Chapters
Higher Education a Pillar of Fintech Industry Development in MENA Region
Hamdan Allam, Hassanien Aboul Ella, Mescon Timothy, and Alareeni Bahaaeddin (Eds), Studies in Computational Intelligence, 2022 (ISBN: 978-3-030-93921-2)
Ch 13: Amira Kaddour, Nadia Labidi, Saida Gtifa, and Adel Sarea, "Technologies, Artificial Intelligence and the Future of Learning Post-COVID-19"
Wearable Technologies: Concepts, Methodologies, Tools, and Applications
IGI, Information Science Reference. 2018 (ISBN: 978-1522554844 )
Ch 45: Sarra Berrahal, Noureddine Boudriga, "The risks of wearable technologies to individuals and organizations"
Encyclopedia of Information Science and Technology, 4th Edition.
Mehdi Khosrow-Pour (Ed). IGI, Information Science Reference. 2017 (ISBN: 9781522522553)
Ch 420: Yosra Miaoui, Boutheina Fessi, Noureddine Boudriga, “Cost Estimation and Security Investment of Security Projects”
Managing Security Issues and the Hidden Dangers of Wearable Technologies
Andrew Marrington, Don Kerr, and John Gammack (Eds), IGI Global 2016, ISBN13: 9781522510161
Ch 2: Sarra Berrahal and Noureddine Boudriga; "The Risks of Wearable Technologies on Individuals and Organizations," pp.18-46
Data Mining Trends and Applications in Criminal Science and Investigations
Omowunmi E. Isafiade and Antoine B. Bagula (Eds), IGI Global 2016, ISBN13: 9781522504634
Ch 7: Nourhene Ellouze, Slim Rekhis, and Noureddine Boudriga, “Forensic Investigation of Digital Crimes in Healthcare Applications,” pp. 169-210.
Ch 8: Boutheina Fessi, Yacine Djemaiel, and Noureddine Boudriga, “Data mining analytics for cyber-crime investigation and intrusion detection,” pp. 219-252.
Big Data of Complex Networks
Matthias Dehmer, Frank Emmert-Streib, Stefan Pickl, Andreas Holzinger. (Eds). CRC Press 2016, ISBN 9781498723619
Ch 6: Yacine Djemaiel, and Noureddine Boudriga, “Techniques for the Management and Querying of Big Data in Large Scale Communication Networks,” pp. 145-164
Networking for Big Data
Shui Yu, Xiaodong Lin, Jelena Mišić, and Xuemin (Sherman) Shen (Eds), CRC Press - Taylor & Francis Group, USA, 2015, ISBN 9781482263497
Ch 15: Yacine Djemaiel, Boutheina Fessi, and Noureddine Boudriga, “Trends on cloud infrastructures for Big Data,” pp.305-322
Encyclopedia of Information Science and Technology, Third Edition.
Mehdi Khosrow-Pour(Eds). IGI, Information Science Reference. 2014 (DOI: 10.4018/978-1-4666-5888-2)
Ch 505: Yosra Miaoui, Boutheina Fessi, and Noureddine Boudriga, "Management and Cost Estimation of Security Projects" pp. 5114-5125.
Communication Infrastructures for Cloud Computing: Design and Applications
Dr. Hussein T. Mouftah, Dr. Burak Kantarci, (Eds), IGI Global, Sept. 2013. ISBN13: 9781466645226, ISBN10: 1466645229
Ch 5: Walid Abdallah and Noureddine Boudriga, “Design and Implementation of Optical Cloud Networks: Promises and Challenges”, pp. 107-136.
Information Security Management Handbook, 6th Edition, Volume 7
Richard O'Hanley and James S. Tiller (Eds), Auerbach Publications, Aug 2013. ISBN 9781466567498
Ch 2: Nouredddine Boudriga “Attacks in mobile environments”, pp. 21-31
Next Generation Data Communication Technologies: Emerging Trends
Debashis Saha and Varadharajan Sridhar (Eds), IGI Global, 2012, ISBN 978-1-61350-477-2.
Ch 4: Sihem Trabelsi and Noureddine Boudriga, “QoS-Aware Scheme for Mobility Management and Adaptive Resource Reservation in 4G”, pp. 66-95.
WiMAX Security and Quality of Service: Providing an End to End Explanation
Seok-Yee Tang, Hamid Sharif, and Peter Mueller (Eds), John Wiley, 2010
Ch 2: Slim Rekhis and Noureddine Boudriga WiMAX "Security defined in 802.16 standard", pp:26-62
Ch 6: Neila Krichene and Noureddine Boudriga, "QoS in Mobile WiMAX", pp:145-178
WiMAX Network Planning and Optimization
Y. Zhang (Ed) Auerbach Publications, Taylor & Francis Group, USA, 2009, ISBN: 142006662-3.
Ch 7: Neila Krichene and Noureddine Boudriga, “Handoff management in WiMAX”, pp. 133-162.
The Handbook of Research on Wireless Security
Yan Zhan, Jun Zheng, Miao Ma (Eds), Idea Group Reference, an imprint of Idea Group Inc. 2008, ISBN-10: 159904899X
Ch6: Amel Medded-Makhlouf and Noureddine Boudriga, "Intrusion and Anomaly Detection wireless Networks", pp: 78-94.
Ch15: Yassine Djemaiel, Slim Rekhis, and Noureddine Boudriga, "Trustworthy networks, authentication, privacy and security models", pp: 189-209.
Ch35: Mohamed Hamdi and Noureddine Boudriga, "Security in Wireless Sensor Network", pp: 565-581.
Security in Wireless Mesh Networks
Y. Zhang & J. Zheng & H. HU (Eds), CRC Press, Series: Wireless Networks and Mobile Communications, Nov. 2007, ISBN: 978-0-8493-8250-5.
Ch 2: Neila Krichene and Noureddine Boudriga, “Mesh Networking in Wireless PAN, LAN, MAN and WAN”, pp. 45-119
The Handbook of Wireless Mesh & Sensor Networks
George Aggelou (Ed). McGraw-Hill, 2007.
Ch: Neila Krichene, Noureddine Boudriga, and MS. Obaidat, "Worldwide Interoperability for Microwave Access (WiMAX)".
Security in Wireless Mesh Networks
Y. Zhang & J. Zheng & H. HU (Eds), CRC Press, Series: Wireless Networks and Mobile Communications, Nov.2007, ISBN:978-0-8493-8250-5.
Ch2: Neila Krichene and Noureddine Boudriga, "Mesh Networking in Wireless PAN, LAN, MAN and WAN", pp. 45-119,
The Handbook of Computer Networks, Volume 1, Key Concepts, Data Transmission, and Optical Networks
Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2007. ISBN-10: 0471784613.
Ch 40: Yassine Khlifi, Noureddine Boudriga, and M.S. Obaidat, "Wavelength Division Multiplexing".
Ch 57: Amor Lazzez, Noureddine Boudriga, and M.S. Obaidat, "Optical Switching Techniques in WDM Optical Networks".
The Handbook of Computer Networks, Volume 2, LANs, MANs, WANs, The Internet, Global, Cellular and Wireless Networks
Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2007. ISBN-10: 0471784613.
Ch 105: Faouzi Zarai and Noureddine Boudriga, "UMTS".
Ch 120: Amel Meddeb and Noureddine Boudriga, "Wireless ATM".
Ch 131: Slim Rekhis, Noureddine Boudriga, and M.S. Obaidat, "Localization in Wireless Networks".
The Handbook of Computer Networks, volume 3, Distributed Networks, Network Planning, Control, Management, New Trends and Applications
Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2007. ISBN-10: 0471784613.
Ch162: Mohamed Hamdi and Noureddine Boudriga, "Network Attacks".
The Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards and Protocols
Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2005, ISBN: 978-0-471-64833-8:
Ch63: Amel Meddeb, Noureddine Boudriga, and M.S. Obaidat, "The IPSec Authentication Header and Encapsulation Security Payload Protocols".
Handbook of Information Security, Volume 2, Information Warfare, Social, Legal, and International Issues and Security Foundations
Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2005, ISBN: 978-0-471-64833-8.
Ch 122: Mohamed Hamdi, Noureddine Boudriga and M.S. Obaidat," Forensic Science and Computers".
The Handbook of Information Security, volume 3, Threats, Vulnerabilities, Prevention, Detection and management
Editor-in-chief: Hossein Bidgoli. John Wiley and Sons Publishers, 2005, ISBN: 978-0-471-64833-8
Ch 203: Mohamed Hamdi, Noureddine Boudriga, and M.S. Obaidat, "Security Policy Guidelines".
Ch 160: Slim Rekhis, Noureddine Boudriga, and M.S. Obaidat, "Server-side Security".
Applied system simulation: Methodology and Applications
M.S. Obaidat and G.I. Papadimitriou (edts), ISBN-10: 1402076037, ISBN-13: 978-1402076039, Kluwer, Sept 2003.
Ch 5: M.S. Obaidat and N. Boudriga, "Modeling and simulation of ATM Systems and Networks", in pp: 81-114
Advances in Digital Government: Technology, Human Factors, and Policy
W. McIver and M. Elmagarmid (Eds), Kluwer Publishers, NY 2002. ISBN-13: 9781402070679
Ch 18: N. Boudriga and S. Ben Abdallah, "Laying out the foundation for a digital government model Case study: Tunisia", pp. 289-303