Skip to main content

and
  1. No Access

    Chapter

    Machine Learning Methods for Enhanced Cyber Security Intrusion Detection System

    In the ever-changing world of information security, networks had expanded in scale and complexity that integrates wide range of business functions, intrusion threats have increased in occurrence and intelligen...

    M Satheesh Kumar, Jalel Ben-Othman in Advances in Computing, Informatics, Networ… (2022)

  2. No Access

    Chapter and Conference Paper

    A New Model for Cooperative Cognitive Radio Network Using Coalitional Game

    In this paper we study the resources access problem in cognitive radio networks, especially we are interested in the large number of secondary users (SUs) present in the system. We propose a model based on cha...

    Sara Gmira, Abdellatif Kobbane, Mouna El Machkour, Jalel Ben-othman in Wireless Internet (2018)

  3. No Access

    Chapter and Conference Paper

    A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11

    In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablet...

    Mohammed-Alamine El Houssaini, Abdessadek Aaroud, Ali El Hore in Ubiquitous Networking (2017)

  4. Chapter and Conference Paper

    A Trust-Based Routing Protocol for Ad Hoc Networks

    Ad hoc networks are particularly vulnerable as compare to traditional networks mainly due to their lack of infrastructure. A malicious node can easily disrupt both the routing discovery phase and the data forw...

    **aoyun Xue, Jean Leneutre, Jalel Ben-Othman in Mobile and Wireless Communication Networks (2005)