Abdelaziz Amara Korba

According to our database1, Abdelaziz Amara Korba authored at least 16 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Accuracy and diversity-aware multi-objective approach for random forest construction.
Expert Syst. Appl., September, 2023

5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities.
IEEE Internet Things Mag., March, 2023

Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Reinforcement Learning-Based Security Orchestration for 5G-V2X Network Slicing at Cross-Borders.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks.
Wirel. Pers. Commun., 2022

AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks.
J. Netw. Syst. Manag., 2022

2021
Detecting DDoS Attacks in IoT Environment.
Int. J. Inf. Secur. Priv., 2021

2020
Towards the Development of Realistic DoS Dataset for Intelligent Transportation Systems.
Wirel. Pers. Commun., 2020

Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI.
Comput. Secur., 2020

2018
Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices.
Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), 2018

Energy Fraud Detection in Advanced Metering Infrastructure AMI.
Proceedings of the 7th International Conference on Software Engineering and New Technologies, 2018

2016
An efficient intrusion detection and prevention framework for ad hoc networks.
Inf. Comput. Secur., 2016

Hybrid Intrusion Detection Framework for Ad hoc networks.
Int. J. Inf. Secur. Priv., 2016

Anomaly-based intrusion detection system for ad hoc networks.
Proceedings of the 7th International Conference on the Network of the Future, 2016

2014
Analysis of security attacks in AODV.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

2013
Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013


  Loading...