Publications

Publications

Ouvrages

1. Jallouli, R., Zaïane, O.R., Tobji, M.A.B., Tabbane, R.S., Nijholt, A. Digital Economy. Emerging Technologies and Business Innovation - Second International Conference, ICDEc 2017, Sidi Bou Said, Tunisia, May 4-6, 2017, Proceedings. Springer. 2017

2. Jallouli, R., Nasraoui, O., Tobji, M.A.B., Tabbane, R.S., Rhouma, R. International Conference on Digital Economy, ICDEc 2016, Carthage, Tunisia, April 28-30, 2016. IEEE. 2016

3. Jallouli, R., Nasraoui, O., Bach Tobji, M-A., Tabbane, R., Rhouma, R.. Proceedings of the International Conference on Digital Economy, ICDEc 2016. IEEE. 2016

4. Maher Helaoui. Informatique Théorique: Cours et Exercices Corrigés. Editions universitaires européennes. 2016

5. Yassine SLAMA. Expatriés et cadres locaux dans le cadre de l'internationalisation des entreprises. Centre de Publication Universitaire. 2014

6. R. Rhouma. Analyse et conception des cryptsystèmes à base de chaos. Presses Académiques Francophones. ISBN : 978-3-8416-2148-1. 2013

7. R. Rhouma. Contributions à la sécurisation de l'information par chaos. Editions universitaires europeennes. ISBN : 978-613-1-59291-1. 2011

Chapitre d'ouvrages

1. Ikbal Chammakhi Msadaa,Amine Dhraief. Chapter I- Internet of Things in Support of Public Safety Networks : Opportunities and Challenges. Wireless Public Safety Networks, Volume Two : A Systematic Approach, ISBN 9781785480522. Elsevier. Pages 1-20, 2016

2. Yassine SLAMA et Nathalie MONTARGOT. Regards croisés de cadres expatriés et locaux de filiales multinationales en Tunisie sur la pertinence de recourir à l’expatriation. Ambivalences. LARIME- ESSEC de Tunis. Pages 65-72, 2015

3. Rym Srarfi Tabbane and Mohsen Debabi. Electronic Word-of-Mouth: Definitions and Concepts. Capturing, Analyzing, and Managing Word-of-Mouth in the Digital Marketplace. IGI Global. Pages 1-27, 2015

4. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Overview of partitional overlapping clustering methods.. Partitional Clustering Algorithm (PCA). Springer. Pages 245-275, 2015

5. Zhang, T.J.,Manhrawy, I.M.,Abdo, A.A.,El-Latif, A.A.A.,Rhouma, R.. Cryptanalysis of elementary cellular automata based image encryption. Advanced Materials Research. . Pages , 2014

6. Amine Dhraief, Imen Mahjri, and Abdelfettah Belghith. Chapter VII- A Performance Evaluation of the Coverage Configuration Protocol and Its Applicability to Precision Agriculture. Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing, ISBN 1466647159. IGI Global. Pages 107–122, 2014

7. Chebbah, M., Kharoune, M., Martin, A., Yaghlane, B.B. Considérant la dépendance dans la théorie des fonctions de croyance.. Fouille de données complexes. . Pages 43-64, 2014

8. Rhouma, R.,Belghith, S.. Chaos-based cryptosystem in different modes of block encryption. Cryptography: Protocols, Design and Applications. . Pages , 2012

9. Chebbah, M., Martin, A., Yaghlane, B.B. Estimation de la fiabilité des sources des bases de données évidentielles.. Fouille de données complexes. . Pages 193-210, 2011

10. Jallouli, R. et Lassouad A.. Les indicateurs de performance dans le secteur de l’art ,. Approches Tunisiennes en Gestion: Entrepreneuriat et Investissement Culturel,s. Université de Paris I Panthéon Sorbonne/ CNR, Collection l’impensé du temp. Pages -, 2010

11. Jallouli R., Zghal M and Orsoni J.. Marketing et art, Est ce le grand écart?. Nouvelles approches en culture et développement,. Université de Paris I Panthéon Sorbonne/ CNR, Collection l’impensé du temps. Pages -, 2008

Articles de journaux

1. Maroua Meddeb, Amine Dhraief Abdelfettag Belghith, Thierry Monteil, Khalil Drira, and Saad Al-Ahmadi. Named Data Networking A promisin g architecture for the Internet of things (IoT). International Journal on Semantic Web and Information Systems (IJSWIS), IGI. JCR 2016 : SCI Impact Factor=1.5, Q3. Vol. 14, Issue 2, Pages 1-19, 2018

2. Maroua Meddeb, Amine Dhraief , Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Cache Freshness in Named Data Networking for the Internet of Things. The Computer Journal, Oxford University Press , JCR 2017 : SCI Impact Factor=0.792, Q4. Vol. 61, Issue 10, Pages 1496-1511, 2018

3. Imen Mahjri,Samir Medjiah,Amine Dhraief,Khalil Drira,Abdelfettah Belghith. Weighted Localization in Mobile Wireless Networks. Wiley Internet Technology Letters. Vol. 1, Issue 1, Pages 1-6, 2018

4. Mohamed Belhassen, Amine Dhraief, Abdelfettah Belghith, Hassan Mathkour. ALOE: autonomic locating of obstructing entities in MANETs. Journal of Ambient Intelligence and Humanized Computing, Springer Berlin Heidelberg, JCR 2016 : SCI Impact Factor=1.588, Q3. Vol. 9, Issue 6, Pages 1955-1974, 2018

5. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, Sofien Gannouni. AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks. Future Generation Computer Systems, Elsevier (JCR 2016 Q1, IF= 4.639). Vol. 87, Issue 10, Pages 351-363, 2018

6. Bousnina, F.E., Tobji, M.A.B., Chebbah, M., Yaghlane, B.B. Modeling evidential databases as possible worlds.. Int. J. Intell. Syst.. Vol. 33, Issue 6, Pages 1146-1164, 2018

7. Abidi, A., Elmi, S., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. Skyline queries over possibilistic RDF data.. Int. J. Approx. Reasoning. Vol. 93, Issue , Pages 277-289, 2018

8. T.Mellah. Effectiveness of the water resources allocation institution in Tunisia. Water Policy. Vol. 20, Issue 2, Pages 429-445, 2018

9. Zeineb Ayachi. The Effect of Culture and Gender on English Learning Strategies: The Case of Tunisian and German Learners. The Reading Matrix. Vol. 18, Issue 1, Pages 124-138, 2018

10. Imen Mahjri, Amine Dhraief, Abdelfettah Belghith, Sofien Gannouni, Issam Mabrouki, Maram AlAjlanc. Collision risk assessment in Flying Ad Hoc aerial wireless networks. Journal of Network and Computer Applications, Elsevier. JCR 2017 : SCI Impact Factor=3.991, Q1. Vol. 124, Issue 12, Pages 1-13, 2018

11. Bousnina, F.E., Tobji, M.A.B., Chebbah, M., Yaghlane, B.B. Modeling evidential databases as possible worlds.. Int. J. Intell. Syst.. Vol. 33, Issue 6, Pages 1146-1164, 2018

12. Lamia Zaibi. Transcending Boundaries: Kwame Dawes’ Digital Projects. The Rupkatha Journal On Interdisciplinary Studies In Humanities. Vol. 9, Issue 3, Pages 115-124, 2017

13. Lamia Zaibi. Kwame Dawes. A City of Bones: A Testament. World Literaure Today. Vol. 91, Issue 5, Pages 85-86, 2017

14. Hamdi, M., Rhouma, R., Belghith, S. An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps.. Multimedia Tools Appl.. Vol. 76, Issue 5, Pages 7105-7128, 2017

15. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S. A new adaptive image steganography scheme based on DCT and chaotic map.. Multimedia Tools Appl.. Vol. 76, Issue 11, Pages 13493-13510, 2017

16. Hamdi, M., Rhouma, R., Belghith, S. A selective compression-encryption of images based on SPIHT coding and Chirikov Standard Map.. Signal Processing. Vol. 131, Issue , Pages 514-526, 2017

17. Imen Mahjri, Amine Dhraief, Abdelfettah Belghith, and Ahmad AlMogren. SLIDE : A Straight Line Conflict Detection and Alerting Algorithm for Multiple Unmanned Aerial Vehicles. IEEE Transactions on Mobile Computing (TMC). JCR 2017 : SCI Impact Factor=4.098, Q1. Vol. 17, Issue 5, Pages 1-17, 2017

18. Dr Dhouha DOGHRI. Several publications and articles in international scientific journals. international journals. Vol. 000, Issue 000, Pages pp, 2017

19. . The Impact of Social Professional Category Consumer’s on Acceptance Level Towards Islamic Banking Window. Chinese Business Review. Vol. , Issue , Pages , 2017

20. El Ghali M. et Jammeli A.. "The dimensions of the media experience lived by the children: exploratory study with the Tunisian children". Journal of Internet Social Networking and Virtual Communities. Vol. À paraître, Issue À paraître, Pages À paraître, 2017

21. Zeineb Ayachi. Peer and Teacher Assessment in EFL Writing Compositions: The Case Of Advanced English Major Students in Jendouba, Tunisia. The Reading Matrix. Vol. 17, Issue 1, Pages 156-168, 2017

22. Elmi, S., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Selecting skyline stars over uncertain databases - Semantics and refining methods in the evidence theory setting.. Appl. Soft Comput.. Vol. 57, Issue , Pages 88-101, 2017

23. Amine Dhraief, Abdelfettah Belghith, Hassan Mathkour, and Khalil Drira. An M2M gateway-centric architecture for autonomic healing and optimising of machine-to-machine overlay networks. International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Inderscience. JCR 2016 , SCI Impact Factor=0.705, Q4. Vol. 26, Issue 1, Pages 12-28, 2017

24. T.Mellah & T. Ben Amor. Performance of the Tunisian Water Utilities: an input-distance function approach. Utilities Policy. Vol. 38, Issue -, Pages 18-32, 2016

25. Tawfik BEN AMOR and Thuraya MELLAH. COST EFFICIENCY OF TUNISIAN WATER DISTRIBUTION UTILITIES: AN HETEROSKEDASTIC STOCHASTIC COST FRONTIER APPROACH. Journal of Economics Theory (2016 Volume 10). Vol. 10, Issue 4, Pages 1-9, 2016

26. Thuraya Mellah and Tawfik Ben Amor. Performance of the Tunisian Water Utility: An input-distance function approach. Utility plicy. Vol. 38, Issue February 2016,, Pages Pages 18–32, 2016

27. Lamia Zaibi. “Rewriting the Tempest: George Lamming’s Water with Berries.”. Postcolonial Interventions 1. 2. Vol. 1, Issue 2, Pages 107-134, 2016

28. Lamia Zaibi. “Exploring Landscape: A comparative Study of George Lamming’s In the Castle of My Skin and Water with Berries.”. Subalternspeak: An International Journal of Postcolonial Studies. Vol. 4, Issue 3, Pages 48-59, 2016

29. Lamia Zaibi. “Pocomania Rituals and Identity in Andrew Salkey’s a Quality of Violence (1959).”. Global Journal of Human Social Science. Vol. 14, Issue 1, Pages 1-7, 2016

30. Maher Helaoui and Wady Naanaa. Modularity-based Decomposing for Valued CSP. Annals of Mathematics and Artificial Intelligence (AMAI). Vol. 67, Issue 2, Pages 165-187, 2016

31. Zeineb Ayachi. ELT EVALUATION: THE ISSUE OF IN-COMPANY ENGLISH TRAINING IN TUNISIA. Modern Journal of Language Teaching Methods. Vol. 6, Issue 3, Pages 97-106, 2016

32. Zeineb Ayachi. The main sources of language-skills-specific anxiety in Tunsian ESP students. TAYR. Vol. 3, Issue 2, Pages 10-53, 2016

33. Amine Dhraief, Abdelfettah Belghith, and Khalil Drira.. Regular and lightweight mobility management in the HIP-based M2M overlay network. International Jour-nal of Autonomous and Adaptive Communications Systems (IJAACS), Inderscience. Vol. 9, Issue 3/4, Pages 331-352, 2016

34. Imen Mahjri, Amine Dhraief, Abdelfattah Belghith, Khalil Drira, and Hassan Mathkour. A GPS-less Framework for Localization and Coverage Maintenance in Wireless Sensor Networks. KSII Transactions on Internet and Information Systems, JCR 2016, SCI Impact Factor=0.452, Q4. Vol. 10, Issue 1, Pages 96-116, 2016

35. Rafaa Tahar, Amine Dhraief, Abdelfattah Belghith, Hassan Mathkour, and Rafik Braham. Autonomous and adaptive beaconing strategy for multi-interfaced wireless mobile nodes. Wiley Wireless Communications and Mobile Computing, JCR 2016: SCI Impact Factor=1.899, Q2. Vol. 16, Issue 12, Pages 1625-1641, 2016

36. Jallouli R. & Raboudi F.. LES DÉRIVES DE LA DÉLOCALISATION: L'EXEMPLE DES CENTRES D'APPEL EN TUNISIE. Revue française du marketing. Vol. 2, Issue 5, Pages 77-84, 2015

37. Hermassi, H.,Hamdi, M.,Rhouma, R.,Belghith, S.M.. A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map. Multimedia Tools and Applications. Vol. , Issue , Pages , 2015

38. Mannai, O.,Bechikh, R.,Hermassi, H.,Rhouma, R.,Belghith, S.. A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity. Nonlinear Dynamics. Vol. , Issue , Pages , 2015

39. Bechikh, R.,Hermassi, H.,Abd El-Latif, A.A.,Rhouma, R.,Belghith, S.. Breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Processing: Image Communication. Vol. , Issue , Pages , 2015

40. Elmi, S., Benouaret, K., HadhjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Requêtes Skyline en présence des données évidentielles. Revue des Nouvelles Technologies de l'Information, Extraction et Gestion des Connaissances. Vol. RNTI-E-, Issue 28, Pages 215-220, 2015

41. Lamia Ketari and Mohammadi Akheela Khanum. Impact of Facebook Usage on the Academic Grades: A case study. Journal of Computing. Vol. 5, Issue 1, Pages 44-49, 2015

42. Lamia Ketari and Akheela Khanum. A Review of Malicious Code Detection Techniques for Mobile Devices. International Journal of Com- puter Theory and Engineering. Vol. 4, Issue 2, Pages 212-216, 2015

43. Manel Hamouda et Rym Srarfi Tabbane. Impacte du BAO électronique sur l’intention d’achat du consommateur: le role modérateur de l’âge et du genre. La Revue Gestion et Organisation. Vol. 6, Issue 1, Pages 39-46, 2015

44. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Using Sequences of Words for Non-Disjoint Grouping of Documents.,. International journal of Pattern Recognition and Artificial Intelligence (IJPRAI),. Vol. 29, Issue (3), Pages 1-20, 2015

45. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Mohamed Limam. Kernel-Based Methods to Identify Overlapping Clusters with Linear and Nonlinear Boundaries. Journal of classification. Vol. 32, Issue (2), Pages 176-211, 2015

46. Raéf BAHRINI. Productivity of MENA Islamic banks: a bootstrapped Malmquist Index approach. International Journal of Islamic and Middle Eastern Finance and Management. Vol. 8, Issue 4, Pages 508-528, 2015

47. Amdouni Hamida et Gammoudi Mohamed Mohsen. Semi-Automatic Method to Assist Expert for Association Rules Validation. International Journal of Computer, Electrical, Automation, Control and Information Engineering. Vol. 9, Issue 8, Pages 1888-1896, 2015

48. Zeineb Ayachi. Adult Learning Strategies in an Onsite Training Program in Tunisia. The Reading Matrix. Vol. 15, Issue 2, Pages 80-100, 2015

49. Chebbah, M., Martin, A., Yaghlane, B.B. Combining partially independent belief functions.. Decision Support Systems. Vol. 73, Issue , Pages 37-46, 2015

50. imen Jemili, Dhouha Ghrab, Amine Dhraief, Abdelfettah Belghith, Bilel Derbel, Ahmed Al-Mogren, and Hassan Mathkour. CHRA - a coloring based hierarchical routing algorithm. Journal of Ambient Intelligence and Humanized Computing, Springer Berlin Heidelberg. 2015 JCR, SCI Impact Factor=0.835, Q4. Vol. 6, Issue 1, Pages 69-82, 2015

51. Raik Aissaoui, Amine Dhraief, Abdelfettah Belghith, Hamid Menouer, Hassan I. Mathkour, Fethi Filali, and Adnan Abu-Dayya. HCBLS - A Hierarchical Cluster-Based Location Service in Urban Environment. Mobile Information Systems. JCR 2015, SCI Impact Factor=1.462, Q2. Vol. 2015, Issue 2015, Pages 1-16, 2015

52. Abdelfettah Belghith, Mohamed Belhassen, Amine Dhraief, NourElhouda Dougui, and Hassan Mathkour. Autonomic Obstacle Detection and Avoidance in MANETs Driven by Cartography Enhanced OLSR. Mobile Information Systems. 2015 JCR, SCI Impact Factor=1.462, Q2. Vol. 2015, Issue 2015, Pages 1-18, 2015

53. Yassine SLAMA. Le rôle des salariés locaux dans le processus d'adaptation des expatriés dans le cadre de la multinationalisation des firmes. Revue Française de Gestion. Vol. 40, Issue 239, Pages 51-63, 2014

54. Koubaâ Y.,Tabbane R. & Jallouli R. On the use of structural equation modeling in marketing image research. Asia Pacific Journal of Marketing and Logistics. Vol. 26, Issue 2, Pages 315-338, 2014

55. Belazi, A.,Hermassi, H.,Rhouma, R.,Belghith, S.. Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map. Nonlinear Dynamics. Vol. , Issue , Pages , 2014

56. Yamen Koubaa, Rym Srarfi Tabbane et Rim Jallouli Chaabouni. On the Use of Structural Equations Modeling in Marketing Image Research. Asia Pacific Journal of Marketing and Logistics. Vol. 26, Issue 2, Pages 315-338, 2014

57. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Generalization of c-means for identifying non-disjoint clusters with overlap regulation,. Pattern Recognition Letters. Vol. 45, Issue (1), Pages 92-98, 2014

58. El Ghali M., Saied Ben Rached K. et Brée J.,. « Le processus d’Appropriation de l’Expérience Télévisuelle des Enfants. Cas de l’Emission de la « Star Academy ». International Journal of Business & EconomicStrategy (IJBES). Vol. 2, Issue -, Pages -, 2014

59. Hermassi, H.,Rhouma, R.,Belghith, S.. Improvement of an image encryption algorithm based on hyper-chaos. Telecommunication Systems. Vol. , Issue , Pages , 2013

60. Hermassi, H.,Belazi, A.,Rhouma, R.,Belghith, S.M.. Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimedia Tools and Applications. Vol. , Issue , Pages , 2013

61. Manel Hamouda et Rym Srarfi Tabbane. Impact of Electronic Word of Mouth Evaluation on Purchase Intention: The Mediating Role of Attitude toward the Product. International Journal of Online Marketing. Vol. 3, Issue 2, Pages 20-37, 2013

62. Maher Helaoui, Wady Naanaa, and Béchir El Ayeb. Submodularity-based Decomposing for Valued CSP.. International Journal on Artificial Intelligence Tools (IJAIT). Vol. 22, Issue 2, Pages 1-20, 2013

63. Jean-Marc Bardet, Hatem Bibi.. Adaptive semiparametric wavelet estimator and goodness-of-fit test for long memory linear processes. Electronic Journal of Statistics, Institute of Mathematical Statistics and Bernoulli Society,. Vol. 6, Issue 0, Pages 2382-2419, 2012

64. KS Søilen, MA Kovacevic, R Jallouli. Key success factors for Ericsson mobile platforms using the value grid model. Journal of Business Research JBR. Vol. 65, Issue 9, Pages 1335-1345, 2012

65. Jallouli R., Raboudi F. and Koubâa Y.. Customer knowledge management: Implementation and added-value. ecch the case for learning UK and USA. Vol. Ref., Issue Ref. 912-007-1, Pages 17p, 2012

66. Hermassi, H.,Rhouma, R.,Belghith, S.. Security analysis of image cryptosystems only or partially based on a chaotic permutation. Journal of Systems and Software. Vol. , Issue , Pages , 2012

67. BAHRINI Raéf. Efficiency and productivity analysis of Tunisian banks during a recent deregulation period. The Journal of Management and Business Research. Vol. 2, Issue 2, Pages 68-82, 2012

68. K. Kamoun and S. Ben Yahia,. content similarity measure to assess stability during ontology enrichment. International Review on Computer and Software (IRECOS). Vol. 7, Issue 3, Pages 1020-1027, 2012

69. K. Kamoun and S. Ben Yahia. A Novel Global Measure Approach based on Ontology Spectrum to Evaluate Ontology Enrichment. International Journal of Computer Applications. Vol. 39, Issue 17, Pages 23-30, 2012

70. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Recognition of overlapping Patterns with Linear and Non-Linear Separations using Positive Definite Kernels.. International Journal of Computer Application (IJCA),. Vol. Volume 53, Issue (1), Pages 1-8, 2012

71. Amine Dhraief, Imen Mahjri, and Abdelfettah Belghith. A Performance Evaluation of the Coverage Configuration Protocol Under Location Errors, Irregular Sensing Patterns, and a Noisy Channel. International Journal of Business Data Communications and Networking, IGI. Vol. 8, Issue 3, Pages 28-41, 2012

72. Amine Dhraief and Abdelfettah Belghith. An Experimental Investigation of the Impact of Mobile IPv6 Handover on Transport Protocols. Smart Computing Review, KAIS. Vol. 2, Issue 1, Pages 1-17, 2012

73. Solak, E.,Rhouma, R.,Belghith, S.. Breaking an orbit-based symmetric cryptosystem. Mathematical and Computer Modelling. Vol. , Issue , Pages , 2011

74. Kumar, A.,Rhouma, R.,Wang, Y.,Sklavos, N.,Ghose, M.K.. Comments on, " A blind source separation-based method for multiple images encryption". Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2011

75. Rhouma, R.,Belghith, S.. Cryptanalysis of a chaos-based cryptosystem on DSP. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2011

76.  BAHRINI Raéf. Empirical analysis of non-performing loans in the case of Tunisian banks. Journal of Business Studies Quarterly. Vol. 3, Issue 1, Pages 230-245, 2011

77. Amdouni Hamida et Gammoudi Mohamed Mohsen. CondClose: A new algorithm of association rules extraction. International Journal of Computer Science Issues (IJCSI). Vol. 8, Issue 4, Pages 550-560, 2011

78. Bach Tobji, M-A., Ben Yaghlane, B. Extraction des itemsets fréquents à partir de données imparfaites : application à une base de données éducationnelles. Revue des Nouvelles Technologies de l'Information, Fouille de données complexes-Complexité liée aux données multiples. Vol. RNTI-E-, Issue 21, Pages 211-231, 2011

79. Amine Dhraief and Abdelfettah Belghith. Mobility Impact on Session Survivability under the SHIM6 Protocol and Enhancement of its Rehoming Procedure. Journal of Networks, Academy Publisher. Vol. 6, Issue 11, Pages 1521-1532, 2011

80. Arroyo, D.,Li, S.,Amigó, J.M.,Alvarez, G.,Rhouma, R.. Comment on "Image encryption with chaotically coupled chaotic maps". Physica D: Nonlinear Phenomena. Vol. , Issue , Pages , 2010

81. Solak, E.,Rhouma, R.,Belghith, S.. Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications. Vol. , Issue , Pages , 2010

82. Rhouma, R.,Solak, E.,Belghith, S.. Cryptanalysis of a new substitution-diffusion based image cipher. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2010

83. Hermassi, H.,Rhouma, R.,Belghith, S.. Joint compression and encryption using chaotically mutated Huffman trees. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2010

84. Tawfik Ben Amor and Mohamed Goaied. "Stochastic Varying Coefficient Frontier Model in the Estimation of Technical Efficiency and Technical Efficiency of Specific Input". Agricultural Journal. Vol. Vol 5, Issue 6, Pages p 329-337, 2010

85. Tawfik Ben Amor and Christophe Muller. "Application of Stochastic Production Frontier in the Estimation of Technical Efficiency of Irrigated Agriculture in Tunisia". Agricultural Journal. Vol. 5, Issue 2, Pages p50-56., 2010

86. Rhouma, R.,Solak, E.,Arroyo, D.,Li, S.,Alvarez, G.,Belghith, S.. Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2009

87. Rhouma, R.,Belghith, S.. Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos, Solitons and Fractals. Vol. , Issue , Pages , 2009

88. Rhouma, R.,Meherzi, S.,Belghith, S.. OCML-based colour image encryption. Chaos, Solitons and Fractals. Vol. , Issue , Pages , 2009

89. Jean-Marc Bardet, Hatem Bibi, Abdellatif Jouini.. Adaptive wavelet based estimator of the memory parameter for stationary Gaussian processes. Bernoulli Society for Mathematical Statistics and Probability. Vol. 14, Issue 3, Pages .691-724., 2008

90. Hatem Bibi, Abdellatif Jouini, M. Kratou. More general constructions of wavelets on the interval. Communications in Mathematical Analysis. Vol. 4, Issue 1, Pages 45-47, 2008

91. Rhouma, R.,Belghith, S.. Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2008

92. Rhouma, R.,Belghith, S.. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2008

93. Arroyo, D.,Rhouma, R.,Alvarez, G.,Li, S.,Fernandez, V.. On the security of a new image encryption scheme based on chaotic map lattices. Chaos. Vol. , Issue , Pages , 2008

94. Rhouma, R.,Safya, B.. On the security of a spatiotemporal chaotic cryptosystem. Chaos. Vol. , Issue , Pages , 2007

95. . Performance of a new Chaos-based Communication Scheme: The Reduced-Delay-Masked-DCSK. European Signal Processing Conference. Vol. , Issue , Pages , 2007

96. . A multidimensional map for a chaotic cryptosystem. European Signal Processing Conference. Vol. , Issue , Pages , 2006

97. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines.. Journal of Object Technology. Vol. 4, Issue 1, Pages 83-108, 2005

Articles de conférence

1. . Antecedents of Trust toward Islamic Banks: a proposal of an explanatory Model. ATM Hammamet. Pages , 2018

2. Bousnina, F.E., Chebbah, M., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Evidential Top-k Queries Evaluation - Algorithms and Experiments.. IPMU. Pages 407-417, 2018

3. Jendoubi, S., Chebbah, M., Martin, A. Evidential Independence Maximization on Twitter Network.. BELIEF. Pages 121-128, 2018

4. Bousnina, F.E., Chebbah, M., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Evidential Top-k Queries Evaluation - Algorithms and Experiments.. IPMU. Pages 407-417, 2018

5. Chehibi, M., Chebbah, M., Martin, A. Independence of Sources in Social Networks.. IPMU. Pages 418-428, 2018

6. Chehibi, M., Chebbah, M., Martin, A. Independence of Sources in Social Networks.. CoRR. Pages , 2018

7. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S. Uniformly Spread Embedding Based Steganography.. ICDEc. Pages 162-172, 2017

8. . The impact of social professional category on consumers’ acceptance level towards Islamic banking window.. GBATA Vienna. Pages , 2017

9. Elmi, S., Hadjali, A., Tobji, M.A.B., Yaghlane, B.B. Skyline Computation and Maintenance over Imperfect Databases - A Marginal-Points-Based Approach.. ICTAI. Pages 1234-1242, 2017

10. Bousnina, F.E., Elmi, S., Chebbah, M., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. Skyline Operator over Tripadvisor Reviews Within the Belief Functions Framework.. ICDEc. Pages 186-197, 2017

11. Abidi, A., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Skyline Modeling and Computing over Trust RDF Data.. ICEIS. Pages 634-643, 2017

12. Abidi, A., Bahri, N., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. First Steps Towards an Electronic Meta-journal Platform Based on Crowdsourcing.. ICDEc. Pages 175-185, 2017

13. Zeineb Ayachi. Speaking anxiety, order or disorder?. Jendouba, Tunisia. Pages 199-220, 2017

14. Bousnina, F.E., Chebbah, M., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. On Top-K Queries Over Evidential Data.. ICEIS, Portugal. Pages 106-113, 2017

15. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Producer Mobility support in Named Data Internet of Things Network. International Conference on Ambient Systems, Networks and Techno- logies (ANT’17), volume 109 of Procedia Computer Science, Madeira, Portugal. Pages 1067 – 1073, 2017

16. Bousnina, F.E., Elmi, S., Chebbah, M., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. Skyline Operator over Tripadvisor Reviews Within the Belief Functions Framework.. ICDEc. Pages 186-197, 2017

17. Bousnina, F.E., Chebbah, M., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. On Top-K Queries Over Evidential Data.. ICEIS. Pages 106-113, 2017

18. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. How to cache in ICN/IoT environments ?. 17th IEEE/ACS International Conference of Computer Systems and Applications (AICCSA’17) Hammamet, Tunisia. Pages 1-8, 2017

19. Vidal, G., Bechikh, R., Rhouma, R., Belghith, S. A commercial application of a chaos-based-stream cipher - Performance and Security analysis.. ICITST. Pages 39-44, 2016

20. Ounifi Mohamed Sami, Amdouni Hamida, Ben Elhoussine Rafika et Slimane Hammoudi. New 3D Visualization and Validation Tool for Displaying Association Rules and Their Associated Classifiers. 20th International Conference Information Visualisation, Universidade NOVA de Lisboa, Lisbon, July 19-22, Portugal. Pages 152-158, 2016

21. Jallouli, R., Jallouli, M., Rekik, J., Bach Tobji, M-A., Abdi, A., Bahri, N. The CEVEP medical application for innovative management of central venous port (CVP): Technical issues and research challenges. International Conference on Digital Economy (ICDEc 2016), Tunisia, Carthage. Pages 68-73, 2016

22. Bousnina, F-E., Elmi, S., Bach Tobji, Chebbah, M., HadjAli, A., Ben Yaghlane, B. Object-relational implementation of evidential databases. International Conference on Digital Economy (ICDEc 2016), Tunisia, Carthage. Pages 80-87, 2016

23. Elmi, S., HadjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Efficient Skyline Maintenance over Frequently Updated Evidential Databases. Information Processing and Management of Uncertainty in Knowledge-Based Systems, Netherlands, Eindhoven. Pages 199-210, 2016

24. Maher Helaoui and Wady Naanaa. A submodular-based decomposition strategy for valued CSPs. Proceedings of the Sixth Starting AI Researchers' Symposium (STAIRS), Montpellier, France. Pages 149-161, 2016

25. Mguiris Imen, Amdouni Hamida and Gammoudi Mohamed Mohsen. Fuzzy association rules mining: State of the Art. International Business Information Management Conference (28th IBIMA) 9-10 November 2016 in Seville, Spain. Pages --, 2016

26. . Trust levels toward Islamic banks in Tunisia: Users or not users it does matter?. GBATA Dubai. Pages , 2016

27. Elmi, S., HadhjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Efficient distributed skyline over imperfect data modeled by the evidence theory. IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI). Pages 335-342, 2016

28. El Ghali M. et Jammeli A.. "Les dimensions de l'expérience médiatique vécue par les enfants : étude exploratoire avec les enfants tunisiens",. Actes de 28th IBIMA Conference , Séville 2016.. Pages -, 2016

29. Bousnina, F.E., Elmi, S., Tobji, M.A.B., Chebbah, M., HadjAli, A., Yaghlane, B.B. Object-relational implementation of evidential databases.. ICDEc. Pages 80-87, 2016

30. Raik Aissaoui, Amine Dhraief, Abdelfattah Belghith, Hamid Menouer, Fethi Filali, and Hassan Mathkour. VALS: Vehicle-Aided location service in urban environment. IEEE Wireless Communications and Networking Conference (WCNC’16), Doha, Qatar. Pages 1-6, 2016

31. Imen Mahjri, Amine Dhraief, and Abdelfattah Belghith.. A three dimensional scalable and distributed conflict detection algorithm for unmanned aerial vehicles. IEEE Wireless Communications and Networking Conference (WCNC’16), Doha, Qatar. Pages 1-7, 2016

32. Belazi, A.,Rhouma, R.,Belghith, S.. A novel approach to construct S-box based on Rossler system. IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Pages , 2015

33. Belazi, A.,Abd El-Latif, A.A.,Rhouma, R.,Belghith, S.. Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Pages , 2015

34. K. Kamoun and S. Ben Yahia. Stability assess based on enhanced information content similarity measure for ontology enrichment.. 4th International conference of Model and Data Engineering, Springer, Laranaca,Cyprus.. Pages 146-153, 2015

35. Aymen HajKacem , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Parallel K-prototypes for Clustering Big Data. ICCI 2015, Madrid, ESP. Pages 627-638, 2015

36. Aymen HajKacem , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. MapReduce-based K-Prototypes Clustering Method for Big Data. DSAA, IEEE, Paris, France. Pages ..., 2015

37. Mguiris Imen, Amdouni Hamida et Gammoudi Mohamed Mohsen. New validation method of fuzzy association rules based on structural equation modeling. 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'15), August 15-17, China. Pages 624-633, 2015

38. Bousnina, F-E., Bach Tobji, Chebbah, M., Liétard, L., Ben Yaghlane, B. A New Formalism for Evidential Databases. International Symposium on Methodologies for Intelligent Systems, Lyon, France. Pages 31-40, 2015

39. . Sustainable development and education: a Tunisian case study.. GBATA Péniche/lisbon. Pages , 2015

40. El Ghali M., Saied Ben Rached K. et Brée J.,. « L’expérience de la Téléréalité Vécue par les Enfants : les Motivations et les Freins à l’Egard de « La Star Academy »,. Actes de 25th IBIMA Conference , Amesterdam 2015.. Pages -, 2015

41. Bousnina, F.E., Tobji, M.A.B., Chebbah, M., Liétard, L., Yaghlane, B.B. A New Formalism for Evidential Databases.. ISMIS. Pages 31-40, 2015

42. Chebbah, M., Kharoune, M., Martin, A., Yaghlane, B.B. Consid{é}rant la d{é}pendance dans la th{é}orie des fonctions de croyance.. CoRR. Pages , 2015

43. Chebbah, M., Martin, A., Yaghlane, B.B. Combining partially independent belief functions.. CoRR. Pages , 2015

44. Park, J., Chebbah, M., Jendoubi, S., Martin, A. Second-Order Belief Hidden Markov Models.. CoRR. Pages , 2015

45. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Cache coherence in Machine-To-Machine Information Centric Networks. the 40th IEEE Conference on Local Computer Networks (LCN’15), Clearwater Beach, FL, USA. Pages 430–433, 2015

46. Mohamed Belhassen, Amine Dhraief, and Abdelfettah Belghith. City-Obstacles Im- pact on OLSR-Based Routing Protocols. Communication Technologies for Vehicles 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 47-59, 2015

47. Imen Mahjri, Amine Dhraief, and Abdelfettah Belghith. A Review on Collision Avoidance Systems for Unmanned Aerial Vehicles. Proceedings of the Communication Technologies for Vehicles : 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 203-214, 2015

48. Hajer Souri, Amine Dhraief, and Abdelfettah Belghith. TCP Application Recovery Improvement After Handover in Mobile Networks. Communication Technologies for Vehicles : 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 60-71, 2015

49. Yassine SLAMA. La responsabilité sociale des entreprises en Tunisie : état des lieux après la révolution. 16ème Université de Printemps de l’Audit Social, organisée par l’Institut d'Audit Sociale (IAS) et l’Université de Pékin, Pékin, Chine. Pages 699-705, 2014

50. Jammali, A., Bach Tobji, M-A., Martin, A., Ben Yaghlane, B. Indexing evidential data. The IEEE second World Conference on Complex Systems 2014, Agadir, Morocco. Pages 196 - 201, 2014

51. Elmi, S., Benouaret, K., HadjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Computing skyline from evidential data. International Conference on Scalable Uncertainty Management 2014, Oxford, UK. Lecture Notes in Artificial Intelligence, vol. 8720. Springer-Verlag. Pages 148—161, 2014

52. Hamdi, M.,Hermassi, H.,Rhouma, R.,Belghith, S.. A new secure and efficient scheme of ADPCM encoder based on chaotic encryption. 2014 1st International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2014. Pages , 2014

53. Yamen Koubaa, Rym Srarfi Tabbane et Manel Hamouda. A multiple Criteria Senior Segmentation : Case of the French market. Administrative Science Association of Canada 2014 Conference Muskoka, Ontario, Canada. Pages 00, 2014

54. Manel Hamouda et Rym Srarfi Tabbane. Gender Mediating Role in Electronic WOM Relationship and Purchase Intention: Proposal of a Conceptual Model. International Marketing Trends Conference 2014, Venice, Italy.. Pages 00, 2014

55. Hela masmoudi , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Identification de classes non-disjointes ayants des densités différentes. EGC 2014, Rennes, France. Pages 257-268, 2014

56. Rezgui Amira , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Généralisation des k-moyennes pour produire des recouvrements ajustables,. EGC 2014, Rennes, France. Pages 221-232, 2014

57. . A Tunisian pioneer Islamic bank:a case study of the quality of the website.. GBATA Baku. Pages , 2014

58. El Ghali M., Saied Ben Rached K. et Brée J.,. « Le processus d’Appropriation de l’Expérience Télévisuelle des Enfants. Cas de l’Emission de la « Star Academy »,. Actes de l’International Conference on Innovation in Business, Economics & Marketing Research (IBEM’14), Monastir 2014.-. Pages -, 2014

59. Chebbah, M.. Source Independence in the Theory of Belief Functions. (Indépendance des Sources dans la Théorie de l'évidence).. . Pages , 2014

60. Park, J., Chebbah, M., Jendoubi, S., Martin, A. Second-Order Belief Hidden Markov Models.. Belief Functions. Pages 284-293, 2014

61. Raik Aissaoui, Hamid Mnaouer, Amine Dhraief, Fethi Filali, Abdelfettah Belghith, and Adnan Abu-Dayya. Advanced real-time traffic monitoring system based on V2X communications. IEEE International Conference on Communi- cations (ICC’14), Sydney, Australia. Pages 2713–2718, 2014

62. Imen Mahjri, Amine Dhraief, Issam Mabrouki, Abdelfettah Belghith, and Khalil Drira.. The coverage configuration protocol under AT-Dist localization. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 141–148, 2014

63. Maroua Meddeb, Mehdi Ben Alaya, Thierry Monteil, Amine Dhraief, and Khalil Drira. M2M Platform with Autonomic Device Management Service. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 1063-1070, 2014

64. Hajer Souri, Amine Dhraief, Syrine Tlili, Khalil Drira, and Abdelfettah Belghith. Smart Metering Privacy-preserving Techniques in a Nutshell.. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 1087-1094, 2014

65. Imen Mahjri, Amine Dhraief, Issam Mabrouki, Abdelfettah Belghith, and Khalil Drira. An integrated framework for localization and coverage maintenance in wireless sensor networks. the 10th International Wireless Communications and Mobile Computing Conference (IWCMC’14), Nicosia, Cyprus. Pages 287-292, 2014

66. Zaghbani, S.,Rhouma, R.. Data hiding in spatial domain image using chaotic map. 2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013. Pages , 2013

67. Rym Srarfi Tabbane et Mohsen Debabi. Effects of eWOM on Consumer Behavior: a Stimulus-Organism-Response Model Proposition. Direct / Interactive Marketing Research Summit, Marketing EDGE, Chicago, USA. Pages 00, 2013

68. Rym Srarfi Tabbane et Manel Hamouda. Exposure to eWOM and Consumer Behavior: Does Gender Matter?. 15th Annual International Conference on Globalizing Businesses for the Next Century: Visualizing and Developing Contemporary Approach to Harness Future Opportunities, GBATA 2013, Helsinki, Finland. Pages 00, 2013

69. Rym Srarfi Tabbane et Manel Hamouda. Impact of eWOM on the Tunisian Consumer’s Attitude towards the Product. Advances in Business-Related Scientific Research Conference, Venice, Italy. Pages 00, 2013

70. Amine Dhraief, Hajer Souri, and Abdelfettah Belghith. Explicit MIPv6 handover cross-layer triggers and its impact on TCP Application recovery time. the International Conference on Computer Applications Technology (ICCAT’13),Sousse, Tunisia. Pages 1–8, 2013

71. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Detecting overlapping clustering with small and parameterizable overlaps,,. ICCAT, IEEE, Sousse, Tunisia. Pages 1-6, 2013

72. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Un modèle générique pour les k-moyennes à recouvrements ajustables,. EGC-FDC, Toulouse, France. Pages 81-92, 2013

73. Ben N'Cir Chiheb-Eddine , Zenned Afef , Essoussi Nadia. Non-disjoint grouping of text documents based Word Sequence Kernel.,. EGC2013, Toulouse, France. Pages 253-262, 2013

74. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Non-Disjoint Cluster Analysis with Non-Uniform Density.,. MIKE2013, Tamil Nadu, India.. Pages 100-111, 2013

75. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. On the Extension of k-means for Overlapping Clustering: Average or Sum of clusters' representatives ?.,. KDIR2013. Pages 208-213, 2013

76. Amdouni Hamida et Gammoudi Mohamed Mohsen. Visualization of a Synthetic Representation of Association Rules to Assist Expert Validation. Computer Science and Information Technology (CS & IT-CSCP 2013), DOI: 10.5121/csit.2013.3819, Sundarapandian et al. (Eds): ICAITA, SAI, SEAS, CDKP, CMCA. Pages 229–242, 2013

77. . Consumer trust determinants in a Tunisian Bank: an exploratory study.. GBATA Helsinki. Pages , 2013

78. Amine Dhraief, Abdelfettah Belghith, Khalil Drira, Tarek Bouali, and Mohamed Amine Ghorbali. Autonomic management of the HIP-based M2M overlay network. Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT’13), volume 19 of Procedia Computer Science, Halifax, NS, Canada. Pages 98–105, 2013

79. Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith, Bilel Derbel, and Amine Dhraief. Collision aware coloring algorithm for wireless sensor networks. the 9th International Wireless Communications and Mobile Computing Conference (IWCMC’13), Cagliari, Sardinia, Italy. Pages 1546–1553, 2013

80. Issam Mabrouki, Nesrine Ben Khalifa, Amine Dhraief, and Abdelfettah Belghith. CrossWalk: A novel cross-layer random walk data dissemination in wireless sensor networks. the 24th IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC’13), London, United Kingdom. Pages 2474–2478, 2013

81. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, and Abdelfettah Belghith. Mobility management in the HIP-based M2M overlay network. the 22nd IEEE International Workshop on Enabling Technologies : Infrastructure for Colla- borative Enterprises (WETICE’13), Hammamet, Tunisia. Pages 50–55, 2013

82. Amine Dhraief, Khalil Drira, Abdelfettah Belghith, Tarek Bouali, and Mohamed Amine Ghorbali. Self-healing and Optimizing of the HIP-based M2M Overlay Network. the 10th International Conference on Autonomic Computing (ICAC’13), San Jose, CA, USA. Pages 183–192, 2013

83. Rafaa Tahar, Amine Dhraief, Abdelfettah Belghith, and Rafik Braham. TCP performance evaluation over multihomed networks. the International Conference on Computer Applications Technology (ICCAT’13), Sousse, Tunisia. Pages 1–6, 2013

84. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. Simultaneous mobility management in the HIP-based M2M overlay network. the 9th International Wireless Communications and Mobile Computing Conference (IWCMC’13), Cagliari, Italy. Pages 219-224, 2013

85. Dhouha Ghrab, Bilel Derbel, Imen Jemili, Amine Dhraief, Abdelfettah Belghith, and El-Ghazali Talbi. Coloring based hierarchical routing approach. Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT’13), Halifax, NS, Canada,. Pages 188-196, 2013

86. Jallouli R. & Kasraoui A.. Business Intelligence et Management des Universités. ISKO-Maghreb, 3-4 nov, Hammamet. Pages -, 2012

87. Lamia Ketari, Munesh Chandra and Akheela Khanum. A Study of Image Spam Filtering Techniques. 4th IEEE International Conference on Com- putational Intelligence and Communication Networks, CICN 2012, Mathura, India. Pages 245-250, 2012

88. Rym Srarfi Tabbane et Manel Hamouda. Impact of Electronic Word-of-Mouth on Purchase Intention: Tunisian Consumer’s Case. 2nd International Symposium ISKO-Maghreb, Hammamet, Tunisie. Pages 00, 2012

89. K. Kamoun and S. Ben Yahia. Automatic Approach for Ontology Evolution based on Stability Evaluation.. 8th International Conference on Web Information Systems and Technologies (WEBIST 2012),Porto, Portugal. Pages 452-459, 2012

90. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Improved overlapping k-means for detecting overlapping clusters.,. MSDM2012, Hammamet, Tunisia. Pages 1-6, 2012

91. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Identification of Overlapping Clusters with Small Overlaps.,. EGC-Maghreb, Hammamet, Tunisia. Pages 26-32, 2012

92. . The combined effect of strength and favourability of associations as a source of brand equity: A survey on Tunisian women.. ICIMB london. Pages , 2012

93. Chebbah, M., Martin, A., Yaghlane, B.B. About Sources Dependence in the Theory of Belief Functions.. Belief Functions. Pages 239-246, 2012

94. Chebbah, M., Martin, A., Yaghlane, B.B. Positive and Negative Dependence for Evidential Database Enrichment.. IPMU. Pages 575-584, 2012

95. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. A service-oriented framework for mobility and multihoming support. The 16th IEEE Mediterra- nean Electrotechnical Conference (MELECON’12), Hammamet, Tunisia. Pages 489–493, 2012

96. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. HBMON : A HIP based M2M overlay network. The 3rd International Conference on the Network of the Future (NOF’12), Tunis, Tunisia. Pages 1–8, 2012

97. Jallouli R. et Nahdi E.. Impact of Search Engine Marketing SEM on the Website Success. Information Systems and artificial intelligence SIIE, Casablanca, 17-19th February. Pages -, 2011

98. Mohammadi Akheela Khanum and Lamia Ketari. Trends in Combating Image Spam E-mails. In International Proceedings of Computer Science and Information Technology, CSIT 2011, Singapore. Pages 78-84, 2011

99. Lamia Ketari. Online Library for Graduation Projects Management: The OGPL System. In Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications, EdMedia 2011, Lisbon, Portugal. Pages 2017-2020, 2011

100. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Classification Recouvrante Bassée sur les Méthodes à Noyau,. JDS2011, Gammart, Tunisia. Pages 1-6, 2011

101. Amdouni Hamida et Gammoudi Mohamed Mohsen. Algorithms of association rules extraction: State of the Art. IEEE 3rd International Conference on Communication Software and Networks (ICCSN), May 27-29, China. Pages 333-339, 2011

102. Maher Helaoui and Wady Naanaa. Domain permutation reduction for valued CSPs. 11th Workshop on Preferences and Soft Constraints, Perugia, Italy. Pages 76-90, 2011

103. Chebbah, M., Martin, A., Yaghlane, B.B. Mesure de concordance pour les bases de données évidentielles.. EGC. Pages 197-202, 2011

104. Amine Dhraief, Raik Aissaoui, and Abdelfettah Belghith. Parallel Computing the Longest Common Subsequence (LCS) on GPUs: Efficiency and Language Suitability. the 1st International Conference on Advanced Communications and Computation (INFOCOMP’11), Barcelona, Spain. Pages 143–148, 2011

105. Jallouli R.. Interaction between International Retailers and local Retailers in Tunisia: Investment opportunities and strategic partnerships. 8 th Conference of the Society of Asian Retailing and Distribution SARD, University of Marketing and Distribution Sciences, Kobe, Japan, 26-28 november. Pages -, 2010

106. Bach Tobji, M-A., Ben Yaghlane, B. Maintaining Evidential Frequent Itemsets in Case of Data Deletion. The International Conference on Information Processing and Management of Uncertainty in Knowledge-based System 2010, Dortmund, Germany. Pages 218-227, 2010

107. Amira, H.,Rhouma, R.,Belghith, S.. An eigen value based watermarking scheme for tamper detection in gray level images. 2010 7th International Multi-Conference on Systems, Signals and Devices, SSD-10. Pages , 2010

108. K. Kamoun and S. Ben Yahia. Evolution des ontologies : un panorama,. 10ème Conférence Internationale Francophone « Extraction et Gestion des Connaissances » (EGC’10), Hammamet, Tunisie. Pages 20-29, 2010

109. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Patrice Bertrand. Overlapping clustering based on kernel similarity metric.,. MSDM2010, Hammamet, Tunisia. Pages 130-136, 2010

110. Amine Dhraief and Abdelfettah Belghith. Multihoming support in the Internet : A state of the art. Proceedings of the International Conference on Models of Information and Communication Systems (MICS’10), Rabat, Morocco. Pages 1-8, 2010

111. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Patrice Bertrand. Kernel overlapping k-means for clustering in feature space.,. KDIR2010, Valencia, ESP. Pages 250-256, 2010

112. Amdouni Hamida et Gammoudi Mohamed Mohsen. A customer profile extraction using Conceptual Decomposition of a Binary relation Algorithm. 3rd International Conference on Information Systems and Economic Intelligence (SIIE'2010), 18-20 February, Sousse. Pages **, 2010

113. Amdouni Hamida et Gammoudi Mohamed Mohsen. An Automatic Method for Ontology Construction based on Formal Concept Analysis. Proceedings of Workshop en Informatique et Applications (WIA) – February 12-14, Tozeur, Tunisia.. Pages --, 2010

114. Wady Naanaa, Maher Helaoui and Béchir El Ayeb. A decomposition method for valued CSPs. 10th International Workshop on Preferences and Soft Constraints, Saint Andrews, Scotland. Pages 143-159, 2010

115. Brée J., EL Ghali M. et Saied Ben Rached K.,. « La Star Academy libanaise : une expérience de consommation multidimensionnelle pour les enfants »,. Actes de 9ème congrès international de marketing des tendances. Pages -, 2010

116. El Ghali M., Saied Ben Rached K. et Brée J., (2010). La Star Academy comme objet de regroupement pour les enfants tunisiens : la naissance de la communauté « Star Academy ». Actes de 8ème Colloque International De L’association Tunisienne De Marketing, Sousse le 2 et 3 Avril 2010.. Pages -, 2010

117. Amine Dhraief and Abelfettah. Belghith. Suitability analysis of mobility and multihoming unification. the International Conference on Communication in Wireless Environments and Ubiquitous Systems : New Challenges (ICWUS’10), Sousse, Tunisia. Pages 1-6, 2010

118. Amine Dhraief, Zied Chedly, and Abdelfettah Belghith. The impact of mobile IPv6 on transport protocols an experimental investigation. the International Conference on Communication in Wireless Environments and Ubiquitous Systems: New Challenges (ICWUS), Sousse, Tunisia. Pages 1-6, 2010

119. Jallouli R., Khlif H. & Brahmi S.. Tunisian Call centers defy the crisis!,. 7th Conference of the Society of Asian Retailing and Distribution SARD, University of Marketing and Distribution Sciences, Chung Ang University, Seoul, Korea , 20-22 november. Pages -, 2009

120. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. Incremental Maintenance of Frequent Itemsets in Evidential Databases. the European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty 2009, Verona, Italy. Lecture Notes in Computer Science, vol. 5590. Springer Berlin/Heidelberg. Pages 457-468, 2009

121. Hermassi, H.,Rhouma, R.,Belghith, S.. A modified hyperchaos based image cryptosystem. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009

122. Rhouma, R.,Arroyo, D.,Belghith, S.. A new color image cryptosystem based on a piecewise linear chaotic map. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009

123. Hassine, A.,Rhouma, R.,Belghith, S.. A novel method for tamper detection and recovery resistant to vector quantization attak. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009

124. Sébastien Barre, Amine Dhraief, Nicolas Montavont, and Olivier Bonaventure. MipShim6 : une approche combinée pour la mobilité et la multidomiciliation. 14ème Colloque Francophone sur l’Ingénierie des Protocoles (CFIP’09), Strasbourg, France. Pages 1-8, 2009

125. Wady Naanaa, Maher Helaoui and Béchir El Ayeb. Algorithme de décomposition de domaine pour la satisfaction et l'optimisation de contraintes. Les Cinquièmes Journées Francophones de Programmation par contraintes, Orléans, France. Pages 375-384, 2009

126. Amine Dhraief and Nicolas Montavont. Rehoming decision algorithm: Design and empirical evaluation. the International Conference on Computational Science and Engineering (CSE ’09), Vancouver, Canada. Pages 464–469, 2009

127. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. Frequent Itemset Mining from Databases Including One Evidential Attribute. Tthe Second International Conference on Scalable Uncertainty Management 2008, Napoli, Italia. Lecture Notes in Artificial Intelligence, vol. 5291. Springer-Verlag. Pages 19—32, 2008

128. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. A New Algorithm for Mining Frequent Itemsets from Evidential Databases. Tthe International Conference on Information Processing and Management of Uncertainty in Knowledge-based System 2008, Malaga, Spain. Pages 1535-1542, 2008

129. Bach Tobji, M-A., Abrougui, A., Ben Yaghlane, B. GUFI: a new algorithm for General Updating of Frequent Itemsets. Tthe 11th IEEE International Conference on Computational Science and Engineering – Workshops 2008, São Paulo, Brazil. Pages 45-52, 2008

130. Bach Tobji, M-A. Comparative Study Of Data Mining Query Languages. Tthe International Conference on Applied Computer 2008, Algavre, Portugal. Pages 259-268, 2008

131. Amine Dhraief and Nicolas Montavont. Toward Mobility and Multihoming Unification- The SHIM6 Protocol : A Case Study. Proceedings of the IEEE Wi- reless Communications and Networking Conference (WCNC’08), Las Vegas, USA. Pages 2840–2845, 2008

132. Saied Ben Rached K. et EL GHALI M.,. «La Star Academy : une expérience de consommation pour les jeunes enfants et préadolescents tunisiens »,. Actes de 7ème journées normandes de la consommation, colloque consommation et société, Rouen, le 27 et 28 Mars 2008. . Pages -, 2008

133. Saied Ben Rached K. et El Ghali M.,. Le comportement des enfants et préadolescents face aux émissions de la téléréalité cas de la « Star Academy » : étude exploratoire »,. Actes de 7ème congrès international de marketing des tendances à Venise, du 17 au 19 Janvier 2008.. Pages -, 2008

134. Amine Dhraief, Tanguy Ropitault, and Nicolas Montavont. Mobility and multihoming management and strategies. the 14th Eunice Open European Summer School, Brest, France. Pages 1-8, 2008

135. Rhouma, R.,Belghith, S.. Performance of a new Chaos-based Communication Scheme: The Reduced-Delay-Masked-DCSK. European Signal Processing Conference. Pages , 2007

136. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo et Y. Slimani. EDOLA : Une nouvelle méthode d'alignement d'ontologies OWL-Lite.. 4ième Conférence en Recherche d’Information et Applications (CORIA’07), St-Etienne, France. Pages 351-367, 2007

137. Amine Dhraief, Nicolas Montavont, Romain Kuntz, and Manabu Tsukada.. E-Bicycle Demonstration on the Tour De France. the International Multi- Conference on Computing in the Global Information Technology (ICCGI’07), Guadeloupe, France. Pages 56– 56, 2007

138. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo and Y. Slimani. A new alignment method for OWL-Lite ontologies using propagation of similarity over the graph. 18th International Conference on Database and Expert Systems Applications (DEXA’07), Regensburg, Germany. Pages 524-528, 2007

139. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo et Y. Slimani. Une nouvelle méthode d'alignement et de visualisation d'ontologies OWL-Lite.. Conférence d’Extraction et Gestion des Connaissances (EGC’07), Namur, Belgique. Pages 197-198, 2007

140. Amine Dhraief, Abdelfattah Belghith, Nicolas Montavont, Jean-Marie Bonnin, and Mohamed Kassab. NS2 based simulation framework to evaluate the performance of wireless distribution systems. The 2007 Spring Simulaiton Multiconference - Volume 1, SpringSim ’07, Norfolk, Virginia, USA. Pages 264–271, 2007

141. Jallouli R.. The e-learning in Tunisia, How to succeed the implementation process?. Colloque international « les ruptures dans les sociétés d’information et l’économie de savoir», University Tunis El Manar, 15-16 february. Pages -, 2006

142. Jallouli R. et Zghal M.. Web and market orientation, The case of art product,. International Conference « Marketing in the area of ICT », Higher Institute of Management Tunis, 2- 3 november. Pages -, 2006

143. Bach Tobji, M-A., Gouider, M-S. Incremental Maintenance Of Association Rules Under Support Threshold Change. the International Conference on Applied Computer 2006, San Sebastian, Spain. Pages 91-98, 2006

144. Rhouma, R.,Safya, B.. A multidimensional map for a chaotic cryptosystem. European Signal Processing Conference. Pages , 2006

145. Belaid Ajroud Henda et Amdouni Hamida. Incremental Clustering as a Tool for CRM. Proceedings of the 5th WSEAS International Conference on Telecommunications and Informatics, Istanbul, Turkey, May 27-29. Pages 260-266, 2006

146. Saied Ben Rached K. et El Ghali M.,. «L’influence de la couleur et des personnages sur la mémorisation du packaging par les enfants : Cas des petits gâteaux et des macaronis ». Actes du 4ème colloque international de l’ATM à Tunis, du 31Mars et 1er Avril 2006.. Pages -, 2006

147. Hella Kaffel Ben Ayed and Safa Kaâbi. "Un protocole de communication pour enchères temps réel". Colloque Francophone sur l'Ingénierie des Protocoles (CFIP 2006), Tozeur, Tunisia.. Pages 12 p., 2006

148. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. A Dynamic Compiler for Embedded Java Virtual Machines. In Proceedings of the 3rd Inter- national Conference on the Principles and Practice of Programming in Java, ACM PPPJ'2004, Las Vegas, Nevada, USA, ACM Press. Pages 100-107, 2004

149. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. A Synergy between Efficient Interpretation and Fast Selective Dynamic Compilation for the Acceleration of Embedded Java Virtual Machines. In Pro- ceedings of the 3rd International Conference on the Principles and Practice of Programming in Java, ACM PPPJ'2004, Las Vegas, Nevada, USA, ACM Press. Pages 108-115, 2004

150. Ayed, H.K.B., Chihi, S.K., Kamoun, F. A Communication Architecture for Real-Time Auctions. Network Control and Engineering for QoS, Security and Mobility, {III} - {IFIP} {TC6} WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, . Pages 111--124, 2004

151. Mourad Debbabi, Lamia Ketari, and Hamdi Yahyaoui. A Java SIP Inter- face for Limited Connected Devices. In Proceedings of Wireless and Optical Communications Conference, IASTED' WOC'2003, Banff, Canada, IASTED Proceedings. Pages 560-565, 2003

152. Mourad Debbabi, Mourad Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yah- yaoui, and Sami Zhioua. Method Call Acceleration in Embedded Java Virtual Machines. In Proceedings of the International Conference on Com- putational Science, ICCS'03, Lecture Notes in Computer Science, LNCS, Volume 2659, Melbourne, Australia, Springer Verlag. Pages 750-759, 2003

153. Safa Kaâbi. Evaluation de http , de l’Email, de NNTP et de l’IRC en fonction du besoin de e-négociation. Université de printemps de DNAC 2003, Internet ambiant et très hauts débits, Tozeur, Tunisie.. Pages 8 p., 2003

154. . Transcending boundaries: Kwame Dawes’s Digital Collaborations. . Pages , 0

Articles de conférence (sans cimité de lecture)

1. Jallouli R.. Marketing Research and democracy in Tunisia. 9th international seminar of the Tunisian Association of Marketing, 8-9 April 2011, Hammamet. Pages -, 2015

2. Jallouli R.. NFC Technology, The case of cultural products »,. 6ème Journée sur les stratégies de développement culturel et création artistique : Enjeux défis et nouvelles perspectives, Laboratory of Research in Culture, New Technologies and development, Higher institute of Music, University of Tunis, 24 June. Pages -, 2010

3. Jallouli, R. Marketing & E-learning,. 5th International Conference of Tunisian association of Marketing, University El Manar, Hammamet, 13-14 April. Pages -, 2007