Multi-hop bandwidth reservation in WMN-based IEEE 802.11s (MBRWMN). ICCIT 2012: 211-215 - [c19]Malik Mubashir Hassan, Abdelhak Guéroui:
I. Improvement of Qos by Dynamic Reallocation of the Mesh Deterministic Access in Wireless Mesh Networks Ieee 802.11s. ICCIT 2012: 227-230 - 2011
- [j4]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Tanveer A. Zia:
Data Aggregation Security Challenge in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 12(3-4): 295-324 (2011) - [j3]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Jonathan Petit:
RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks. J. Univers. Comput. Sci. 17(11): 1550-1571 (2011) - [c18]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat:
Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks. DICTAP (1) 2011: 603-618 - [c17]Rami Ellouze, Abdelhak Mourad Guéroui, Adel M. Alimi:
Femtocells QoS management with user priority in mobile WiMAX. WCNC 2011: 84-89 - [c16]Rami Ellouze, Abdelhak Mourad Guéroui, Adel M. Alimi:
MacroFemto cell handover with enhanced QoS in Mobile WiMAX. WTS 2011: 1-6
2000 – 2009
- 2009
- [c15]Ali Hamieh, Jalel Ben-Othman, Abdelhak Mourad Guéroui, Farid Naït-Abdesselam:
Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks. ICC 2009: 1-6 - [c14]Rami Ellouze, Abdelhak Mourad Guéroui, Mohamed Adel Alimi:
Optimising handover for real-time flows in Mobile wimax network. ISCC 2009: 40-45 - 2007
- [j2]Adlen Ksentini, Abdelhamid Nafaa, Abdelhak Mourad Guéroui, Mohamed Naimi:
ETXOP: A resource allocation protocol for QoS-sensitive services provisioning in 802.11 networks. Perform. Evaluation 64(5): 419-443 (2007) - 2006
- [j1]Adlen Ksentini, Mohamed Naimi, Abdelhak Guéroui:
Toward an improvement of H.264 video transmission over IEEE 802.11e through a cross-layer architecture. IEEE Commun. Mag. 44(1): 107-114 (2006) - [c13]Omar Moussaoui, Adlen Ksentini, Mohamed Naimi, Abdelhak Mourad Guéroui:
A novel clustering algorithm for efficient energy saving in wireless sensor networks. ISCN 2006: 66-72 - [c12]Ousmane Thiare, Abdelhak Mourad Guéroui, Mohamed Naimi:
Distributed Groups Mutual Exclusion Based on Clients/Servers Model. PDCAT 2006: 67-73 - 2005
- [c11]Adlen Ksentini, Abdelhak Mourad Guéroui, Mohamed Naimi:
A new IEEE 802.11 MAC protocol with admission control for sensitive multimedia applications. GLOBECOM 2005: 5 - [c10]Adlen Ksentini, Abdelhak Mourad Guéroui, Mohamed Naimi:
Improving H.264 video transmission in 802.11e EDCA. ICCCN 2005: 381-386 - [c9]Omar Moussaoui, Adlen Ksentini, Mohamed Naimi, Abdelhak Mourad Guéroui:
Multicast Tree Construction with QoS Guaranties. MMNS 2005: 96-108 - [c8]Adlen Ksentini, Abdelhak Mourad Guéroui, Mohamed Naimi:
Adaptive transmission opportunity with admission control for IEEE 802.11e networks. MSWiM 2005: 234-241 - [c7]Adlen Ksentini, Abdelhamid Nafaa, Abdelhak Mourad Guéroui, Mohamed Naimi:
Determinist contention window algorithm for IEEE 802.11. PIMRC 2005: 2712-2716 - 2004
- [c6]Adlen Ksentini, Mohamed Naimi, Abdelhamid Nafaa, Abdelhak Mourad Guéroui:
Adaptive service differentiation for QoS provisioning in IEEE 802.11 wireless ad hoc networks. PE-WASUN 2004: 39-45 - [c5]Adlen Ksentini, Abdelhak Mourad Guéroui, Mohamed Naimi:
Novel architecture for reliable H.26L video transmission over IEEE 802.11e. PIMRC 2004: 1466-1470 - 2003
- [c4]Adlen Ksentini, Abdelhak Mourad Guéroui, Mohamed Naimi:
Adaptive AIFS in Wireless LAN. Net-Con 2003: 78-89 - 2002
- [c3]Abdelhak Mourad Guéroui, Dominique Gaïti:
Multi-service rerouting algorithm in wireless ATM. PIMRC 2002: 1472-1476 - 2001
- [c2]Lynda Mokdad, Jalel Ben-Othman, Abdelhak Mourad Guéroui:
Quality of Service of A Rerouting Algorithm Using Stochastic Automata Networks. ISCC 2001: 338-343 - [c1]Abdelhak Mourad Guéroui, Khaled Boussetta, Dominique Gaïti:
Rerouting algorithm for non real time traffic. VTC Fall 2001: 2635-2639
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint