default search action
Nasreddine Hajlaoui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler, Saadi Boudjit:
Blockchain-cloud integration: Comprehensive survey and open research issues. Concurr. Comput. Pract. Exp. 36(15) (2024) - [j6]Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane, Leïla Azouz Saïdane:
A Comprehensive Survey on Vehicular Communication Security. J. Cyber Secur. Mobil. 13(5): 1007-1038 (2024) - [j5]Tayssir Ismail, Nasreddine Hajlaoui, Haifa Touati, Mohamed Elhadad, Paul Muhlethaler, Leïla Azouz Saïdane:
A Fuzzy-Based Greedy Behaviour Attack Detection Approach in VANETs. SN Comput. Sci. 5(7): 822 (2024) - [c14]Chaima Bejaoui, Nasreddine Hajlaoui:
Monitoring a Rice Field with a Low-Cost Wireless Sensor Network. AINA (6) 2024: 261-272 - [c13]Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler, Saadi Boudjit:
A Decentralized Blockchain-Based Platform for Secure Data Sharing in Cloud Storage Model. AINA (4) 2024: 338-348 - [c12]Chaima Bejaoui, Fatma Achour, Nasreddine Hajlaoui, Anis Jedidi:
An IoT Semantic Web Service For Objects Identifying. ISORC 2024: 1-6 - 2023
- [j4]Abdelhak Hidouri, Haifa Touati, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler, Samia Bouzefrane:
Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking. Comput. Networks 235: 109998 (2023) - 2022
- [j3]Abdelhak Hidouri, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler:
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking. Comput. 11(12): 186 (2022) - [c11]Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler:
A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm. AINA (2) 2022: 398-408 - [c10]Abdelhak Hidouri, Haifa Touati, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler:
A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture. AINA (1) 2022: 435-446 - [c9]Abdelhak Hidouri, Mohamed Hadded, Haifa Touati, Nasreddine Hajlaoui, Paul Muhlethaler:
Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN). ICCSA (1) 2022: 310-323 - 2021
- [c8]Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane, Leïla Azouz Saïdane:
Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks. PEMWN 2021: 1-6 - [c7]Abdelhak Hidouri, Mohamed Hadded, Nasreddine Hajlaoui, Haifa Touati, Paul Mühlethaler:
Cache Pollution Attacks in the NDN Architecture: Impact and Analysis. SoftCOM 2021: 1-6 - 2020
- [c6]Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Hassen Hamdi:
Hybrid and Secure E-Health Data Sharing Architecture in Multi-Clouds Environment. ICOST 2020: 249-258
2010 – 2019
- 2019
- [c5]Hamdi Hassen, Nasreddine Hajlaoui, Khemak Maher:
DMRA-MCP: A Distributed Map-Reduce Applications Deployments in a Multi-Cloud Platform Based on Cloud Broker Architecture. KES-IDT (1) 2019: 275-285 - 2018
- [j2]Nasreddine Hajlaoui, Issam Jabri, Maher Ben Jemaa:
An accurate two dimensional Markov chain model for IEEE 802.11n DCF. Wirel. Networks 24(4): 1019-1031 (2018) - 2013
- [j1]Nasreddine Hajlaoui, Issam Jabri, Maher Ben Jemaa:
Experimental Performance Evaluation and Frame Aggregation Enhancement in IEEE 802.11n WLANs. Int. J. Commun. Networks Inf. Secur. 5(1) (2013) - [c4]Nasreddine Hajlaoui, Issam Jabri, Maher Ben Jemaa:
Analytical study of frame aggregation in error-prone channels. IWCMC 2013: 237-242 - 2012
- [c3]Nasreddine Hajlaoui, Issam Jabri, Malek Taieb, Maher Ben Jemaa:
A frame aggregation scheduler for QoS-sensitive applications in IEEE 802.11n WLANs. ICCIT 2012: 221-226 - [c2]Nasreddine Hajlaoui, Issam Jabri, Maher Ben Jemaa:
Experimental study of IEEE 802.11n protocol. WiNTECH 2012: 93-94 - [c1]Nasreddine Hajlaoui, Issam Jabri:
On the performance of IEEE 802.11n protocol. WMNC 2012: 64-69
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint