default search action
Hanen Idoudi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Sami Mnasri, Dorsaf Salah, Hanen Idoudi:
A hybrid blockchain and federated learning attention-based BERT transformer framework for medical records management. J. Supercomput. 81(1): 317 (2025) - 2024
- [j12]Brahim Mefgouda, Hanen Idoudi, Mohammad Al-Quraan, Omer Waqar, Ahmed Zoha, Muhammad Ali Imran, Lina S. Mohjazi:
A QoS-Aware Service-Driven Network Selection for HWNs Based on MARCOS and Utility Functions. IEEE Open J. Commun. Soc. 5: 3658-3677 (2024) - 2023
- [j11]Brahim Mefgouda, Hanen Idoudi:
New network interface selection based on MADM and multi-objective whale optimization algorithm in heterogeneous wireless networks. J. Supercomput. 79(4): 3580-3615 (2023) - [c38]Mounira Sassi, Hanen Idoudi, Khadija Bousselmi:
Combining MLP and Feature Engineering to Predict Avalanche Severity. CoDIT 2023: 151-156 - [c37]Mounira Sassi, Hanen Idoudi:
OntDM: An Ontology for Disaster Management and Response Mitigation. CW 2023: 126-133 - [c36]Moenes Ben Soussia, Khadija Bousselmi, Hanen Idoudi:
Deep Reinforcement Learning-based Load Balancer usaing Kubernetes. INISTA 2023: 1-7 - [p1]Nourhène Ben Rabah, Hanen Idoudi:
A Machine Learning Framework for Intrusion Detection in VANET Communications. Emerging Trends in Cybersecurity Applications 2023: 209-227 - 2022
- [j10]Dorsaf Swessi, Hanen Idoudi:
A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures. Wirel. Pers. Commun. 124(2): 1557-1592 (2022) - [c35]Dorsaf Swessi, Hanen Idoudi:
Comparative Study of Ensemble Learning Techniques for Fuzzy Attack Detection in In-Vehicle Networks. AINA (2) 2022: 598-610 - [c34]Mounira Sassi, Hanen Idoudi, Khadija Bousselmi:
Predictive Systems for Snow Avalanche Forecasting. CoDIT 2022: 837-842 - [c33]Brahim Mefgouda, Hanen Idoudi:
A Novel MADM based Network Interface Selection Approach with Rank Reversal Avoidance in HWNs. WCNC 2022: 2082-2087 - 2021
- [c32]Brahim Mefgouda, Hanen Idoudi:
Multi-Objective Whale Optimization for Network Interface Selection in HWNs. WETICE 2021: 23-26 - [c31]Insaf Achour, Hanen Idoudi, Samiha Ayed:
Automatic Generation of Access Control for Permissionless Blockchains: Ethereum Use Case. WETICE 2021: 45-50 - [c30]Dorsaf Salah, Hanen Idoudi:
A Meta-heuristic-based Scheduling of Transactions for Medical Blockchain Systems. WETICE 2021: 81-84
2010 – 2019
- 2019
- [j9]Hanen Idoudi, Ons Mabrouk, Pascale Minet, Leïla Azouz Saïdane:
Cluster-based scheduling for cognitive radio sensor networks. J. Ambient Intell. Humaniz. Comput. 10(2): 477-489 (2019) - [c29]Mouna Elloumi, Riadh Dhaou, Benoît Escrig, Hanen Idoudi, Leïla Azouz Saïdane, Andrei Fer:
Traffic Monitoring on City Roads Using UAVs. ADHOC-NOW 2019: 588-600 - 2018
- [b1]Hanen Idoudi:
Contributions à l'amélioration des communications dans les réseaux sans fil multi-sauts. University of Toulouse, France, 2018 - [j8]Hend Fourati, Hanen Idoudi, Leïla Azouz Saïdane:
Intelligent slots allocation for dynamic differentiation in IEEE 802.15.6 CSMA/CA. Ad Hoc Networks 72: 27-43 (2018) - [j7]Jihen Bennaceur, Hanen Idoudi, Leïla Azouz Saïdane:
Trust management in cognitive radio networks: A survey. Int. J. Netw. Manag. 28(1) (2018) - [j6]Sabri Khssibi, Adrien van den Bossche, Hanen Idoudi, Leïla Azouz Saïdane, Thierry Val:
Enhancement of the Traffic Differentiation Architecture for WBAN Based on IEEE 802.15.4. Wirel. Pers. Commun. 101(3): 1519-1537 (2018) - [c28]Hanen Idoudi:
Scheduling in Cognitive Radio Sensor Networks-An Auction-based Mechanism. PEMWN 2018: 1-6 - [c27]Mouna Elloumi, Riadh Dhaou, Benoît Escrig, Hanen Idoudi, Leïla Azouz Saïdane:
Monitoring road traffic with a UAV-based system. WCNC 2018: 1-6 - 2017
- [j5]Chiraz Houaidia, Hanen Idoudi, Adrien van den Bossche, Leïla Azouz Saïdane, Thierry Val:
Inter-flow and intra-flow interference mitigation routing in wireless mesh networks. Comput. Networks 120: 141-156 (2017) - [j4]Sabri Khssibi, Adrien van den Bossche, Thierry Val, Hanen Idoudi, Leïla Azouz Saïdane:
Optimisation of IEEE 802.15.4: overview, theoretical study and simulation. Int. J. Inf. Commun. Technol. 10(2): 119-135 (2017) - [c26]Mouna Elloumi, Benoît Escrig, Riadh Dhaou, Hanen Idoudi, Leïla Azouz Saïdane:
Designing an energy efficient UAV tracking algorithm. IWCMC 2017: 127-132 - [c25]Jihen Bennaceur, Hanen Idoudi, Leïla Azouz Saïdane:
Game-based Secure Sensing for the CRN. IWCMC 2017: 2079-2084 - [c24]Jihen Bennaceur, Sami Souihi, Hanen Idoudi, Leïla Azouz Saïdane, Abdelhamid Mellouk:
Game-based secure sensing for the mobile cognitive radio network. PIMRC 2017: 1-7 - 2016
- [j3]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane, Halima Elbiaze:
Tree-based modelling of redundancy and paths in wireless sensor networks. Int. J. Inf. Commun. Technol. 8(2/3): 212-234 (2016) - [c23]Hend Fourati, Hanen Idoudi, Leïla Azouz Saïdane:
A novel IEEE 802.15.6 CSMA/CA service differentiation. AICCSA 2016: 1-7 - [c22]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane:
Hierarchical Cuckoo Search-based routing in Wireless Sensor Networks. ISCC 2016: 996-998 - [c21]Hanen Idoudi, Oumaima Ben Abderrahim, Khalil Mabrouk:
Generic links and paths stability model for Mobile Ad Hoc Networks. IWCMC 2016: 394-398 - [c20]Hend Fourati, Hanen Idoudi, Leïla Azouz Saïdane:
Modeling and enhancement of IEEE 802.15.6. IWCMC 2016: 1105-1110 - [c19]Hanen Idoudi, Jihen Bennaceur:
Fault tolerant placement strategy for WSN. WCNC 2016: 1-5 - 2015
- [c18]Hend Fourati, Hanen Idoudi, Thierry Val, Adrien van den Bossche, Leïla Azouz Saïdane:
Performance evaluation of IEEE 802.15.6 CSMA/CA-based CANet WBAN. AICCSA 2015: 1-7 - [c17]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane:
Ant Colony Optimization based hierarchical data dissemination in WSN. IWCMC 2015: 782-787 - [c16]Ons Mabrouk, Pascale Minet, Hanen Idoudi, Leïla Azouz Saïdane:
Intra-cluster multichannel scheduling algorithm for Cognitive Radio Sensor Networks. IWCMC 2015: 1452-1457 - [c15]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane:
Adaptive Scheduling with Fault Tolerance for Wireless Sensor Networks. VTC Spring 2015: 1-5 - 2014
- [j2]Chiraz Houaidia, Hanen Idoudi, Adrien van den Bossche, Thierry Val, Leïla Azouz Saïdane:
Towards an optimised traffic-aware routing in wireless mesh networks. Int. J. Space Based Situated Comput. 4(3/4): 217-232 (2014) - [c14]Ons Mabrouk, Hanen Idoudi, Ichrak Amdouni, Ridha Soua, Pascale Minet, Leïla Azouz Saïdane:
OTICOR: Opportunistic Time Slot Assignment in Cognitive Radio Sensor Networks. AINA 2014: 790-797 - [c13]Ons Mabrouk, Pascale Minet, Hanen Idoudi, Leïla Azouz Saïdane:
Conflict-Free Opportunistic Centralized Time Slot Assignment in Cognitive Radio Sensor Networks. HPCC/CSS/ICESS 2014: 421-427 - [c12]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane:
PASC: Power aware scheduled clustering in wireless sensor networks. ISWCS 2014: 873-877 - [c11]Hanen Idoudi:
Lightweight Balanced Power Saving MAC Protocol for Wireless Sensor Networks. NTMS 2014: 1-5 - 2013
- [j1]Hanen Idoudi:
Efficient Forwarding With Power Saving and Load Balancing In Wireless Sensor Networks. Int. J. Bus. Data Commun. Netw. 9(2): 45-60 (2013) - [c10]Chiraz Houaidia, Adrien van den Bossche, Hanen Idoudi, Thierry Val, Leïla Azouz Saïdane:
Link availability aware routing metric for wireless mesh networks. AICCSA 2013: 1-4 - [c9]Hanen Idoudi, Fatma Somaa, Leïla Azouz Saïdane:
Alarms management in wireless body area networks. AICCSA 2013: 1-4 - [c8]Chiraz Houaidia, Hanen Idoudi, Adrien van den Bossche, Thierry Val, Leïla Azouz Saïdane:
Impact of IEEE 802.11 PHY/MAC Strategies on Routing Performance in Wireless Mesh Networks. AINA Workshops 2013: 803-808 - [c7]Chiraz Houaidia, Adrien van den Bossche, Hanen Idoudi, Thierry Val, Leïla Azouz Saïdane:
Novel link availability aware metrics for routing in wireless mesh networks. GIIS 2013: 1-7 - [c6]Chiraz Houaidia, Adrien van den Bossche, Hanen Idoudi, Thierry Val, Leïla Azouz Saïdane:
Experimental performance analysis of routing metrics in Wireless Mesh Networks. IWCMC 2013: 1011-1016 - 2012
- [c5]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane:
Hierarchical modeling of redundancy and paths in wireless sensor networks. ICCIT 2012: 243-247 - [i1]Hanen Idoudi, Chiraz Houaidia, Leïla Azouz Saïdane, Pascale Minet:
Robots-Assisted Redeployment in Wireless Sensor Networks. CoRR abs/1207.7304 (2012)
2000 – 2009
- 2008
- [c4]Hanen Idoudi, Abdelfattah Belghith, Miklós Molnár:
Trade-offs between Optimality and Validity in Probabilistic Routing for Mobile Multi-Hop Networks. Communications in Computing 2008: 166-172 - [c3]Abdelfattah Belghith, Hanen Idoudi, Miklós Molnár:
Proactive Probabilistic Routing in Mobile Ad-hoc Networks. ICWN 2008: 621-627 - [c2]Abdelfettah Belghith, Adel Ben Mnaouer, Hanen Idoudi:
Polymorphic routing using proactive and probabilistic approaches for MANETs. QSHINE 2008: 49 - 2007
- [c1]Raymond A. Marie, Miklós Molnár, Hanen Idoudi:
A simple automata based model for stable routing in dynamic ad hoc networks. PM2HW2N 2007: 72-79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint