default search action
Mohamed Mosbah 0001
Person information
- affiliation: University of Bordeaux, Bordeaux INP, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Wafa Hamdi, Chahrazed Ksouri, Hasan Bulut, Mohamed Mosbah:
Network Slicing-Based Learning Techniques for IoV in 5G and Beyond Networks. IEEE Commun. Surv. Tutorials 26(3): 1989-2047 (2024) - [j57]Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
Hybrid vehicular access protocol and message prioritization for real-time safety messaging. Internet Things 28: 101390 (2024) - [j56]Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings. J. Netw. Syst. Manag. 32(2): 38 (2024) - [j55]Rim Negra, Imen Jemili, Akka Zemmari, Mohamed Mosbah, Abdelfattah Belghith:
Investigating the impact of body node coordinator position on communication reliability in wireless body area networks. Netw. Model. Anal. Health Informatics Bioinform. 13(1): 50 (2024) - [j54]Alexey Zhukov, Alain Rivero, Jenny Benois-Pineau, Akka Zemmari, Mohamed Mosbah:
A Hybrid System for Defect Detection on Rail Lines through the Fusion of Object and Context Information. Sensors 24(4): 1171 (2024) - [c139]Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
Integrated Vehicle Access Protocol with Priority-Based Messaging for VANETs. AINA (1) 2024: 114-128 - [c138]Rania Swessi, Zeineb El Khalfi, Mohamed Mosbah:
Optimizing Shared Micro-Mobility Services: Edge-Enabled Rebalance for Dock-Based Systems. WiMob 2024: 1-6 - [c137]Badreddine Yacine Yacheur, Cesar Vargas Anamuro, Moad Dehbi, Mohamed Amine Bouzaidi Tiali, Mohamed Mosbah, Jean-Marie Bonnin, Marwane Ayaida, Toufik Ahmed:
Enhancing Vehicle Orientation in Toll Stations Using vMEC and Hybrid Vehicular Communications. WiMob 2024: 1-7 - [e13]Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquín García-Alfaro:
Foundations and Practice of Security - 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14551, Springer 2024, ISBN 978-3-031-57536-5 [contents] - [e12]Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquín García-Alfaro:
Foundations and Practice of Security - 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14552, Springer 2024, ISBN 978-3-031-57539-6 [contents] - [e11]Mohamed Mosbah, M. Tahar Kechadi, Ladjel Bellatreche, Faïez Gargouri, Chirine Ghedira Guégan, Hassan Badir, Amin Beheshti, Mohamed Mohsen Gammoudi:
Advances in Model and Data Engineering in the Digitalization Era - MEDI 2023 Short and Workshop Papers, Sousse, Tunisia, November 2-4, 2023, Proceedings. Communications in Computer and Information Science 2071, Springer 2024, ISBN 978-3-031-55728-6 [contents] - [e10]Mohamed Mosbah, M. Tahar Kechadi, Ladjel Bellatreche, Faïez Gargouri:
Model and Data Engineering - 12th International Conference, MEDI 2023, Sousse, Tunisia, November 2-4, 2023, Proceedings. Lecture Notes in Computer Science 14396, Springer 2024, ISBN 978-3-031-49332-4 [contents] - [i2]Badreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah:
DRL-Based RAT Selection in a Hybrid Vehicular Communication Network. CoRR abs/2407.00828 (2024) - 2023
- [j53]Vineeta Jain, Ulf Wetzker, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah, Dominique Méry:
SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks. IEEE Access 11: 84620-84635 (2023) - [j52]Badreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah:
Efficient DRL-Based Selection Strategy in Hybrid Vehicular Networks. IEEE Trans. Netw. Serv. Manag. 20(3): 2400-2411 (2023) - [c136]Ibrahim Dahaoui, Mohamed Mosbah, Akka Zemmari:
Distribution of the Training Data Over the Shortest Path Between the Servers. AINA (3) 2023: 351-356 - [c135]Badreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah:
Throughput Enhancement in Hybrid Vehicular Networks Using Deep Reinforcement Learning. ISCC 2023: 938-943 - [c134]Sabri Khamari, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
Adaptive Deep Reinforcement Learning Approach for Service Migration in MEC-Enabled Vehicular Networks. ISCC 2023: 1075-1079 - [c133]Imed Ghnaya, Mohamed Mosbah, Hasnaâ Aniss, Toufik Ahmed:
Multi-Agent Advantage Actor-Critic Learning For Message Content Selection in Cooperative Perception Networks. NOMS 2023: 1-9 - [c132]Rania Swessi, Zeineb El Khalfi, Imen Jemili, Mohamed Mosbah:
Free-Floating Micro-mobility Smart Redistribution Using Spatio-temporal Demand Forecasting. VNC 2023: 73-80 - [c131]Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
Optimized Intelligent Driver Model for a Fluid Traffic Flow and Accidents Avoidance. VTC2023-Spring 2023: 1-5 - [c130]Badreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah:
DRL-Based RAT Selection in a Hybrid Vehicular Communication Network. VTC2023-Spring 2023: 1-5 - [c129]Imed Ghnaya, Hasnaâ Aniss, Toufik Ahmed, Mohamed Mosbah:
A Distributed Double Deep Q-Learning Method for Object Redundancy Mitigation in Vehicular Networks. WCNC 2023: 1-6 - 2022
- [j51]Ameni Chetouane, Sabra Mabrouk, Imen Jemili, Mohamed Mosbah:
Vision-based vehicle detection for road traffic congestion classification. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j50]Dhouha Ghrab, Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah:
Context-aware routing framework for duty-cycled wireless sensor networks. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j49]Chahrazed Ksouri, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith:
Towards general Internet of Vehicles networking: Routing protocols survey. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j48]Emna Taktak, Mohamed Tounsi, Mohamed Mosbah, Abdessalem Mnif, Ahmed Hadj Kacem:
A handshake algorithm for scheduling communications in wireless sensor networks. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j47]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah:
Cybersecurity attacks on CAN bus based vehicles: a review and open challenges. Libr. Hi Tech 40(5): 1179-1203 (2022) - [j46]Chahrazed Ksouri, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith:
Hybrid routing for safety data with intermittent V2I connectivity. Veh. Commun. 38: 100519 (2022) - [c128]Ibrahim Dahaoui, Mohamed Mosbah, Akka Zemmari:
Distributed Training from Multi-sourced Data. AINA (2) 2022: 339-347 - [c127]Meroua Moussaoui, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
A RAN Slicing Architecture for ITS-G5 Cooperative Intelligent Transport System. CCNC 2022: 727-728 - [c126]Imed Ghnaya, Toufik Ahmed, Mohamed Mosbah, Hasnaâ Aniss:
Maximizing Information Usefulness in Vehicular CP Networks Using Actor-Critic Reinforcement Learning. CNSM 2022: 296-302 - [c125]Sabri Khamari, Toufik Ahmed, Mohamed Mosbah:
Efficient Edge Server Placement under Latency and Load Balancing Constraints for Vehicular Networks. GLOBECOM 2022: 4437-4442 - [c124]Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
Proactive C-ITS Decentralized Congestion Control Using LSTM. ICC 2022: 4342-4347 - [c123]Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
A Messaging Strategy based on ITS-G5 for a Bus Blockage Emergency at a Level Crossing. WMNC 2022: 108-112 - [c122]Sabri Khamari, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
Green Edge Servers Placement for Intelligent Transport Systems. NoF 2022: 1-8 - [c121]Mohamed Mosbah:
Keynote Speaker 2: Cybersecurity of connected Vehicules. SIN 2022: 1 - [e9]Bo Luo, Mohamed Mosbah, Frédéric Cuppens, Lotfi Ben Othmane, Nora Cuppens, Slim Kallel:
Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13204, Springer 2022, ISBN 978-3-031-02066-7 [contents] - [e8]Imen Jemili, Mohamed Mosbah:
Distributed Computing for Emerging Smart Networks - Third International Workshop, DiCES-N 2022, Bizerte, Tunisia, February 11, 2022, Proceedings. Communications in Computer and Information Science 1564, Springer 2022, ISBN 978-3-030-99003-9 [contents] - 2021
- [j45]Chahrazed Ksouri, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith:
Infrastructure localization service and tracking scheme in uncovered areas for Internet of Vehicles. Ann. des Télécommunications 76(9-10): 647-664 (2021) - [j44]Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith, Mohamed Mosbah, Saad A. Al-Ahmadi:
Cross-layer multipath approach for critical traffic in duty-cycled wireless sensor networks. J. Netw. Comput. Appl. 191: 103154 (2021) - [j43]Robert M. Hierons, Mohamed Mosbah:
Preface. Theor. Comput. Sci. 880: 138 (2021) - [c120]Emna Taktak, Mohamed Tounsi, Mohamed Mosbah, Ahmed Hadj Kacem:
High-Level Approach for the Reconfiguration of Distributed Algorithms in Wireless Sensor Networks. AINA (2) 2021: 95-106 - [c119]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah:
A Lightweight Authentication Scheme for SDN-Based Architecture in IoT. AINA (3) 2021: 336-345 - [c118]Badreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah:
Implementation and Assessment of IEEE 802.11BD for Improved Road Safety. CCNC 2021: 1-6 - [c117]Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
End-to-End Network Slicing for ITS-G5 Vehicular Communications. IWCMC 2021: 266-271 - [c116]Sabri Khamari, Toufik Ahmed, Mohamed Mosbah:
Edge-based Safety Intersection Assistance Architecture for Connected Vehicles. IWCMC 2021: 272-277 - 2020
- [j42]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Adv. Comput. 119: 73-120 (2020) - [j41]Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith, Mohamed Mosbah:
Cross-layer adaptive multipath routing for multimedia Wireless Sensor Networks under duty cycle mode. Ad Hoc Networks 109: 102292 (2020) - [j40]Takoua Abdellatif, Mohamed Mosbah:
Efficient monitoring for intrusion detection in wireless sensor networks. Concurr. Comput. Pract. Exp. 32(15) (2020) - [j39]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah:
Modeling and Proving Distributed Algorithms for Dynamic Graphs. Future Gener. Comput. Syst. 108: 751-761 (2020) - [j38]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah:
Vehicle Platooning Systems: Review, Classification and Validation Strategies. Int. J. Networked Distributed Comput. 8(4): 203-213 (2020) - [j37]Abdelhamid Alleg, Toufik Ahmed, Mohamed Mosbah, Raouf Boutaba:
Joint Diversity and Redundancy for Resilient Service Chain Provisioning. IEEE J. Sel. Areas Commun. 38(7): 1490-1504 (2020) - [c115]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah:
A New SDN Architecture Based on Trust Management and Access Control for IoT. AINA Workshops 2020: 245-254 - [c114]Ameni Chetouane, Sabra Mabrouk, Mohamed Mosbah:
Traffic Congestion Detection: Solutions, Open Issues and Challenges. DiCES-N 2020: 3-22 - [c113]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah:
Towards an Efficient Clustering-Based Algorithm for Emergency Messages Broadcasting. ICCCI 2020: 267-278 - [c112]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah:
Formal specification and verification of a broadcasting protocol: a refinement-based approach. KES 2020: 2858-2867 - [c111]Aymen Abdallah, Imen Jemili, Sabra Mabrouk, Mohamed Mosbah:
Leveraging GPS Data for Vehicle Maneuver Detection. Nets4Cars/Nets4Trains/Nets4Aircraft 2020: 39-54 - [c110]Badreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah:
Analysis and Comparison of IEEE 802.11p and IEEE 802.11bd. Nets4Cars/Nets4Trains/Nets4Aircraft 2020: 55-65 - [c109]Chahrazed Ksouri, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith:
A Unified Smart Mobility System Integrating Terrestrial, Aerial and Marine Intelligent Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2020: 203-214 - [c108]Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac:
A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning. NOMS 2020: 1-7 - [c107]Afaf Bouhoute, Mohamed Mosbah, Akka Zemmari, Ismail Berrada:
On the Application of Machine Learning for Cut-in Maneuver Recognition in Platooning Scenarios. VTC Spring 2020: 1-5 - [e7]Imen Jemili, Mohamed Mosbah:
Distributed Computing for Emerging Smart Networks - Second International Workshop, DiCES-N 2020, Bizerte, Tunisia, December 18, 2020, Proceedings. Communications in Computer and Information Science 1348, Springer 2020, ISBN 978-3-030-65809-0 [contents] - [e6]Imen Jemili, Mohamed Mosbah:
Distributed Computing for Emerging Smart Networks - First International Workshop, DiCES-N 2019, Hammamet, Tunisia, October 30, 2019, Revised Selected Papers. Communications in Computer and Information Science 1130, Springer 2020, ISBN 978-3-030-40130-6 [contents]
2010 – 2019
- 2019
- [j36]Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
ETGuard: Detecting D2D attacks using wireless Evil Twins. Comput. Secur. 83: 389-405 (2019) - [j35]Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac, Parvez Faruki:
Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Commun. Surv. Tutorials 21(3): 2671-2701 (2019) - [j34]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah:
Formal Modeling and Verification of a Distributed Algorithm for Constructing Maximal Cliques in Static Networks. Computación y Sistemas 23(4) (2019) - [c106]Rim Negra, Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah:
MTM-MAC: Medical Traffic Management MAC Protocol for Handling Healthcare Applications in WBANs. ADHOC-NOW 2019: 483-497 - [c105]Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac:
An Intrusion Detection System for the OneM2M Service Layer Based on Edge Machine Learning. ADHOC-NOW 2019: 508-523 - [c104]Chahrazed Ksouri, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith:
VANETs Routing Protocols Survey: Classifications, Optimization Methods and New Trends. DiCES-N@ICTAC 2019: 3-22 - [c103]Ameni Chetouane, Sabra Mabrouk, Imen Jemili, Mohamed Mosbah:
A Comparative Study of Vehicle Detection Methods in a Video Sequence. DiCES-N@ICTAC 2019: 37-53 - [c102]Emna Taktak, Mohamed Tounsi, Mohamed Mosbah, Ahmed Hadj Kacem:
Energy Efficient Handshake Algorithm for Wireless Sensor Networks. DiCES-N@ICTAC 2019: 57-76 - [c101]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah:
An Evaluative Review of the Formal Verification for VANET Protocols. IWCMC 2019: 1209-1214 - [c100]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah:
A Comprehensive Survey on Broadcasting Emergency Messages. IWCMC 2019: 1983-1988 - [c99]Rim Negra, Imen Jemili, Akka Zemmari, Mohamed Mosbah, Abdelfettah Belghith, Nesrine Ouled Abdallah:
Leveraging the link quality awareness for body node coordinator (BNC) placement in WBANs. SAC 2019: 754-761 - [e5]Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens:
Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11391, Springer 2019, ISBN 978-3-030-12142-6 [contents] - [e4]Robert M. Hierons, Mohamed Mosbah:
Theoretical Aspects of Computing - ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31 - November 4, 2019, Proceedings. Lecture Notes in Computer Science 11884, Springer 2019, ISBN 978-3-030-32504-6 [contents] - [i1]Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
ETGuard: Detecting D2D Attacks using Wireless Evil Twins. CoRR abs/1903.05843 (2019) - 2018
- [j33]Wafa Ben Jaballah, Mauro Conti, Gilberto Filé, Mohamed Mosbah, Akka Zemmari:
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks. Comput. Commun. 119: 66-82 (2018) - [j32]Dhouha Ghrab, Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah:
Context-aware medium access control protocols in wireless sensor networks. Internet Technol. Lett. 1(6) (2018) - [c98]Emna Taktak, Mohamed Tounsi, Mohamed Mosbah, Ahmed Hadj Kacem:
Distributed Computations in Wireless Sensor Networks by Local Interactions. ADHOC-NOW 2018: 293-304 - [c97]Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android. ISEA-ISAP 2018: 219-233 - [c96]Rim Negra, Imen Jemili, Akka Zemmari, Mohamed Mosbah, Abdelfettah Belghith:
WBAN Path Loss Based Approach For Human Activity Recognition With Machine Learning Techniques. IWCMC 2018: 470-475 - [c95]Chahrazed Ksouri, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith:
Data Gathering for Internet of Vehicles Safety. IWCMC 2018: 904-909 - [c94]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah, Ahmed Hadj Kacem:
Formal Verification Approaches for Distributed Algorithms: A Systematic Literature Review. KES 2018: 1551-1560 - [c93]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah, Ahmed Hadj Kacem:
A Formal Approach for Distributed Computing of Maximal Cliques in Dynamic Networks. SEKE 2018: 348-347 - [c92]Emna Taktak, Mohamed Tounsi, Mohamed Mosbah, Ahmed Hadj Kacem:
Proving Distributed Algorithms for Wireless Sensor Networks by Combining Refinement and Local Computations. WETICE 2018: 217-222 - 2017
- [j31]Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti:
Android inter-app communication threats and detection techniques. Comput. Secur. 70: 392-421 (2017) - [j30]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah, Dominique Méry, Ahmed Hadj Kacem:
Proving Distributed Coloring of Forests in Dynamic Networks. Computación y Sistemas 21(4) (2017) - [j29]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A secure electric energy management in smart home. Int. J. Commun. Syst. 30(17) (2017) - [j28]Mouna Ktari, Mohamed Mosbah, Ahmed Hadj Kacem:
Leader election and computation of a spanning tree in dynamic distributed networks using local computations and mobile agents. Int. J. Space Based Situated Comput. 7(2): 57-71 (2017) - [j27]Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith, Mohamed Mosbah:
Context-Aware Broadcast in Duty-Cycled Wireless Sensor Networks. Int. J. Semantic Web Inf. Syst. 13(3): 48-67 (2017) - [j26]Mouna Ktari, Mohamed Amine Haddar, Mohamed Mosbah, Ahmed Hadj Kacem:
Maintenance of a Spanning Tree For Dynamic Graphs by Mobile Agents and Local Computations. RAIRO Theor. Informatics Appl. 51(2): 51-70 (2017) - [c91]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah, Dominique Méry, Ahmed Hadj Kacem:
A correct-by-construction approach for proving distributed algorithms in spanning trees. ICIS 2017: 1-6 - [c90]Dhouha Ghrab, Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah:
Correlation-Free MultiPath Routing for Multimedia Traffic in Wireless Sensor Networks. ADHOC-NOW 2017: 276-289 - [c89]Mouna Ktari, Mohamed Mosbah, Ahmed Hadj Kacem:
Electing a Leader in Dynamic Networks using Mobile Agents and Local Computations. ANT/SEIT 2017: 351-358 - [c88]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks. ANT/SEIT 2017: 553-559 - [c87]Abdelhamid Alleg, Toufik Ahmed, Mohamed Mosbah, Roberto Riggio, Raouf Boutaba:
Delay-aware VNF placement and chaining based on a flexible resource allocation approach. CNSM 2017: 1-7 - [c86]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Daya Ram Sharma, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Unraveling Reflection Induced Sensitive Leaks in Android Apps. CRiSIS 2017: 49-65 - [c85]Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah, Ahmed Hadj Kacem:
Algorithms for Finding Maximal and Maximum Cliques: A Survey. ISDA 2017: 745-754 - [c84]Maha Boussabbeh, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Mosbah:
Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques. SCSS 2017: 96-106 - [c83]Vineeta Jain, Shweta Bhandari, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
SniffDroid: Detection of Inter-App Privacy Leaks in Android. TrustCom/BigDataSE/ICESS 2017: 331-338 - [c82]Takoua Abdellatif, Kais Rouis, Mohamed Mosbah:
Adaptable Monitoring for Intrusion Detection in Wireless Sensor Networks. WETICE 2017: 54-59 - [e3]Mohamed Mosbah, Michaël Rusinowitch:
SCSS 2017, The 8th International Symposium on Symbolic Computation in Software Science 2017, April 6-9, 2017, Gammarth, Tunisia. EPiC Series in Computing 45, EasyChair 2017 [contents] - 2016
- [j25]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
The impact of malicious nodes positioning on vehicular alert messaging system. Ad Hoc Networks 52: 3-16 (2016) - [j24]Mohamed Tounsi, Mohamed Mosbah, Dominique Méry:
From Event-B specifications to programs for distributed algorithms. Int. J. Auton. Adapt. Commun. Syst. 9(3/4): 223-242 (2016) - [c81]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A broadcast authentication scheme in IoT environments. AICCSA 2016: 1-6 - [c80]Mouna Ktari, Mohamed Amine Haddar, Mohamed Mosbah, Ahmed Hadj Kacem:
Distributed Computation and Maintenance of a Spanning Tree in Dynamic Networks by Mobile Agents. AINA Workshops 2016: 331-336 - [c79]Allyx Fontaine, Mohamed Mosbah, Mohamed Tounsi, Akka Zemmari:
A Fault-Tolerant Handshake Algorithm for Local Computations. AINA Workshops 2016: 475-480 - [c78]Maha Boussabbeh, Mohamed Tounsi, Mohamed Mosbah, Ahmed Hadj Kacem:
Formal Proofs of Termination Detection for Local Computations by Refinement-Based Compositions. ABZ 2016: 198-212 - [c77]Vineeta Jain, Manoj Singh Gaur, Vijay Laxmi, Mohamed Mosbah:
Detection of SQLite Database Vulnerabilities in Android Apps. ICISS 2016: 521-531 - [c76]Dhouha Ghrab, Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah:
NDRECT: Node-disjoint routes establishment for critical traffic in WSNs. IWCMC 2016: 702-707 - [c75]Maha Boussabbeh, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Mosbah:
Towards a General Framework for Ensuring and Reusing Proofs of Termination Detection in Distributed Computing. PDP 2016: 504-511 - [c74]Dhouha Ghrab, Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah:
Study of context-awareness efficiency applied to duty cycled wireless sensor networks. WCNC 2016: 1-6 - [c73]Imen Jemili, Hamida Jarraya, Abdelfettah Belghith, Mohamed Mosbah:
Fast synchronisation protocol with collision handling for wireless ad hoc networks. WCNC 2016: 1-6 - [c72]Faten Fakhfakh, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Mosbah:
A Refinement-Based Approach for Proving Distributed Algorithms on Evolving Graphs. WETICE 2016: 44-49 - 2015
- [j23]Eve Garnaud, Sofian Maabout, Mohamed Mosbah:
Functional dependencies are helpful for partial materialization of data cubes. Ann. Math. Artif. Intell. 73(1-2): 245-274 (2015) - [j22]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef, Akka Zemmari:
Lightweight secure group communications for resource constrained devices. Int. J. Space Based Situated Comput. 5(4): 187-200 (2015) - [j21]Chourouk Hammami, Imen Jemili, Achraf Gazdar, Abdelfettah Belghith, Mohamed Mosbah:
HLPSP: A Hybrid Live P2P Streaming Protocol. KSII Trans. Internet Inf. Syst. 9(3): 1035-1056 (2015) - [c71]Faten Fakhfakh, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Mosbah:
A formal pattern for dynamic networks through evolving graphs. AICCSA 2015: 1-4 - [c70]Mouna Ktari, Mohamed Amine Haddar, Ahmed Hadj Kacem, Mohamed Mosbah:
Proving distributed algorithms for mobile agents: Examples of spanning tree computation in dynamic networks. AICCSA 2015: 1-7 - [c69]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A secure authentication mechanism for resource constrained devices. AICCSA 2015: 1-7 - [c68]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
Impact of security threats in vehicular alert messaging systems. ICC Workshops 2015: 2627-2632 - [c67]Nesrine Ouled Abdallah, Mohamed Jmaiel, Mohamed Mosbah, Akka Zemmari:
A Totally Distributed Fair Scheduler for Population Protocols by Randomized Handshakes. ICTAC 2015: 290-306 - [c66]Dhouha Ghrab, Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah:
ECAB: An Efficient Context-Aware multi-hop Broadcasting protocol for wireless sensor networks. IWCMC 2015: 1023-1029 - [c65]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
Enhanced LEAP authentication delay for higher immunity against DoS attack. CFIP/NOTERE 2015: 1-6 - [c64]Faten Fakhfakh, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Mosbah:
Towards a Formal Model for Dynamic Networks Through Refinement and Evolving Graphs. SNPD (revised selected papers) 2015: 227-243 - 2014
- [j20]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
A secure alert messaging system for safe driving. Comput. Commun. 46: 29-42 (2014) - [j19]Rachid Echahed, Annegret Habel, Mohamed Mosbah:
Preface. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 71 (2014) - [j18]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication. IEEE Trans. Intell. Transp. Syst. 15(1): 433-450 (2014) - [c63]Nesrine Ouled Abdallah, Mohamed Jmaiel, Mohamed Mosbah, Akka Zemmari:
Greedy Flooding in Redoubtable Sensor Networks. AINA 2014: 899-906 - [c62]Chourouk Hammami, Imen Jemili, Achraf Gazdar, Abdelfettah Belghith, Mohamed Mosbah:
Hybrid Live P2P Streaming Protocol. ANT/SEIT 2014: 158-165 - [c61]Wahabou Abdou, Nesrine Ouled Abdallah, Mohamed Mosbah:
ViSiDiA: A Java Framework for Designing, Simulating, and Visualizing Distributed Algorithms. DS-RT 2014: 43-46 - [c60]Maha Boussabbeh, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Mosbah:
Enhancing Proofs of Local Computations through Formal Event-B Modularization. WETICE 2014: 50-55 - 2013
- [j17]Nesrine Ouled Abdallah, Hatem Hadj Kacem, Mohamed Mosbah, Akka Zemmari:
Randomized broadcasting in wireless mobile sensor networks. Concurr. Comput. Pract. Exp. 25(2): 203-217 (2013) - [j16]Rachid Echahed, Annegret Habel, Mohamed Mosbah:
Graph Computation Models 2012. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 61 (2013) - [c59]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef, Akka Zemmari:
Lightweight Source Authentication Mechanisms for Group Communications in Wireless Sensor Networks. AINA 2013: 598-605 - [c58]Wafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde:
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices. CRiSIS 2013: 1-6 - [c57]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
Secure Verification of Location Claims on a Vehicular Safety Application. ICCCN 2013: 1-7 - [c56]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef:
Performance evaluation of key disclosure delay-based schemes in wireless sensor networks. PerCom Workshops 2013: 566-571 - [c55]Mohamed Tounsi, Mohamed Mosbah, Dominique Méry:
From Event-B Specifications to Programs for Distributed Algorithms. WETICE 2013: 104-109 - [c54]Vincent Filou, Mohamed Mosbah, Mohamed Tounsi:
Towards Proved Distributed Algorithms through Refinement, Composition and Local Computations. WETICE 2013: 353-358 - 2012
- [j15]Eve Garnaud, Sofian Maabout, Mohamed Mosbah:
Les dépendances fonctionnelles pour la sélection de vues dans les cubes de données. J. Decis. Syst. 21(1): 71-91 (2012) - [c53]Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah, Marc Sistiaga:
Relaxing Time Granularity for Mining Frequent Sequences. EGC (best of volume) 2012: 53-76 - [c52]Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah, Marc Sistiaga:
Extraction de séquences fréquentes avec intervalles d'incertitude. EGC 2012: 213-224 - [c51]Eve Garnaud, Sofian Maabout, Mohamed Mosbah:
Using Functional Dependencies for Reducing the Size of a Data Cube. FoIKS 2012: 144-163 - [c50]Cédric Aguerre, Thomas Morsellino, Mohamed Mosbah:
Fully-distributed Debugging and Visualization of Distributed Systems in Anonymous Networks. GRAPP/IVAPP 2012: 764-767 - [c49]Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah, Marc Sistiaga:
Uncertainty Interval Temporal Sequences Extraction. ICISTM 2012: 259-270 - [c48]Thomas Morsellino, Cédric Aguerre, Mohamed Mosbah:
Debugging the Execution of Distributed Algorithms over Anonymous Networks. IV 2012: 464-470 - [c47]Imen Jemili, Nader Chaabouni, Abdelfettah Belghith, Mohamed Mosbah:
A Multipath Layered Cluster Based Routing for Ad Hoc Networks. NTMS 2012: 1-5 - 2011
- [j14]Rachid Echahed, Annegret Habel, Mohamed Mosbah:
Graph Computation Models. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 39 (2011) - [c46]Eve Garnaud, Sofian Maabout, Mohamed Mosbah:
Dépendances fonctionnelles et matérialisation partielle des cubes de données. EDA 2011: 155-169 - [c45]Dominique Méry, Mohamed Mosbah, Mohamed Tounsi:
Refinement-Based Verification of Local Synchronization Algorithms. FM 2011: 338-352 - 2010
- [j13]Mohamed Tounsi, Mohamed Mosbah, Dominique Méry:
Proving Distributed Algorithms by Combining Refinement and Local Computations. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 35 (2010) - [j12]Bilel Derbel, Mohamed Mosbah, Akka Zemmari:
Sublinear Fully Distributed Partition with Applications. Theory Comput. Syst. 47(2): 368-404 (2010) - [c44]Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah:
A layered cluster based routing for an ad hoc environment. AICCSA 2010: 1-8 - [c43]Ibrahim Chahid, Sofian Maabout, Loic Martin, Mohamed Mosbah:
Simplification de données de vol pour un stockage optimal et une visualisation accélérée. EGC 2010: 393-398 - [c42]Asma Ben Zakour, Marc Sistiaga, Sofian Maabout, Mohamed Mosbah:
Time Constraints Extension on Frequent Sequential Patterns. KDIR 2010: 281-287 - [c41]Nesrine Ouled Abdallah, Hatem Hadj Kacem, Mohamed Mosbah, Akka Zemmari:
Broadcast in wireless mobile sensor networks with population protocols and extension with the rendezvous model. NOTERE 2010: 219-226 - [e2]Chenyang Lu, Toshimitsu Masuzawa, Mohamed Mosbah:
Principles of Distributed Systems - 14th International Conference, OPODIS 2010, Tozeur, Tunisia, December 14-17, 2010. Proceedings. Lecture Notes in Computer Science 6490, Springer 2010, ISBN 978-3-642-17652-4 [contents]
2000 – 2009
- 2009
- [j11]Monia Loulou, Mohamed Jmaiel, Mohamed Mosbah:
Dynamic security framework for mobile agent systems: specification, verification and enforcement. Int. J. Inf. Comput. Secur. 3(3/4): 321-336 (2009) - [c40]Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah:
Exploiting a clustering mechanism for power saving in ad hoc networks: Performance evaluation. AICCSA 2009: 717-724 - [c39]Hédi Hamdi, Mohamed Mosbah:
A DSL Framework for Policy-Based Security of Distributed Systems. SSIRI 2009: 150-158 - 2008
- [c38]Med Amine Haddar, Ahmed Hadj Kacem, Yves Métivier, Mohamed Mosbah, Mohamed Jmaiel:
Electing a leader in the local computation model using mobile agents. AICCSA 2008: 473-480 - [c37]Monia Loulou, Ahmed Hadj Kacem, Mohamed Jmaiel, Mohamed Mosbah:
A formal security framework for mobile agent systems: Specification and verification. CRiSIS 2008: 69-76 - [c36]Bilel Derbel, Mohamed Mosbah, Stefan Gruner:
Mobile Agents Implementing Local Computations in Graphs. ICGT 2008: 99-114 - [c35]Mohamed Mosbah, Annegret Habel:
Workshop on Graph Computation Models. ICGT 2008: 460-462 - [c34]Med Amine Haddar, Ahmed Hadj Kacem, Yves Métivier, Mohamed Mosbah, Mohamed Jmaiel:
Proving Distributed Algorithms for Mobile Agents: Examples of Spanning Tree Computation in Anonymous Networks. ICDCN 2008: 286-291 - [c33]Imen Jemili, Abdelfattah Belghith, Mohamed Mosbah:
Evaluating the Efficiency of Clustering on Routing and Network Performance. ICWN 2008: 634-639 - [c32]Imen Jemili, Abdelfattah Belghith, Mohamed Mosbah:
A Synchronous Tiered Based Clustering Algorithm for large-scale Ad hoc Networks. MWCN/PWC 2008: 41-55 - [c31]Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah:
Cluster based prioritized power conservation mechanism. Wireless Days 2008: 1-5 - [e1]Mohamed Jmaiel, Mohamed Mosbah:
CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008. IEEE 2008, ISBN 978-1-4244-3309-4 [contents] - 2007
- [j10]Nicolas Bonichon, Stefan Felsner, Mohamed Mosbah:
Convex Drawings of 3-Connected Plane Graphs. Algorithmica 47(4): 399-420 (2007) - [c30]Hédi Hamdi, Mohamed Mosbah, Adel Bouhoula:
A Domain Specific Language for Securing Distributed Systems. ICSNC 2007: 76 - [c29]Brahim Hamid, Bertrand Le Saëc, Mohamed Mosbah:
Distributed Local 2-Connectivity Test of Graphs and Applications. ISPA 2007: 195-207 - [c28]Shehla Abbas, Mohamed Mosbah, Akka Zemmari:
Merging Time of Random Mobile Agents. LDIC 2007: 179-190 - [c27]Brahim Hamid, Mohamed Mosbah, Akka Zemmari:
A Self-stabilizing Distributed Algorithm for Resolving Conflicts. OTM Workshops (2) 2007: 1042-1051 - [c26]Shehla Abbas, Mohamed Mosbah, Akka Zemmari:
A Generic Distributed Algorithm for Computing by Random Mobile Agents. PRIMA 2007: 392-397 - [c25]Med Amine Haddar, Ahmed Hadj Kacem, Yves Métivier, Mohamed Mosbah, Mohamed Jmaiel:
A Distributed Computational Model for Mobile Agents. PRIMA 2007: 416-421 - [c24]Hédi Hamdi, Adel Bouhoula, Mohamed Mosbah:
A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems. SECURWARE 2007: 187-192 - 2006
- [j9]Brahim Hamid, Mohamed Mosbah:
A Local Enumeration Protocol in Spite of Corrupted Data. J. Comput. 1(7): 9-20 (2006) - [c23]Brahim Hamid, Mohamed Mosbah:
A Local Self-stabilizing Enumeration Algorithm. DAIS 2006: 289-302 - [c22]Yves Métivier, Mohamed Mosbah:
Workshop on Graph Computation Models. ICGT 2006: 463-464 - [c21]Bilel Derbel, Mohamed Mosbah, Akka Zemmari:
Fast distributed graph partition and application. IPDPS 2006 - 2005
- [c20]Brahim Hamid, Mohamed Mosbah:
Visualization of Self-Stabilizing Distributed Algorithms. IV 2005: 550-555 - [c19]Brahim Hamid, Mohamed Mosbah:
An Implementation of a Failure Detector for Local Computations in Graphs. Parallel and Distributed Computing and Networks 2005: 473-478 - [c18]Brahim Hamid, Mohamed Mosbah:
A Formal Model for Fault-Tolerance in Distributed Systems. SAFECOMP 2005: 108-121 - [c17]Brahim Hamid, Mohamed Mosbah:
An Automatic Approach to Self-Stabilization. SNPD 2005: 123-128 - [c16]Bilel Derbel, Mohamed Mosbah:
Distributed Graph Traversals by Relabelling Systems with Applications. GT-VC@CONCUR 2005: 79-94 - 2004
- [j8]Nicolas Bonichon, Bertrand Le Saëc, Mohamed Mosbah:
Orthogonal drawings based on the stratification of planar graphs. Discret. Math. 276(1-3): 43-57 (2004) - [c15]Mohamed Mosbah, Rodrigue Ossamy:
A Programming Language for Local Computations in Graphs: Computational Completeness. ENC 2004: 12-19 - [c14]Mohamed Mosbah, Rodrigue Ossamy:
Checking Global Properties for Local Computations in Graphs with Applications to Invariant Testing. ENC 2004: 35-42 - [c13]Nicolas Bonichon, Stefan Felsner, Mohamed Mosbah:
Convex Drawings of 3-Connected Plane Graphs. GD 2004: 60-70 - [c12]Yves Métivier, Mohamed Mosbah, Rodrigue Ossamy, Afif Sellami:
Synchronizers for Local Computations. ICGT 2004: 271-286 - 2003
- [j7]Nicolas Bonichon, Mohamed Mosbah:
Watermelon uniform random generation with applications. Theor. Comput. Sci. 307(2): 241-256 (2003) - [c11]Bilel Derbel, Mohamed Mosbah:
Distributing the Execution of a Distributed Algorithm over a Network. IV 2003: 485-490 - 2002
- [c10]Emmanuel Godard, Yves Métivier, Mohamed Mosbah, Afif Sellami:
Termination Detection of Distributed Algorithms by Graph Relabelling Systems. ICGT 2002: 106-119 - [c9]Nicolas Bonichon, Bertrand Le Saëc, Mohamed Mosbah:
Wagner's Theorem on Realizers. ICALP 2002: 1043-1053 - [c8]Nicolas Bonichon, Bertrand Le Saëc, Mohamed Mosbah:
Optimal Area Algorithm for Planar Polyline Drawings. WG 2002: 35-46 - [c7]Michel Bauderon, Mohamed Mosbah:
A Unified Framework for Designing, Implementing and Visualizing Distributed Algorithms. GT-VMT@ICGT 2002: 13-24 - 2001
- [c6]Yves Métivier, Mohamed Mosbah, Pierre-André Wacrenier, Stefan Gruner:
A Distributed Algorithm for Computing a Spanning Tree in Anonymous Tprime Graph. OPODIS 2001: 141-158 - [c5]Michel Bauderon, Yves Métivier, Mohamed Mosbah, Afif Sellami:
Graph Relabelling Systems: a Tool for Encoding, Proving, Studying and Visualizing - Distributed Algorithms. GETGRATS Closing Workshop 2001: 93-107 - [c4]Michel Bauderon, Stefan Gruner, Yves Métivier, Mohamed Mosbah, Afif Sellami:
Visualization of Distributed Algorithms Based on Graph Relabelling Systems. GT-VMT@ICALP 2001: 227-237 - 2000
- [j6]Mohamed Mosbah, Nasser Saheb:
Formal rational fractions and random walks on cycles. Discret. Math. 217(1-3): 301-313 (2000) - [j5]Nicolas Bonichon, Bertrand Le Saëc, Mohamed Mosbah:
Orthogonal Drawings Based On The Stratification Of Planar Graphs. Electron. Notes Discret. Math. 5: 35-37 (2000)
1990 – 1999
- 1999
- [j4]Mohamed Mosbah, Nasser Saheb:
Non-Uniform Random Spanning Trees on Weighted Graphs. Theor. Comput. Sci. 218(2): 263-271 (1999) - 1997
- [c3]Mohamed Mosbah, Nasser Saheb:
A Syntactic Approach to Random Walks on Graphs. WG 1997: 258-272 - 1996
- [j3]Mohamed Mosbah:
Probabilistic Graph Grammars. Fundam. Informaticae 26(3/4): 341-362 (1996) - [j2]Mohamed Mosbah:
Probabilistic Hyperedge Replacement Grammars. Theor. Comput. Sci. 159(1): 81-102 (1996) - 1993
- [j1]Bruno Courcelle, Mohamed Mosbah:
Monadic Second-Order Evaluations on Tree-Decomposable Graphs. Theor. Comput. Sci. 109(1&2): 49-82 (1993) - 1992
- [c2]Mohamed Mosbah:
Probabilistic Graph Grammars. WG 1992: 236-247 - 1991
- [c1]Bruno Courcelle, Mohamed Mosbah:
Monadic Second-Order Evaluations on Tree-Decomposable Graphs. WG 1991: 13-24
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint