Name
Papers
Collaborators
LEÏLA AZOUZ SAÏDANE
99
93
Citations 
PageRank 
Referers 
141
37.35
437
Referees 
References 
1487
631
Search Limit
1001000
Title
Citations
PageRank
Year
LoRaWAN possible attacks, proposed countermeasures and enhanced solution.00.342021
TRAK-CPABE: A novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption scheme in cloud computing00.342021
Towards a Novel Vehicular Ad Hoc Networks Based on SDN00.342021
SMC - A New Strategy Based on Software-Defined Networking to Mitigate the Impact of Anomalies on Cooperative Cloud.00.342021
Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security10.362020
Fuzzified Double Game for Qos-Aware LTE-U and Wifi Coexistence in 5Ghz Band00.342020
Collaborative and verifiable key derivation protocol for smart home security: CV-KDP00.342020
Security issues in Industry 4.010.342020
Multi-user diversity wireless multicast: A Survey.00.342020
An Orthogonal Air Pollution Monitoring Method (OAPM) Based on LoRaWAN.00.342020
WiFi/LTE learning based Qos-aware Coexistence00.342020
Auction-based Time Resource Allocation for Energy Harvesting WBAN.00.342020
Collision-Free Transmissions in an IoT Monitoring Application Based on LoRaWAN.00.342020
Using Information Centric Networking in Internet of Things: A Survey30.462019
Revocable Sliced Ciphertext Policy Attribute Based Encryption Scheme In Cloud Computing00.342019
Adaptive Security For The Intra-Electric Vehicular Wireless Networks00.342019
Privacy-preserving aware data transmission for IoT-based e-health.10.352019
Canonical Coalition Game for Solving Wifi and LTE Coexistence Issues on the 5Ghz Band20.422019
Toward Ciphertext Policy Attribute Based Encryption Model - A Revocable Access Control Solution in Cloud Computing.00.342019
Power consumption comparison of synchronized IoT devices running FreeRTOS and RIOT00.342019
Maximizing Lifetime in Energy-Harvesting WBSN for Health Monitoring Systems Through Dynamic Slots Allocation00.342019
CAN-TM: Chain Augmented Naïve Bayes-based Trust Model for Reliable Cloud Service Selection00.342019
Cluster-based scheduling for cognitive radio sensor networks.00.342019
FCR-NS: a novel caching and forwarding strategy for Named Data Networking based on Software Defined Networking10.362019
A survey on Blockchain based access control for Internet of Things00.342019
PP-NDNoT: On preserving privacy in IoT-based E-health systems over NDN00.342019
Lightweight and Secure Password Based Smart Home Authentication Protocol: LSP-SHAP00.342019
Towards a novel cache replacement strategy for Named Data Networking based on Software Defined Networking.30.392018
Intelligent slots allocation for dynamic differentiation in IEEE 802.15.6 CSMA/CA.20.402018
Trust Management In Cognitive Radio Networks: A Survey00.342018
LoRaWAN Analysis Under Unsaturated Traffic, Orthogonal and Non-Orthogonal Spreading Factor Conditions10.352018
An automated sensor nodes' speed estimation for wireless sensor networks.00.342018
Hybrid Centralised Mac Protocol For Reliable Broadcast Of Safety Messages In Vehicular Ad Hoc Network00.342018
Improved Distributed Virtual Forces Algorithm For 3d Terrains Coverage In Mobile Wireless Sensor Networks00.342018
QCH-MAC: A Qos-Aware Centralized Hybrid MAC Protocol for Vehicular Ad Hoc NETworks00.342018
A Throughput-Oriented Reliable Multicast In Multi-Rate Wireless Networks00.342018
Toward privacy preserving in IoT e-health systems: A key escrow identity-based encryption scheme00.342018
Surveying and Analyzing Urban Environment Approaches of Air Quality Monitoring.00.342018
Hierarchical Fair Spectrum Sharing in CRSNs for Smart Grid Monitoring00.342018
End to End Cloud Computing Architecture Based on A Novel Classification of Security Issues00.342017
Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography00.342017
Centralized connectivity restoration in multichannel wireless sensor networks.20.362017
Using SDN Approach to Secure Cloud Servers against Flooding Based DDoS Attacks20.402017
Inter-flow and intra-flow interference mitigation routing in wireless mesh networks.20.362017
Towards A Novel Forwarding Strategy For Named Data Networking Based On Sdn And Bloom Filter10.342017
Feedback Entropy: A New Metric to Detect Unfair Rating Attacks for Trust Computing in Cloud Environments00.342017
LTE-U and WiFi coexistence in the 5 GHz unlicensed spectrum: A survey10.372017
Recovery from simultaneous failures in a large scale wireless sensor network.00.342017
Trusted Third Party Based Key Management For Enhancing Lorawan Security00.342017
Modeling correlation between QoS attributes for trust computation in cloud computing environments.10.342017
  • 1
  • 2