FANET: Communication, mobility models and security issues A Chriki, H Touati, H Snoussi, F Kamoun Computer Networks 163, 106877, 2019 | 275 | 2019 |
SVM-based indoor localization in Wireless Sensor Networks A Chriki, H Touati, H Snoussi 2017 13th international wireless communications and mobile computing …, 2017 | 130 | 2017 |
Deep learning and handcrafted features for one-class anomaly detection in UAV video A Chriki, H Touati, H Snoussi, F Kamoun Multimedia Tools and Applications 80, 2599-2620, 2021 | 57 | 2021 |
Efficient forwarding strategy in a NDN-based internet of things A Aboud, H Touati, B Hnich Cluster Computing(2018) https://doi.org/10.1007/s10586-018-2859-7, 2018 | 52 | 2018 |
UAV-GCS centralized data-oriented communication architecture for crowd surveillance applications A Chriki, H Touati, H Snoussi, F Kamoun 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 35 | 2019 |
Uav-based surveillance system: an anomaly detection approach A Chriki, H Touati, H Snoussi, F Kamoun 2020 IEEE Symposium on computers and communications (ISCC), 1-6, 2020 | 26 | 2020 |
Geographic Interest Forwarding in NDN-Based Wireless Sensor Networks A Aboud, H Touati The 13th ACS/IEEE International Conference on Computer Systems and …, 2016 | 26 | 2016 |
Anomaly detection in connected and autonomous vehicles: A survey, analysis, and research challenges S Baccari, M Hadded, H Ghazzai, H Touati, M Elhadef IEEE Access 12, 19250-19276, 2024 | 25 | 2024 |
Deep neural networks for indoor localization using WiFi fingerprints S BelMannoubi, H Touati Mobile, Secure, and Programmable Networking: 5th International Conference …, 2019 | 25 | 2019 |
Hop-by-hop interest rate notification and adjustment in named data networks S Mejri, H Touati, F Kamoun 2018 IEEE wireless communications and networking conference (WCNC), 1-6, 2018 | 23 | 2018 |
Hop-by-hop congestion control for named data networks S Mejri, H Touati, N Malouch, F Kamoun 2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017 | 22 | 2017 |
A survey on security attacks and intrusion detection mechanisms in named data networking A Hidouri, N Hajlaoui, H Touati, M Hadded, P Muhlethaler Computers 11 (12), 186, 2022 | 20 | 2022 |
Cognitive radio and dynamic TDMA for efficient UAVs swarm communications H Touati, A Chriki, H Snoussi, F Kamoun Computer Networks 196, 108264, 2021 | 20 | 2021 |
Named Data Networking‐based communication model for Internet of Things using energy aware forwarding strategy and smart sleep mode H Touati, A Aboud, B Hnich Concurrency and Computation: Practice and Experience 34 (3), e6584, 2022 | 18 | 2022 |
Stacked auto-encoder for scalable indoor localization in wireless sensor networks S BelMannoubi, H Touati, H Snoussi 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 17 | 2019 |
Centralized cognitive radio based frequency allocation for UAVs communication A Chriki, H Touati, H Snoussi, F Kamoun 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 16 | 2019 |
Preventing unnecessary interests retransmission in named data networking S Mejri, H Touati, F Kamoun 2016 International Symposium on Networks, Computers and Communications …, 2016 | 15 | 2016 |
Cache pollution attacks in the NDN architecture: Impact and analysis A Hidouri, M Hadded, N Hajlaoui, H Touati, P Muhlethaler 2021 International Conference on Software, Telecommunications and Computer …, 2021 | 14 | 2021 |
A secure data storage in multi-cloud architecture using blowfish encryption algorithm H Ghanmi, N Hajlaoui, H Touati, M Hadded, P Muhlethaler International Conference on Advanced Information Networking and Applications …, 2022 | 13 | 2022 |
Performance impact analysis of security attacks on cross-layer routing protocols in vehicular ad hoc networks S Baccari, H Touati, M Hadded, P Muhlethaler 2020 International Conference on Software, Telecommunications and Computer …, 2020 | 12 | 2020 |