default search action
Mohamed Hadded
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Sihem Baccari, Mohamed Hadded, Hakim Ghazzai, Haifa Touati, Mourad Elhadef:
Anomaly Detection in Connected and Autonomous Vehicles: A Survey, Analysis, and Research Challenges. IEEE Access 12: 19250-19276 (2024) - [j13]Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler, Saadi Boudjit:
Blockchain-cloud integration: Comprehensive survey and open research issues. Concurr. Comput. Pract. Exp. 36(15) (2024) - [j12]Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane, Leïla Azouz Saïdane:
A Comprehensive Survey on Vehicular Communication Security. J. Cyber Secur. Mobil. 13(5): 1007-1038 (2024) - [j11]Tayssir Ismail, Nasreddine Hajlaoui, Haifa Touati, Mohamed Elhadad, Paul Muhlethaler, Leïla Azouz Saïdane:
A Fuzzy-Based Greedy Behaviour Attack Detection Approach in VANETs. SN Comput. Sci. 5(7): 822 (2024) - [c33]Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler, Saadi Boudjit:
A Decentralized Blockchain-Based Platform for Secure Data Sharing in Cloud Storage Model. AINA (4) 2024: 338-348 - [c32]Ameni Chtourou, Mohamed Hadded, Hakim Ghazzai, Mourad Elhadef:
Context-aware Communication in C-ITS for Road Safety: Survey and Open Research Directions. SoftCOM 2024: 1-6 - 2023
- [j10]Abdelhak Hidouri, Haifa Touati, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler, Samia Bouzefrane:
Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking. Comput. Networks 235: 109998 (2023) - [j9]Souad BelMannoubi, Haifa Touati, Mohamed Hadded, Khalifa Toumi, Oyunchimeg Shagdar, Farouk Kamoun:
A comprehensive survey on blockchain-based C-ITS applications: Classification, challenges, and open issues. Veh. Commun. 43: 100607 (2023) - 2022
- [j8]Abdelhak Hidouri, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler:
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking. Comput. 11(12): 186 (2022) - [c31]Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler:
A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm. AINA (2) 2022: 398-408 - [c30]Abdelhak Hidouri, Haifa Touati, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler:
A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture. AINA (1) 2022: 435-446 - [c29]Abdelhak Hidouri, Mohamed Hadded, Haifa Touati, Nasreddine Hajlaoui, Paul Muhlethaler:
Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN). ICCSA (1) 2022: 310-323 - [c28]Mohamed Hadded, Gaspard Lauras, Jérôme Letailleur, Yohann Petiot, Anouk Dubois:
An Assessment Platform of Cybersecurity Attacks against the MQTT Protocol using SIEM. SoftCOM 2022: 1-6 - 2021
- [j7]Fouzi Boukhalfa, Mohamed Hadded, Paul Mühlethaler, Oyunchimeg Shagdar:
Performance evaluation of an active signaling based time-slot scheduling scheme for connected vehicles. Ann. des Télécommunications 76(5-6): 363-374 (2021) - [j6]Mohamed Hadded, Pascale Minet, Jean-Marc Lasgouttes:
A game theory-based route planning approach for automated vehicle collection. Concurr. Comput. Pract. Exp. 33(16) (2021) - [j5]Sihem Baccari, Mohamed Hadded, Haifa Touati, Paul Mühlethaler:
A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks. J. Cyber Secur. Mobil. 10(2): 377-402 (2021) - [c27]Abir Rebei, Fouzi Boukhalfa, Haifa Touati, Mohamed Hadded, Paul Mühlethaler:
An Efficient Cross-Layer Design for Multi-hop Broadcast of Emergency Warning Messages in Vehicular Networks. AINA (1) 2021: 25-38 - [c26]Mohammed Shabbir Ali, Julian Garbiso, Jun Zhang, Houda Labiod, Oyunchimeg Shagdar, Mohamed Hadded:
An Analytical Model of Bluetooth Performance Considering Physical and MAC Layers' Effects. HPSR 2021: 1-8 - [c25]Fouzi Boukhalfa, Mohamed Hadded, Paul Muhlethaler, Oyunchimeg Shagdar:
Evaluation of a new Radio Technology and Visible Light Communication for a Platooning Application. ISNCC 2021: 1-7 - [c24]Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane, Leïla Azouz Saïdane:
Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks. PEMWN 2021: 1-6 - [c23]Abdelhak Hidouri, Mohamed Hadded, Nasreddine Hajlaoui, Haifa Touati, Paul Mühlethaler:
Cache Pollution Attacks in the NDN Architecture: Impact and Analysis. SoftCOM 2021: 1-6 - 2020
- [j4]Mohamed Hadded, Khalifa Toumi, Anis Laouiti, Paul Mühlethaler:
A Trust Framework for Centralized TDMA Scheduling Mechanism in Vehicular Ad hoc Networks. Int. J. Interdiscip. Telecommun. Netw. 12(4): 74-87 (2020) - [c22]Mohamed Hadded, Pierre Merdrignac, Sacha Duhamel, Oyunchimeg Shagdar:
Security attacks impact for collective perception based roadside assistance: A study of a highway on-ramp merging case. IWCMC 2020: 1284-1289 - [c21]Fouzi Boukhalfa, Mohamed Hadded, Paul Mühlethaler, Oyunchimeg Shagdar:
Using visible light links in combination with radio communication in a vehicular network. PEMWN 2020: 1-6 - [c20]Sihem Baccari, Haifa Touati, Mohamed Hadded, Paul Mühlethaler:
Performance Impact Analysis of Security Attacks on Cross-Layer Routing Protocols in Vehicular Ad hoc Networks. SoftCOM 2020: 1-6 - [c19]Fouzi Boukhalfa, Mohamed Hadded, Paul Mühlethaler, Oyunchimeg Shagdar:
Coexistence of IEEE 802.11p and the TDMA-based AS-DTMAC Protocol. SoftCOM 2020: 1-6 - [c18]Abir Rebei, Mohamed Hadded, Haifa Touati, Fouzi Boukhalfa, Paul Mühlethaler:
MAC-aware Routing Protocols for Vehicular Ad Hoc Networks: A Survey. SoftCOM 2020: 1-6 - [c17]Fouzi Boukhalfa, Cédric Adjih, Paul Mühlethaler, Mohamed Hadded, Oyunchimeg Shagdar:
Physical and MAC Layer Design for Active Signaling Schemes in Vehicular Networks. WiMob 2020: 86-92
2010 – 2019
- 2019
- [c16]Fouzi Boukhalfa, Mohamed Hadded, Paul Mühlethaler, Oyunchimeg Shagdar:
An Active Signaling Mechanism to Reduce Access Collisions in a Distributed TDMA Based MAC Protocol for Vehicular Networks. AINA 2019: 286-300 - [c15]Mohamed Hadded, Oyunchimeg Shagdar, Pierre Merdrignac:
Augmented Perception by V2X Cooperation (PAC-V2X): Security issues and misbehavior detection solutions. IWCMC 2019: 907-912 - [c14]Fouzi Boukhalfa, Mohamed Hadded, Paul Mühlethaler, Oyunchimeg Shagdar:
An Analytical Model for Performance Analysis of an Active Signaling-based TDMA MAC Protocol for Vehicular Networks. VTC Fall 2019: 1-7 - 2018
- [j3]Narjes Boulila, Mohamed Hadded, Anis Laouiti, Leïla Azouz Saïdane:
Hybrid centralised MAC protocol for reliable broadcast of safety messages in vehicular ad hoc network. Int. J. Space Based Situated Comput. 8(3): 169-178 (2018) - [c13]Narjes Boulila, Mohamed Hadded, Anis Laouiti, Leïla Azouz Saïdane:
QCH-MAC: A Qos-Aware Centralized Hybrid MAC Protocol for Vehicular Ad Hoc NETworks. AINA 2018: 55-62 - [c12]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti:
An Optimized Multi-hop Broadcast Scheme for Mesh Networks with Node Failures. ICCC 2018: 814-818 - [c11]Mohamed Hadded, Jean-Marc Lasgouttes, Fawzi Nashashibi, Ilias Xydias:
Platoon Route Optimization for Picking up Automated Vehicles in an Urban Network. ITSC 2018: 1987-1992 - [c10]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti:
TDMA Scheduling Strategies for Vehicular Ad Hoc Networks: From a Distributed to a Centralized Approach. SoftCOM 2018: 1-6 - 2017
- [c9]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti:
Performance evaluation of a TDMA-based multi-hop communication scheme for reliable delivery of warning messages in vehicular networks. IWCMC 2017: 1029-1034 - [c8]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti, Leïla Azouz Saïdane:
TDMA-Aware Routing Protocol for Multi-Hop Communications in Vehicular Ad Hoc Networks. WCNC 2017: 1-6 - 2016
- [b1]Mohamed Hadded:
Design and optimization of access control protocols in Vehicular Ad Hoc Networks (VANETs). (Conception et optimisation de protocoles de contrôle d'accès pour les réseaux véhiculaires VANETs). Telecom & Management SudParis, France, 2016 - [c7]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti, Leïla Azouz Saïdane:
A centralized TDMA based scheduling algorithm for real-time communications in vehicular ad hoc networks. SoftCOM 2016: 1-6 - [c6]Mohamed Hadded, Anis Laouiti, Paul Mühlethaler, Leïla Azouz Saïdane:
An Infrastructure-Free Slot Assignment Algorithm for Reliable Broadcast of Periodic Messages in Vehicular Ad Hoc Networks. VTC Fall 2016: 1-7 - 2015
- [j2]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti, Rachid Zagrouba, Leïla Azouz Saïdane:
TDMA-Based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis, and Open Research Issues. IEEE Commun. Surv. Tutorials 17(4): 2461-2492 (2015) - [c5]Mohamed Hadded, Rachid Zagrouba, Anis Laouiti, Paul Mühlethaler, Leïla Azouz Saïdane:
A multi-objective genetic algorithm-based Adaptive Weighted Clustering Protocol in VANET. CEC 2015: 994-1002 - [c4]Mohamed Hadded, Paul Mühlethaler, Rachid Zagrouba, Anis Laouiti, Leïla Azouz Saïdane:
Using road IDs to enhance clustering in vehicular ad hoc networks. IWCMC 2015: 285-290 - [c3]Ines Khoufi, Mohamed Hadded, Pascale Minet, Anis Laouiti:
Optimized trajectories of multi-robot deploying wireless sensor nodes. WiMob 2015: 724-731 - 2014
- [j1]Mohamed Hadded, Fethi Jarray, Ghassen Tlig, Hamadi Hasni:
Hybridisation of genetic algorithms and tabu search approach for reconstructing convex binary images from discrete orthogonal projections. Int. J. Metaheuristics 3(4): 291-319 (2014) - [c2]Ines Khoufi, Erwan Livolant, Pascale Minet, Mohamed Hadded, Anis Laouiti:
Optimized trajectory of a robot deploying wireless sensor nodes. Wireless Days 2014: 1-6 - 2013
- [c1]Mohamed Hadded, Hamadi Hasni:
Combining Genetic Algorithm and Simulated Annealing Methods for Reconstructing HV-Convex Binary Matrices. Hybrid Metaheuristics 2013: 78-91
Coauthor Index
aka: Paul Muhlethaler
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint