Abdelouahid Derhab

Orcid: 0000-0002-6498-1528

Affiliations:
  • King Saud University


According to our database1, Abdelouahid Derhab authored at least 115 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Survey of Malware Analysis Using Community Detection Algorithms.
ACM Comput. Surv., February, 2024

Crowd Management Intelligence Framework: Umrah Use Case.
IEEE Access, 2024

2023
Two-Stage Intrusion Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023

PRIviLY: Private Remote Inference over fulLY connected deep networks for pervasive health monitoring with constrained client-side.
J. Inf. Secur. Appl., September, 2023

SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features.
Expert Syst. Appl., September, 2023

Internet of drones security: Taxonomies, open issues, and future directions.
Veh. Commun., February, 2023

Increasing Continuous Engagement With Open Government Data: Learning From the Saudi Experience.
J. Glob. Inf. Manag., 2023

Privacy-preserving remote deep-learning-based inference under constrained client-side environment.
J. Ambient Intell. Humaniz. Comput., 2023

2022
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques.
Comput. Electr. Eng., 2022

A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media.
IEEE Access, 2022

Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

2021
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence
Advances in Information Security 86, Springer, ISBN: 978-3-030-74663-6, 2021

BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks.
Wirel. Commun. Mob. Comput., 2021

A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things.
Sensors, 2021

A Survey on Multi-Agent Based Collaborative Intrusion Detection Systems.
J. Artif. Intell. Soft Comput. Res., 2021

TriDroid: a triage and classification framework for fast detection of mobile threats in android markets.
J. Ambient Intell. Humaniz. Comput., 2021

CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover.
Complex., 2021

Context-oriented trust computation model for industrial Internet of Things.
Comput. Electr. Eng., 2021

Detection and Prediction of Diabetes Using Data Mining: A Comprehensive Review.
IEEE Access, 2021

Tweet-Based Bot Detection Using Big Data Analytics.
IEEE Access, 2021

PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021

2020
Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering.
Wirel. Commun. Mob. Comput., 2020

Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues.
Telecommun. Syst., 2020

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.
Sensors, 2020

NSNAD: negative selection-based network anomaly detection approach with relevant feature subset.
Neural Comput. Appl., 2020

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues.
Knowl. Based Syst., 2020

Survey of false data injection in smart power grid: Attacks, countermeasures and challenges.
J. Inf. Secur. Appl., 2020

A review of privacy-preserving techniques for deep learning.
Neurocomputing, 2020

Android Malware Clustering using Community Detection on Android Packages Similarity Network.
CoRR, 2020

Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning.
Comput. Secur., 2020

Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges.
IEEE Access, 2020

Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing.
IEEE Access, 2020

MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance.
IEEE Access, 2020

CyberSecurity Attack Prediction: A Deep Learning Approach.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

An OWASP Top Ten Driven Survey on Web Application Protection Methods.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks.
J. Supercomput., 2019

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.
Sensors, 2019

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.
Secur. Commun. Networks, 2019

Trust models of internet of smart things: A survey, open issues, and future directions.
J. Netw. Comput. Appl., 2019

Blockchain Technologies for the Internet of Things: Research Issues and Challenges.
IEEE Internet Things J., 2019

Combined dynamic multi-feature and rule-based behavior for accurate malware detection.
Int. J. Distributed Sens. Networks, 2019

Reducing the effects of DoS attacks in software defined networks using parallel flow installation.
Hum. centric Comput. Inf. Sci., 2019

Accurate detection of sitting posture activities in a secure IoT based assisted living environment.
Future Gener. Comput. Syst., 2019

Toward an optimal solution against Denial of Service attacks in Software Defined Networks.
Future Gener. Comput. Syst., 2019

Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends.
CoRR, 2019

Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures.
CoRR, 2019

An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks.
IEEE Access, 2019

Formal Analysis of Language-Based Android Security Using Theorem Proving Approach.
IEEE Access, 2019

TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection.
IEEE Access, 2019

Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

An Improved Key Graph based Key Management Scheme for Smart Grid AMI systems.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

2018
Vulnerability Assessment of Cyber Security for SCADA Systems.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics Informatics, 2018

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures.
EAI Endorsed Trans. Security Safety, 2018

MalDozer: Automatic framework for android malware detection using deep learning.
Digit. Investig., 2018

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.
CoRR, 2018

VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems.
Comput. Networks, 2018

Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.
IEEE Access, 2018

A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.
IEEE Access, 2018

Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices.
Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), 2018

Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers.
Proceedings of the Machine Learning for Networking - First International Conference, 2018

2017
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness.
Wirel. Pers. Commun., 2017

Efficient and privacy-aware multi-party classification protocol for human activity recognition.
J. Netw. Comput. Appl., 2017

A Survey of Authentication Schemes in Telecare Medicine Information Systems.
J. Medical Syst., 2017

Android Malware Detection using Deep Learning on API Method Sequences.
CoRR, 2017

Wireless and mobile sensing technologies for the future Internet.
Ann. des Télécommunications, 2017

Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
Sensors, 2016

Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network.
Mob. Inf. Syst., 2016

Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.
Comput. Hum. Behav., 2016

Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2016

MMSMAC: A multi-mode medium access control protocol for Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Survey on cybersecurity issues in wireless mesh networks based eHealthcare.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Cypider: building community-based cyber-defense infrastructure for android malware detection.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Distributed Low-Latency Data Aggregation Scheduling in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2015

Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems.
Secur. Commun. Networks, 2015

Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks.
Int. J. Distributed Sens. Networks, 2015

A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Secure transfer of environmental data to enhance human decision accuracy.
Comput. Hum. Behav., 2015

Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society.
Comput. Hum. Behav., 2015

Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience.
Comput. Hum. Behav., 2015

Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks.
Proceedings of the 12th International Conference on Information Technology, 2015

Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink.
Proceedings of the 12th International Conference on Information Technology, 2015

On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications.
Proceedings of the 17th International Conference on E-health Networking, 2015

2014
Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges.
IEEE Commun. Surv. Tutorials, 2014

Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN.
Comput. Networks, 2014

Third line of defense strategy to fight against SMS-based malware in android smartphones.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Spam Trapping System: Novel security framework to fight against spam botnets.
Proceedings of the 21st International Conference on Telecommunications, 2014

Low delay and secure M2M communication mechanism for eHealthcare.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

DZ50: Energy-efficient Wireless Sensor Mote Platform for Low Data Rate Applications.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

SMART: Secure Multi-pAths Routing for wireless sensor neTworks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014

2013
Editorial.
Int. J. Commun. Networks Distributed Syst., 2013

2012
Half-Symmetric Lens based localization algorithm for wireless sensor networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Semi-structured and unstructured data aggregation scheduling in wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

MOB-TOSSIM: An Extension Framework for TOSSIM Simulator to Support Mobility in Wireless Sensor and Actuator Networks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

2011
Distributed algorithm for the actor coverage problem in WSN-based precision irrigation applications.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
A Comparison on MANETs' Service Replication Schemes: Interest versus Topology Prediction.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2010

2009
Data replication protocols for mobile ad-hoc networks: a survey and taxonomy.
IEEE Commun. Surv. Tutorials, 2009

Efficient Monitoring Mechanisms for Cooperative Storage in Mobile Ad-Hoc Networks: Detection Time and Accuracy Tradeoffs.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

2008
A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks.
IEEE Trans. Parallel Distributed Syst., 2008

A distributed mutual exclusion algorithm over multi-routing protocol for mobile <i>ad hoc</i> networks.
Int. J. Parallel Emergent Distributed Syst., 2008

Self-stabilizing algorithm for high service availability in spite of concurrent topology changes in ad hoc mobile networks.
J. Parallel Distributed Comput., 2008

Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service.
Ad Hoc Networks, 2008

SQUIRREL: Self-Organizing Qos-roUting for IntRa-flow Contention in Ad-Hoc wiRELess Networks.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008

Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2007
Mobile Networks A pull-based service replication protocol in mobile ad hoc networks.
Eur. Trans. Telecommun., 2007

Enabling ad-hoc collaboration between mobile users in the <i>MESSENGER</i> project.
Clust. Comput., 2007

2006
Ad Hoc Networks Routing Protocols and Mobility.
Int. Arab J. Inf. Technol., 2006

ELS: Energy-Aware Some-for-Some Location Service for Ad Hoc Mobile Networks.
Proceedings of the Wireless Algorithms, 2006

Ad-Hoc Collaboration Between Messengers: Operations and Incentives.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

Localized Hybrid Data Delivery Scheme using K-hop Clustering Algorithm in Ad Hoc Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

On Promoting Ad-Hoc Collaboration Among Messengers.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks.
Proceedings of the 2nd International Conference on Wireless on Demand Network Systems and Service (WONS 2005), 2005


  Loading...