default search action
Ouajdi Korbaa
Person information
- affiliation: University of Sousse, Tunesia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Maha Nssibi, Ghaith Manita, Amit Chhabra, Seyedali Mirjalili, Ouajdi Korbaa:
Gene selection for high dimensional biological datasets using hybrid island binary artificial bee colony with chaos game optimization. Artif. Intell. Rev. 57(3): 51 (2024) - [j36]Chiheb Jamazi, Ghaith Manita, Amit Chhabra, Houssem Manita, Ouajdi Korbaa:
Mutated Aquila Optimizer for assisting brain tumor segmentation. Biomed. Signal Process. Control. 88(Part C): 105089 (2024) - [j35]Ahlem Abid, Farah Jemili, Ouajdi Korbaa:
Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques. Clust. Comput. 27(2): 2217-2238 (2024) - [j34]Farah Jemili, Rahma Meddeb, Ouajdi Korbaa:
Intrusion detection based on ensemble learning for big data classification. Clust. Comput. 27(3): 3771-3798 (2024) - [j33]Ilhem Salah, Khaled Jouini, Cyril-Alexandre Pachon, Ouajdi Korbaa:
Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound. Clust. Comput. 27(9): 13395-13405 (2024) - [j32]Raja Oueslati, Ghaith Manita, Amit Chhabra, Ouajdi Korbaa:
Chaos Game Optimization: A comprehensive study of its variants, applications, and future directions. Comput. Sci. Rev. 53: 100647 (2024) - [j31]Farah Jemili, Ouajdi Korbaa:
Active intrusion detection and prediction based on temporal big data analytics. Int. J. Knowl. Based Intell. Eng. Syst. 28(2): 389-418 (2024) - [j30]Ahmed Aljabri, Farah Jemili, Ouajdi Korbaa:
Intrusion detection in cyber-physical system using rsa blockchain technology. Multim. Tools Appl. 83(16): 48119-48140 (2024) - [c59]Imen Boujnah, Mounira Tlili, Ouajdi Korbaa:
Integrated approach of aggregate production planning and disaggregate production planning in pharmaceutical industry. CoDIT 2024: 510-515 - [c58]Zouhour Nabli, Soulef Khalfallah, Ouajdi Korbaa:
Examining Two-Stage Hybrid Flow Shop Models: Evaluating the Effects of Release Date Constraints. ICCAD 2024: 1-5 - [c57]Vian Abdulmajeed Ahmed, Khaled Jouini, Amel Tuama, Ouajdi Korbaa:
A Fusion Approach for Enhanced Remote Sensing Image Classification. VISIGRAPP (2): VISAPP 2024: 554-561 - 2023
- [j29]Maha Nssibi, Ghaith Manita, Francis Faux, Ouajdi Korbaa, Elyes Lamine:
African vultures optimization algorithm based Choquet fuzzy integral for global optimization and engineering design problems. Artif. Intell. Rev. 56(Supplement 3): 3205-3271 (2023) - [j28]Ghaith Manita, Amit Chhabra, Ouajdi Korbaa:
Efficient e-mail spam filtering approach combining Logistic Regression model and Orthogonal Atomic Orbital Search algorithm. Appl. Soft Comput. 144: 110478 (2023) - [j27]Salma Yacoubi, Ghaith Manita, Amit Chhabra, Ouajdi Korbaa, Seyedali Mirjalili:
A multi-objective Chaos Game Optimization algorithm based on decomposition and random learning mechanisms for numerical optimization. Appl. Soft Comput. 144: 110525 (2023) - [j26]Maha Nssibi, Ghaith Manita, Ouajdi Korbaa:
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey. Comput. Sci. Rev. 49: 100559 (2023) - [j25]Ilhem Salah, Khaled Jouini, Ouajdi Korbaa:
On the use of text augmentation for stance and fake news detection. J. Inf. Telecommun. 7(3): 359-375 (2023) - [j24]Ahlem Abid, Farah Jemili, Ouajdi Korbaa:
Distributed deep learning approach for intrusion detection system in industrial control systems based on big data technique and transfer learning. J. Inf. Telecommun. 7(4): 513-541 (2023) - [j23]Salma Yacoubi, Ghaith Manita, Hamida Amdouni, Seyedali Mirjalili, Ouajdi Korbaa:
A modified multi-objective slime mould algorithm with orthogonal learning for numerical association rules mining. Neural Comput. Appl. 35(8): 6125-6151 (2023) - [j22]Rahma Meddeb, Farah Jemili, Bayrem Triki, Ouajdi Korbaa:
A deep learning-based intrusion detection approach for mobile Ad-hoc network. Soft Comput. 27(14): 9425-9439 (2023) - [c56]Salma Yacoubi, Ghaith Manita, Ouajdi Korbaa:
Mining Association Rules for a Sustainable Supply Chain Using Improved Multiobjective Crystal Structure Algorithm. CoDIT 2023: 889-894 - [c55]Mohamed Ala Eddine Bahri, Farah Jemili, Ouajdi Korbaa:
Towards Deep Learning and Blockchain-based Intrusion Detection System. CW 2023: 357-364 - [c54]Amal Abid, Mounira Tlili, Faten Maaroufi, Ouajdi Korbaa:
A management analysis tool to support healthcare resource planning in public hospitals during the covid-19 pandemic: A case study. INISTA 2023: 1-6 - [c53]Imen Boujnah, Mounira Tlili, Ouajdi Korbaa:
Hierarchical production planning frameworks for multi product multi stage batch plants. INISTA 2023: 1-6 - 2022
- [j21]Eric Sanchez, Elsa Paukovics, Lilia Cheniti-Belcadhi, Ghada A. El Khayat, Bilal Said, Ouajdi Korbaa:
What do you mean by learning lab? Educ. Inf. Technol. 27(4): 4501-4520 (2022) - [j20]Mohamed Salim Amri Sakhri, Mounira Tlili, Ouajdi Korbaa:
A memetic algorithm for the inventory routing problem. J. Heuristics 28(3): 351-375 (2022) - [j19]Asma Fejjari, Karim Saheb Ettabaâ, Ouajdi Korbaa:
Improved superpixels generation algorithm for qualified graph-based technique. Int. Arab J. Inf. Technol. 19(6): 949-955 (2022) - [c52]Salah Gontara, Amine Boufaied, Ouajdi Korbaa:
Impact of EIP-1559 on Transactions in the Ethereum Blockchain and Its Rollups. CRiSIS 2022: 114-126 - [c51]Ilhem Salah, Khaled Jouini, Ouajdi Korbaa:
Augmentation-Based Ensemble Learning for Stance and Fake News Detection. ICCCI (CCIS Volume) 2022: 29-41 - [c50]Ahlem Abid, Farah Jemili, Ouajdi Korbaa:
Distributed Architecture of an Intrusion Detection System in Industrial Control Systems. ICCCI (CCIS Volume) 2022: 472-484 - [c49]Syrine Belguith, Soulef Khalfallah, Ouajdi Korbaa:
A Decision Support System Based Vehicle Ontology for Solving VRPs. ISDA (4) 2022: 194-203 - [c48]Mohamed Wajdi Ouertani, Ghaith Manita, Ouajdi Korbaa:
Automatic Data Clustering Using Hybrid Chaos Game Optimization with Particle Swarm Optimization Algorithm. KES 2022: 2677-2687 - [c47]Salma Yacoubi, Ghaith Manita, Ouajdi Korbaa:
A Multiobjective Crystal Optimization-based association rule mining enhanced with TOPSIS for predictive maintenance analysis. KES 2022: 2782-2793 - 2021
- [j18]Khaoula Ben Abdellafou, Hatem Hadda, Ouajdi Korbaa:
Heuristic algorithms for scheduling intrees on m machines with non-availability constraints. Oper. Res. 21(1): 55-71 (2021) - [j17]Rafika Thabet, Dominik Bork, Amine Boufaied, Elyes Lamine, Ouajdi Korbaa, Hervé Pingaud:
Risk-aware business process management using multi-view modeling: method and tool. Requir. Eng. 26(3): 371-397 (2021) - [j16]Rafika Thabet, Dominik Bork, Amine Boufaied, Elyes Lamine, Ouajdi Korbaa, Hervé Pingaud:
Correction to: Risk‑aware business process management using multi‑view modeling: method and tool. Requir. Eng. 26(4): 583 (2021) - [j15]Mohamed Wajdi Ouertani, Ghaith Manita, Ouajdi Korbaa:
Chaotic lightning search algorithm. Soft Comput. 25(3): 2039-2055 (2021) - [c46]Mohamed Salim Amri Sakhri, Mounira Tlili, Ouajdi Korbaa:
An Exact Algorithm for A Multi-Period Inventory Routing Problem with Lateral Transshipment. AICCSA 2021: 1-8 - [c45]Khaled Jouini, Mohamed Hédi Maâloul, Ouajdi Korbaa:
Real-Time, CNN-Based Assistive Device for Visually Impaired People. CISP-BMEI 2021: 1-6 - [c44]Maha Nssibi, Ghaith Manita, Ouajdi Korbaa:
Binary Giza Pyramids Construction For Feature Selection. KES 2021: 676-687 - [c43]Mohamed Wajdi Ouertani, Ghaith Manita, Ouajdi Korbaa:
Improved Genetic Algorithm for Electric Vehicle Charging Station Placement. KES-IDT 2021: 37-57 - [c42]Syrine Belguith, Soulef Khalfallah, Ouajdi Korbaa:
An Ontology for Modeling Vehicle Routing Problems. SoMeT 2021: 281-292 - 2020
- [j14]Ghaith Manita, Ouajdi Korbaa:
Binary Political Optimizer for Feature Selection Using Gene Expression Data. Comput. Intell. Neurosci. 2020: 8896570:1-8896570:14 (2020) - [c41]Rafika Thabet, Elyes Lamine, Amine Boufaied, Dominik Bork, Ouajdi Korbaa, Hervé Pingaud:
Formal Specification, Implementation, and Evaluation of the AdoBPRIM Approach. AMCIS 2020 - [c40]Marwa Elayni, Farah Jemili, Ouajdi Korbaa, Basel Solaiman:
A new features vector matching for big heterogeneous data in intrusion detection context. ATSIP 2020: 1-5 - [c39]Rafika Thabet, Amine Boufaied, Elyes Lamine, Dominik Bork, Ouajdi Korbaa, Hervé Pingaud:
AdoBPRIM: Towards a New Healthcare Risk-aware Business Process Management Tool. HEALTHINF 2020: 498-505 - [c38]Asma Fejjari, Karim Saheb Ettabaâ, Ouajdi Korbaa:
Hyperspectral Feature Extraction by Tensor Modeling and Intrinsic Decomposition. KES 2020: 561-571 - [c37]Asma Fejjari, Ouajdi Korbaa, Karim Saheb Ettabaâ:
Intrinsic Decomposition based Tensor Modeling Scheme for Hyperspectral Target Detection. SMC 2020: 2541-2546
2010 – 2019
- 2019
- [j13]Hajer Lahdhiri, Khaoula Ben Abdellafou, Okba Taouali, Majdi Mansouri, Ouajdi Korbaa:
New online kernel method with the Tabu search algorithm for process monitoring. Trans. Inst. Meas. Control 41(10): 2687-2698 (2019) - [c36]Rahma Meddeb, Bayrem Triki, Farah Jemili, Ouajdi Korbaa:
Dataset for Intrusion Detection in Mobile Ad-Hoc Networks. ISDA 2019: 24-34 - [c35]Mondher Essid, Farah Jemili, Ouajdi Korbaa:
Distributed Architecture of Snort IDS in Cloud Environment. ISDA 2019: 100-111 - [c34]Marwa Elayni, Farah Jemili, Ouajdi Korbaa, Basel Solaiman:
Big Data Processing for Intrusion Detection System Context: A Review. ISDA 2019: 122-131 - [c33]Sana Benzarti, Bayrem Triki, Ouajdi Korbaa:
Drone Authentication Using ID-Based Signcryption in LoRaWAN Network. ISDA 2019: 205-216 - [c32]Rahma Meddeb, Farah Jemili, Bayrem Triki, Ouajdi Korbaa:
Anomaly-based Behavioral Detection in Mobile Ad-Hoc Networks⁎. KES 2019: 77-86 - [c31]Salah Gontara, Amine Boufaied, Ouajdi Korbaa:
A Unified approach for Selecting Probes and Probing Stations for Fault Detection and Localization in Computer Networks. SMC 2019: 2071-2076 - [c30]Salah Gontara, Amine Boufaied, Ouajdi Korbaa:
Fault Localization Algorithm in Computer Networks Based on the Boolean Particle Swarm Optimization. SMC 2019: 4347-4352 - 2018
- [j12]Olfa Fakhfakh, Armand Toguyéni, Ouajdi Korbaa:
On-line fault diagnosis of FMS based on flows analysis. J. Intell. Manuf. 29(8): 1891-1904 (2018) - [c29]Salah Gontara, Amine Boufaied, Ouajdi Korbaa:
Routing the Pi-Containers in the Physical Internet using the PI-BGP Protocol. AICCSA 2018: 1-8 - [c28]Rafika Thabet, Elyes Lamine, Amine Boufaied, Ouajdi Korbaa, Hervé Pingaud:
Towards a Risk-Aware Business Process Modelling Tool Using the ADOxx Platform. CAiSE Workshops 2018: 235-248 - [c27]Mohamed Salim Amri Sakhri, Mounira Tlili, Hamid Allaoui, Ouajdi Korbaa:
Order Crossover for the Inventory Routing Problem. ESANN 2018 - [c26]Neji Kouka, Tarek Guesmi, Ouajdi Korbaa:
Performance Evaluation of IEEE 802.15.6 Channel Access Procedure in WBAN. FiCloud 2018: 162-168 - [c25]Asma Fejjari, Karim Saheb Ettabaâ, Ouajdi Korbaa:
Modified Graph-Based Algorithm for Efficient Hyperspectral Feature Extraction. ISCIS 2018: 87-95 - [c24]Zouhour Nabli, Soulef Khalfallah, Ouajdi Korbaa:
A two-stage hybrid flow shop problem with dedicated machine and release date. KES 2018: 214-223 - [c23]Asma Fejjari, Karim Saheb Ettabaâ, Ouajdi Korbaa:
Fast Spatial Spectral Schroedinger Eigenmaps algorithm for hyperspectral feature extraction. KES 2018: 656-664 - [c22]Asma Fejjari, Karim Saheb Ettabaâ, Ouajdi Korbaa:
Feature Extraction Techniques for Hyperspectral Images Classification. SOFA (2) 2018: 174-188 - [c21]Rahma Meddeb, Bayrem Triki, Farah Jemili, Ouajdi Korbaa:
An Effective IDS Against Routing Attacks on Mobile Ad-Hoc Networks. SoMeT 2018: 201-214 - [c20]Sana Benzarti, Bayrem Triki, Ouajdi Korbaa:
Privacy Preservation and Drone Authentication Using ID-Based Signcryption. SoMeT 2018: 226-239 - 2017
- [j11]Chokri Lajimi, Amine Boufaied, Ouajdi Korbaa:
Assessing and modelling transport delays risk in supply chains. Int. J. Adv. Oper. Manag. 9(4): 225-245 (2017) - [c19]Mohamed Hedi Ghaddab, Khaled Jouini, Ouajdi Korbaa:
Fast and Accurate Fingerprint Matching Using Expanded Delaunay Triangulation. AICCSA 2017: 751-758 - [c18]Asma Fejjari, Karim Saheb Ettabaâ, Ouajdi Korbaa:
Modified Schroedinger Eigenmap Projections Algorithm for Hyperspectral Imagery Classification. AICCSA 2017: 809-814 - [c17]Mohamed Salim Amri Sakhri, Mounira Tlili, Ouajdi Korbaa:
A Hybrid Genetic Algorithm for the Inventory Routing Problem. AICCSA 2017: 987-994 - [c16]Zouhour Nabli, Soulef Khalfallah, Ouajdi Korbaa:
Heuristics for the Hybrid Flow Shop Scheduling Problem with Parallel Machines at the First Stage and Two Dedicated Machines at the Second Stage. ISDA 2017: 693-701 - [c15]Imen Gaied, Farah Jemili, Ouajdi Korbaa:
Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: Comparative study. SoftCOM 2017: 1-6 - 2016
- [c14]Imen Gaied, Farah Jemili, Ouajdi Korbaa:
A Genetic-Fuzzy Classification Approach to Improve High-Dimensional Intrusion Detection System. ISDA 2016: 319-329 - [c13]Khaoula Ben Abdellafou, Hatem Hadda, Ouajdi Korbaa:
Heuristic for Scheduling Intrees on m Machines with Non-availability Constraints. ISDA 2016: 384-393 - [c12]Khaoula Ben Abdellafou, Ouajdi Korbaa:
Makespan minimization for two parallel machines with unavailability constraints. SMC 2016: 601-606 - [c11]Amine Boufaied, Rafika Thabet, Ouajdi Korbaa:
Dynamic delay risk assessing using cost-based FMEA for transportation systems. SMC 2016: 1057-1062 - [c10]Faten Maaroufi, Hervé Camus, Ouajdi Korbaa:
A mixed integer linear programming approach to schedule the operating room. SMC 2016: 3882-3887 - [c9]Zouhour Nabli, Ouajdi Korbaa, Soulef Khalfallah:
Mathematical programming formulations for hybrid flow shop scheduling with parallel machines at the first stage and two dedicated machines at the second stage. SMC 2016: 4389-4393 - 2015
- [c8]Imen Gaied, Farah Jemili, Ouajdi Korbaa:
Intrusion detection based on Neuro-Fuzzy classification. AICCSA 2015: 1-8 - 2013
- [j10]Safa Saidane, Mohamed Zied Babai, M. Salah Aguir, Ouajdi Korbaa:
On the performance of the base-stock inventory system under a compound Erlang demand distribution. Comput. Ind. Eng. 66(3): 548-554 (2013) - [c7]Ghaith Manita, Ouajdi Korbaa:
A min-max ANT colony algorithm for machine loop layout problem. MED 2013: 741-747 - [c6]Ghaith Manita, Ouajdi Korbaa:
A Hybrid Genetic Algorithm for Solving Machine Layout Problem with Consideration of Industrial Constraints. MIM 2013: 2039-2044
2000 – 2009
- 2009
- [j9]Meriam Kefi, Khaled Ghédira, Ouajdi Korbaa, Pascal Yim:
Container handling using multi-agent architecture. Int. J. Intell. Inf. Database Syst. 3(3): 338-360 (2009) - 2008
- [j8]Tienté Hsu, Ouajdi Korbaa, Rémy Dupas, Gilles Goncalves:
Cyclic scheduling for F.M.S.: Modelling and evolutionary solving approach. Eur. J. Oper. Res. 191(2): 464-484 (2008) - 2007
- [j7]Benoit Trouillet, Ouajdi Korbaa, Jean-Claude Gentina:
Formal Approach of FMS Cyclic Scheduling. IEEE Trans. Syst. Man Cybern. Part C 37(1): 126-137 (2007) - [c5]Meriam Kefi, Ouajdi Korbaa, Khaled Ghédira, Pascal Yim:
Container Handling Using Multi-agent Architecture. KES-AMSTA 2007: 685-693 - 2006
- [j6]Etienne Craye, Éric Niel, Ouajdi Korbaa:
Introduction. Math. Comput. Simul. 70(5-6): 247-249 (2006) - [j5]Jong-Kun Lee, Ouajdi Korbaa:
Scheduling analysis of FMS: An unfolding timed Petri nets approach. Math. Comput. Simul. 70(5-6): 419-432 (2006) - 2004
- [j4]Michel Bigand, Ouajdi Korbaa, Jean Pierre Bourey:
Integration of FMS performance evaluation models using patterns for an information system design. Comput. Ind. Eng. 46(4): 625-637 (2004) - [j3]Jong-Kun Lee, Ouajdi Korbaa:
Modeling and scheduling of ratio-driven FMS using unfolding time Petri nets. Comput. Ind. Eng. 46(4): 639-653 (2004) - [c4]Olfa Belkahla Driss, Pascal Yim, Ouajdi Korbaa, Khaled Ghédira:
Reachability search in timed Petri nets using constraint programming. SMC (5) 2004: 4923-4928 - [c3]Ouajdi Korbaa, Pascal Yim:
Container assignment to stock in a fluvial port. SMC (7) 2004: 6180-6185 - 2001
- [c2]Jong-Kun Lee, Ouajdi Korbaa, Jean-Claude Gentina:
Modeling and analysis of cycle schedule using Petri nets unfolding. SMC 2001: 2611-2616 - 2000
- [j2]Ouajdi Korbaa, Pascal Yim, Jean-Claude Gentina:
Solving Transient Scheduling Problems with Constraint Programming. Eur. J. Control 6(6): 511-520 (2000) - [j1]Pierre Lopez, Hassane Alla, Ouajdi Korbaa, Pascal Yim, Jean-Claude Gentina:
Discussion on: 'Solving Transient Scheduling Problems with Constraint Programming' by O. Korbaa, P. Yim, and J.-C. Gentina. Eur. J. Control 6(6): 521-524 (2000)
1990 – 1999
- 1999
- [c1]Ouajdi Korbaa, Pascal Yim, Jean-Claude Gentina:
Solving transient scheduling problem for cyclic production using timed Petri nets and constraint programming. ECC 1999: 3938-3945
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint