Chapters


Wearable Technologies: Concepts, Methodologies, Tools, and Applications

IGI, Information Science Reference. 2018 (ISBN: 978-1522554844 )

Ch 45: Sarra Berrahal, Noureddine Boudriga, "The risks of wearable technologies to individuals and organizations"


Encyclopedia of Information Science and Technology, 4th Edition.

Mehdi Khosrow-Pour (Ed). IGI, Information Science Reference. 2017 (ISBN: 9781522522553)

Ch 420: Yosra Miaoui, Boutheina Fessi, Noureddine Boudriga, “Cost Estimation and Security Investment of Security Projects”


Managing Security Issues and the Hidden Dangers of Wearable Technologies

Andrew Marrington, Don Kerr, and John Gammack (Eds), IGI Global 2016, ISBN13: 9781522510161

Ch 2: Sarra Berrahal and Noureddine Boudriga; "The Risks of Wearable Technologies on Individuals and Organizations," pp.18-46


Data Mining Trends and Applications in Criminal Science and Investigations

Omowunmi E. Isafiade and Antoine B. Bagula (Eds), IGI Global 2016, ISBN13: 9781522504634

Ch 7: Nourhene Ellouze, Slim Rekhis, and Noureddine Boudriga, “Forensic Investigation of Digital Crimes in Healthcare Applications,” pp. 169-210.

Ch 8: Boutheina Fessi, Yacine Djemaiel, and Noureddine Boudriga, “Data mining analytics for cyber-crime investigation and intrusion detection,” pp. 219-252.


Big Data of Complex Networks

Matthias Dehmer, Frank Emmert-Streib, Stefan Pickl, Andreas Holzinger. (Eds). CRC Press 2016, ISBN 9781498723619

Ch 6: Yacine Djemaiel, and Noureddine Boudriga, “Techniques for the Management and Querying of Big Data in Large Scale Communication Networks,” pp. 145-164


Networking for Big Data

Shui Yu, Xiaodong Lin, Jelena Mišić, and Xuemin (Sherman) Shen (Eds), CRC Press - Taylor & Francis Group, USA, 2015, ISBN 9781482263497

Ch 15: Yacine Djemaiel, Boutheina Fessi, and Noureddine Boudriga, “Trends on cloud infrastructures for Big Data,” pp.305-322


Encyclopedia of Information Science and Technology, Third Edition.

Mehdi Khosrow-Pour(Eds). IGI, Information Science Reference. 2014 (DOI: 10.4018/978-1-4666-5888-2)

Ch 505: Yosra Miaoui, Boutheina Fessi, and Noureddine Boudriga, "Management and Cost Estimation of Security Projects" pp. 5114-5125.


Communication Infrastructures for Cloud Computing: Design and Applications

Dr. Hussein T. Mouftah, Dr. Burak Kantarci, (Eds), IGI Global, Sept. 2013. ISBN13: 9781466645226, ISBN10: 1466645229

Ch 5: Walid Abdallah and Noureddine Boudriga, “Design and Implementation of Optical Cloud Networks: Promises and Challenges, pp. 107-136.


Information Security Management Handbook, 6th Edition, Volume 7

Richard O'Hanley and James S. Tiller (Eds), Auerbach Publications, Aug 2013. ISBN 9781466567498

Ch 2: Nouredddine Boudriga “Attacks in mobile environments”, pp. 21-31


Next Generation Data Communication Technologies: Emerging Trends

Debashis Saha and Varadharajan Sridhar (Eds), IGI Global, 2012, ISBN 978-1-61350-477-2.

Ch 4: Sihem Trabelsi and Noureddine Boudriga, “QoS-Aware Scheme for Mobility Management and Adaptive Resource Reservation in 4G”, pp. 66-95.


WiMAX Security and Quality of Service: Providing an End to End Explanation

Seok-Yee Tang, Hamid Sharif, and Peter Mueller (Eds), John Wiley, 2010

Ch 2: Slim Rekhis and Noureddine Boudriga WiMAX "Security defined in 802.16 standard", pp:26-62

Ch 6: Neila Krichene and Noureddine Boudriga, "QoS in Mobile WiMAX", pp:145-178


WiMAX Network Planning and Optimization

Y. Zhang (Ed) Auerbach Publications, Taylor & Francis Group, USA, 2009, ISBN: 142006662-3.

Ch 7: Neila Krichene and Noureddine Boudriga, “Handoff management in WiMAX”, pp. 133-162.


The Handbook of Research on Wireless Security

Yan Zhan, Jun Zheng, Miao Ma (Eds), Idea Group Reference, an imprint of Idea Group Inc. 2008, ISBN-10: 159904899X

Ch6: Amel Medded-Makhlouf and Noureddine Boudriga, "Intrusion and Anomaly Detection wireless Networks", pp: 78-94.

Ch15: Yassine Djemaiel, Slim Rekhis, and Noureddine Boudriga, "Trustworthy networks, authentication, privacy and security models", pp: 189-209.

Ch35: Mohamed Hamdi and Noureddine Boudriga, "Security in Wireless Sensor Network", pp: 565-581.


Security in Wireless Mesh Networks

Y. Zhang & J. Zheng & H. HU (Eds), CRC Press, Series: Wireless Networks and Mobile Communications, Nov. 2007, ISBN: 978-0-8493-8250-5.

Ch 2: Neila Krichene and Noureddine Boudriga, “Mesh Networking in Wireless PAN, LAN, MAN and WAN”, pp. 45-119


The Handbook of Wireless Mesh & Sensor Networks

George Aggelou (Ed). McGraw-Hill, 2007.

Ch: Neila Krichene, Noureddine Boudriga, and MS. Obaidat, "Worldwide Interoperability for Microwave Access (WiMAX)".


Security in Wireless Mesh Networks

Y. Zhang & J. Zheng & H. HU (Eds), CRC Press, Series: Wireless Networks and Mobile Communications, Nov.2007, ISBN:978-0-8493-8250-5.

Ch2: Neila Krichene and Noureddine Boudriga, "Mesh Networking in Wireless PAN, LAN, MAN and WAN", pp. 45-119,


The Handbook of Computer Networks, Volume 1, Key Concepts, Data Transmission, and Optical Networks

Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2007. ISBN-10: 0471784613.

Ch 40: Yassine Khlifi, Noureddine Boudriga, and M.S. Obaidat, "Wavelength Division Multiplexing".

Ch 57: Amor Lazzez, Noureddine Boudriga, and M.S. Obaidat, "Optical Switching Techniques in WDM Optical Networks".


The Handbook of Computer Networks, Volume 2, LANs, MANs, WANs, The Internet, Global, Cellular and Wireless Networks

Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2007. ISBN-10: 0471784613.

Ch 105: Faouzi Zarai and Noureddine Boudriga, "UMTS".

Ch 120: Amel Meddeb and Noureddine Boudriga, "Wireless ATM".

Ch 131: Slim Rekhis, Noureddine Boudriga, and M.S. Obaidat, "Localization in Wireless Networks".


The Handbook of Computer Networks, volume 3, Distributed Networks, Network Planning, Control, Management, New Trends and Applications

Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2007. ISBN-10: 0471784613.

Ch162: Mohamed Hamdi and Noureddine Boudriga, "Network Attacks".


The Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards and Protocols

Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2005, ISBN: 978-0-471-64833-8:

Ch63: Amel Meddeb, Noureddine Boudriga, and M.S. Obaidat, "The IPSec Authentication Header and Encapsulation Security Payload Protocols".


Handbook of Information Security, Volume 2, Information Warfare, Social, Legal, and International Issues and Security Foundations

Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2005, ISBN: 978-0-471-64833-8.

Ch 122: Mohamed Hamdi, Noureddine Boudriga and M.S. Obaidat," Forensic Science and Computers".


The Handbook of Information Security, volume 3, Threats, Vulnerabilities, Prevention, Detection and management

Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2005, ISBN: 978-0-471-64833-8

Ch 203: Mohamed Hamdi, Noureddine Boudriga, and M.S. Obaidat, "Security Policy Guidelines".

Ch 160: Slim Rekhis, Noureddine Boudriga, and M.S. Obaidat, "Server-side Security".


Applied system simulation: Methodology and Applications

M.S. Obaidat and G.I. Papadimitriou (edts), ISBN-10: 1402076037, ISBN-13: 978-1402076039, Kluwer, Sept 2003.

Ch 5: M.S. Obaidat and N. Boudriga, "Modeling and simulation of ATM Systems and Networks", in pp: 81-114


Advances in Digital Government: Technology, Human Factors, and Policy

W. McIver and M. Elmagarmid (Eds), Kluwer Publishers, NY 2002. ISBN-13: 9781402070679

Ch 18: N. Boudriga and S. Ben Abdallah, "Laying out the foundation for a digital government model Case study: Tunisia", pp. 289-303