关注
mohamed elboukhari
mohamed elboukhari
enseignant chercheur, cuillizi, science économique, centre universitaire d'illizi
在 cuillizi.dz 的电子邮件经过验证
标题
引用次数
年份
A novel greedy forwarding mechanism based on density, speed and direction parameters for vanets
A Bengag, A Bengag, M Elboukhari
International Association of Online Engineering, 2020
152020
A simulation analyse of MANET's RREQ Flooding and HELLO Flooding attacks with ns-3
O Sbai, M Elboukhari
Proceedings of the 2nd International Conference on Networking, Information …, 2019
42019
A simulation analyses of MANET’s attacks against OLSR protocol with ns-3
O Sbai, M Elboukhari
Innovations in Smart Cities Applications Edition 3: The Proceedings of the …, 2020
42020
A simulation analysis of MANET's link-spoofing and replay attacks with ns-3
O Sbai, M Elboukhari
Proceedings of the 4th International Conference on Smart City Applications, 1-5, 2019
12019
Aboukhriss Hicham 124
A BOUMEZZOUGH, M BOULMALF, M AFIFI, A BOUZIDI, K ALLABOUCHE, ...
Achieving unconditional security by quantum cryptography
M Elboukhari, M Azizi, A Azizi
Intelligent Communication System, AL-Dahoud Ali, Walid A. Salameh, Linda …, 0
2
AD HOC NETWORKS PERFORMANCE
M Elboukhari, M Azizi, A Azizi
Analysis of quantum cryptography protocols by model checking
M Elboukhari, M Azizi, A Azizi
Int. J. Universal Comput. Sci 1, 34-40, 2010
182010
Analysis of the Security of BB84 by Model Checking
M Elboukhari, M Azizi, A Azizi
arXiv preprint arXiv:1005.4504, 2010
262010
Anomaly detection from log files using multidimensional analysis model
Y Azizi, M Azizi, M Elboukhari
International Conference on Digital Technologies and Applications, 515-524, 2021
32021
Classification of mobile ad hoc networks attacks
O Sbai, M Elboukhari
2018 IEEE 5th International Congress on Information Science and Technology …, 2018
152018
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
M Elboukhari, M Azizi, A Azizi
Comparative study between network layer attacks in mobile ad hoc networks
O Sbai, M Elboukhari
Networking, Intelligent Systems and Security: Proceedings of NISS 2021, 381-392, 2022
22022
Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks
O Sbai, M Elboukhari
Int J Artif Intell ISSN 2252 (8938), 878, 2022
72022
Density, Speed and Direction Aware GPSR Protocol for VANETs
A Bengag, A Bengag, M Elboukhari
Proceedings of the 2nd International Conference on Electronic Engineering …, 2021
2021
Devadze, Sergei 67 Diaz, Daniel 265 Dinsoreanu, Mihaela 23 Djaanfar, Ahmed Said 201
M Elboukhari, C Badica, H Belbachir, A Bendahmane, S Benkirane, ...
Intelligent Distributed Computing IV: Proceedings of the 4th International …, 2010
2010
FOTA-MAC: A Novel Traffic Adaptive MAC Protocol for Wireless Body Area Networks.
N Azdad, M Elboukhari
International Journal of Interactive Mobile Technologies 18 (2), 2024
2024
Impact analysis of black hole attacks on mobile Ad Hoc networks performance
M Elboukhari, M Azizi, A Azizi
International Journal of Grid Computing & Applications 6 (1/2), 1, 2015
122015
Implementation of secure key distribution based on quantum cryptography
M Elboukhari, A Azizi, M Azizi
2009 International Conference on Multimedia Computing and Systems, 361-365, 2009
412009
Improving the security of CHAP protocol by quantum cryptography
M Elboukhari, M Azizi, A Azizi
Intelligent Distributed Computing IV: Proceedings of the 4th International …, 2010
32010
系统目前无法执行此操作,请稍后再试。
文章 1–20