Follow
lynda MOKDAD
lynda MOKDAD
professeur of compter sciences
No verified email
Title
Cited by
Cited by
Year
Designing UAV surveillance frameworks for smart city and extensive ocean with differential perspectives
H Kim, L Mokdad, J Ben-Othman
IEEE Communications Magazine 56 (4), 98-104, 2018
1452018
Detection of radio interference attacks in VANET
A Hamieh, J Ben-Othman, L Mokdad
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-5, 2009
1342009
Towards an efficient and a more accurate web service selection using MCDM methods
W Serrai, A Abdelli, L Mokdad, Y Hammal
Journal of computational science 22, 253-267, 2017
1292017
DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks
L Mokdad, J Ben-Othman, AT Nguyen
Performance Evaluation 87, 47-59, 2015
1172015
Research challenges and security threats to AI-driven 5G virtual emotion applications using autonomous vehicles, drones, and smart devices
H Kim, J Ben-Othman, L Mokdad, J Son, C Li
IEEE network 34 (6), 288-294, 2020
672020
Enhancing data security in ad hoc networks based on multipath routing
JB Othman, L Mokdad
Journal of parallel and Distributed Computing 70 (3), 309-316, 2010
612010
An energy efficient priority-based QoS MAC protocol for wireless sensor networks
J Ben-Othman, L Mokdad, B Yahya
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
512011
Performance evaluation tools for QoS MAC protocol for wireless sensor networks
L Mokdad, J Ben-Othman, B Yahya, S Niagne
Ad Hoc Networks 12, 86-99, 2014
452014
Dealing with value constraints in decision making using MCDM methods
A Abdelli, L Mokdad, Y Hammal
Journal of Computational Science 44, 101154, 2020
432020
UDiPP: A framework for differential privacy preserving movements of unmanned aerial vehicles in smart cities
H Kim, J Ben-Othman, L Mokdad
IEEE Transactions on Vehicular Technology 68 (4), 3933-3943, 2019
402019
Detecting DoS attacks in WSN based on clustering technique
D Mansouri, L Mokdad, J Ben-Othman, M Ioualalen
2013 IEEE Wireless Communications and Networking Conference (WCNC), 2214-2219, 2013
402013
An efficient approach for Web service selection
W Serrai, A Abdelli, L Mokdad, Y Hammal
2016 IEEE Symposium on Computers and Communication (ISCC), 167-172, 2016
372016
The impact of breakdowns disciplines and repeated attempts on performances of small cell networks
N Gharbi, B Nemmouchi, L Mokdad, J Ben-Othman
Journal of Computational Science 5 (4), 633-644, 2014
362014
Solution of detecting jamming attacks in vehicle ad hoc networks
AT Nguyen, L Mokdad, J Ben Othman
Proceedings of the 16th ACM international conference on Modeling, analysis …, 2013
362013
Performance analysis of a selective encryption algorithm for wireless ad hoc networks
Y Ren, A Boukerche, L Mokdad
2011 IEEE Wireless Communications and Networking Conference, 1038-1043, 2011
342011
Performance analysis of UGS, rtPS, nrtPS admission control in WiMAX networks
S Ghazal, L Mokdad, J Ben-Othman
2008 IEEE International Conference on Communications, 2696-2701, 2008
342008
Recursive‐clustering‐based approach for denial of service (DoS) attacks in wireless sensors networks
S Fouchal, D Mansouri, L Mokdad, M Iouallalen
International journal of communication systems 28 (2), 309-324, 2015
332015
A framework for IoT-enabled virtual emotion detection in advanced smart cities
H Kim, J Ben-Othman, S Cho, L Mokdad
IEEE Network 33 (5), 142-148, 2019
312019
Formal modeling and verification of an enhanced variant of the IEEE 802.11 CSMA/CA protocol
Y Hammal, J Ben-Othman, L Mokdad, A Abdelli
Journal of Communications and Networks 16 (4), 385-396, 2014
312014
Dynamic solution for detecting denial of service attacks in wireless sensor networks
M Guechari, L Mokdad, S Tan
2012 IEEE International Conference on Communications (ICC), 173-177, 2012
302012
The system can't perform the operation now. Try again later.
Articles 1–20