A novel greedy forwarding mechanism based on density, speed and direction parameters for vanets A Bengag, A Bengag, M Elboukhari International Association of Online Engineering, 2020 | 15 | 2020 |
A simulation analyse of MANET's RREQ Flooding and HELLO Flooding attacks with ns-3 O Sbai, M Elboukhari Proceedings of the 2nd International Conference on Networking, Information …, 2019 | 4 | 2019 |
A simulation analyses of MANET’s attacks against OLSR protocol with ns-3 O Sbai, M Elboukhari Innovations in Smart Cities Applications Edition 3: The Proceedings of the …, 2020 | 4 | 2020 |
A simulation analysis of MANET's link-spoofing and replay attacks with ns-3 O Sbai, M Elboukhari Proceedings of the 4th International Conference on Smart City Applications, 1-5, 2019 | 1 | 2019 |
Aboukhriss Hicham 124 A BOUMEZZOUGH, M BOULMALF, M AFIFI, A BOUZIDI, K ALLABOUCHE, ... | | |
Achieving unconditional security by quantum cryptography M Elboukhari, M Azizi, A Azizi Intelligent Communication System, AL-Dahoud Ali, Walid A. Salameh, Linda …, 0 | 2 | |
AD HOC NETWORKS PERFORMANCE M Elboukhari, M Azizi, A Azizi | | |
Analysis of quantum cryptography protocols by model checking M Elboukhari, M Azizi, A Azizi Int. J. Universal Comput. Sci 1, 34-40, 2010 | 18 | 2010 |
Analysis of the Security of BB84 by Model Checking M Elboukhari, M Azizi, A Azizi arXiv preprint arXiv:1005.4504, 2010 | 26 | 2010 |
Anomaly detection from log files using multidimensional analysis model Y Azizi, M Azizi, M Elboukhari International Conference on Digital Technologies and Applications, 515-524, 2021 | 3 | 2021 |
Classification of mobile ad hoc networks attacks O Sbai, M Elboukhari 2018 IEEE 5th International Congress on Information Science and Technology …, 2018 | 15 | 2018 |
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS M Elboukhari, M Azizi, A Azizi | | |
Comparative study between network layer attacks in mobile ad hoc networks O Sbai, M Elboukhari Networking, Intelligent Systems and Security: Proceedings of NISS 2021, 381-392, 2022 | 2 | 2022 |
Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks O Sbai, M Elboukhari Int J Artif Intell ISSN 2252 (8938), 878, 2022 | 7 | 2022 |
Density, Speed and Direction Aware GPSR Protocol for VANETs A Bengag, A Bengag, M Elboukhari Proceedings of the 2nd International Conference on Electronic Engineering …, 2021 | | 2021 |
Devadze, Sergei 67 Diaz, Daniel 265 Dinsoreanu, Mihaela 23 Djaanfar, Ahmed Said 201 M Elboukhari, C Badica, H Belbachir, A Bendahmane, S Benkirane, ... Intelligent Distributed Computing IV: Proceedings of the 4th International …, 2010 | | 2010 |
FOTA-MAC: A Novel Traffic Adaptive MAC Protocol for Wireless Body Area Networks. N Azdad, M Elboukhari International Journal of Interactive Mobile Technologies 18 (2), 2024 | | 2024 |
Impact analysis of black hole attacks on mobile Ad Hoc networks performance M Elboukhari, M Azizi, A Azizi International Journal of Grid Computing & Applications 6 (1/2), 1, 2015 | 12 | 2015 |
Implementation of secure key distribution based on quantum cryptography M Elboukhari, A Azizi, M Azizi 2009 International Conference on Multimedia Computing and Systems, 361-365, 2009 | 41 | 2009 |
Improving the security of CHAP protocol by quantum cryptography M Elboukhari, M Azizi, A Azizi Intelligent Distributed Computing IV: Proceedings of the 4th International …, 2010 | 3 | 2010 |