default search action
Nabila Labraoui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j20]Radjaa Bensaid, Nabila Labraoui, Hafida Saidi, Haythem Bany Salameh:
Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach. Clust. Comput. 28(1): 50 (2025) - 2024
- [j19]Sihem Benfriha, Nabila Labraoui, Radjaa Bensaid, Haythem Bany Salameh, Hafida Saidi:
FUBA: A fuzzy-based unmanned aerial vehicle behaviour analytics for trust management in flying ad-hoc networks. IET Networks 13(3): 208-220 (2024) - 2023
- [c13]Hafida Saidi, Nabila Labraoui, Sihem Benfriha, Zina Houhamdi:
DVD: Decentralized Verification of Diplomas in Smart Universities. ACIT 2023: 1-7 - [c12]Radjaa Bensaid, Nabila Labraoui, Haythem Bany Salameh:
Federated Deep Learning-based Intrusion Detection Approach for Enhancing Privacy in Fog-IoT Networks. IOTSMS 2023: 156-160 - [c11]Mounirah Djam-Doudou, Ado Adamou Abba Ari, Hortense Boudjou Tchapgnouo, Abdelhak Mourad Guéroui, Alidou Mohamadou, Nabila Labraoui, Ousmane Thiare:
A Lightweight Authenticated Key Agreement Scheme for Resource-Constrained Devices Based on Implicit Certificates and Finite Graphs. SAFER-TEA 2023: 128-155 - [c10]Sihem Benfriha, Nabila Labraoui, Haythem Bany Salameh, Hafida Saidi:
A Survey on Trust Management in Flying Ad Hoc Networks: Challenges, Classifications, and Analysis. SDS 2023: 107-114 - [i4]Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Leandros Maglaras, Hafida Saidi, Ahmed Mahmoud Abdu Lwahhab, Sihem Benfriha:
Toward a real-time TCP SYN Flood DDoS mitigation using Adaptive Neuro-Fuzzy classifier and SDN Assistance in Fog Computing. CoRR abs/2311.15633 (2023) - 2022
- [j18]Hafida Saidi, Nabila Labraoui, Ado Adamou Abba Ari, Leandros A. Maglaras, Joel Herve Mboussam Emati:
DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data. IEEE Access 10: 101011-101028 (2022) - [c9]Sihem Benfriha, Nabila Labraoui:
Insiders Detection in the Uncertain IoD using Fuzzy Logic. ACIT 2022: 1-6 - 2021
- [j17]Lazhar Khamer, Nabila Labraoui, Abdelhak Mourad Guéroui, Ado Adamou Abba Ari:
Enhancing video dissemination over urban VANETs using line of sight and QoE awareness mechanisms. Ann. des Télécommunications 76(9-10): 759-775 (2021) - [j16]Fazilet Lemya Benmansour, Nabila Labraoui:
A Comprehensive Review on Swarm Intelligence-Based Routing Protocols in Wireless Multimedia Sensor Networks. Int. J. Wirel. Inf. Networks 28(2): 175-198 (2021) - [j15]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke:
WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors 21(7): 2443 (2021) - [j14]Lazhar Khamer, Nabila Labraoui, Abdelhak Mourad Guéroui, Sofiane Zaidi, Ado Adamou Abba Ari:
Road network layout based multi-hop broadcast protocols for Urban Vehicular Ad-hoc Networks. Wirel. Networks 27(2): 1369-1388 (2021) - [c8]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Nasreddine Lagraa, Mohamed Amine Ferrag, Leandros Maglaras:
SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles. CrownCom/WiCON 2021: 343-360 - [c7]Messaoud Babaghayou, Nabila Labraoui, Mohamed Amine Ferrag, Leandros Maglaras:
Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles. ICCE 2021: 1-5 - 2020
- [j13]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Nasreddine Lagraa, Mohamed Amine Ferrag:
Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey. J. Inf. Secur. Appl. 55: 102618 (2020) - [j12]Arouna Ndam Njoya, Ado Adamou Abba Ari, Marah Nana Awa, Chafiq Titouna, Nabila Labraoui, Joseph Yves Effa, Wahabou Abdou, Abdelhak Guéroui:
Hybrid Wireless Sensors Deployment Scheme with Connectivity and Coverage Maintaining in Wireless Sensor Networks. Wirel. Pers. Commun. 112(3): 1893-1917 (2020) - [c6]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Mohamed Amine Ferrag, Leandros Maglaras:
The Impact of the Adversary's Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles. SEEDA-CECNSM 2020: 1-6
2010 – 2019
- 2019
- [j11]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari:
Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users. Int. J. Strateg. Inf. Technol. Appl. 10(2): 44-58 (2019) - [j10]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui:
Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles. Int. J. Strateg. Inf. Technol. Appl. 10(4): 33-54 (2019) - [c5]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari:
EPP: Extreme Points Privacy for Trips and Home Identification in Vehicular Social Networks. JERI 2019 - 2018
- [j9]Ado Adamou Abba Ari, Nabila Labraoui, Blaise Omer Yenke, Abdelhak Mourad Guéroui:
Clustering algorithm for wireless sensor networks: the honeybee swarms nest-sites selection process based approach. Int. J. Sens. Networks 27(1): 1-13 (2018) - [j8]Farah Khedim, Nabila Labraoui, Ado Adamou Abba Ari:
A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks. J. Netw. Comput. Appl. 123: 42-56 (2018) - 2017
- [j7]Ado Adamou Abba Ari, Irepran Damakoa, Abdelhak Guéroui, Chafiq Titouna, Nabila Labraoui, Guidedi Kaladzavi, Blaise Omer Yenke:
Bacterial Foraging Optimization Scheme for Mobile Sensing in Wireless Sensor Networks. Int. J. Wirel. Inf. Networks 24(3): 254-267 (2017) - [c4]Ado Adamou Abba Ari, Irepran Damakoa, Chafiq Titouna, Nabila Labraoui, Abdelhak Guéroui:
Efficient and Scalable ACO-Based Task Scheduling for Green Cloud Computing Environment. SmartCloud 2017: 66-71 - 2016
- [j6]Ado Adamou Abba Ari, Blaise Omer Yenke, Nabila Labraoui, Irepran Damakoa, Abdelhak Mourad Guéroui:
A power efficient cluster-based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach. J. Netw. Comput. Appl. 69: 77-97 (2016) - [j5]Nabila Labraoui, Abdelhak Mourad Guéroui, Larbi Sekhri:
A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks. Wirel. Pers. Commun. 87(3): 1037-1055 (2016) - [c3]Ado Adamou Abba Ari, Abdelhak Mourad Guéroui, Nabila Labraoui, Blaise Omer Yenke, Chafiq Titouna, Irepran Damakoa:
Adaptive scheme for collaborative mobile sensing in wireless sensor networks: Bacterial foraging optimization approach. PIMRC 2016: 1-6 - 2015
- [c2]Nabila Labraoui, Abdelhak Mourad Guéroui, Larbi Sekhri:
On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks. CIIA 2015: 406-415 - [i3]Ado Adamou Abba Ari, Abdelhak Mourad Guéroui, Nabila Labraoui, Blaise Omer Yenke:
Concepts and evolution of research in the field of wireless sensor networs. CoRR abs/1502.03561 (2015) - 2014
- [i2]Sihem Souiki, Maghnia Feham, Mohammed Feham, Nabila Labraoui:
Geographic routing protocols for underwater wireless sensor networks: a survey. CoRR abs/1403.3779 (2014) - 2013
- [j4]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Jonathan Petit:
Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommun. Syst. 54(1): 3-17 (2013) - [i1]Asma Mesmoudi, Mohammed Feham, Nabila Labraoui:
Wireless sensor networks localization algorithms: a comprehensive survey. CoRR abs/1312.4082 (2013) - 2012
- [j3]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat:
Secure DV-Hop localization scheme against wormhole attacks in wireless sensor networks. Trans. Emerg. Telecommun. Technol. 23(4): 303-316 (2012) - 2011
- [j2]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Tanveer A. Zia:
Data Aggregation Security Challenge in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 12(3-4): 295-324 (2011) - [j1]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Jonathan Petit:
RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks. J. Univers. Comput. Sci. 17(11): 1550-1571 (2011) - [c1]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat:
Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks. DICTAP (1) 2011: 603-618
Coauthor Index
aka: Abdelhak Guéroui
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint