International Journals

In each year, CNAS research Lab publishes various journals in different research fields (e.g. cyber security, optical network, telecommunication economics, etc.). You can find below all references

2019


  • Yosra Lakhdhar, Slim Rekhis and Noureddine Boudriga, A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios. Journal of Universal Computer Science, 25(9): 1066-1088, 2019, IF=0.910
  • Meriem Salhi, Maha Sliti and Noureddine Boudriga "All-optical VPN platform for multisite VLC-based networks, Transaction on Emerging Telecommunications Technologies, 30(2), 1-24, 2019, IF=1.258
  • Walid Abdallah, Dhouha Krichen and Noureddine Boudriga. Accepted in An Optical Backhaul Solution for LiFi-based Access Networks. Optics Communications, 2019, IF=1.961
  • Yosra Miaoui, Noureddine Boudriga: Enterprise security investment through time when facing different types of vulnerabilities. Information Systems Frontiers, 21(2): 261-300, 2019, IF=2.539
  • Mohamed Yassine Braham, Mariem Gharbeoui, Mohamed Bellali, Haithem Attia, Hana Harzallah, Olfa Bekir, Moncef Hamdoun, and Mohamed Allouche, Unnatural death in the elderly: a retrospective study of medicolegal autopsies in Northern Tunisia, Egyptian Journal of Forensic Sciences, 9(21), 2019, IF=0.95
  • Mehdi Ben Khelil, Amine Zgarni, Meyssa Belghith, Mohamed Allouche, Ahmed Banasr, Mohamed Bellali, Olfa Bekir, Anis Benzarti, and Moncef Hamdoun, Managing cases of gender based sexual assault in the Metropole of Tunis, a public health based approach, Aggression and Violent Behavior, (47):257-261; 2019, IF=1.983
  • Y.Naceur, M.Gharbeoui, M.Bellali, M.Meddeb, R.Tira, M.Shimi, M.Hamdoun and M.Allouche, Décès après une consultation médicale récente : apport de l’autopsie dans l’analyse de l’erreur médicale, La Revue de Médecine Légale, 10(4):140-145, 2019
  • Jihed Kanzari, Mehdi Ben Khelil, Mohamed Allouche, Anis Benzarti and Moncef Hamdoun, Suicide in northern Tunisia: A twelve-years study (2005-2016), International Journal of Research in Applied Sciences, (04):210-2 19, 2019

2018

  • Mohamed Jacem Guezguez, Slim Rekhis and Noureddine Boudriga, “A Sensor Cloud for the provision of Secure and QoS-aware Healthcare Services”, Arabian Journal for Sciences and Engineering, 43(12), December 2018, pp 7059-7082, IF=1.092
  • Noureddine Boudriga, Paulvanna N. Marimuthu and Sami J. Habib, “Measurement and security trust in WSNs: A Proximity Deviation Based Approach”, Annals of Telecommunications, Published Online 29 November 2018, (https://doi.org/10.1007/s12243-018-0675-y), pp 1-16 . IF=1.168
  • Maroua Gharam and Noureddine Boudriga, "Cell Selection Game in 5G Heterogeneous Networks", Ubiquitous Networking Lecture Notes in Computer Science ( LNCS 11277), pp 28-39
  • Meriem Salhi and Noureddine Boudriga, “MIMO Beamforming Anti-jamming Scheme for Mobile Smallcell Networks", Ubiquitous Networking, Lecture Notes in Computer Science ( LNCS 11277), pp 308-319
  • Yosra Lakhdhar, Slim Rekhis and Noureddine Boudriga, “A Context-based Model for Validating the Ability of Cyber Systems to Defend Against Attacks”, Ubiquitous Networking, Lecture Notes in Computer Science ( LNCS 11277), pp 295-307
  • Mehdi Ben Khelil, Amine Zgarni, Meyssa Belghith, Mohamed Allouche, Ahmed Banasr, Mohamed Bellali, Olfa Bekir, Anis Benzarti and Moncef Hamdoun, "Managing cases of gender based sexual assault in the Metropole of Tunis, a public health based approach", Aggression and Violent Behavior, Published Online: 29 October 2018, (https://doi.org/10.1016/j.avb.2018.10.005). IF=2.230
  • Meriem Salhi, Maha Sliti, and Noureddine Boudriga, “All‐optical VPN platform for multisite VLC‐based networks”, Transactions on Emerging Telecommunication Technologies, Published Online: 22 October 2018, (https://doi.org/10.1002/ett.3532). IF=1.606
  • Nourhene Ellouze, Slim Rekhis, and Noureddine Boudriga, “A WSN-Based Solution for Pollution Detection and Localization in Waterways”, Arabian Journal for Science and Engineering. Published Online: 02 August 2018, (https://doi.org/10.1007/s13369-018-3463-0). IF=1.092
  • Yacine Djemaiel, Sarra Berrahal and Noureddine Boudriga, "A Novel Graph-Based Approach for the Management of Health Data on Cloud-Based WSANs", Journal of Grid Computing, 16(2), pp 317-344, June 2018. IF=2.8
  • Hatem Mejjaoli and Khalifa Trimèche, "Spectral Theorems Associated with the Spherical Mean Two-Wavelet Localization Operators", Mediterranean Journal of Mathematics, 15(3), p.112, June 2018. IF=1.0
  • Noureddine Boudriga. Paulvanna N. Marimuth and Sami J. Habib, “Trusting Sensors Measurements in a WSN: An Approach based on True and Group Deviation Estimation", Trends and Advances in Information Systems and Technologies, Part of the Advances in Intelligent Systems and Computing book series (AISC 746) , pp 603-613.
  • Hatem Mejjaoli and Khalifa Trimèche, "Boundedness and Compactness of Localization Operators Associated with the Spherical Mean Wigner Transform", Complex Analysis and Operator Theory, Published Online 16 May 2018, pp 1-28. IF=0.799
  • Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga, and Mohamed Allouche, "Powerless Security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform", Journal of Network and Computer Applications, 107(2018), 1-21, April 2018. IF=3.991
  • Yosra Lakhdhar, Slim Rekhis and Noureddine Boudriga, “Proactive Security For Safety And Sustainability of Mission Critical Systems”, IEEE Transactions on Sustainable Computing (TSUSC 2018), Published Online: 27 February 2018 (DOI: 10.1109/TSUSC.2018.2810092)
  • Nihel Ramdhan, Maha Sliti and Noureddine Boudriga, “A tree-based data collection protocol for optical unmanned aerial vehicle networks”, Computers and Electrical Engineering, 66, February 2018, pp 80-97 . IF=1.747
  • Hatem Mejjaoli and Khalifa Trimèche, "Boundedness and compactness of localization operators associated with the Dunkl–Wigner transform", Integral Transforms and Special Functions, 29(4), pp 310-334, 2018. IF=0.828
  • Mehdi Ben Kheli, Fethia Farhani, Hana Harzallah, Mohamed Allouche, Meriem Gharbaoui, Ahmed Banasr, Anis Benzarti and Moncef Hamdoun, "Patterns of homicide in North Tunisia: a 10-year study (2005-2014)", Injury Prevention, 24(1):73-77, 2018. IF=2.420
  • Mohamed Jacem Guezguez, Slim Rekhis, and Noureddine Boudriga, "Game-Based Data Muling as a Service in Infrastructureless Area", Ad-hoc, Mobile, and Wireless Networks, Lecture Notes in Computer Science (LNCS 11104).
  • Meriem Gharbaoui, Yomn Naceur, Ons Hmandi, Mohamed Bellali, Mehdi Ben Khelil, Moncef Hamdoun and Mohamed Allouche, "Accidental and occupational ligature strangulation in northern Tunisia: four-case study", Egyptian Journal of Forensic Sciences. 8(1), p.51, 2018
  • Mohamed Bellali, Maamer, M., Meriem Gharbaoui, Moncef Hamdoun and Mohamed Allouche, "Evaluation of death certificates of forensic cadavers", Revue de Médecine Légale, 9(2), pp 61-67, 2018


2017

  • Khalifa Trimèche, “Harmonic analysis on measures spaces attached to some Dunkl operators on Rd and applications”, Journal of Inequalities and Special Functions, 8(1), Dec 29, 2017, pp 104-117
  • Hatem Mejjaoli and Khalifa Trimèche, “The Donoho-Stark, Benedicks and Heisenberg type uncertainty principles, and the localisation operators for the Heckman-Opdam continuous wavelet transform on Rd”, Journal of Pseudo-Differential Operators and Applications, 8(3), September 2017, pp 423-452. IF=0.649
  • Marwa Gharam and Noureddine Boudriga, “An Agreement graph-based-authentication scheme for 5G network”, Ubiquitous Networking, Lecture Notes in Computer Science, (LNCS 10542),2017, pp 509-520
  • Wided Boubakri, Walid Abdallah and Noureddine Boudriga, “Chaotic ZKP based Authentication and Key Distribution Scheme in Environmental Monitoring CPS”, Ubiquitous Networking, Lecture Notes in Computer Science, (LNCS 10542), 2017, pp 472-483
  • Soumaya BelHadj Youssef, Slim Rekhis, and Noureddine Boudriga,“A Multi-Broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development”, Ubiquitous Networking, Lecture Notes in Computer Science, (LNCS 10542), 2017, pp 141-153
  • Chirine Chettaoui, Amina Hassini and Khalifa Trimeche, “The hypergeometric Wigner and Weyl transforms attached to the Cherednik operators in the W-invariant case”, Integral Transforms and Special Functions, 28(9)(2017), pp 663-681. IF: 0.828
  • Hatem Mejjaoli and Khalifa Trimeche, “Time frequency concentration, Heisenberg type uncertainty principles, and localisation operators for the continuous Dunkl wavelet transform on Rd”, Mediterranean Journal of Mathematics, 14, August 2017, p. 146. IF=1.00
  • Hatem Mejjaoli and Khalifa Trimèche, “A variant of Hardy's and Miyachi's theorem for the Bessel-Struve transform”, Integral Transforms and Special Functions, 28(5)(2017), pp 374-385. IF=0.828
  • Yosra Miaoui and Noureddine Boudriga, “Enterprise Security Investment Through Time When Facing Different Types of Vulnerabilities", Information Systems Frontiers, (2017), pp 1-40. IF=3.232
  • Dhouha Krichen, Walid Abdallah, and Noureddine Boudriga, “On the design of an embedded wireless sensor network for aircraft vibration monitoring using efficient game theoretic based MAC protocol”, Ad Hoc Networks, 61, June 2017, pp 1-15. IF=3.151
  • Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga, and Mohamed Allouche, “Cardiac Implantable Medical Devices Forensics: Postmortem Analysis of Lethal Attacks Scenarios”, Int. Journal of Digital Forensics & Incident Response, Digital Investigation, 21, June 2017, pp 11-30. IF=1.771
  • Maha Sliti, Walid Abdallah, and Noureddine Boudriga, “Digitizing Radio over Fiber Transceiver based on optical tunable encoder and optical codewords”, Photonic Network Communications, 33(3), June 2017, pp 313-327. IF=1.203
  • Mehdi Ben Khelil, Amine Zgarni, M Ben Mohamed, Mohamed Allouche, Ahmed Benzarti, Ahmed Banasr and Moncef Hamdoun, "A comparison of suicidal behavior by burns five years before and five years after the 2011 Tunisian Revolution", Burns, 43(4), June 2017, pp 858-865. IF=2.134
  • Imen Arfaoui, Noureddine Boudriga, and Khalifa Trimeche, “A WSN Deployment Scheme under Irregular Conditions for Surveillance Applications”, Ad Hoc & Sensor Wireless Networks, 35(3/4)(2017), pp 217-259. IF=0.753
  • Khalifa Trimeche, “The positivity of the hypergeometric translation operators associated to the Cherednik operators and the Heckman-Opdam theory on Rd”, Advances in Pure and Applied Mathematics, 8(1), April 2017, pp 91-108


2016


  • Mehdi Ben Khelil, Meriem Gharbaoui, Fethia Farhani, Malek Zaafrane, Hana Harzallah, Mohamed Allouche, Mongi Zhioua and Moncef Hamdoun,"Impact of the Tunisian Revolution on homicide and suicide rates in Tunisia", International Journal of Public Health, 61(9), December 2016, pp 995-1002. IF=2.617
  • Nourhene Ellouze, Slim Rekhis, and Noureddine Boudriga, “A Secure and Investigation-aware Smart Healthcare Cyber Physical System”, International Journal of Advances in Computer Science & Its Applications, 6(2), August 2016, pp 33-37.
  • Sarra Berrahal, Noureddine Boudriga, and Atoine Bagula, “Reacting to Fire Incidents in Infrastructure-less Zones: A WBAN-Cloud based Approach”, International Journal of Advances in Computer Science & Its Applications, 6(2), August 2016, pp 39-44.
  • Hatem Mejjaoli, Rayaane Maalaoui and khalifa Trimèche, “Qualitative uncertainty principles for the generalized Fourier transform associated to a Dunkl type operator on the real line”, Analysis and Mathematical Physics, 6(2), June 2016, pp 141-162. IF=1.381
  • Noureddine Boudriga, “A WSN-based System for Country Border Surveillance and Target Tracking”, Advances in Remote Sensing (ARS) Journal, 5(1), March 2016, pp 51-72
  • Amina Hassini, Rayaane Maalaoui and Khalifa Trimèche, “Calderon’s reproducing formula for the generalized Wavelet transform on Rd associated to the Heckman-opdam theory”, International Journal Open Problems in Complex Analysis, 8(1), March 2016, pp 45-60.
  • Khalifa Trimèche, “The positivity of the Transmutation Operators Associated to the Cherednik Operators for the Root System BC2”, Mathematical Journal of Okayama University, (58), January 2016, pp 183-198.
  • Amina Hassini, Rayaane Maalaoui and Khalifa Trimèche "Generalized Wavelets and the Generalized Wavelet transform on Rd for the Heckman-Opdam theory", Korean Journal of Mathematical 24(2)(2016), pp 235-271.
  • Sarra Berrahal, Noureddine Boudriga, and Mhamed Chammem, “WBAN-assisted Navigation for Firefighters in Indoor Environments", Ad Hoc & Sensor Wireless Networks, 33(1-4)(2016), pp 81-119. IF=0.753
  • Sarra Berrahal, Jong-Hoon Kim, Slim Rekhis, Noureddine Boudriga, Deon Wilkins, and Jaime Acevedo, “Border surveillance monitoring using Quadcopter UAV-Aided Wireless Sensor Networks”, Journal of Communications Software and Systems, 12(1)(2016), pp 67-82
  • Yacine Djemaiel, Nadia Labidi, Noureddine Boudriga, “A Dynamic Hybrid RBF/Elman Neural Networks for Credit Scoring Using Big Data”, Business information systems BIS 2016, Lecture Notes in Business Information Processing, (255), pp 102-113.
  • Mouna Garai, Slim Rekhis and Noureddine Boudriga, “A Vehicular Cloud for Secure and QoS 2 Aware Service Provision”, Advances in Ubiquitous Networking, Lecture Notes in Electrical Engineering, 2016, (LNEE 397), pp 219-233.


2015


  • Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar and Nagarajan Prabakar, “Autonomous Pipeline Monitoring and Maintenance System: A RFID-based Approach”, EURASIP Journal on Wireless Communications and Networking, December 2015, pp 262-283. IF=2.407
  • Maha Sliti and Noureddine Boudriga, “Security Filtering of Optical Data Signals: An Approach Based on Codewords", Photonic Network Communications, 30(2), October 2015, pp 261-279. IF=1.203
  • Maha Sliti and Noureddine Boudriga, “BHP flooding vulnerability and countermeasure”, Photonic Network Communications, 29(2), April 2015, pp 198-213. IF=1.203
  • Bayrem Triki, Slim Rekhis, and Noureddine Boudriga, “Connectivity-Aware and Adaptive Multipath Routing Algorithm for Mobile Ad hoc and Sensor Networks”, International Journal of Wireless & mobile networks (IJWMN), 7(1), February 2015, pp 55-74
  • Maroua Gharam, Meriem Salhi, and Noureddine Boudriga, “An LTE-based VPN for enhancing QoS and Authentication in Smallcell enterprise networks”, Cryptology and Network Security, Lecture Notes in Computer Science, (LNCS 9476), 2015, pp. 248-256.
  • Mouna Garai, Mariem Mahjoub, Slim Rekhis, Noureddine Boudriga, and Mohamed Bettaz, “Access and Resources Reservation in 4G-VANETs for Multimedia Applications”, Ad-hoc Networks and Wireless, Lecture Notes in Computer Science, (LNCS 8629), 2015, pp. 95-108.
  • Yosra Miaoui, Noureddine Boudriga, and Ezzeddine Abaoub, “Economics of Privacy: A Model for Protecting against Cyber Data Disclosure Attacks”, Procedia Computer Science, 72(2015):569–579 (Scopus Indexed; Best Student Paper Award)
  • Meriem Salhi, Sihem Trabelsi, and Noureddine Boudriga, “Mobility-Assisted and QoS-Aware Resource Allocation for Video Streaming over LTE Femtocell Networks”, ECTI Transactions on Electrical Engineering, Electronics, and Communications, 13(1)(2015), pp 42-53.
  • Yacine Djemaiel, Boutheina Fessi, and Noureddine Boudriga, “A Mark Based-Temporal Conceptual Graphs for Enhancing Big Data Management and Attack Scenario Reconstruction”, Business Information Systems (2015), Lecture Notes in Business Information Processing (LNBIP 208), pp 62-73.
  • Sarra Berrahal, Noureddine Boudriga, and Antoine Bagula, “Healthcare systems in rural areas: A cloud-sensor based approach for epidemic diseases management”, e‐Infrastructure and e‐Services, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 171), pp 167-177.
  • Dhouha Krichen, Walid Abdallah, Noureddine Boudriga, and Antoine Bagula “A Public Safety Wireless Sensor Network: A Visible Light Communication Based Approach”, e‐Infrastructure and e‐Services, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 171), pp 203-214.
  • Walid Abdallah, Noureddine Boudriga, Daehee Kim, and Sunshin An, “An Efficient and Scalable Key Management Mechanism for Wireless Sensor Networks”, ICACT Transactions on Advanced Communications Technology (ICACT-TACT), pp 480-493


2014


  • Dongwan Kim, Noureddine Boudriga, and Sunshin An, “A new leader-based multicast scheme with a Raptor code in IEEE 802.11 multi-rate WLANs”, EURASIP Journal on Wireless Communications and Networking, 2014(1), December 2014. IF=2.407
  • Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, and Noureddine Boudriga, "Security of Implantable Medical Devices: Limits, Requirements, and Proposals", Security and Communication Networks, 7(12), November 2014, pp 2475-2491. IF=0.904
  • Boutheina Fessi, Salah Benabdallah, Noureddine Boudriga, and Mohamed Hamdi, “A Multi-Attribute Decision Model for Intrusion Response System”, Information Sciences 270, June 2014, pp 237-254. IF= 4.305
  • Sihem Trabelsi and Noureddine Boudriga, “An innovative approach for dynamic evaluation of telecommunications interconnection costs for multimedia real time services”, Business Information Systems Workshops (2014), Lecture Notes in Business Information Processing, (LNBIP 183), pp 80-92.
  • Yacine Djemaiel and Noureddine Boudriga, “Modeling and assessing the impact of security attacks on enterprise information systems”, Business Information Systems Workshops (2014), Lecture Notes in Business Information Processing, (LNBIP 183), pp 281-292.
  • Yacine Djemaiel, Nejla Essaddi and Noureddine Boudriga, “Optimizing big data management using conceptual graphs: A mark-based approach”, Business Information Systems 2014, Lecture Notes in Business Information Processing (LNBIP 176), pp 1-12.
  • Maha Sliti and Noureddine Boudriga, “LEOCast: An Optical Multicast Protocol for LEO Satellites based on Optical Codewords”, International Journal on Advances in Telecommunications, 7(3&4)(2014), pp 56-68.
  • Walid Abdallah, Suk kyu Lee, Hwagnam Kim, and Noureddine Boudriga. “Adaptive QoS and security for video transmission over wireless networks: A cognitive-based approach”, Algorithms and Architectures for Parallel Processing, Lecture Notes in Computer Science, (LNCS 8630), 2014, pp 138-151.
  • Maha Sliti, Walid Abdallah, and Noureddine Boudriga, “Optical Multicast over OBS Networks: An Approach Based On Code-Words and Tunable Decoders”, World Academy of Science, Engineering and Technology, International Journal of Electronics and Communication Engineering, 8(6)(2014), pp 923-928
  • Noureddine Boudriga, "On a controlled random deployment WSN-based monitoring system allowing fault detection and replacement", International Journal of Distributed Sensor Networks,10(4)(2014), pp 101496-101509. IF=1.787
  • Ramzi Bellazreg and Noureddine Boudriga, "DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks", EURASIP Journal on Wireless Communications and Networking, 2014(1), 9. IF=2.407


2013


  • Yacine Djemaiel, Noureddine Boudriga, and Soukeina Zouaidi, "An intrusion Tolerant Transaction Management Model for Wireless Storage Networks", Journal of Networking technology, 4(3), September 2013, pp 127-138.
  • Boutheina Fessi, Yosra Maoui, and Noureddine Boudriga, “A Managerial Issues-aware Cost Estimation of Enterprise Security Projects”, Journal of Information Security Research (JISR), 4(2), June 2013, pp 81-89.
  • Neila Krichene and Noureddine Boudriga, “Intrusion Tolerant QoS Provision in Mobile Multihop Relay Networks”, Eurasip Journal on Wireless communication and networking, 2013(1) 100-121. IF=2.407
  • M’hamed Chammem, Sarra Berrahal, and Noureddine Boudriga, “Smart navigation for firefighters in hazardous environments: A ban-based approach”, Pervasive Computing and the Networked World, Lecture Notes in Computer Science (LNCS 7719), 2013, pp 82-96


2012


  • Slim Rekhis and Noureddine Boudriga, “A Hierarchical Visibility Theory for Formal Digital Investigation of Anti-forensic Attacks”, Computers and Security Journal, 31(8), November 2012, pp 967-982. IF=2.650
  • Slim Rekhis and Noureddine Boudriga, “A System for Formal Digital Forensic Investigation Aware of Anti-forensic Attacks”, IEEE Transactions on Information Forensics & Security, 7(2), April 2012, pp 635-650. IF=5.824


2011


  • Slim Rekhis and Noureddine Boudriga, “Formal Reconstruction of Attack Scenarios in Mobile Ad-hoc and Sensor Networks”, Eurasip Journal on Wireless communication and networking, December 2011, pp 39-50. IF=2.407
  • Slim Rekhis and Noureddine Boudriga, “Logic-based Approach for Digital Forensic Investigation in Communication Networks”, Computers and Security Journal, 30(6-7), September–October 2011, pp 376-396. IF=2.650
  • Nejla Essaddi, Mohamed Hamdi, Sami Habib, and Noureddine Boudriga, “Evolutionary Strategies for Non-Uniform Deployment in Wireless Sensor Networks”, International Journal of Communication Networks and Distributed Systems, 7(3-4), September 2011, pp 331-354.
  • Noureddine Boudriga, Mohamed Hamdi, and Sitharama Iyengar, “Coverage Assessment and Target Tracking in 3D Domains”, Journal of Sensors, 11(10)(2011), pp 9904-9927. IF=2.057


2010


  • Sihem Trabelsi and Noureddine Boudriga, “Predictive Dynamic Uplink /Downlink Resource Reservation for Vertical Handoff Optimization”, International Journal of Business Data Communications and Networking, 6(4), October 2010, pp 64-85.
  • Manel Abdelkader, Mohamed Hamdi, and Noureddine Boudriga, “Relational Modeling of Grid-based service Composition in 4G networks”, International Journal of Grid and distributed computing, 3(3), September 2010, pp 77-96.
  • Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga, and Mohammad S. Obaidat, “Contention Resolution for TCP over Optical Burst Switching Networks Using Random Segment Dropping”, SIMULATION: Transactions of The Society for Modeling and Simulation International, 86(4), pp 217-227. IF=0.940.
  • Selma Batti, Mourad Zghal, and Noureddine Boudriga, “A New All-Optical Switching Node Including Virtual Memory and Synchronizer”, Journal of networks, 5(2), February 2010, pp 165-179.
  • Nejla Essaddi, Mohamed Hamdi, and Noureddine Boudriga, “WSN-based Target Path Simulation Using Incomplete Tracking Data”, International Journal of Simulation: Systems, Science & Technology, 10(2), January 2010, pp 38-45.
  • Bayrem Triki, Slim Rekhis, Noureddine Boudriga, “A Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks”, e-Business and Telecommunications, Communications in Computer and Information Science (CCIS 222), pp 54-70.


2009


  • Slim Rekhis, Jihene Krichene, and Noureddine Boudriga, “Forensic Investigation in Communication Networks using Incomplete Digital Evidences”, International Journal of Communications, Network and System Sciences, 2(9), December 2009, pp 857-873. IF=1.52
  • Slim Rekhis and Noureddine Boudriga, “Visibility: A Novel Concept for Characterizing Provable Network Digital Evidences”, International Journal of Security and Networks, 4(4), September 2009, pp 234-245.
  • Slim Rekhis and Noureddine Boudriga, “Investigating Attack Scenarios in Multihop Wireless Systems”, Journal of networks, 4(7)(2009), pp 539-551.
  • Manel Abdelkader, Mohamed Hamdi, and Noureddine Boudriga, “Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams”, Journal of networks, 4(7)(2009), pp 589-597.


2008


  • Mohamed Hamdi, Noureddine Boudriga, and Amel Meddeb Makhlouf, “Multi-layer Statistical Intrusion Detection in Wireless Network", EURASIP Journal on Advances in Signal Processing, (1),December 2008, pp 368589-368602. IF=1.92
  • Jihène Krichène, Mohamed Hamdi, and Noureddine Boudriga, “Heterogeneous Security Policy Validation: From Formal to Executable Specifications”, Journal of Networks, 3(8), November 2008, pp 55-69.
  • Noureddine Boudriga, M.S. Obaidat, and Faouzi Zarai, “Intelligent Network Functionalities in Wireless 4G Networks: Integration Scheme and Simulation Analysis”, Computer Communications, 31(16),25 October 2008, pp 3752-3759. IF=2.613
  • Mohamed Hamdi and Noureddine Boudriga, “Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking”, IEEE Systems Journal, 2(1), March 2008, pp 74-82. IF=4.337
  • Mohamed Hamdi, Noureddine Boudriga, and M.S. Obaidat, “WhoMoVes: An Optimized Broadband Sensor Network for Military Vehicle Tracking”, International Journal of Communication Systems, 21(3), March 2008, pp 277-300. IF=1.717
  • Yacine Djemaiel, Slim Rekhis, and Noureddine Boudriga, “Intrusion detection and tolerance: A global scheme”, International Journal of Communication Systems, 21(2), February 2008, pp 211-230. IF=1.717
  • Manel Abdelkader, Noureddine Boudriga, and Mohammad Obaidat, “A novel GRID-based multiparty micropayment systems for Heterogeneous Multiparty Accounting”, E-business and Telecommunications, Communications in Computer and Information Science (CCIS 23)(2008), pp 30-54.


2007


  • Faouzi Zarai and Noureddine Boudriga, “Provision of Quality of Service in Wireless Fourth Generation Networks”, International Journal of Communication Systems, 20(11), November 2007, pp 1215-1243. IF=1.717
  • Mohammad S. Obaidat, Yassine Khlifi and Noureddine Boudriga, “Performance Analysis of a Dynamic QoS in Optical Label Switched Network”, Computer Communications Journal, 30(16), 3 November 2007, pp 3012-3026. IF=2.613
  • Mohamed Hamdi, and Noureddine Boudriga, “Detecting Denial of Service attacks using the wavelet transform”, Computer Communications, 30(16), 3 November 2007, pp 3203–3213. IF=2.613
  • Amor Lazzez, Yassine Khlifi, Sihem Guemara El Fatmi, Noureddine Boudriga, and M.S. Obaidat, “A Novel Node Architecture for Optical Networks: Modeling, Analysis, and Performance Evaluation”, Computer Communication Journal, 30(5), March 2007, pp 999-1014. IF=2.613
  • Boutheina Fessi, Mohamed Hamdi , Salah Benabdallah, and Noureddine Boudriga, “A decisional framework system for computer network intrusion detection”, European Journal of Operational Research, 177(3), 16 March 2007, pp 1824-1838. IF=3.429
  • Noureddine Boudriga, Amor Lazzez, and Mohammad S. Obaidat, “Absolute Transmission Delay Guarantee in Optical Burst-Switched Networks”, Simulation, 83(2)(2007), pp 173-187. IF=0.940


2006


  • Faouzi Zarai, Noureddine Boudriga, and M.S. Obaidat, “WLAN-UMTS Integration: Architecture, Seamless Handoff, and Simulation Analysis”, Simulation Journal, 82(6), June 1, 2006, pp 413-424. IF=0.940
  • Faouzi Zarai, Noureddine Boudriga, and M.S. Obaidat, “Performance evaluation of a novel scheme for QoS provision in UTRA TDD”, Computer Communication Journal, 29(8), May 2006, pp 969-982. IF=2.613
  • Noureddine Boudriga and M.S. Obaidat, “Mobility, sensing, and security management in wireless ad-hoc sensor networks”, Journal of Computers and Electrical Engineering, 32(1-3), January–May 2006, pp 266-276. IF=1.747


2005


  • Mohamed Hamdi and Noureddine Boudriga, “Computer and Network Security Risk Management: Theory, Challenges, and Countermeasures”, International Journal of Communication Systems, 18(8), October 2005, pp. 763-793. IF=1.717
  • Yacine Djemaiel, Slim Rekhis, and Noureddine Boudriga, “Marking and Investigating communication traffic: an Adaptive and Selective Scheme”, WSEAS Transactions on Communications, 7(4), July 2005, pp 469-478.
  • Slim Rekhis and Noureddine Boudriga, “A temporal logic-based model for forensic investigation in networked system security”, Computer Network Security, Lecture Notes in Computer Science, (LNCS 3685), pp 325-338, 2005.


2004


  • Noureddine Boudriga and M.S. Obaidat, “Intelligent Agents on the Web: A Review”, Computing in Science & Engineering, 6(4)(2004), pp 35-42. IF=1.074
  • Sihem Guemara-ElFatmi, Noureddine Boudriga, and M.S. Obaidat, “Relational-based calculus for trust management in networked services”, Computer communication Journal, 27(12), July 2004, pp 1206-1219. IF=2.613


2003


  • Noureddine Boudriga, “Optical burst switching protocols for supporting QoS and adaptive routing”, Computer communication Journal, 26(15), September 2003, pp 1804-1812. IF=2.613
  • Chiheb Ben Ahmed, Noureddine Boudriga, and M.S. Obaidat, “DRA: A new Buffer management scheme for wireless ATM networks using aggregative large deviation principle”, Computer communication Journal, 26(7), May 2003, pp 708-717. IF=2.613


2001


  • Chiheb Ben Ahmed, Noureddine Boudriga, and M.S. Obaidat, “On a congestion management scheme for high speed networks using aggregated large deviations principle”, Computer communications, 24 (9),pp 860-867, May 2001. IF=2.613


2000


  • Chiheb Ben Ahmed, Noureddine Boudriga, and M.S. Obaidat, “An Adaptive Approach to manage traffic in CDMA/ ATM Networks”, Computer Communication Journal. 23(10), pp 942-949, 1 May 2000. IF=2.613
  • Chiheb Ben Ahmed, Noureddine Boudriga, and M.S. Obaidat, “A Methodology to optimize the design of telecommunication systems”, Computer Communication Journal 23(10), pp 912-921, 1 May 2000. IF=2.613