default search action
Nassira Ghoualmi-Zine
Person information
- affiliation: Badji Mokhtar University-Annaba, Networks and Systems Laboratory, Annaba, Algeria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Othmane Friha, Mohamed Amine Ferrag, Burak Kantarci, Burak Çakmak, Arda Ozgun, Nassira Ghoualmi-Zine:
LLM-Based Edge Intelligence: A Comprehensive Survey on Architectures, Applications, Security and Trustworthiness. IEEE Open J. Commun. Soc. 5: 5799-5856 (2024) - [e1]Messaoud Abbas, Makhlouf Derdour, Mohammed Mounir Bouhamed, Saci Medileh, Abdelkamel Ben Ali, Nassira Ghoualmi-Zine:
6th International Conference on Pattern Analysis and Intelligent Systems, PAIS 2024, El Oued, Algeria, April 24-25, 2024. IEEE 2024, ISBN 979-8-3503-5026-5 [contents] - [i1]Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine, Yacine Challal, Yacine Ghamri-Doudane:
AntibotV: A Multilevel Behaviour-based Framework for Botnets Detection in Vehicular Networks. CoRR abs/2407.03506 (2024) - 2023
- [j22]Zahida Tchantchane, Khadidja Bouhadja, Ouahiba Azouaoui, Nassira Ghoualmi-Zine:
Enhanced unstructured points cloud subdivision applied for parallel Delaunay triangulation. Clust. Comput. 26(3): 1877-1889 (2023) - [j21]Marwa Ahmim, Ahmed Ahmim, Mohamed Amine Ferrag, Nacira Ghoualmi-Zine, Leandros Maglaras:
ESIKE: An Efficient and Secure Internet Key Exchange Protocol. Wirel. Pers. Commun. 128(2): 1309-1324 (2023) - [c15]Ilyes Ahmim, Nacira Ghoualmi-Zine, Feriel Bouakkaz, Abderrezak Rachedi:
Enhancement of a User Authentication Scheme for Big Data Collection in IoT-Based Intelligent Transportation System. WINCOM 2023: 1-6 - 2022
- [j20]Ilyes Ahmim, Nacira Ghoualmi-Zine, Ahmed Ahmim, Marwa Ahmim:
Security analysis on "Three-factor authentication protocol using physical unclonable function for IoV". Int. J. Inf. Sec. 21(5): 1019-1026 (2022) - [j19]Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine, Yacine Challal, Yacine Ghamri-Doudane:
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks. J. Netw. Syst. Manag. 30(1): 15 (2022) - [j18]Yasmine Labiod, Abdelaziz Amara Korba, Nassira Ghoualmi:
Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks. Wirel. Pers. Commun. 125(1): 231-259 (2022) - [c14]Ilyes Ahmim, Nacira Ghoualmi-Zine, Marwa Ahmim, Ahmed Ahmim:
Lightweight Authentication Protocols for Internet of Vehicles: Network Model, Taxonomy and Challenges. PAIS 2022: 1-6 - [c13]Manel Bouhali, Amira Bendjeddou, Nacira Ghoualmi-Zine:
A Routing Protocol With Quality Of Service In Body Area Network. PAIS 2022: 1-6 - 2021
- [j17]Sarra Namane, Nassira Ghoualmi, Mustafa Kaiiali:
Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making. Int. J. Inf. Secur. Priv. 15(1): 99-116 (2021) - [j16]Yasmine Labiod, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine:
Detecting DDoS Attacks in IoT Environment. Int. J. Inf. Secur. Priv. 15(2): 145-180 (2021) - 2020
- [j15]Hayet Djellali, Nacira Ghoualmi-Zine, Souad Guessoum:
Hybrid adapted fast correlation FCBF-support vector machine recursive feature elimination for feature selection. Intell. Decis. Technol. 14(3): 269-279 (2020) - [j14]Sahraoui Abdelatif, Makhlouf Derdour, Nacira Ghoualmi-Zine, Bouchra Marzak:
VANET: A novel service for predicting and disseminating vehicle traffic information. Int. J. Commun. Syst. 33(6) (2020) - [j13]Roumaissa Khelf, Nacira Ghoualmi-Zine, Marwa Ahmim:
TAKE-IoT: Tiny Authenticated Key Exchange Protocol for the Internet of Things. Int. J. Embed. Real Time Commun. Syst. 11(3): 1-21 (2020) - [j12]Asma Saighi, Zakaria Laboudi, Philippe Roose, Sébastien Laborie, Nassira Ghoualmi-Zine:
On Using Multiple Disabilities Profiles to Adapt Multimedia Documents: A Novel Graph-Based Method. Int. J. Inf. Technol. Web Eng. 15(3): 34-60 (2020) - [j11]Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine:
Towards the Development of Realistic DoS Dataset for Intelligent Transportation Systems. Wirel. Pers. Commun. 115(2): 1415-1444 (2020)
2010 – 2019
- 2019
- [j10]Noudjoud Kahya, Nacira Ghoualmi-Zine, Marwa Ahmim:
Secure Network Entry Process in Wimax. J. Commun. 14(12): 1205-1210 (2019) - [c12]Roumaissa Khelf, Nacira Ghoualmi-Zine:
A Survey on Dynamic Multipoint Virtual Private Networks. RIF 2019: 15-24 - 2018
- [j9]Sarra Namane, Nassira Ghoualmi:
Parallel Access Control Model in Cross-Domain Grid Computing Environment. Int. J. Embed. Real Time Commun. Syst. 9(1): 50-65 (2018) - [c11]Hayet Djellali, Akila Djebbar, Nacira Ghoualmi-Zine, Nabiha Azizi:
Hybrid Artificial Bees Colony and Particle Swarm on Feature Selection. CIIA 2018: 93-105 - 2017
- [j8]Asma Saighi, Philippe Roose, Nassira Ghoualmi, Sébastien Laborie, Zakaria Laboudi:
HaMA: A Handicap-based Architecture for Multimedia Document Adaptation. Int. J. Multim. Data Eng. Manag. 8(3): 55-96 (2017) - [c10]Sarra Namane, Mustafa Kaiiali, Nacira Ghoualmi-Zine, Rajeev Wankar, C. R. Rao, Sakir Sezer:
Weighted grid authorization graph (WGAG). COMNET 2017: 1-5 - 2015
- [j7]Marwa Ahmim, Malika Babes, Nacira Ghoualmi-Zine:
Formal analysis of efficiency and safety in IPSec based on internet key exchange protocol. Int. J. Commun. Networks Distributed Syst. 14(2): 202-218 (2015) - [j6]Ahmed Ahmim, Nacira Ghoualmi-Zine:
A new hierarchical intrusion detection system based on a binary tree of classifiers. Inf. Comput. Secur. 23(1): 31-57 (2015) - 2014
- [j5]Amira Bendjeddou, Nacira Ghoualmi-Zine, Congduc Pham:
A New Method for Prolonging Network Lifetime and Maintaining the Connectivity in Wireless Sensor Network Through Controlling the Transmission Power. Int. J. Embed. Real Time Commun. Syst. 5(1): 1-14 (2014) - [j4]Ahmed Ahmim, Nacira Ghoualmi-Zine:
A new adaptive intrusion detection system based on the intersection of two different classifiers. Int. J. Secur. Networks 9(3): 125-132 (2014) - 2012
- [j3]Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nacira Ghoualmi-Zine:
An adaptation platform for multimedia applications CSC (Component, Service, Connector). J. Syst. Inf. Technol. 14(1): 4-22 (2012) - [c9]Bektache Djamel, Nacira Ghoualmi-Zine, Chérif Tolba:
Forecasting Approach in VANET based on vehicle collision alert. ICMCS 2012: 573-577 - 2011
- [c8]Hassina Bensefia, Nacira Ghoualmi-Zine:
A New Approach for Adaptive Intrusion Detection. CIS 2011: 983-987 - [c7]Hassina Bensefia, Nacira Ghoualmi-Zine:
An Intelligent System for Decision Making in Firewall Forensics. DICTAP (1) 2011: 470-484 - 2010
- [j2]Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nacira Ghoualmi-Zine, Adel Alti:
MMSA: Metamodel Multimedia Software Architecture. Adv. Multim. 2010: 386035:1-386035:17 (2010) - [j1]Derdour Makhlouf, Nacira Ghoualmi-Zine, Philippe Roose, Marc Dalmau, Adel Alti:
UML-profile for multimedia software architectures. Int. J. Multim. Intell. Secur. 1(3): 209-231 (2010) - [c6]Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nacira Ghoualmi-Zine, Adel Alti:
Vers une architecture d'adaptation automatique des applications reparties basées composants. CAL 2010: 1-13 - [c5]Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nacira Ghoualmi-Zine, Adel Alti:
An Adaptation Approach for Component-Based Software Architecture. COMPSAC 2010: 179-187
2000 – 2009
- 2009
- [c4]Derdour Makhlouf, Nacira Ghoualmi-Zine, Philippe Roose, Marc Dalmau:
An Adaptation System for P2P Multimedia Applications. AINA Workshops 2009: 67-72 - 2006
- [c3]Nacira Ghoualmi-Zine:
Enterprise Information Integration. CONFENIS 2006: 213-218 - 2005
- [c2]Nacira Ghoualmi-Zine, Abdelaziz Araar:
Towards a Communication Manager: a layer's Task for Enterprise. CSREA EEE 2005: 25-31 - 2003
- [c1]Nacira Ghoualmi-Zine, Abdelaziz Araar:
The Vigenere Cipher of Degree in Net-Banking Application. ICWI 2003: 1109-1114
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint