Li, S., Romdhani, I., & Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, (32-36). doi:10.3969/j.issn.1673-5188.2016.S0.006. ISSN 16735188
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the pat⁃
terns and vulnerabilities for both web and mobil...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012). Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. In 6th IEEE International Workshop Quality-Oriented Reuse of Software (IEEE QUORS’12), 328-333. doi:10.1109/compsacw.2012.66
Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applicati...
Romdhani, I., & Yassin Al-Dubai, A. (2009). Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. doi:10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...
Romdhani, I., & Al-Dubai, A. (2007). A multi-channel hybrid MAC protocol for wireless Mesh networks. In Proceedings of the IEEE 8th International Symposium on Computer Networks (ISCN?08), Istanbul, Turkey