default search action
Ahmed Meddahi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Chaima Zidi, Patrick Sondi, Nathalie Mitton, Martine Wahl, Ahmed Meddahi:
Review and Perspectives on the Audit of Vehicle-to-Everything Communications. IEEE Access 11: 81623-81645 (2023) - [j10]Phithak Thaenkaew, Bruno Quoitin, Ahmed Meddahi:
Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs. Sensors 23(22): 9172 (2023) - [c27]Mohamed Abderrahmane Madani, Fen Zhou, Ahmed Meddahi:
Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path Routing. CNSM 2023: 1-5 - [c26]Mohamed Abderrahmane Madani, Fen Zhou, Ahmed Meddahi:
Adaptive ILP Formulation for Disaster-Resilient Service Function Chains in Beyond 5G Networks. CSCN 2023: 346-352 - [c25]Lounès Meddahi, Ahmed Meddahi, Patrick Sondi, Fen Zhou:
Leveraging Blockchain for a Robust and Scalable Device Identification in LoRaWAN. ISNCC 2023: 1-6 - [c24]Oussama Sbai, Benjamin Allaert, Patrick Sondi, Ahmed Meddahi:
SIP-DDoS: SIP Framework for DDoS Intrusion Detection Based on Recurrent Neural Networks. MLN 2023: 72-89 - 2022
- [c23]Phithak Thaenkaew, Bruno Quoitin, Ahmed Meddahi:
Evaluating the cost of beyond AES-128 LoRaWAN security. ISNCC 2022: 1-6 - 2021
- [j9]Chalee Vorakulpipat, Ryan K. L. Ko, Qi Li, Ahmed Meddahi:
Security and Privacy in Smart Cities. Secur. Commun. Networks 2021: 9830547:1-9830547:2 (2021) - [j8]Montida Pattaranantakul, Ruan He, Zonghua Zhang, Ahmed Meddahi, Ping Wang:
Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds. IEEE Trans. Dependable Secur. Comput. 18(1): 372-383 (2021) - [j7]Montida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang, Ahmed Meddahi, Chalee Vorakulpipat:
On Achieving Trustworthy Service Function Chaining. IEEE Trans. Netw. Serv. Manag. 18(3): 3140-3153 (2021) - [c22]Sixu Cai, Fen Zhou, Zonghua Zhang, Ahmed Meddahi:
Disaster-Resilient Service Function Chain Embedding Based on Multi-Path Routing. INFOCOM Workshops 2021: 1-7 - [c21]Amar Meddahi, Hassen Drira, Ahmed Meddahi:
SIP-GAN: Generative Adversarial Networks for SIP traffic generation. ISNCC 2021: 1-6
2010 – 2019
- 2019
- [c20]Montida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang, Ahmed Meddahi:
Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV. SecureComm (2) 2019: 287-301 - 2018
- [j6]Montida Pattaranantakul, Ruan He, Qipeng Song, Zonghua Zhang, Ahmed Meddahi:
NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures. IEEE Commun. Surv. Tutorials 20(4): 3330-3368 (2018) - [j5]Mourad Amad, Djamil Aïssani, Ahmed Meddahi, Aimed Merabet, Noureddine Sekhriou:
Pancake graphs for lookup acceleration and optimization in P2P networks. Web Intell. 16(4): 221-232 (2018) - [e1]David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi:
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11149, Springer 2018, ISBN 978-3-030-01949-5 [contents] - 2017
- [c19]Montida Pattaranantakul, Yuchia Tseng, Ruan He, Zonghua Zhang, Ahmed Meddahi:
A First Step Towards Security Extension for NFV Orchestrator. SDN-NFV@CODASPY 2017: 25-30 - 2016
- [c18]Montida Pattaranantakul, Ruan He, Ahmed Meddahi, Zonghua Zhang:
SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration. Trustcom/BigDataSE/ISPA 2016: 598-605 - 2015
- [j4]Mourad Amad, Djamil Aïssani, Ahmed Meddahi, Makhlouf Benkerrou, Farouk Amghar:
De Bruijn Graph Based Solution for Lookup Acceleration and Optimization in P2P Networks. Wirel. Pers. Commun. 85(3): 1471-1486 (2015) - [c17]Mourad Amad, Djamil Aïssani, Ahmed Meddahi, Nouria Madi, Razika Bouiche:
A Priority Based Lookup Model for VoIP Applications in Unstructured P2P Networks. IPAC 2015: 35:1-35:5 - [c16]Mourad Amad, Ahmed Meddahi, Gilles Vanwormhoudt:
A self-adaptive ALM architecture for P2P media streaming. CFIP/NOTERE 2015: 1-6 - 2013
- [c15]Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
A weighted QoS aware multipath routing process in Mobile Ad hoc networks. ISCC 2013: 336-341 - [c14]Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
An enhanced Quality Aware Multi path routing protocol over MA-NETs based on cross layer approach. ISWCS 2013: 1-5 - [c13]Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
An enhanced routing protocol for 802.11s-LTE communications. ISWCS 2013: 1-5 - [c12]Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
A Cross Layer Balanced Routing Protocol for Differentiated Traffics over Mobile Ad Hoc Networks. NEW2AN 2013: 407-419 - [p1]Mourad Amad, Djamil Aïssani, Ahmed Meddahi, Abdelmalek Boudries:
A Pragmatic and Scalable Solution for Free Riding Problem in Peer to Peer Networks. Modeling Approaches and Algorithms for Advanced Computer Applications 2013: 135-144 - 2012
- [j3]Mourad Amad, Ahmed Meddahi, Djamil Aïssani, Gilles Vanwormhoudt:
GPM: A generic and scalable P2P model that optimizes tree depth for multicast communications. Int. J. Commun. Syst. 25(4): 491-514 (2012) - [j2]Mourad Amad, Ahmed Meddahi, Djamil Aïssani, Zonghua Zhang:
HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity. J. Netw. Comput. Appl. 35(6): 1818-1830 (2012) - [c11]Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
Enhanced Backtracking Chord protocol for mobile Ad hoc networks. ICCIT 2012: 191-195 - [i1]Mourad Amad, Ahmed Meddahi, Djamil Aïssani:
Peer to Peer Networks Management Survey. CoRR abs/1203.3351 (2012) - 2011
- [c10]Mourad Amad, Djamil Aïssani, Ahmed Meddahi, Mustapha Saadi:
Multi Group Key Agreement Mechanism for Mobile P2P Wireless Networks. CIIA 2011 - [c9]Mariem Thaalbi, Ahmed Meddahi, Tarek Bejaoui, Nabil Tabbane:
An enhanced chord-based P2P lookup protocol for mobile Ad hoc networks. Wireless Days 2011: 1-5
2000 – 2009
- 2008
- [c8]Mourad Amad, Ahmed Meddahi:
A scalable P2P model for optimizing application layer multicast. AICCSA 2008: 407-413 - [c7]Ahmed Meddahi, Gilles Vanwormhoudt, Amro Malkawi:
A P2P Framework for Decentralized Xconferencing and Its JXTA Implementation. CISIS 2008: 400-405 - [c6]Mourad Amad, Ahmed Meddahi:
A Scalable Approach for Application Layer Multicast in P2P Networks. PerCom 2008: 498-503 - 2006
- [j1]Ahmed Meddahi, Hossam Afifi:
"Packet-E-Model": E-Model for VoIP quality evaluation. Comput. Networks 50(15): 2659-2675 (2006) - [c5]Mourad Amad, Ahmed Meddahi:
"P4L": A Four Layers P2P Model for Optimizing Resources Discovery and Localization. APNOMS 2006: 342-351 - [c4]Ahmed Meddahi, Hossam Afifi, Gilles Vanwormhoudt:
"MOSQoS": Subjective VoIP Quality for Feedback Control and Dynamic QoS Adaptation. ICC 2006: 2034-2039 - 2005
- [c3]Kamel Haddadou, Yacine Ghamri-Doudane, Marc Girod-Genet, Ahmed Meddahi, Laurent Bernard, Gilles Vanwormhoudt, Hossam Afifi, Nazim Agoulmine:
Toward Feasibility and Scalability of Session Initiation and Dynamic QoS Provisioning in Policy-Enabled Networks. NETWORKING 2005: 277-288 - 2004
- [c2]Ahmed Meddahi, Gilles Vanwormhoudt, Hossam Afifi:
Smart Profile: A New Method for Minimising SIP Messages. ICT 2004: 688-697 - 2003
- [c1]Ahmed Meddahi, Hossam Afifi, Djamal Zeghlache:
"Packet-e-model": e-model for wireless VoIP quality evaluation. PIMRC 2003: 2421-2425
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint