Publications
Journals:
[1] M. E. Elhdhili, L. Benazzouz, F. Kamoun, "CASAN: Clustering Algorithm for Security in Ad hoc Networks", Computer Communications 31 (2008) 2972–2980.
[2] M. E. Elhdhili, L. Benazzouz, F. Kamoun, "Reputation based clustering algorithm for security management in ad hoc networks with liars", International Journal of Information and Computer Security 2009 - Vol. 3, No.3/4 pp. 228-244
[3] L. Benazzouz, M. E. Elhdhili, F. Kamoun, "Towards an Efficient Reputation Based Hybrid Key Management Architecture for Ad hoc Networks ", security and communication networks, DOI:10.1002/sec, 2009.
International conferences
[1] M. E. Elhdhili, L. Benazzouz, F. Kamoun, "Reputation based clustering algorithm for security management in ad hoc networks with liars", Proceedings of The Third IEEE international conference on risks and security of Internet and systems, pp 141-148, 2008
[2] M. E. Elhdhili, L. Ben Azzouz, F. Kamoun, " Lowest Weight: Reactive Clustering Algorithm for Adhoc Networks ". IFIP PWC 2006, Espagne.
[3]M. E. Elhdhili, L. Ben Azzouz, F. Kamoun, " Designing reactive clustering Algorithms for Adhoc Networks ". Accepté à WNET 2006, Canada.
[4] M. E. Elhdhili, L. Benazzouz, F. Kamoun, "A Totally Distributed Cluster Based Key management Model for Ad hoc Networks", Proceedings of The Third Annual Medeterranean Ad hoc Networking Workshop / Med-Hoc-Net 2004.
[1] M. E. Elhdhili, L. Benazzouz, F. Kamoun, "CASAN: Clustering Algorithm for Security in Ad hoc Networks", Computer Communications 31 (2008) 2972–2980.
[2] M. E. Elhdhili, L. Benazzouz, F. Kamoun, "Reputation based clustering algorithm for security management in ad hoc networks with liars", International Journal of Information and Computer Security 2009 - Vol. 3, No.3/4 pp. 228-244
[3] L. Benazzouz, M. E. Elhdhili, F. Kamoun, "Towards an Efficient Reputation Based Hybrid Key Management Architecture for Ad hoc Networks ", security and communication networks, DOI:10.1002/sec, 2009.
International conferences
[1] M. E. Elhdhili, L. Benazzouz, F. Kamoun, "Reputation based clustering algorithm for security management in ad hoc networks with liars", Proceedings of The Third IEEE international conference on risks and security of Internet and systems, pp 141-148, 2008
[2] M. E. Elhdhili, L. Ben Azzouz, F. Kamoun, " Lowest Weight: Reactive Clustering Algorithm for Adhoc Networks ". IFIP PWC 2006, Espagne.
[3]M. E. Elhdhili, L. Ben Azzouz, F. Kamoun, " Designing reactive clustering Algorithms for Adhoc Networks ". Accepté à WNET 2006, Canada.
[4] M. E. Elhdhili, L. Benazzouz, F. Kamoun, "A Totally Distributed Cluster Based Key management Model for Ad hoc Networks", Proceedings of The Third Annual Medeterranean Ad hoc Networking Workshop / Med-Hoc-Net 2004.