This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
en:students [2020/05/22 18:59] – [Current Ph. D. Students :] bouabdal | en:students [2020/06/05 07:12] – [Alumni Ph. D. Students :] bouabdal | ||
---|---|---|---|
Line 21: | Line 21: | ||
===== Alumni Ph. D. Students : ===== | ===== Alumni Ph. D. Students : ===== | ||
+ | * **Y. Imine**, | ||
+ | * ** D-E, Kouicem**, " Internet of Everything security", | ||
+ | | ||
* **L. Zaouche**, " | * **L. Zaouche**, " | ||
* ** A. Barki**, " M2M security", | * ** A. Barki**, " M2M security", | ||
| | ||
- | * **M. Sabt**, "Trust in mobile communication architectures", | + | * **M. Sabt**, "Trust in mobile communication architectures", |
- | * **T. Rault**, | + | * **T. Rault**, |
- | * **A. Lounis**, " Cloud computing security", | + | * **A. Lounis**, " Cloud computing security", |
* **N. Maalel **, " Reliable routing in highly dynamic networks", | * **N. Maalel **, " Reliable routing in highly dynamic networks", | ||
Line 38: | Line 41: | ||
* **A. Hadjidj**, " Wireless Sensor Networks Reliability", | * **A. Hadjidj**, " Wireless Sensor Networks Reliability", | ||
- | * **W. Bechkit**, " Security and energy saving in Wireless Sensor Networks" | + | * **W. Bechkit**, " Security and energy saving in Wireless Sensor Networks" |
* **S. Hattahet**, " Worms propagation and detection in P2P networks ", (April 2011), //Currently Consultant in industry//. | * **S. Hattahet**, " Worms propagation and detection in P2P networks ", (April 2011), //Currently Consultant in industry//. | ||
Line 44: | Line 47: | ||
* **M. Omar**, " Thrust models and architectures for mobile Ad'Hoc Networks", | * **M. Omar**, " Thrust models and architectures for mobile Ad'Hoc Networks", | ||
- | * **M. Abdelouahab**, | + | * **M. Abdelouahab**, |
* **S. Lanièpce**, | * **S. Lanièpce**, |