A Trust-based Intrusion Detection System for Mobile RPL Based Networks
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (in press)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...
Towards OWL 2 Natively Supported Fuzzy Cloud Ontology
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012)
Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. In 6th IEEE International Workshop Quality-Oriented Reuse of Software (IEEE QUORS’12), (328-333). https://doi.org/10.1109/compsacw.2012.66
Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applicati...
Integrated many-to-many multicast addressing and access control method
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...
A multi-channel hybrid MAC protocol for wireless Mesh networks.
Romdhani, I., & Al-Dubai, A. (2007)
A multi-channel hybrid MAC protocol for wireless Mesh networks. In Proceedings of the IEEE 8th International Symposium on Computer Networks (ISCN?08), Istanbul, Turkey