scispace - formally typeset
N

Noureddine Boudriga

Researcher at Carthage University

Publications -  299
Citations -  1900

Noureddine Boudriga is an academic researcher from Carthage University. The author has contributed to research in topics: Wireless sensor network & Quality of service. The author has an hindex of 18, co-authored 295 publications receiving 1698 citations. Previous affiliations of Noureddine Boudriga include Higher School of Communication of Tunis & École Normale Supérieure.

Papers
More filters
Book

Security of e-Systems and Computer Networks

TL;DR: This presentation explains how public key cryptosystems, biometric-based security systems, and trust management systems in communication networks help to protect against malware and other threats.
Proceedings ArticleDOI

SPAMMS: A sensor-based pipeline autonomous monitoring and maintenance system

TL;DR: A novel cost effective, scalable, customizable, and autonomous sensor-based system, called SPAMMS, that combines robot agent based technologies with sensing technologies for efficiently locating health related events and allows active and corrective monitoring and maintenance of the pipelines.
Journal ArticleDOI

Border surveillance monitoring using Quadcopter UAV-Aided Wireless Sensor Networks

TL;DR: Powerful techniques to accurately localize terrestrial sensors using RFID technology, compute the optimal positions of the new sensors to drop, relay data between isolated islands of nodes, and wake up sensors to track intruders are developed.
Proceedings ArticleDOI

Cooperative data muling from ground sensors to base stations using UAVs

TL;DR: This paper revisits the issue of traffic engineering in Internet-of-Things (IoT) settings, to assess the relevance of using UAVs for the persistent collection of sensor readings from the sensor nodes located into an environment and their delivery to base stations where further processing is performed.
Journal ArticleDOI

Detecting Denial-of-Service attacks using the wavelet transform

TL;DR: An efficient anomaly analysis method is presented that is proved to be more efficient and less complex than the existing techniques and extensible to the case where the monitoring points, used to gather the measurable features, are distributed according to the network topology.