Abdelouahid Derhab

According to our database1, Abdelouahid Derhab authored at least 69 papers between 2005 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 



On csauthors.net:


A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks.
The Journal of Supercomputing, 2019

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.
Sensors, 2019

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.
Security and Communication Networks, 2019

Trust models of internet of smart things: A survey, open issues, and future directions.
J. Network and Computer Applications, 2019

Blockchain Technologies for the Internet of Things: Research Issues and Challenges.
IEEE Internet of Things Journal, 2019

Reducing the effects of DoS attacks in software defined networks using parallel flow installation.
HCIS, 2019

Accurate detection of sitting posture activities in a secure IoT based assisted living environment.
Future Generation Comp. Syst., 2019

Toward an optimal solution against Denial of Service attacks in Software Defined Networks.
Future Generation Comp. Syst., 2019

Formal Analysis of Language-Based Android Security Using Theorem Proving Approach.
IEEE Access, 2019

TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection.
IEEE Access, 2019

Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Vulnerability Assessment of Cyber Security for SCADA Systems.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics and Informatics, 2018

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures.
ICST Trans. Security Safety, 2018

MalDozer: Automatic framework for android malware detection using deep learning.
Digital Investigation, 2018

VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems.
Computer Networks, 2018

Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.
IEEE Access, 2018

A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.
IEEE Access, 2018

Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices.
Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), 2018

Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers.
Proceedings of the Machine Learning for Networking - First International Conference, 2018

MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness.
Wireless Personal Communications, 2017

Efficient and privacy-aware multi-party classification protocol for human activity recognition.
J. Network and Computer Applications, 2017

A Survey of Authentication Schemes in Telecare Medicine Information Systems.
J. Medical Systems, 2017

Wireless and mobile sensing technologies for the future Internet.
Annales des Télécommunications, 2017

Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
Sensors, 2016

Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network.
Mobile Information Systems, 2016

Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.
Computers in Human Behavior, 2016

Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2016

MMSMAC: A multi-mode medium access control protocol for Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Survey on cybersecurity issues in wireless mesh networks based eHealthcare.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Cypider: building community-based cyber-defense infrastructure for android malware detection.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Distributed Low-Latency Data Aggregation Scheduling in Wireless Sensor Networks.
TOSN, 2015

Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems.
Security and Communication Networks, 2015

Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks.
IJDSN, 2015

A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks.
IJDSN, 2015

Secure transfer of environmental data to enhance human decision accuracy.
Computers in Human Behavior, 2015

Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society.
Computers in Human Behavior, 2015

Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience.
Computers in Human Behavior, 2015

On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications.
Proceedings of the 17th International Conference on E-health Networking, 2015

Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks.
IJDSN, 2014

Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges.
IEEE Communications Surveys and Tutorials, 2014

Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN.
Computer Networks, 2014

Third line of defense strategy to fight against SMS-based malware in android smartphones.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Spam Trapping System: Novel security framework to fight against spam botnets.
Proceedings of the 21st International Conference on Telecommunications, 2014

Low delay and secure M2M communication mechanism for eHealthcare.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

DZ50: Energy-efficient Wireless Sensor Mote Platform for Low Data Rate Applications.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

SMART: Secure Multi-pAths Routing for wireless sensor neTworks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014

IJCNDS, 2013

Half-Symmetric Lens based localization algorithm for wireless sensor networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Semi-structured and unstructured data aggregation scheduling in wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

MOB-TOSSIM: An Extension Framework for TOSSIM Simulator to Support Mobility in Wireless Sensor and Actuator Networks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

Distributed algorithm for the actor coverage problem in WSN-based precision irrigation applications.
Proceedings of the Distributed Computing in Sensor Systems, 2011

Data replication protocols for mobile ad-hoc networks: a survey and taxonomy.
IEEE Communications Surveys and Tutorials, 2009

Efficient Monitoring Mechanisms for Cooperative Storage in Mobile Ad-Hoc Networks: Detection Time and Accuracy Tradeoffs.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks.
IEEE Trans. Parallel Distrib. Syst., 2008

A distributed mutual exclusion algorithm over multi-routing protocol for mobile ad hoc networks.
IJPEDS, 2008

Self-stabilizing algorithm for high service availability in spite of concurrent topology changes in ad hoc mobile networks.
J. Parallel Distrib. Comput., 2008

Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service.
Ad Hoc Networks, 2008

SQUIRREL: Self-Organizing Qos-roUting for IntRa-flow Contention in Ad-Hoc wiRELess Networks.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008

Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

Mobile Networks A pull-based service replication protocol in mobile ad hoc networks.
European Transactions on Telecommunications, 2007

Enabling ad-hoc collaboration between mobile users in the MESSENGER project.
Cluster Computing, 2007

Ad Hoc Networks Routing Protocols and Mobility.
Int. Arab J. Inf. Technol., 2006

ELS: Energy-Aware Some-for-Some Location Service for Ad Hoc Mobile Networks.
Proceedings of the Wireless Algorithms, 2006

Ad-Hoc Collaboration Between Messengers: Operations and Incentives.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

Localized Hybrid Data Delivery Scheme using K-hop Clustering Algorithm in Ad Hoc Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

On Promoting Ad-Hoc Collaboration Among Messengers.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks.
Proceedings of the 2nd International Conference on Wireless on Demand Network Systems and Service (WONS 2005), 2005