default search action
Mohamed Ayoub Messous
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c16]Mohamed Ayoub Messous, Emmanuel Ferreyra, Eneyi Ruth Ikwu, Yuki Unno, Hisashi Kojima:
An Unsupervised Detection Approach for Location Attacks in Satellite-Based Navigation Data. CCNC 2023: 991-992 - 2020
- [j7]Esubalew Alemneh, Sidi-Mohammed Senouci, Mohamed Ayoub Messous:
An energy-efficient adaptive beaconing rate management for pedestrian safety: A fuzzy logic-based approach. Pervasive Mob. Comput. 69: 101285 (2020) - [j6]Maissa Dammak, Sidi-Mohammed Senouci, Mohamed Ayoub Messous, Mohamed Houcine Elhdhili, Christophe Gransart:
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments. IEEE Trans. Netw. Serv. Manag. 17(3): 1742-1757 (2020) - [c15]Habtamu Mohammed Birhanie, Sidi-Mohammed Senouci, Mohamed Ayoub Messous, Amel Arfaoui, Ali Kies:
A Stochastic Theoretical Game Approach for Resource Allocation in Vehicular Fog Computing. CCNC 2020: 1-2 - [c14]Mohamed Ayoub Messous, Hermann Hellwagner, Sidi-Mohammed Senouci, Driton Emini, Dominik Schnieders:
Edge Computing for Visual Navigation and Mapping in a UAV Network. ICC 2020: 1-6
2010 – 2019
- 2019
- [j5]Hichem Sedjelmaci, Mohamed Ayoub Messous, Sidi Mohammed Senouci, Imane Horiya Brahmi:
Toward a lightweight and efficient UAV-aided VANET. Trans. Emerg. Telecommun. Technol. 30(8) (2019) - [j4]Mohamed Ayoub Messous, Sidi-Mohammed Senouci, Hichem Sedjelmaci, Soumaya Cherkaoui:
A Game Theory Based Efficient Computation Offloading in an UAV Network. IEEE Trans. Veh. Technol. 68(5): 4964-4974 (2019) - [c13]Maissa Dammak, Omar Rafik Merad Boudia, Mohamed Ayoub Messous, Sidi Mohammed Senouci, Christophe Gransart:
Token-Based Lightweight Authentication to Secure IoT Networks. CCNC 2019: 1-4 - [c12]Wided Hammedi, Metzli Ramirez-Martinez, Philippe Brunet, Sidi-Mohammed Senouci, Mohamed Ayoub Messous:
Deep Learning-Based Real-Time Object Detection in Inland Navigation. GLOBECOM 2019: 1-6 - 2018
- [j3]Ahmed Alioua, Sidi-Mohammed Senouci, Samira Moussaoui, Hichem Sedjelmaci, Mohamed Ayoub Messous:
Efficient Data Processing in Software-Defined UAV-Assisted Vehicular Networks: A Sequential Game Approach. Wirel. Pers. Commun. 101(4): 2255-2286 (2018) - [c11]Habtamu Mohammed Birhanie, Mohamed Ayoub Messous, Sidi-Mohammed Senouci, El-Hassane Aglzim, Ahmedin Mohammed Ahmed:
MDP-Based Resource Allocation Scheme Towards a Vehicular Fog Computing with Energy Constraints. GLOBECOM 2018: 1-6 - [c10]Joelle Klaimi, Sidi-Mohammed Senouci, Mohamed Ayoub Messous:
Theoretical Game Approach for Mobile Users Resource Management in a Vehicular Fog Computing Environment. IWCMC 2018: 452-457 - 2017
- [j2]Mohamed Ayoub Messous, Hichem Sedjelmaci, Sidi-Mohammed Senouci:
Implementing an emerging mobility model for a fleet of UAVs based on a fuzzy logic inference system. Pervasive Mob. Comput. 42: 393-410 (2017) - [c9]Mohamed Ayoub Messous, Amel Arfaoui, Ahmed Alioua, Sidi-Mohammed Senouci:
A Sequential Game Approach for Computation-Offloading in an UAV Network. GLOBECOM 2017: 1-7 - [c8]Noureddine Haouari, Samira Moussaoui, Sidi-Mohammed Senouci, Abdelwahab Boualouache, Mohamed Ayoub Messous:
An efficient management of the control channel bandwidth in VANETs. ICC 2017: 1-6 - [c7]Mohamed Ayoub Messous, Hichem Sedjelmaci, Noureddin Houari, Sidi-Mohammed Senouci:
Computation offloading game for an UAV network in mobile edge computing. ICC 2017: 1-6 - 2016
- [c6]Abdelfetah Hentout, Amel Hamdania, Hadjer Kachouane, Mohamed Ayoub Messous, Brahim Bouzouia, Sidi-Mohammed Senouci:
Multi-agent control architecture for RFID cyberphysical robotic systems initial validation of tagged objects detection and identification using Player/Stage. GIIS 2016: 1-6 - [c5]Hichem Sedjelmaci, Sidi Mohammed Senouci, Mohamed Ayoub Messous:
How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network? GLOBECOM 2016: 1-6 - [c4]Mohamed Ayoub Messous, Sidi-Mohammed Senouci, Hichem Sedjelmaci:
Network connectivity and area coverage for UAV fleet mobility model with energy constraint. WCNC 2016: 1-6 - 2015
- [j1]Abdelfetah Hentout, Mohamed Ayoub Messous, Brahim Bouzouia:
Fault-tolerant multi-agent control architecture for autonomous mobile manipulators: Simulation results. Comput. Electr. Eng. 43: 238-256 (2015) - [c3]Hichem Sedjelmaci, Tarek Bouali, Mohamed Ayoub Messous, Sidi Mohammed Senouci:
How to prevent cyber-attacks in inter-vehicle communication network? CFIP/NOTERE 2015: 1-6 - 2014
- [c2]Mohamed Ayoub Messous, Abdelfetah Hentout, Brahim Bouzouia:
Multi-agent Control Approach for Autonomous Mobile Manipulators - Determination of the Best Footsteps Combination. ICINCO (1) 2014: 340-347 - 2013
- [c1]Abdelfetah Hentout, Mohamed Ayoub Messous, Saliha Oukid, Brahim Bouzouia:
Multi-Agent Fuzzy-Based Control Architecture for Autonomous Mobile Manipulators: Traditional Approaches and Multi-Agent Fuzzy-Based Approaches. ICIRA (1) 2013: 679-692
Coauthor Index
aka: Sidi Mohammed Senouci
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint