In each year, CNAS research Lab publishes various journals in different research fields (e.g. cyber security, optical network, telecommunication economics, etc.). You can find below all references
2019
Yosra Lakhdhar, Slim Rekhis and Noureddine Boudriga, A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios. Journal of Universal Computer Science, 25(9): 1066-1088, 2019, IF=0.910
Meriem Salhi, Maha Sliti and Noureddine Boudriga "All-optical VPN platform for multisite VLC-based networks, Transaction on Emerging Telecommunications Technologies, 30(2), 1-24, 2019, IF=1.258
Walid Abdallah, Dhouha Krichen and Noureddine Boudriga. Accepted in An Optical Backhaul Solution for LiFi-based Access Networks. Optics Communications, 2019, IF=1.961
Yosra Miaoui, Noureddine Boudriga: Enterprise security investment through time when facing different types of vulnerabilities. Information Systems Frontiers, 21(2): 261-300, 2019, IF=2.539
Mohamed Yassine Braham, Mariem Gharbeoui, Mohamed Bellali, Haithem Attia, Hana Harzallah, Olfa Bekir, Moncef Hamdoun, and Mohamed Allouche, Unnatural death in the elderly: a retrospective study of medicolegal autopsies in Northern Tunisia, Egyptian Journal of Forensic Sciences, 9(21), 2019, IF=0.95
Mehdi Ben Khelil, Amine Zgarni, Meyssa Belghith, Mohamed Allouche, Ahmed Banasr, Mohamed Bellali, Olfa Bekir, Anis Benzarti, and Moncef Hamdoun, Managing cases of gender based sexual assault in the Metropole of Tunis, a public health based approach, Aggression and Violent Behavior, (47):257-261; 2019, IF=1.983
Y.Naceur, M.Gharbeoui, M.Bellali, M.Meddeb, R.Tira, M.Shimi, M.Hamdoun and M.Allouche, Décès après une consultation médicale récente : apport de l’autopsie dans l’analyse de l’erreur médicale, La Revue de Médecine Légale, 10(4):140-145, 2019
Jihed Kanzari, Mehdi Ben Khelil, Mohamed Allouche, Anis Benzarti and Moncef Hamdoun, Suicide in northern Tunisia: A twelve-years study (2005-2016), International Journal of Research in Applied Sciences, (04):210-2 19, 2019
2018
Mohamed Jacem Guezguez, Slim Rekhis and Noureddine Boudriga,“A Sensor Cloud for the provision of Secure and QoS-aware Healthcare Services”, Arabian Journal for Sciences and Engineering, 43(12), December 2018, pp 7059-7082, IF=1.092
Noureddine Boudriga, Paulvanna N. Marimuthu and Sami J. Habib, “Measurement and security trust in WSNs: A Proximity Deviation Based Approach”, Annals of Telecommunications, Published Online 29 November 2018, (https://doi.org/10.1007/s12243-018-0675-y), pp 1-16 . IF=1.168
Maroua Gharam and Noureddine Boudriga, "Cell Selection Game in 5G Heterogeneous Networks", Ubiquitous Networking Lecture Notes in Computer Science ( LNCS 11277), pp 28-39
Meriem Salhi and Noureddine Boudriga, “MIMO Beamforming Anti-jamming Scheme for Mobile Smallcell Networks", Ubiquitous Networking, Lecture Notes in Computer Science ( LNCS 11277), pp 308-319
Yosra Lakhdhar, Slim Rekhis and Noureddine Boudriga, “A Context-based Model for Validating the Ability of Cyber Systems to Defend Against Attacks”, Ubiquitous Networking, Lecture Notes in Computer Science ( LNCS 11277), pp 295-307
Mehdi Ben Khelil, Amine Zgarni, Meyssa Belghith, Mohamed Allouche, Ahmed Banasr, Mohamed Bellali, Olfa Bekir, Anis Benzarti and Moncef Hamdoun, "Managing cases of gender based sexual assault in the Metropole of Tunis, a public health based approach", Aggression and Violent Behavior, Published Online: 29 October 2018, (https://doi.org/10.1016/j.avb.2018.10.005). IF=2.230
Meriem Salhi, Maha Sliti, and Noureddine Boudriga, “All‐optical VPN platform for multisite VLC‐based networks”, Transactions on Emerging Telecommunication Technologies, Published Online: 22 October 2018, (https://doi.org/10.1002/ett.3532). IF=1.606
Nourhene Ellouze, Slim Rekhis, and Noureddine Boudriga, “A WSN-Based Solution for Pollution Detection and Localization in Waterways”, Arabian Journal for Science and Engineering. Published Online: 02 August 2018, (https://doi.org/10.1007/s13369-018-3463-0). IF=1.092
Yacine Djemaiel, Sarra Berrahal and Noureddine Boudriga, "A Novel Graph-Based Approach for the Management of Health Data on Cloud-Based WSANs", Journal of Grid Computing, 16(2), pp 317-344, June 2018. IF=2.8
Hatem Mejjaoli and Khalifa Trimèche, "Spectral Theorems Associated with the Spherical Mean Two-Wavelet Localization Operators", Mediterranean Journal of Mathematics, 15(3), p.112, June 2018. IF=1.0
Noureddine Boudriga. Paulvanna N. Marimuth and Sami J. Habib, “Trusting Sensors Measurements in a WSN: An Approach based on True and Group Deviation Estimation", Trends and Advances in Information Systems and Technologies, Part of the Advances in Intelligent Systems and Computing book series (AISC 746) , pp 603-613.
Hatem Mejjaoli and Khalifa Trimèche, "Boundedness and Compactness of Localization Operators Associated with the Spherical Mean Wigner Transform", Complex Analysis and Operator Theory, Published Online16 May 2018, pp 1-28. IF=0.799
Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga, and Mohamed Allouche, "Powerless Security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform", Journal of Network and Computer Applications, 107(2018), 1-21, April 2018. IF=3.991
Yosra Lakhdhar, Slim Rekhis and Noureddine Boudriga, “Proactive Security For Safety And Sustainability of Mission Critical Systems”, IEEE Transactions on Sustainable Computing (TSUSC 2018), Published Online: 27 February 2018 (DOI: 10.1109/TSUSC.2018.2810092)
Nihel Ramdhan, Maha Sliti and Noureddine Boudriga, “A tree-based data collection protocol for optical unmanned aerial vehicle networks”, Computers and Electrical Engineering, 66, February 2018, pp 80-97 . IF=1.747
Hatem Mejjaoli and Khalifa Trimèche, "Boundedness and compactness of localization operators associated with the Dunkl–Wigner transform", Integral Transforms and Special Functions, 29(4), pp 310-334, 2018. IF=0.828
Mehdi Ben Kheli, Fethia Farhani, Hana Harzallah, Mohamed Allouche, Meriem Gharbaoui, Ahmed Banasr, Anis Benzarti and Moncef Hamdoun, "Patterns of homicide in North Tunisia: a 10-year study (2005-2014)", Injury Prevention, 24(1):73-77, 2018. IF=2.420
Mohamed Jacem Guezguez, Slim Rekhis, and Noureddine Boudriga, "Game-Based Data Muling as a Service in Infrastructureless Area", Ad-hoc, Mobile, and Wireless Networks, Lecture Notes in Computer Science (LNCS 11104).
Meriem Gharbaoui, Yomn Naceur, Ons Hmandi, Mohamed Bellali, Mehdi Ben Khelil, Moncef Hamdoun and Mohamed Allouche, "Accidental and occupational ligature strangulation in northern Tunisia: four-case study", Egyptian Journal of Forensic Sciences. 8(1), p.51, 2018
Mohamed Bellali, Maamer, M., Meriem Gharbaoui, Moncef Hamdoun and Mohamed Allouche, "Evaluation of death certificates of forensic cadavers", Revue de Médecine Légale, 9(2), pp 61-67, 2018
2017
Khalifa Trimèche, “Harmonic analysis on measures spaces attached to some Dunkl operators on Rd and applications”, Journal of Inequalities and Special Functions, 8(1), Dec 29, 2017, pp 104-117
Hatem Mejjaoli and Khalifa Trimèche, “The Donoho-Stark, Benedicks and Heisenberg type uncertainty principles, and the localisation operators for the Heckman-Opdam continuous wavelet transform on Rd”, Journal of Pseudo-Differential Operators and Applications, 8(3), September 2017, pp 423-452. IF=0.649
Marwa Gharam and Noureddine Boudriga, “An Agreement graph-based-authentication scheme for 5G network”, Ubiquitous Networking, Lecture Notes in Computer Science, (LNCS 10542),2017, pp 509-520
Wided Boubakri, Walid Abdallah and Noureddine Boudriga, “Chaotic ZKP based Authentication and Key Distribution Scheme in Environmental Monitoring CPS”, Ubiquitous Networking, Lecture Notes in Computer Science, (LNCS 10542), 2017, pp 472-483
Soumaya BelHadj Youssef, Slim Rekhis, and Noureddine Boudriga,“A Multi-Broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development”, Ubiquitous Networking, Lecture Notes in Computer Science, (LNCS 10542), 2017, pp 141-153
Chirine Chettaoui, Amina Hassini and Khalifa Trimeche, “The hypergeometric Wigner and Weyl transforms attached to the Cherednik operators in the W-invariant case”, Integral Transforms and Special Functions, 28(9)(2017), pp 663-681. IF: 0.828
Hatem Mejjaoli and Khalifa Trimeche, “Time frequency concentration, Heisenberg type uncertainty principles, and localisation operators for the continuous Dunkl wavelet transform on Rd”, Mediterranean Journal of Mathematics, 14, August 2017, p. 146. IF=1.00
Hatem Mejjaoli and Khalifa Trimèche, “A variant of Hardy's and Miyachi's theorem for the Bessel-Struve transform”, Integral Transforms and Special Functions, 28(5)(2017), pp 374-385. IF=0.828
Yosra Miaoui and Noureddine Boudriga, “Enterprise Security Investment Through Time When Facing Different Types of Vulnerabilities", Information Systems Frontiers, (2017), pp 1-40. IF=3.232
Dhouha Krichen, Walid Abdallah, and Noureddine Boudriga, “On the design of an embedded wireless sensor network for aircraft vibration monitoring using efficient game theoretic based MAC protocol”, Ad Hoc Networks, 61, June 2017, pp 1-15. IF=3.151
Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga, and Mohamed Allouche, “Cardiac Implantable Medical Devices Forensics: Postmortem Analysis of Lethal Attacks Scenarios”, Int. Journal of Digital Forensics & Incident Response, Digital Investigation, 21, June 2017, pp 11-30. IF=1.771
Maha Sliti, Walid Abdallah, and Noureddine Boudriga, “Digitizing Radio over Fiber Transceiver based on optical tunable encoder and optical codewords”, Photonic Network Communications, 33(3), June 2017, pp 313-327. IF=1.203
Mehdi Ben Khelil, Amine Zgarni, M Ben Mohamed, Mohamed Allouche, Ahmed Benzarti, Ahmed Banasr and Moncef Hamdoun, "A comparison of suicidal behavior by burns five years before and five years after the 2011 Tunisian Revolution", Burns, 43(4), June 2017, pp 858-865. IF=2.134
Imen Arfaoui, Noureddine Boudriga, and Khalifa Trimeche, “A WSN Deployment Scheme under Irregular Conditions for Surveillance Applications”, Ad Hoc & Sensor Wireless Networks, 35(3/4)(2017), pp 217-259. IF=0.753
Khalifa Trimeche, “The positivity of the hypergeometric translation operators associated to the Cherednik operators and the Heckman-Opdam theory on Rd”, Advances in Pure and Applied Mathematics, 8(1), April 2017, pp 91-108
2016
Mehdi Ben Khelil, Meriem Gharbaoui, Fethia Farhani, Malek Zaafrane, Hana Harzallah, Mohamed Allouche, Mongi Zhioua and Moncef Hamdoun,"Impact of the Tunisian Revolution on homicide and suicide rates in Tunisia", International Journal of Public Health, 61(9), December 2016, pp 995-1002. IF=2.617
Nourhene Ellouze, Slim Rekhis, and Noureddine Boudriga, “A Secure and Investigation-aware Smart Healthcare Cyber Physical System”, International Journal of Advances in Computer Science & Its Applications, 6(2), August 2016, pp 33-37.
Sarra Berrahal, Noureddine Boudriga, and Atoine Bagula, “Reacting to Fire Incidents in Infrastructure-less Zones: A WBAN-Cloud based Approach”, International Journal of Advances in Computer Science & Its Applications, 6(2), August 2016, pp 39-44.
Hatem Mejjaoli, Rayaane Maalaoui and khalifa Trimèche, “Qualitative uncertainty principles for the generalized Fourier transform associated to a Dunkl type operator on the real line”, Analysis and Mathematical Physics, 6(2), June 2016, pp 141-162. IF=1.381
Noureddine Boudriga, “A WSN-based System for Country Border Surveillance and Target Tracking”, Advances in Remote Sensing (ARS) Journal, 5(1), March 2016, pp 51-72
Amina Hassini, Rayaane Maalaoui and Khalifa Trimèche, “Calderon’s reproducing formula for the generalized Wavelet transform on Rd associated to the Heckman-opdam theory”, International Journal Open Problems in Complex Analysis, 8(1), March 2016, pp 45-60.
Khalifa Trimèche, “The positivity of the Transmutation Operators Associated to the Cherednik Operators for the Root System BC2”, Mathematical Journal of Okayama University, (58), January 2016, pp 183-198.
Amina Hassini, Rayaane Maalaoui and Khalifa Trimèche "Generalized Wavelets and the Generalized Wavelet transform on Rd for the Heckman-Opdam theory", Korean Journal of Mathematical 24(2)(2016), pp 235-271.
Sarra Berrahal, Noureddine Boudriga, and Mhamed Chammem, “WBAN-assisted Navigation for Firefighters in Indoor Environments", Ad Hoc & Sensor Wireless Networks, 33(1-4)(2016), pp 81-119. IF=0.753
Sarra Berrahal, Jong-Hoon Kim, Slim Rekhis, Noureddine Boudriga, Deon Wilkins, and Jaime Acevedo, “Border surveillance monitoring using Quadcopter UAV-Aided Wireless Sensor Networks”, Journal of Communications Software and Systems, 12(1)(2016), pp 67-82
Yacine Djemaiel, Nadia Labidi, Noureddine Boudriga, “A Dynamic Hybrid RBF/Elman Neural Networks for Credit Scoring Using Big Data”, Business information systems BIS 2016, Lecture Notes in Business Information Processing, (255), pp 102-113.
Mouna Garai, Slim Rekhis and Noureddine Boudriga, “A Vehicular Cloud for Secure and QoS 2 Aware Service Provision”, Advances in Ubiquitous Networking, Lecture Notes in Electrical Engineering, 2016, (LNEE 397), pp 219-233.
2015
Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar and Nagarajan Prabakar, “Autonomous Pipeline Monitoring and Maintenance System: A RFID-based Approach”, EURASIP Journal on Wireless Communications and Networking, December 2015, pp 262-283. IF=2.407
Maha Sliti and Noureddine Boudriga, “Security Filtering of Optical Data Signals: An Approach Based on Codewords", Photonic Network Communications, 30(2), October 2015, pp 261-279. IF=1.203
Maha Sliti and Noureddine Boudriga, “BHP flooding vulnerability and countermeasure”, Photonic Network Communications, 29(2), April 2015, pp 198-213. IF=1.203
Bayrem Triki, Slim Rekhis, and Noureddine Boudriga, “Connectivity-Aware and Adaptive Multipath Routing Algorithm for Mobile Ad hoc and Sensor Networks”, International Journal of Wireless & mobile networks (IJWMN), 7(1), February 2015, pp 55-74
Maroua Gharam, Meriem Salhi, and Noureddine Boudriga, “An LTE-based VPN for enhancing QoS and Authentication in Smallcell enterprise networks”, Cryptology and Network Security, Lecture Notes in Computer Science, (LNCS 9476), 2015, pp. 248-256.
Mouna Garai, Mariem Mahjoub, Slim Rekhis, Noureddine Boudriga, and Mohamed Bettaz, “Access and Resources Reservation in 4G-VANETs for Multimedia Applications”, Ad-hoc Networks and Wireless, Lecture Notes in Computer Science, (LNCS 8629), 2015, pp. 95-108.
Yosra Miaoui, Noureddine Boudriga, and Ezzeddine Abaoub, “Economics of Privacy: A Model for Protecting against Cyber Data Disclosure Attacks”, Procedia Computer Science, 72(2015):569–579 (Scopus Indexed; Best Student Paper Award)
Meriem Salhi, Sihem Trabelsi, and Noureddine Boudriga, “Mobility-Assisted and QoS-Aware Resource Allocation for Video Streaming over LTE Femtocell Networks”, ECTI Transactions on Electrical Engineering, Electronics, and Communications, 13(1)(2015), pp 42-53.
Yacine Djemaiel, Boutheina Fessi, and Noureddine Boudriga, “A Mark Based-Temporal Conceptual Graphs for Enhancing Big Data Management and Attack Scenario Reconstruction”, Business Information Systems (2015), Lecture Notes in Business Information Processing (LNBIP 208), pp 62-73.
Sarra Berrahal, Noureddine Boudriga, and Antoine Bagula, “Healthcare systems in rural areas: A cloud-sensor based approach for epidemic diseases management”, e‐Infrastructure and e‐Services, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 171), pp 167-177.
Dhouha Krichen, Walid Abdallah, Noureddine Boudriga, and Antoine Bagula “A Public Safety Wireless Sensor Network: A Visible Light Communication Based Approach”, e‐Infrastructure and e‐Services, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 171), pp 203-214.
Walid Abdallah, Noureddine Boudriga, Daehee Kim, and Sunshin An, “An Efficient and Scalable Key Management Mechanism for Wireless Sensor Networks”, ICACT Transactions on Advanced Communications Technology (ICACT-TACT), pp 480-493
2014
Dongwan Kim, Noureddine Boudriga, and Sunshin An, “A new leader-based multicast scheme with a Raptor code in IEEE 802.11 multi-rate WLANs”, EURASIP Journal on Wireless Communications and Networking, 2014(1), December 2014. IF=2.407
Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, and Noureddine Boudriga, "Security of Implantable Medical Devices: Limits, Requirements, and Proposals", Security and Communication Networks, 7(12), November 2014, pp 2475-2491. IF=0.904
Boutheina Fessi, Salah Benabdallah, Noureddine Boudriga, and Mohamed Hamdi, “A Multi-Attribute Decision Model for Intrusion Response System”, Information Sciences 270, June 2014, pp 237-254. IF= 4.305
Sihem Trabelsi and Noureddine Boudriga, “An innovative approach for dynamic evaluation of telecommunications interconnection costs for multimedia real time services”, Business Information Systems Workshops (2014), Lecture Notes in Business Information Processing, (LNBIP 183), pp 80-92.
Yacine Djemaiel and Noureddine Boudriga, “Modeling and assessing the impact of security attacks on enterprise information systems”, Business Information Systems Workshops (2014), Lecture Notes in Business Information Processing, (LNBIP 183), pp 281-292.
Yacine Djemaiel, Nejla Essaddi and Noureddine Boudriga, “Optimizing big data management using conceptual graphs: A mark-based approach”, Business Information Systems 2014, Lecture Notes in Business Information Processing (LNBIP 176), pp 1-12.
Maha Sliti and Noureddine Boudriga, “LEOCast: An Optical Multicast Protocol for LEO Satellites based on Optical Codewords”, International Journal on Advances in Telecommunications, 7(3&4)(2014), pp 56-68.
Walid Abdallah, Suk kyu Lee, Hwagnam Kim, and Noureddine Boudriga. “Adaptive QoS and security for video transmission over wireless networks: A cognitive-based approach”, Algorithms and Architectures for Parallel Processing, Lecture Notes in Computer Science, (LNCS 8630), 2014, pp 138-151.
Maha Sliti, Walid Abdallah, and Noureddine Boudriga, “Optical Multicast over OBS Networks: An Approach Based On Code-Words and Tunable Decoders”, World Academy of Science, Engineering and Technology, International Journal of Electronics and Communication Engineering, 8(6)(2014), pp 923-928
Noureddine Boudriga, "On a controlled random deployment WSN-based monitoring system allowing fault detection and replacement", International Journal of Distributed Sensor Networks,10(4)(2014), pp 101496-101509. IF=1.787
Ramzi Bellazreg and Noureddine Boudriga, "DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks", EURASIP Journal on Wireless Communications and Networking, 2014(1), 9. IF=2.407
2013
Yacine Djemaiel, Noureddine Boudriga, and Soukeina Zouaidi, "An intrusion Tolerant Transaction Management Model for Wireless Storage Networks", Journal of Networking technology, 4(3), September 2013, pp 127-138.
Boutheina Fessi, Yosra Maoui, and Noureddine Boudriga, “A Managerial Issues-aware Cost Estimation of Enterprise Security Projects”, Journal of Information Security Research (JISR), 4(2), June 2013, pp 81-89.
Neila Krichene and Noureddine Boudriga, “Intrusion Tolerant QoS Provision in Mobile Multihop Relay Networks”, Eurasip Journal on Wireless communication and networking, 2013(1) 100-121. IF=2.407
M’hamed Chammem, Sarra Berrahal, and Noureddine Boudriga, “Smart navigation for firefighters in hazardous environments: A ban-based approach”, Pervasive Computing and the Networked World, Lecture Notes in Computer Science (LNCS 7719), 2013, pp 82-96
2012
Slim Rekhis and Noureddine Boudriga, “A Hierarchical Visibility Theory for Formal Digital Investigation of Anti-forensic Attacks”, Computers and Security Journal, 31(8), November 2012, pp 967-982. IF=2.650
Slim Rekhis and Noureddine Boudriga, “A System for Formal Digital Forensic Investigation Aware of Anti-forensic Attacks”, IEEE Transactions on Information Forensics & Security, 7(2), April 2012, pp 635-650. IF=5.824
2011
Slim Rekhis and Noureddine Boudriga, “Formal Reconstruction of Attack Scenarios in Mobile Ad-hoc and Sensor Networks”, Eurasip Journal on Wireless communication and networking, December 2011, pp 39-50. IF=2.407
Slim Rekhis and Noureddine Boudriga, “Logic-based Approach for Digital Forensic Investigation in Communication Networks”, Computers and Security Journal, 30(6-7), September–October 2011, pp 376-396. IF=2.650
Nejla Essaddi, Mohamed Hamdi, Sami Habib, and Noureddine Boudriga, “Evolutionary Strategies for Non-Uniform Deployment in Wireless Sensor Networks”, International Journal of Communication Networks and Distributed Systems, 7(3-4), September 2011, pp 331-354.
Noureddine Boudriga, Mohamed Hamdi, and Sitharama Iyengar, “Coverage Assessment and Target Tracking in 3D Domains”, Journal of Sensors, 11(10)(2011), pp 9904-9927. IF=2.057
2010
Sihem Trabelsi and Noureddine Boudriga, “Predictive Dynamic Uplink /Downlink Resource Reservation for Vertical Handoff Optimization”, International Journal of Business Data Communications and Networking, 6(4), October 2010, pp 64-85.
Manel Abdelkader, Mohamed Hamdi, and Noureddine Boudriga, “Relational Modeling of Grid-based service Composition in 4G networks”, International Journal of Grid and distributed computing, 3(3), September 2010, pp 77-96.
Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga, and Mohammad S. Obaidat, “Contention Resolution for TCP over Optical Burst Switching Networks Using Random Segment Dropping”, SIMULATION: Transactions of The Society for Modeling and Simulation International, 86(4), pp 217-227. IF=0.940.
Selma Batti, Mourad Zghal, and Noureddine Boudriga, “A New All-Optical Switching Node Including Virtual Memory and Synchronizer”, Journal of networks, 5(2), February 2010, pp 165-179.
Nejla Essaddi, Mohamed Hamdi, and Noureddine Boudriga, “WSN-based Target Path Simulation Using Incomplete Tracking Data”, International Journal of Simulation: Systems, Science & Technology, 10(2), January 2010, pp 38-45.
Bayrem Triki, Slim Rekhis, Noureddine Boudriga, “A Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks”, e-Business and Telecommunications, Communications in Computer and Information Science (CCIS 222), pp 54-70.
2009
Slim Rekhis, Jihene Krichene, and Noureddine Boudriga, “Forensic Investigation in Communication Networks using Incomplete Digital Evidences”, International Journal of Communications, Network and System Sciences, 2(9), December 2009, pp 857-873. IF=1.52
Slim Rekhis and Noureddine Boudriga, “Visibility: A Novel Concept for Characterizing Provable Network Digital Evidences”, International Journal of Security and Networks, 4(4), September 2009, pp 234-245.
Slim Rekhis and Noureddine Boudriga, “Investigating Attack Scenarios in Multihop Wireless Systems”, Journal of networks, 4(7)(2009), pp 539-551.
Manel Abdelkader, Mohamed Hamdi, and Noureddine Boudriga, “Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams”, Journal of networks, 4(7)(2009), pp 589-597.
2008
Mohamed Hamdi, Noureddine Boudriga, and Amel Meddeb Makhlouf, “Multi-layer Statistical Intrusion Detection in Wireless Network", EURASIP Journal on Advances in Signal Processing, (1),December 2008, pp 368589-368602. IF=1.92
Jihène Krichène, Mohamed Hamdi, and Noureddine Boudriga, “Heterogeneous Security Policy Validation: From Formal to Executable Specifications”, Journal of Networks, 3(8), November 2008, pp 55-69.
Noureddine Boudriga, M.S. Obaidat, and Faouzi Zarai, “Intelligent Network Functionalities in Wireless 4G Networks: Integration Scheme and Simulation Analysis”, Computer Communications, 31(16),25 October 2008, pp 3752-3759. IF=2.613
Mohamed Hamdi and Noureddine Boudriga, “Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking”, IEEE Systems Journal, 2(1), March 2008, pp 74-82. IF=4.337
Mohamed Hamdi, Noureddine Boudriga, and M.S. Obaidat, “WhoMoVes: An Optimized Broadband Sensor Network for Military Vehicle Tracking”, International Journal of Communication Systems, 21(3), March 2008, pp 277-300. IF=1.717
Yacine Djemaiel, Slim Rekhis, and Noureddine Boudriga, “Intrusion detection and tolerance: A global scheme”, International Journal of Communication Systems, 21(2), February 2008, pp 211-230. IF=1.717
Manel Abdelkader, Noureddine Boudriga, and Mohammad Obaidat, “A novel GRID-based multiparty micropayment systems for Heterogeneous Multiparty Accounting”, E-business and Telecommunications, Communications in Computer and Information Science (CCIS 23)(2008), pp 30-54.
2007
Faouzi Zarai and Noureddine Boudriga, “Provision of Quality of Service in Wireless Fourth Generation Networks”, International Journal of Communication Systems, 20(11), November 2007, pp 1215-1243. IF=1.717
Mohammad S. Obaidat, Yassine Khlifi and Noureddine Boudriga, “Performance Analysis of a Dynamic QoS in Optical Label Switched Network”, Computer Communications Journal, 30(16), 3 November 2007, pp 3012-3026. IF=2.613
Mohamed Hamdi, and Noureddine Boudriga, “Detecting Denial of Service attacks using the wavelet transform”, Computer Communications, 30(16), 3 November 2007, pp 3203–3213. IF=2.613
Amor Lazzez, Yassine Khlifi, Sihem Guemara El Fatmi, Noureddine Boudriga, and M.S. Obaidat, “A Novel Node Architecture for Optical Networks: Modeling, Analysis, and Performance Evaluation”, Computer Communication Journal, 30(5), March 2007, pp 999-1014. IF=2.613
Boutheina Fessi, Mohamed Hamdi , Salah Benabdallah, and Noureddine Boudriga, “A decisional framework system for computer network intrusion detection”, European Journal of Operational Research, 177(3), 16 March 2007, pp 1824-1838. IF=3.429
Noureddine Boudriga, Amor Lazzez, and Mohammad S. Obaidat, “Absolute Transmission Delay Guarantee in Optical Burst-Switched Networks”, Simulation, 83(2)(2007), pp 173-187. IF=0.940
2006
Faouzi Zarai, Noureddine Boudriga, and M.S. Obaidat, “WLAN-UMTS Integration: Architecture, Seamless Handoff, and Simulation Analysis”, Simulation Journal, 82(6), June 1, 2006, pp 413-424. IF=0.940
Faouzi Zarai, Noureddine Boudriga, and M.S. Obaidat, “Performance evaluation of a novel scheme for QoS provision in UTRA TDD”, Computer Communication Journal, 29(8), May 2006, pp 969-982. IF=2.613
Noureddine Boudriga and M.S. Obaidat, “Mobility, sensing, and security management in wireless ad-hoc sensor networks”, Journal of Computers and Electrical Engineering, 32(1-3), January–May 2006, pp 266-276. IF=1.747
2005
Mohamed Hamdi and Noureddine Boudriga, “Computer and Network Security Risk Management: Theory, Challenges, and Countermeasures”, International Journal of Communication Systems, 18(8), October 2005, pp. 763-793. IF=1.717
Yacine Djemaiel, Slim Rekhis, and Noureddine Boudriga, “Marking and Investigating communication traffic: an Adaptive and Selective Scheme”, WSEAS Transactions on Communications, 7(4), July 2005, pp 469-478.
Slim Rekhis and Noureddine Boudriga, “A temporal logic-based model for forensic investigation in networked system security”, Computer Network Security, Lecture Notes in Computer Science, (LNCS 3685), pp 325-338, 2005.
2004
Noureddine Boudriga and M.S. Obaidat, “Intelligent Agents on the Web: A Review”, Computing in Science & Engineering, 6(4)(2004), pp 35-42. IF=1.074
Sihem Guemara-ElFatmi, Noureddine Boudriga, and M.S. Obaidat, “Relational-based calculus for trust management in networked services”, Computer communication Journal, 27(12), July 2004, pp 1206-1219. IF=2.613
2003
Noureddine Boudriga, “Optical burst switching protocols for supporting QoS and adaptive routing”, Computer communication Journal, 26(15), September 2003, pp 1804-1812. IF=2.613
Chiheb Ben Ahmed, Noureddine Boudriga, and M.S. Obaidat, “DRA: A new Buffer management scheme for wireless ATM networks using aggregative large deviation principle”, Computer communication Journal, 26(7), May 2003, pp 708-717. IF=2.613
2001
Chiheb Ben Ahmed, Noureddine Boudriga, and M.S. Obaidat, “On a congestion management scheme for high speed networks using aggregated large deviations principle”, Computer communications, 24 (9),pp 860-867, May 2001. IF=2.613
2000
Chiheb Ben Ahmed, Noureddine Boudriga, and M.S. Obaidat, “An Adaptive Approach to manage traffic in CDMA/ ATM Networks”, Computer Communication Journal. 23(10), pp 942-949, 1 May 2000. IF=2.613
Chiheb Ben Ahmed, Noureddine Boudriga, and M.S. Obaidat, “A Methodology to optimize the design of telecommunication systems”, Computer Communication Journal 23(10), pp 912-921, 1 May 2000. IF=2.613