default search action
Faouzi Kamoun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Faouzi Kamoun, Walid El Ayeb, Ibtissem Jabri, Sami Sifi, Farkhund Iqbal:
Exploring Students' and Faculty's Knowledge, Attitudes, and Perceptions Towards ChatGPT: A Cross-Sectional Empirical Study. J. Inf. Technol. Educ. Res. 23: 4 (2024) - 2023
- [j32]Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Liaqat Ali Khan, Babar Shah:
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications. Ann. des Télécommunications 78(3-4): 183-208 (2023) - 2022
- [j31]Faouzi Kamoun, May El Barachi, Fatna Belqasmi, Abderrazak Hachani:
A smart spontaneous crowd evacuation system for large multi-exit exhibition centers based on IoT. J. Ubiquitous Syst. Pervasive Networks 16(2): 55-62 (2022) - [c21]Fatma Outay, Faouzi Kamoun, Anouar Chemek, Hichem Bargaoui, Ansar Yasar:
On the design and implementation of an on-board test bed system for V2V road hazard signaling. FNC/MobiSPC/SEIT 2022: 119-126 - 2021
- [j30]Fatma Outay, Bilal Taha, Hazar Chaabani, Faouzi Kamoun, Naoufel Werghi, Ansar-Ul-Haque Yasar:
Estimating ambient visibility in the presence of fog: a deep convolutional neural network approach. Pers. Ubiquitous Comput. 25(1): 51-62 (2021) - [j29]May El Barachi, Faouzi Kamoun, Abderrazek Hachani, Fatna Belqasmi, Amir Ben Said, Imed Amri:
A location-based ubiquitous crowdsourcing approach for the emergency supply of oxygen cylinders. Pers. Ubiquitous Comput. 25(1): 109-120 (2021) - [c20]Faouzi Kamoun, May El Barachi, Fatna Belqasmi, Abderrazak Hachani:
A smart dynamic crowd evacuation system for exhibition centers. ANT/EDI40 2021: 218-225 - [c19]Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Mohammed Hussain, Liaqat Ali Khan:
Forensic Analysis of the Cisco WebEx Application. CSNet 2021: 90-97 - 2020
- [j28]Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal:
Towards a Better Understanding of Drone Forensics: A Case Study of Parrot AR Drone 2.0. Int. J. Digit. Crime Forensics 12(1): 35-57 (2020) - [j27]Thar Baker, Muhammad Asim, Áine MacDermott, Farkhund Iqbal, Faouzi Kamoun, Babar Shah, Omar Alfandi, Mohammad Hammoudeh:
A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw. Pract. Exp. 50(5): 503-518 (2020) - [c18]Liza Ahmad, Salam Ismail Rasheed Khanji, Farkhund Iqbal, Faouzi Kamoun:
Blockchain-based chain of custody: towards real-time tamper-proof evidence management. ARES 2020: 48:1-48:8 - [c17]Faouzi Kamoun, May El Barachi, Abderrazak Hachani, Fatna Belqasmi, Amir Ben Said, Imed Amri:
A geolocation-aware mobile crowdsourcing solution for the emergency supply of oxygen cylinders. ANT/EDI40 2020: 153-160 - [c16]May El Barachi, Faouzi Kamoun, Jannatul Ferdaos, Mouna Makni, Imed Amri:
An artificial intelligence based crowdsensing solution for on-demand accident scene monitoring. ANT/EDI40 2020: 303-310 - [c15]Faouzi Kamoun, Farkhund Iqbal, Mohamed Amir Esseghir, Thar Baker:
AI and machine learning: A mixed blessing for cybersecurity. ISNCC 2020: 1-7
2010 – 2019
- 2019
- [j26]Faouzi Kamoun, Fatma Outay:
IP/MPLS networks with hardened pipes: service concepts, traffic engineering and design considerations. J. Ambient Intell. Humaniz. Comput. 10(7): 2577-2584 (2019) - [j25]Fatma Outay, Absar-Ul-Haque Ahmar, Faouzi Kamoun, Ansar-Ul-Haque Yasar, Christoph Sommer, Nafaâ Jabeur, Samar El-Amine:
Investigation of the impact of a wireless Fog Warning System with respect to road traffic on a highway. Pers. Ubiquitous Comput. 23(5-6): 893-899 (2019) - [c14]Fatma Outay, Faouzi Kamoun, Florent Kaisser, Doaa Alterri, Ansar-Ul-Haque Yasar:
V2V and V2I Communications for Traffic Safety and CO2 Emission Reduction: A Performance Evaluation. ANT/EDI40 2019: 353-360 - [c13]Fatma Outay, Hichem Bargaoui, Anouar Chemek, Faouzi Kamoun, Ansar-Ul-Haque Yasar:
The COVCRAV project: Architecture and design of a cooperative V2V crash avoidance system. EUSPN/ICTH 2019: 473-478 - 2018
- [c12]Hazar Chaabani, Naoufel Werghi, Faouzi Kamoun, Bilal Taha, Fatma Outay, Ansar-Ul-Haque Yasar:
Estimating meteorological visibility range under foggy weather conditions: A deep learning approach. EUSPN/ICTH 2018: 478-483 - [c11]Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal, Andrew Marrington:
Drone Forensics: Challenges and New Insights. NTMS 2018: 1-6 - [c10]Mathew Nicho, Adelaiye Oluwasegun, Faouzi Kamoun:
Identifying Vulnerabilities in APT Attacks: A Simulated Approach. NTMS 2018: 1-4 - [e1]Fatna Belqasmi, Hamid Harroud, Max Agueh, Rachida Dssouli, Faouzi Kamoun:
Emerging Technologies for Developing Countries - First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 206, Springer 2018, ISBN 978-3-319-67836-8 [contents] - 2017
- [c9]Fatma Outay, Faouzi Kamoun, Florent Kaisser, Mohammed Atiquzzaman:
Towards Safer Roads through Cooperative Hazard Awareness and Avoidance in Connected Vehicles. AINA Workshops 2017: 208-215 - [c8]Fatma Outay, Faouzi Kamoun, Ansar-Ul-Haque Yasar, Elhadi M. Shakshuki, Samar El-Amine:
ConVeh: Driving Safely into a Connected Future. EUSPN/ICTH 2017: 460-465 - [c7]Hazar Chaabani, Faouzi Kamoun, Hichem Bargaoui, Fatma Outay, Ansar-Ul-Haque Yasar:
A Neural network approach to visibility range estimation under foggy weather conditions. EUSPN/ICTH 2017: 466-471 - 2015
- [j24]Faouzi Kamoun, Sami Miniaoui:
Towards a Better Understanding of Organizational Adoption and Diffusion of RFID Technology: A Case Study Approach. Int. J. Technol. Diffusion 6(3): 1-20 (2015) - [c6]Faouzi Kamoun, Dima Alhadidi, Zakaria Maamar:
Weaving Risk Identification into Crowdsourcing Lifecycle. FNC/MobiSPC 2015: 41-48 - [c5]Faouzi Kamoun, Omar Alfandi, Sami Miniaoui:
An RFID solution for the monitoring of storage time and localization of perishable food in a distribution center. GSCIT 2015: 1-6 - 2014
- [j23]Mathew Nicho, Faouzi Kamoun:
Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems. Commun. Assoc. Inf. Syst. 35: 18 (2014) - [j22]Faouzi Kamoun, Sami Miniaoui:
A wireless environmental sensor network for the condition monitoring of paper rolls at printing facilities. Int. J. Bus. Inf. Syst. 15(4): 392-409 (2014) - [j21]Faouzi Kamoun, Mathew Nicho:
Human and Organizational Factors of Healthcare Data Breaches: The Swiss Cheese Model of Data Breach Causation And Prevention. Int. J. Heal. Inf. Syst. Informatics 9(1): 42-60 (2014) - [j20]Faouzi Kamoun, Mohamed Basel Almourad:
Accessibility as an integral factor in e-government web site evaluation: The case of Dubai e-government. Inf. Technol. People 27(2): 208-228 (2014) - 2013
- [c4]Sami Miniaoui, Faouzi Kamoun:
Innovative RFID Solution for Tracking and Control. DeSE 2013: 41-45 - 2012
- [j19]Faouzi Kamoun, Mohanad Halaweh:
A fuzzy classification approach to assess e-commerce security perception. Int. J. Bus. Inf. Syst. 9(1): 108-126 (2012) - [j18]Faouzi Kamoun, Mohanad Halaweh:
User Interface Design and E-Commerce Security Perception: An Empirical Study. Int. J. E Bus. Res. 8(2): 15-32 (2012) - 2010
- [j17]Naoufel Werghi, Faouzi Kamoun:
A decision-tree-based system for student academic advising and planning in information systems programmes. Int. J. Bus. Inf. Syst. 5(1): 1-18 (2010) - [j16]Faouzi Kamoun, Naoufel Werghi, Mohammed Al Blushi:
GENIMS - a user-centric and GIS-enabled incident management system. Int. J. Inf. Commun. Technol. 2(3): 167-185 (2010)
2000 – 2009
- 2009
- [j15]Faouzi Kamoun:
Performance evaluation of a queuing system with correlated packet-trains and server interruption. Telecommun. Syst. 41(4): 267-277 (2009) - [j14]Faouzi Kamoun:
RFID system management: state-of-the art and open research issues. IEEE Trans. Netw. Serv. Manag. 6(3): 190-205 (2009) - [j13]Faouzi Kamoun:
Virtualizing the Datacenter Without Compromising Server Performance. Ubiquity 2009(August): 2 (2009) - 2008
- [j12]Faouzi Kamoun:
Rethinking the Business Model with RFID. Commun. Assoc. Inf. Syst. 22: 35 (2008) - [j11]Faouzi Kamoun:
Performance analysis of a non-preemptive priority queuing system subjected to a correlated Markovian interruption process. Comput. Oper. Res. 35(12): 3969-3988 (2008) - [j10]Faouzi Kamoun, Said Selim:
On the Design and Development of WEBSEE: A Web-Based Senior Exit Exam for Value-Added Assessment of a CIS Program. J. Inf. Syst. Educ. 19(2): 209-222 (2008) - 2007
- [j9]Faouzi Kamoun, Said Selim:
A Framework towards Assessing the Merits of Inviting IT Professionals to the Classroom. J. Inf. Technol. Educ. 6: 81-103 (2007) - [j8]Faouzi Kamoun:
A roadmap towards the convergence of business process management and service oriented architecture. Ubiquity 2007(April): 2:1 (2007) - [j7]Faouzi Kamoun:
The convergence of business process management and service oriented architecture. Ubiquity 2007(June): 3:1 (2007) - [c3]Faouzi Kamoun:
Performance Analysis of a Queuing System with Vacation and Correlated Train Arrivals. HPCNCS 2007: 9-15 - 2006
- [j6]Faouzi Kamoun:
Performance analysis of a discrete-time queuing system with a correlated train arrival process. Perform. Evaluation 63(4-5): 315-340 (2006) - [j5]Faouzi Kamoun:
The discrete-time queue with autoregressive inputs revisited. Queueing Syst. Theory Appl. 54(3): 185-192 (2006) - 2005
- [j4]Faouzi Kamoun, Mohamed El-Torky:
Designing Large-Scale ASTN-Based Optical Mesh Networks. Int. Arab J. Inf. Technol. 2(2): 104-111 (2005) - [j3]Faouzi Kamoun:
Toward best maintenance practices in communications network management. Int. J. Netw. Manag. 15(5): 321-334 (2005)
1990 – 1999
- 1998
- [j2]M. M. Asrin, Faouzi Kamoun:
A Transient Discrete-Time Queueing Analysis of the ATM Multiplexer. Perform. Evaluation 32(3): 153-183 (1998) - 1995
- [c2]Faouzi Kamoun, Mustafa K. Mehmet Ali:
Queueing Analysis of ATM Tandem Queues with Correlated Arrivals. INFOCOM 1995: 709-716 - 1993
- [j1]Mustafa K. Mehmet Ali, Faouzi Kamoun:
Neural networks for shortest path computation and routing in computer networks. IEEE Trans. Neural Networks 4(6): 941-954 (1993) - [c1]Faouzi Kamoun, Mustafa K. Mehmet Ali:
Statistical analysis of the traffic generated by the superposition of N independent interrupted Poisson processes. Information Theory and Applications 1993: 325-342
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint