|
Search the dblp DataBase
Noureddine Boudriga:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yungho Leu, Ahmed K. Elmagarmid, Noureddine Boudriga
Specification and execution of transactions for advanced database applications. [Citation Graph (1, 0)][DBLP] Inf. Syst., 1992, v:17, n:2, pp:171-183 [Journal]
- Noureddine Boudriga, Sihem Guemara-ElFatmi
Formal Protocol Description: Model and validation. [Citation Graph (0, 0)][DBLP] RelMiCS, 1997, pp:187-203 [Conf]
- Noureddine Boudriga, M. Baghdadi, Mohammad S. Obaidat
A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks. [Citation Graph (0, 0)][DBLP] Annual Simulation Symposium, 2006, pp:61-67 [Conf]
- Yassine Khlifi, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi
Admission Control in Optical Label Switched Networks: A Dynamic QoS-Based Approach. [Citation Graph (0, 0)][DBLP] Annual Simulation Symposium, 2007, pp:106-113 [Conf]
- Mohamed Hamdi, Noureddine Boudriga
Algebraic specification of network security risk management. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:52-60 [Conf]
- Kamel Barkaoui, Noureddine Boudriga, Amel Touzi
A Transition Net Formalism for Deductive Databases Efficiently Handling Quering and Integrity Constraints Aspects. [Citation Graph (0, 0)][DBLP] DEXA, 1992, pp:221-225 [Conf]
- Noureddine Boudriga, Ali Mili
A Database of Software Components: An Algebraic Structure and Its Implementation. [Citation Graph (0, 0)][DBLP] DEXA, 1990, pp:162-166 [Conf]
- Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat
Optimum Design of Telecommunication Systems. [Citation Graph (0, 0)][DBLP] ICCCN, 1998, pp:792-799 [Conf]
- Manel Abdelkader, Noureddine Boudriga
SPUR: A Secured Protocol for UMTS Registration. [Citation Graph (0, 0)][DBLP] ICETE (3), 2004, pp:8-16 [Conf]
- Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat
Supporting Adaptive QoS for Multiple Classes of Service in DWDM Networks. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2001, pp:283-290 [Conf]
- Ali Mili, Noureddine Boudriga
Computers in the Classroom: A National Proposal. [Citation Graph (0, 0)][DBLP] IFIP Congress (2), 1992, pp:116-122 [Conf]
- Slim Rekhis, Noureddine Boudriga
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2005, pp:325-338 [Conf]
- Omran A. Bukhres, Jeanne Alm, Noureddine Boudriga
A Priority-Based PCG Algorithm for Global Deadlock Detection and Resilution in Multidatabase Systems. [Citation Graph (0, 0)][DBLP] RIDE-IMS, 1993, pp:241-244 [Conf]
- Noureddine Boudriga, O. Hassairi, Mohammad S. Obaidat
Intelligent Services Integration in Mobile ATM Networks. [Citation Graph (0, 0)][DBLP] SAC, 1999, pp:91-97 [Conf]
- Slim Rekhis, Noureddine Boudriga
A formal logic-based language and an automated verification tool for computer forensic investigation. [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:287-291 [Conf]
- Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga
Global intrusion detection and tolerance in networked systems. [Citation Graph (0, 0)][DBLP] SAC, 2007, pp:188-189 [Conf]
- Yacine Djemaiel, Noureddine Boudriga
A global marking scheme for tracing cyber attacks. [Citation Graph (0, 0)][DBLP] SAC, 2007, pp:170-174 [Conf]
- Noureddine Boudriga, Mohammad S. Obaidat
Resource Management Schemes in Optical Networks. [Citation Graph (0, 0)][DBLP] SCCC, 2003, pp:99-108 [Conf]
- Mohamed Hamdi, Noureddine Boudriga
An Abstract Reduction Model for Computer Security Risk. [Citation Graph (0, 0)][DBLP] SEC, 2004, pp:1-16 [Conf]
- Jihene Krichene, Mohamed Hamdi, Noureddine Boudriga
Collective computer incident response using cognitive maps. [Citation Graph (0, 0)][DBLP] SMC (1), 2004, pp:1080-1085 [Conf]
- Noureddine Boudriga, Ali Mili, R. Zalila, Fatma Mili
A Relational Model for the Specification of Data Types. [Citation Graph (0, 0)][DBLP] Comput. Lang., 1992, v:17, n:2, pp:101-131 [Journal]
- Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat
A methodology to optimize the design of telecommunication systems. [Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:10, pp:912-921 [Journal]
- Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat
On a congestion management scheme for high speed networks using aggregated large deviations principle. [Citation Graph (0, 0)][DBLP] Computer Communications, 2001, v:24, n:9, pp:860-867 [Journal]
- Noureddine Boudriga
Optical burst switching protocols for supporting QoS and adaptive routing. [Citation Graph (0, 0)][DBLP] Computer Communications, 2003, v:26, n:15, pp:1804-1812 [Journal]
- Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi
Multiple connections in data communication and advanced applications. [Citation Graph (0, 0)][DBLP] Computer Communications, 1997, v:20, n:12, pp:1051-1058 [Journal]
- Sihem Guemara-ElFatmi, Noureddine Boudriga, Mohammad S. Obaidat
Relational-based calculus for trust management in networked services. [Citation Graph (0, 0)][DBLP] Computer Communications, 2004, v:27, n:12, pp:1206-1219 [Journal]
- Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga
An adaptive approach to manage traffic in CDMA ATM networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:10, pp:942-949 [Journal]
- Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga
DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle. [Citation Graph (0, 0)][DBLP] Computer Communications, 2003, v:26, n:7, pp:708-717 [Journal]
- Faouzi Zarai, Noureddine Boudriga, Mohammad S. Obaidat
Performance evaluation of a novel scheme for QoS provision in UTRA TDD. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:8, pp:969-982 [Journal]
- Noureddine Boudriga, Fathi Elloumi, Ali Mili
On the Lattice of Specifications: Applications to a Specification Methodology. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 1992, v:4, n:6, pp:544-571 [Journal]
- Yungho Leu, Ahmed K. Elmagarmid, Noureddine Boudriga
Corrigendum: Specification and execution of transactions for advanced database applications. [Citation Graph (0, 0)][DBLP] Inf. Syst., 1993, v:18, n:2, pp:141- [Journal]
- Chiheb Ben Ahmed, Noureddine Boudriga
Reducing Network Latency and Server Load in Hypermedia Systems. [Citation Graph (0, 0)][DBLP] Inf. Sci., 1997, v:102, n:1-4, pp:1-29 [Journal]
- Noureddine Boudriga, Yahya Slimani, Ali Mili
Relation-based semantics for concurrency. [Citation Graph (0, 0)][DBLP] Inf. Sci., 1993, v:75, n:3, pp:223-252 [Journal]
- eva Kühn, Ahmed K. Elmagarmid, Yungho Leu, Noureddine Boudriga
A Parallel Logic Language for Transaction Specification in Multidatabase Systems. [Citation Graph (0, 0)][DBLP] Journal of Systems Integration, 1995, v:5, n:3, pp:219-252 [Journal]
- Noureddine Boudriga, Ali Mili, Roland Mittermeir
Semantic-Based Software Retrieval to Support Rapid Prototyping. [Citation Graph (0, 0)][DBLP] Structured Programming, 1992, v:13, n:3, pp:109-127 [Journal]
- Jules Desharnais, Ali Jaoua, Fatma Mili, Noureddine Boudriga, Ali Mili
A Relation Division Operator: The Conjugate Kernel. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1993, v:114, n:2, pp:247-272 [Journal]
- Ali Jaoua, Ali Mili, Noureddine Boudriga, J. L. Durieux
Regularity of Relations: A Measure of Uniformity. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1991, v:79, n:2, pp:323-339 [Journal]
- B. A. Fessi, Mohamed Hamdi, S. Benabdallah, Noureddine Boudriga
A decisional framework system for computer network intrusion detection. [Citation Graph (0, 0)][DBLP] European Journal of Operational Research, 2007, v:177, n:3, pp:1824-1838 [Journal]
- Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi
A QoS-Oriented Protocol for Burst Admission Control in OBS Networks. [Citation Graph (0, 0)][DBLP] AICCSA, 2007, pp:172-179 [Conf]
- Yassine Khlifi, Noureddine Boudriga, Mohammad S. Obaidat
Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach. [Citation Graph (0, 0)][DBLP] AICCSA, 2007, pp:233-240 [Conf]
- Mohamed Hamdi, Ramzi Bellazreg, Noureddine Boudriga
Doppler Effect on Location-Based Tracking in Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP] AICCSA, 2007, pp:252-257 [Conf]
- Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat
A Novel Scheme for Traffic Monitoring in Optical Burst-Switched Networks. [Citation Graph (0, 0)][DBLP] AICCSA, 2007, pp:266-273 [Conf]
- Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga
Sensor Activity Scheduling for Efficient WSN-based Tracking. [Citation Graph (0, 0)][DBLP] AICCSA, 2007, pp:840-847 [Conf]
- Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. [Citation Graph (0, 0)][DBLP] AICCSA, 2007, pp:825-832 [Conf]
- Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga
Managing mobility in a wireless ATM network. [Citation Graph (0, 0)][DBLP] IPCCC, 1999, pp:90-96 [Conf]
- Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat
Performance analysis of intelligent mobile ATM networks. [Citation Graph (0, 0)][DBLP] IPCCC, 1999, pp:83-89 [Conf]
- Slim Rekhis, Noureddine Boudriga
Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Mohamed Hamdi, Noureddine Boudriga
Towards a Relational Calculus for Security Library Management. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat
Designing a Wireless Sensor Network for Mobile Target Localization and Tracking. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Mohammad S. Obaidat, Yassine Khlifi, Noureddine Boudriga
Performance analysis of a dynamic QoS scheme in optical label-switched networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:16, pp:3012-3026 [Journal]
- Amor Lazzez, Yassine Khlifi, S. Guemara El Fatmi, Noureddine Boudriga, Mohammad S. Obaidat
A novel node architecture for optical networks: Modeling, analysis and performance evaluation. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:5, pp:999-1014 [Journal]
- Mohamed Hamdi, Noureddine Boudriga
Detecting Denial-of-Service attacks using the wavelet transform. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:16, pp:3203-3213 [Journal]
- Noureddine Boudriga, Mohammad S. Obaidat
Mobility, sensing, and security management in wireless ad hoc sensor systems. [Citation Graph (0, 0)][DBLP] Computers & Electrical Engineering, 2006, v:32, n:1-3, pp:266-276 [Journal]
Dynamic Detection and Tolerance of Attacks in Storage Area Networks. [Citation Graph (, )][DBLP]
ReAlSec: A Relational Language for Advanced Security Engineering. [Citation Graph (, )][DBLP]
Automated Intrusion Response System: Surveys and Analysis. [Citation Graph (, )][DBLP]
A QoS-Based Scheme for Planning and Dimensioning of Optical Label Switched Networks. [Citation Graph (, )][DBLP]
A Dynamic QoS-Based Scheme for Admission Control in OBS Networks. [Citation Graph (, )][DBLP]
A Progressive Chaotic MPEG-4 Video Encryption Scheme for Wireless Networks. [Citation Graph (, )][DBLP]
Secure Grid-Based Multi-Party Micropayment System in 4G Networks. [Citation Graph (, )][DBLP]
SAGA: An Adaptive Infrastructure for Secure Available Grid on Ad-hoc Networks. [Citation Graph (, )][DBLP]
Four dimensional chaotic ciphers for secure image transmission. [Citation Graph (, )][DBLP]
An image-based tracking algorithm for hybrid Wireless Sensor Networks using epipolar geometry. [Citation Graph (, )][DBLP]
Intrusion detection and tolerance for transaction based applications in wireless environments. [Citation Graph (, )][DBLP]
An all-optical synchronizer for switching node using single-sideband modulator and fiber Bragg gratings. [Citation Graph (, )][DBLP]
A public key algorithm for optical communication based on lattice cryptography. [Citation Graph (, )][DBLP]
A new genetic algorithm approach for intrusion response system in computer networks. [Citation Graph (, )][DBLP]
Incident Response Probabilistic Cognitive Maps. [Citation Graph (, )][DBLP]
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Serving Handing Over Stations within the Mobile IEEE 802.16 Mesh Mode Context. [Citation Graph (, )][DBLP]
A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks. [Citation Graph (, )][DBLP]
Cognitive-Maps Based Investigation of Digital Security Incidents. [Citation Graph (, )][DBLP]
DigForNet: Digital Forensic in Networking. [Citation Graph (, )][DBLP]
Security policy validation using temporal executable specifications. [Citation Graph (, )][DBLP]
Network security project management: a security policy-based approach. [Citation Graph (, )][DBLP]
Radio-Based Cooperation for Wireless Intrusion Detection. [Citation Graph (, )][DBLP]
Location Management in Wireless Fourth Generation Networks. [Citation Graph (, )][DBLP]
DPRMM: A Novel Coverage-Invariant Mobility Model for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Chaotic Progressive Access Control for JPEG2000 Images Repositories. [Citation Graph (, )][DBLP]
Using Object Metadata to Detect and Tolerate Attacks in Object Storage Devices. [Citation Graph (, )][DBLP]
Efficient Resource Reservation for Optical Burst Switching Networks. [Citation Graph (, )][DBLP]
Energy-Efficient Routing in Wireless Sensor Networks Using Probabilistic Strategies. [Citation Graph (, )][DBLP]
Coverage control and irregular radio propagation in eireless sensor networks. [Citation Graph (, )][DBLP]
Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS. [Citation Graph (, )][DBLP]
Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems. [Citation Graph (, )][DBLP]
Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks. [Citation Graph (, )][DBLP]
Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. [Citation Graph (, )][DBLP]
A platform for secure multi-service vehicular communication. [Citation Graph (, )][DBLP]
Securing Roaming and Vertical Handover in Fourth Generation Networks. [Citation Graph (, )][DBLP]
Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis. [Citation Graph (, )][DBLP]
Search in 0.021secs, Finished in 0.025secs
|