The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Noureddine Boudriga: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yungho Leu, Ahmed K. Elmagarmid, Noureddine Boudriga
    Specification and execution of transactions for advanced database applications. [Citation Graph (1, 0)][DBLP]
    Inf. Syst., 1992, v:17, n:2, pp:171-183 [Journal]
  2. Noureddine Boudriga, Sihem Guemara-ElFatmi
    Formal Protocol Description: Model and validation. [Citation Graph (0, 0)][DBLP]
    RelMiCS, 1997, pp:187-203 [Conf]
  3. Noureddine Boudriga, M. Baghdadi, Mohammad S. Obaidat
    A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 2006, pp:61-67 [Conf]
  4. Yassine Khlifi, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi
    Admission Control in Optical Label Switched Networks: A Dynamic QoS-Based Approach. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 2007, pp:106-113 [Conf]
  5. Mohamed Hamdi, Noureddine Boudriga
    Algebraic specification of network security risk management. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:52-60 [Conf]
  6. Kamel Barkaoui, Noureddine Boudriga, Amel Touzi
    A Transition Net Formalism for Deductive Databases Efficiently Handling Quering and Integrity Constraints Aspects. [Citation Graph (0, 0)][DBLP]
    DEXA, 1992, pp:221-225 [Conf]
  7. Noureddine Boudriga, Ali Mili
    A Database of Software Components: An Algebraic Structure and Its Implementation. [Citation Graph (0, 0)][DBLP]
    DEXA, 1990, pp:162-166 [Conf]
  8. Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat
    Optimum Design of Telecommunication Systems. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:792-799 [Conf]
  9. Manel Abdelkader, Noureddine Boudriga
    SPUR: A Secured Protocol for UMTS Registration. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:8-16 [Conf]
  10. Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat
    Supporting Adaptive QoS for Multiple Classes of Service in DWDM Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2001, pp:283-290 [Conf]
  11. Ali Mili, Noureddine Boudriga
    Computers in the Classroom: A National Proposal. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:116-122 [Conf]
  12. Slim Rekhis, Noureddine Boudriga
    A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:325-338 [Conf]
  13. Omran A. Bukhres, Jeanne Alm, Noureddine Boudriga
    A Priority-Based PCG Algorithm for Global Deadlock Detection and Resilution in Multidatabase Systems. [Citation Graph (0, 0)][DBLP]
    RIDE-IMS, 1993, pp:241-244 [Conf]
  14. Noureddine Boudriga, O. Hassairi, Mohammad S. Obaidat
    Intelligent Services Integration in Mobile ATM Networks. [Citation Graph (0, 0)][DBLP]
    SAC, 1999, pp:91-97 [Conf]
  15. Slim Rekhis, Noureddine Boudriga
    A formal logic-based language and an automated verification tool for computer forensic investigation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:287-291 [Conf]
  16. Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga
    Global intrusion detection and tolerance in networked systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:188-189 [Conf]
  17. Yacine Djemaiel, Noureddine Boudriga
    A global marking scheme for tracing cyber attacks. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:170-174 [Conf]
  18. Noureddine Boudriga, Mohammad S. Obaidat
    Resource Management Schemes in Optical Networks. [Citation Graph (0, 0)][DBLP]
    SCCC, 2003, pp:99-108 [Conf]
  19. Mohamed Hamdi, Noureddine Boudriga
    An Abstract Reduction Model for Computer Security Risk. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:1-16 [Conf]
  20. Jihene Krichene, Mohamed Hamdi, Noureddine Boudriga
    Collective computer incident response using cognitive maps. [Citation Graph (0, 0)][DBLP]
    SMC (1), 2004, pp:1080-1085 [Conf]
  21. Noureddine Boudriga, Ali Mili, R. Zalila, Fatma Mili
    A Relational Model for the Specification of Data Types. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 1992, v:17, n:2, pp:101-131 [Journal]
  22. Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat
    A methodology to optimize the design of telecommunication systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:10, pp:912-921 [Journal]
  23. Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat
    On a congestion management scheme for high speed networks using aggregated large deviations principle. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2001, v:24, n:9, pp:860-867 [Journal]
  24. Noureddine Boudriga
    Optical burst switching protocols for supporting QoS and adaptive routing. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:15, pp:1804-1812 [Journal]
  25. Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi
    Multiple connections in data communication and advanced applications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:12, pp:1051-1058 [Journal]
  26. Sihem Guemara-ElFatmi, Noureddine Boudriga, Mohammad S. Obaidat
    Relational-based calculus for trust management in networked services. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:12, pp:1206-1219 [Journal]
  27. Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga
    An adaptive approach to manage traffic in CDMA ATM networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:10, pp:942-949 [Journal]
  28. Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga
    DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:7, pp:708-717 [Journal]
  29. Faouzi Zarai, Noureddine Boudriga, Mohammad S. Obaidat
    Performance evaluation of a novel scheme for QoS provision in UTRA TDD. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:8, pp:969-982 [Journal]
  30. Noureddine Boudriga, Fathi Elloumi, Ali Mili
    On the Lattice of Specifications: Applications to a Specification Methodology. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1992, v:4, n:6, pp:544-571 [Journal]
  31. Yungho Leu, Ahmed K. Elmagarmid, Noureddine Boudriga
    Corrigendum: Specification and execution of transactions for advanced database applications. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1993, v:18, n:2, pp:141- [Journal]
  32. Chiheb Ben Ahmed, Noureddine Boudriga
    Reducing Network Latency and Server Load in Hypermedia Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1997, v:102, n:1-4, pp:1-29 [Journal]
  33. Noureddine Boudriga, Yahya Slimani, Ali Mili
    Relation-based semantics for concurrency. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1993, v:75, n:3, pp:223-252 [Journal]
  34. eva Kühn, Ahmed K. Elmagarmid, Yungho Leu, Noureddine Boudriga
    A Parallel Logic Language for Transaction Specification in Multidatabase Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems Integration, 1995, v:5, n:3, pp:219-252 [Journal]
  35. Noureddine Boudriga, Ali Mili, Roland Mittermeir
    Semantic-Based Software Retrieval to Support Rapid Prototyping. [Citation Graph (0, 0)][DBLP]
    Structured Programming, 1992, v:13, n:3, pp:109-127 [Journal]
  36. Jules Desharnais, Ali Jaoua, Fatma Mili, Noureddine Boudriga, Ali Mili
    A Relation Division Operator: The Conjugate Kernel. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1993, v:114, n:2, pp:247-272 [Journal]
  37. Ali Jaoua, Ali Mili, Noureddine Boudriga, J. L. Durieux
    Regularity of Relations: A Measure of Uniformity. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1991, v:79, n:2, pp:323-339 [Journal]
  38. B. A. Fessi, Mohamed Hamdi, S. Benabdallah, Noureddine Boudriga
    A decisional framework system for computer network intrusion detection. [Citation Graph (0, 0)][DBLP]
    European Journal of Operational Research, 2007, v:177, n:3, pp:1824-1838 [Journal]
  39. Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi
    A QoS-Oriented Protocol for Burst Admission Control in OBS Networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:172-179 [Conf]
  40. Yassine Khlifi, Noureddine Boudriga, Mohammad S. Obaidat
    Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:233-240 [Conf]
  41. Mohamed Hamdi, Ramzi Bellazreg, Noureddine Boudriga
    Doppler Effect on Location-Based Tracking in Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:252-257 [Conf]
  42. Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat
    A Novel Scheme for Traffic Monitoring in Optical Burst-Switched Networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:266-273 [Conf]
  43. Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga
    Sensor Activity Scheduling for Efficient WSN-based Tracking. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:840-847 [Conf]
  44. Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga
    Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:825-832 [Conf]
  45. Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga
    Managing mobility in a wireless ATM network. [Citation Graph (0, 0)][DBLP]
    IPCCC, 1999, pp:90-96 [Conf]
  46. Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat
    Performance analysis of intelligent mobile ATM networks. [Citation Graph (0, 0)][DBLP]
    IPCCC, 1999, pp:83-89 [Conf]
  47. Slim Rekhis, Noureddine Boudriga
    Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  48. Mohamed Hamdi, Noureddine Boudriga
    Towards a Relational Calculus for Security Library Management. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  49. Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat
    Designing a Wireless Sensor Network for Mobile Target Localization and Tracking. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  50. Mohammad S. Obaidat, Yassine Khlifi, Noureddine Boudriga
    Performance analysis of a dynamic QoS scheme in optical label-switched networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:16, pp:3012-3026 [Journal]
  51. Amor Lazzez, Yassine Khlifi, S. Guemara El Fatmi, Noureddine Boudriga, Mohammad S. Obaidat
    A novel node architecture for optical networks: Modeling, analysis and performance evaluation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:5, pp:999-1014 [Journal]
  52. Mohamed Hamdi, Noureddine Boudriga
    Detecting Denial-of-Service attacks using the wavelet transform. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:16, pp:3203-3213 [Journal]
  53. Noureddine Boudriga, Mohammad S. Obaidat
    Mobility, sensing, and security management in wireless ad hoc sensor systems. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2006, v:32, n:1-3, pp:266-276 [Journal]

  54. Dynamic Detection and Tolerance of Attacks in Storage Area Networks. [Citation Graph (, )][DBLP]


  55. ReAlSec: A Relational Language for Advanced Security Engineering. [Citation Graph (, )][DBLP]


  56. Automated Intrusion Response System: Surveys and Analysis. [Citation Graph (, )][DBLP]


  57. A QoS-Based Scheme for Planning and Dimensioning of Optical Label Switched Networks. [Citation Graph (, )][DBLP]


  58. A Dynamic QoS-Based Scheme for Admission Control in OBS Networks. [Citation Graph (, )][DBLP]


  59. A Progressive Chaotic MPEG-4 Video Encryption Scheme for Wireless Networks. [Citation Graph (, )][DBLP]


  60. Secure Grid-Based Multi-Party Micropayment System in 4G Networks. [Citation Graph (, )][DBLP]


  61. SAGA: An Adaptive Infrastructure for Secure Available Grid on Ad-hoc Networks. [Citation Graph (, )][DBLP]


  62. Four dimensional chaotic ciphers for secure image transmission. [Citation Graph (, )][DBLP]


  63. An image-based tracking algorithm for hybrid Wireless Sensor Networks using epipolar geometry. [Citation Graph (, )][DBLP]


  64. Intrusion detection and tolerance for transaction based applications in wireless environments. [Citation Graph (, )][DBLP]


  65. An all-optical synchronizer for switching node using single-sideband modulator and fiber Bragg gratings. [Citation Graph (, )][DBLP]


  66. A public key algorithm for optical communication based on lattice cryptography. [Citation Graph (, )][DBLP]


  67. A new genetic algorithm approach for intrusion response system in computer networks. [Citation Graph (, )][DBLP]


  68. Incident Response Probabilistic Cognitive Maps. [Citation Graph (, )][DBLP]


  69. Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  70. Serving Handing Over Stations within the Mobile IEEE 802.16 Mesh Mode Context. [Citation Graph (, )][DBLP]


  71. A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks. [Citation Graph (, )][DBLP]


  72. Cognitive-Maps Based Investigation of Digital Security Incidents. [Citation Graph (, )][DBLP]


  73. DigForNet: Digital Forensic in Networking. [Citation Graph (, )][DBLP]


  74. Security policy validation using temporal executable specifications. [Citation Graph (, )][DBLP]


  75. Network security project management: a security policy-based approach. [Citation Graph (, )][DBLP]


  76. Radio-Based Cooperation for Wireless Intrusion Detection. [Citation Graph (, )][DBLP]


  77. Location Management in Wireless Fourth Generation Networks. [Citation Graph (, )][DBLP]


  78. DPRMM: A Novel Coverage-Invariant Mobility Model for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  79. Chaotic Progressive Access Control for JPEG2000 Images Repositories. [Citation Graph (, )][DBLP]


  80. Using Object Metadata to Detect and Tolerate Attacks in Object Storage Devices. [Citation Graph (, )][DBLP]


  81. Efficient Resource Reservation for Optical Burst Switching Networks. [Citation Graph (, )][DBLP]


  82. Energy-Efficient Routing in Wireless Sensor Networks Using Probabilistic Strategies. [Citation Graph (, )][DBLP]


  83. Coverage control and irregular radio propagation in eireless sensor networks. [Citation Graph (, )][DBLP]


  84. Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  85. Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS. [Citation Graph (, )][DBLP]


  86. Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems. [Citation Graph (, )][DBLP]


  87. Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks. [Citation Graph (, )][DBLP]


  88. Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. [Citation Graph (, )][DBLP]


  89. A platform for secure multi-service vehicular communication. [Citation Graph (, )][DBLP]


  90. Securing Roaming and Vertical Handover in Fourth Generation Networks. [Citation Graph (, )][DBLP]


  91. Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis. [Citation Graph (, )][DBLP]


Search in 0.086secs, Finished in 0.088secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002