Survey on VANET security challenges and possible cryptographic solutions MN Mejri, J Ben-Othman, M Hamdi Vehicular Communications 1 (2), 53-66, 2014 | 697 | 2014 |
Energy efficient and QoS based routing protocol for wireless sensor networks J Ben-Othman, B Yahya Journal of Parallel and Distributed Computing 70 (8), 849-857, 2010 | 411 | 2010 |
Underwater wireless sensor networks: A survey on enabling technologies, localization protocols, and internet of underwater things M Jouhari, K Ibrahimi, H Tembine, J Ben-Othman IEEE Access 7, 96879-96899, 2019 | 304 | 2019 |
Congestion control protocols in wireless sensor networks: A survey MA Kafi, D Djenouri, J Ben-Othman, N Badache IEEE communications surveys & tutorials 16 (3), 1369-1390, 2014 | 233 | 2014 |
Towards a classification of energy aware MAC protocols for wireless sensor networks B Yahya, J Ben‐Othman Wireless Communications and Mobile Computing 9 (12), 1572-1607, 2009 | 198 | 2009 |
Blockchain for managing heterogeneous internet of things: A perspective architecture L Tseng, L Wong, S Otoum, M Aloqaily, JB Othman IEEE network 34 (1), 16-23, 2020 | 154 | 2020 |
Designing UAV surveillance frameworks for smart city and extensive ocean with differential perspectives H Kim, L Mokdad, J Ben-Othman IEEE Communications Magazine 56 (4), 98-104, 2018 | 152 | 2018 |
Mobile WiMAX: Toward broadband wireless metropolitan area networks Y Zhang, HH Chen CRC Press, 2007 | 151 | 2007 |
Detection of radio interference attacks in VANET A Hamieh, J Ben-Othman, L Mokdad GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-5, 2009 | 135 | 2009 |
DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks L Mokdad, J Ben-Othman, AT Nguyen Performance Evaluation 87, 47-59, 2015 | 123 | 2015 |
REER: Robust and energy efficient multipath routing protocol for wireless sensor networks B Yahya, J Ben-Othman GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-7, 2009 | 123 | 2009 |
A survey on reliability protocols in wireless sensor networks MA Kafi, JB Othman, N Badache ACM Computing Surveys (CSUR) 50 (2), 1-47, 2017 | 118 | 2017 |
Detection of jamming attacks in wireless ad hoc networks using error distribution A Hamieh, J Ben-Othman 2009 IEEE International Conference on Communications, 1-6, 2009 | 104 | 2009 |
GDVAN: a new greedy behavior attack detection algorithm for VANETs MN Mejri, J Ben-Othman IEEE Transactions on Mobile Computing 16 (3), 759-771, 2016 | 90 | 2016 |
Research challenges and security threats to AI-driven 5G virtual emotion applications using autonomous vehicles, drones, and smart devices H Kim, J Ben-Othman, L Mokdad, J Son, C Li IEEE network 34 (6), 288-294, 2020 | 81 | 2020 |
Energy efficient and QoS aware medium access control for wireless sensor networks B Yahya, J Ben‐Othman Concurrency and Computation: Practice and Experience 22 (10), 1252-1266, 2010 | 81 | 2010 |
Data security in ad hoc networks using multipath routing S Bouam, J Ben-Othman 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications …, 2003 | 81 | 2003 |
A collision-free surveillance system using smart UAVs in multi domain IoT H Kim, J Ben-Othman IEEE communications letters 22 (12), 2587-2590, 2018 | 76 | 2018 |
Dispatch of UAVs for urban vehicular networks: A deep reinforcement learning approach OS Oubbati, M Atiquzzaman, A Baz, H Alhakami, J Ben-Othman IEEE Transactions on Vehicular Technology 70 (12), 13174-13189, 2021 | 65 | 2021 |
QoS enhancement with deep learning-based interference prediction in mobile IoT S Zafar, S Jangsher, O Bouachir, M Aloqaily, JB Othman Computer Communications 148, 86-97, 2019 | 60 | 2019 |