default search action
Cherkaoui Leghris
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Youssef Nour-El Aine, Cherkaoui Leghris:
Securing IoT Communication: A Steganographic Protocol for Efficient Mutual Authentication and Data Integrity. ISIVC 2024: 1-6 - [c24]Youness Tace, Mohamed Tabaa, Sanaa Elfilali, Hassna Bensag, Cherkaoui Leghris:
Novel approach for detecting Bacterial spot combining Transfer Learning and Large Language Models. ISIVC 2024: 1-6 - 2023
- [c23]Ouafae Elaeraj, Cherkaoui Leghris:
Study of the SNORT intrusion detection system based on machine learning. CiSt 2023: 33-37 - 2022
- [c22]Youness Tace, Sanaa Elfilali, Cherkaoui Leghris, Hassna Bensag, Eric Renault:
Transfer Learning approach for smart agriculture: Application to Blight Bacteria. ICM 2022: 250-253 - 2021
- [j9]Said Radouche, Cherkaoui Leghris:
New Network Selection Algorithm Based on Cosine Similarity Distance and PSO in Heterogeneous Wireless Networks. J. Comput. Networks Commun. 2021: 6613460:1-6613460:11 (2021) - [j8]Ali El Ksimi, Cherkaoui Leghris:
Contribution to Optimization and Evaluation of IPv6 Signals Based Constrained Devices Networks. Wirel. Pers. Commun. 117(3): 2311-2325 (2021) - 2020
- [j7]Mouâd Mansouri, Cherkaoui Leghris:
A Use of Fuzzy TOPSIS to Improve the Network Selection in Wireless Multiaccess Environments. J. Comput. Networks Commun. 2020: 3408326:1-3408326:12 (2020) - [c21]Ouafae Elaeraj, Cherkaoui Leghris, Éric Renault:
Performance Evaluation of Some Machine Learning Algorithms for Security Intrusion Detection. MLN 2020: 154-166
2010 – 2019
- 2019
- [j6]Mouâd Mansouri, Leghris Cherkaoui:
New Manhattan distance-based fuzzy MADM method for the network selection. IET Commun. 13(13): 1980-1987 (2019) - [c20]Mouâd Mansouri, Leghris Cherkaoui:
A Comparison Between MADM Methods and Utility Functions in the Network Selection Context. MSPN 2019: 201-210 - [c19]Ali El Ksimi, Cherkaoui Leghris:
A New Mechanism to Secure IPv6 Networks Using Symmetric Cryptography. MSPN 2019: 229-246 - [c18]Cherkaoui Leghris, Ouafae Elaeraj, Eric Renault:
Improved security intrusion detection using intelligent techniques. WINCOM 2019: 1-5 - [e1]Éric Renault, Selma Boumerdassi, Leghris Cherkaoui, Samia Bouzefrane:
Mobile, Secure, and Programmable Networking - 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23-24, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11557, Springer 2019, ISBN 978-3-030-22884-2 [contents] - 2018
- [j5]Ali El Ksimi, Leghris Cherkaoui:
Minimising the impact of IPv6 neighbour discovery messages on energy consumption in small objects networks. IET Networks 7(4): 226-232 (2018) - [j4]El Hajji Fouad, Leghris Cherkaoui, Khadija Douzi:
Adaptive Routing Protocol for Lifetime Maximization in Multi-Constraint Wireless Sensor Networks. J. Commun. Inf. Networks 3(1): 67-83 (2018) - [j3]Ali El Ksimi, Leghris Cherkaoui:
Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks. Secur. Commun. Networks 2018: 1816462:1-1816462:11 (2018) - [c17]El Hajji Fouad, Leghris Cherkaoui, Douzi Khadija:
Optimizing WSN lifetime based on a new centrality multi-criteria routing approach. CommNet 2018: 1-7 - [c16]Ali El Ksimi, Leghris Cherkaoui:
An Enhancement Approach for Securing Neighbor Discovery in IPv6 Networks. MSPN 2018: 54-69 - 2017
- [c15]Mouâd Mansouri, Leghris Cherkaoui:
A battery level aware MADM combination for the vertical handover decision making. IWCMC 2017: 1448-1452 - [c14]Mouâd Mansouri, Leghris Cherkaoui:
Using Fuzzy Gray Relational Analysis in the Vertical Handover Process in Wireless Networks. NETYS 2017: 396-401 - [c13]Ali El Ksimi, Leghris Cherkaoui, Faddoul Khoukhi:
Toward a New Extension of IPv6 Addressing to Connect Non IP Objects. UNet 2017: 411-421 - [c12]Mouâd Mansouri, Leghris Cherkaoui:
The use of MADM methods in the vertical handover decision making context. WINCOM 2017: 1-6 - [c11]Said Radouche, Leghris Cherkaoui, Abdellah Adib:
MADM methods based on utility function and reputation for access network selection in a multi-access mobile network environment. WINCOM 2017: 1-6 - 2016
- [c10]Ali El Ksimi, Cherkaoui Leghris, Faddoul Khoukhi:
Minimizing energy consumption in IPv6 for Small Objects Network. ICMCS 2016: 332-336 - 2015
- [c9]Mouâd Mansouri, Cherkaoui Leghris, Abdelkrim Bekkhoucha:
Towards a better combination of the MADM algorithms for the Vertical Handover optimization in a mobile network multi-access environment. SITA 2015: 1-5 - 2014
- [c8]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Performance analysis of normalization techniques for network selection access in heterogeneous wireless networks. SITA 2014: 1-5 - 2013
- [j2]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
A Novel Ranking Algorithm Based Network Selection For Heterogeneous Wireless Access. J. Networks 8(2): 263-272 (2013) - [c7]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Novel validation approach for network selection algorithm by applying the group MADM. AICCSA 2013: 1-4 - [c6]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
An enhanced-TOPSIS based network selection technique for next generation wireless networks. ICT 2013: 1-5 - [c5]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
New Validation Approach Based on Group MADM for Network Selection. NETYS 2013: 306-310 - 2012
- [j1]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Towards an Efficient Network Selection Technique Based on Differentiated Weight of Access Interface. Int. J. Bus. Data Commun. Netw. 8(4): 32-48 (2012) - [c4]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
New multi access selection method using differentiated weight of access interface. ICCIT 2012: 237-242 - [c3]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Network selection algorithm based on Diff-AHP and TOPSIS in heterogeneous wireless networks. ICMCS 2012: 485-490 - [c2]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
A survey and comparison study on weighting algorithms for access network selection. WONS 2012: 35-38 - [i3]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
An Intelligent Network Selection Strategy Based on MADM Methods in Heterogeneous Networks. CoRR abs/1204.1383 (2012) - [i2]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks. CoRR abs/1206.1587 (2012) - [i1]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
An Enhanced Evaluation Model For Vertical Handover Algorithm In Heterogeneous Networks. CoRR abs/1206.1848 (2012) - 2011
- [c1]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
A Hybrid Approach for Network Selection in Heterogeneous Multi-Access Environments. NTMS 2011: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint