An adaptive clustering approach to dynamic load balancing and energy efficiency in wireless sensor networks C Gherbi, Z Aliouat, M Benmohammed Energy 114, 647-662, 2016 | 110 | 2016 |
A survey on clustering routing protocols in wireless sensor networks C Gherbi, Z Aliouat, M Benmohammed Sensor Review 37 (1), 12-25, 2017 | 78 | 2017 |
UML2. 0 Profiles for Embedded Systems and Systems On a Chip (SOCs). F Boutekkouk, M Benmohammed, S Bilavarn, M Auguin J. Object Technol. 8 (1), 135-157, 2009 | 39 | 2009 |
Optimization of cat’s whiskers tea (orthosiphon stamineus) using supercritical carbon dioxide and selective chemotherapeutic potential against prostate cancer cells FSR Al-Suede, MB Khadeer Ahamed, AS Abdul Majid, HM Baharetha, ... Evidence-Based Complementary and Alternative Medicine 2014, 2014 | 38 | 2014 |
Using screen brightness to improve security in mobile social network access M Guerar, M Migliardi, A Merlo, M Benmohammed, F Palmieri, ... IEEE Transactions on Dependable and Secure Computing 15 (4), 621-632, 2016 | 37 | 2016 |
A novel load balancing scheduling algorithm for wireless sensor networks C Gherbi, Z Aliouat, M Benmohammed Journal of Network and Systems Management 27, 430-462, 2019 | 30 | 2019 |
A completely automatic public physical test to tell computers and humans apart: A way to enhance authentication schemes in mobile devices M Guerar, M Migliardi, A Merlo, M Benmohammed, B Messabih 2015 International Conference on High Performance Computing & Simulation …, 2015 | 30 | 2015 |
Koetjapic acid, a natural triterpenoid, induces apoptosis in colon cancer cells ZD Nassar, AFA Aisha, N Idris, MB Khadeer Ahamed, Z Ismail, ... Oncology Reports 27 (3), 727-733, 2012 | 24 | 2012 |
Improved RFID authentication protocol based on randomized McEliece cryptosystem N Chikouche, F Cherif, PL Cayrel, M Benmohammed | 23 | 2015 |
An authentication protocol based on combined RFID-biometric system RFID-biometric system N Chikouche, F Cherif, M Benmohammed arXiv preprint arXiv:1207.5627, 2012 | 21 | 2012 |
RFID authentication protocols based on error-correcting codes: a survey N Chikouche, F Cherif, PL Cayrel, M Benmohammed Wireless Personal Communications 96, 509-527, 2017 | 17 | 2017 |
S-TDMA: A new MAC protocol for wireless sensor networks S Boulfekhar, L Bouallouche, M Benmohammed 2012 IEEE/ACM 16th International Symposium on Distributed Simulation and …, 2012 | 16 | 2012 |
New mean-variance gamma method for automatic gamma correction M Mahamdioua, M Benmohammed International Journal of Image, Graphics and Signal Processing 9 (3), 41-54, 2017 | 15 | 2017 |
A secure code-based authentication scheme for RFID systems N Chikouche, F Cherif, PL Cayrel, M Benmohammed International Journal of Computer Network and Information Security 7 (9), 1-9, 2015 | 15 | 2015 |
Color wheel pin: Usable and resilient ATM authentication M Guerar, M Benmohammed, V Alimi Journal of High Speed Networks 22 (3), 231-240, 2016 | 14 | 2016 |
Weaknesses in two RFID authentication protocols N Chikouche, F Cherif, PL Cayrel, M Benmohammed Codes, Cryptology, and Information Security: First International Conference …, 2015 | 12 | 2015 |
Vulnerabilities of two recently RFID authentication protocols N Chikouche, F Cherif, M Benmohammed 2012 IEEE International Conference on Complex Systems (ICCS), 1-6, 2012 | 12 | 2012 |
Automatic adaptation of SIFT for robust facial recognition in uncontrolled lighting conditions M Mahamdioua, M Benmohammed IET Computer Vision 12 (5), 623-633, 2018 | 11 | 2018 |
Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis. L Boussaad, M Benmohammed, R Benzid J. Inf. Process. Syst. 12 (3), 392-409, 2016 | 11 | 2016 |
Algebraic replay attacks on authentication in RFID protocols N Chikouche, F Cherif, M Benmohammed Advances in Security of Information and Communication Networks: First …, 2013 | 11 | 2013 |