Aboubaker Lasebae

Orcid: 0000-0003-2312-9694

According to our database1, Aboubaker Lasebae authored at least 48 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Novel Bio-Inspired Bat Node Scheduling Algorithm for Dependable Safety-Critical Wireless Sensor Network Systems.
Sensors, March, 2024

2023
Efficient Design for Smart Environment Using Raspberry Pi with Blockchain and IoT (BRIoT).
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

Using Hidden Markov Chain for Improving the Dependability of Safety-Critical WSNs.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Novel group handover mechanism for Cooperative and Coordinated Mobile Femtocells technology in railway environment.
Array, 2022

2021
Heuristic Edge Server Placement in Industrial Internet of Things and Cellular Networks.
IEEE Internet Things J., 2021

Robust Continuous User Authentication System Using Long Short Term Memory Network for Healthcare.
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health Management, 2021

Cooperative and Coordinated Mobile Femtocells Technology in High-Speed Vehicular Environments - Mobility and Interference Management.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Continuous User Authentication Featuring Keystroke Dynamics Based on Robust Recurrent Confidence Model and Ensemble Learning Approach.
IEEE Access, 2020

Evaluation of Energy Consumption and Delay in Different Modes of Data Aggregation for Wireless Sensor Networks.
Proceedings of the 2020 International Conference on UK-China Emerging Technologies, 2020

Continuous User Authentication Based on Deep Neural Networks.
Proceedings of the 2020 International Conference on UK-China Emerging Technologies, 2020

2019
Implementing Fingerprint Recognition on One-Time Password Device to Enhance User Authentication.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

2018
A security framework for node-to-node communications based on the LISP architecture.
Int. J. Electron. Secur. Digit. Forensics, 2018

Intrusion Detection and Classification with Autoencoded Deep Neural Network.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

2017
Mobile femtocell utilisation in LTE vehicular environment: Vehicular penetration loss elimination and performance enhancement.
Veh. Commun., 2017

Mobility Management for Vehicular User Equipment in LTE/Mobile Femtocell Networks.
Int. J. Inf. Syst. Serv. Sect., 2017

Towards data privacy in heterogeneous cloud environments: An extension to the SANTA policy language.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

2016
A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Interference Management for Co-channel Mobile Femtocells Technology in LTE Networks.
Proceedings of the 12th International Conference on Intelligent Environments, 2016

2015
Comparison between resource reservation protocol and next steps in signalling in mobile IP networks.
IET Networks, 2015

2014
Concern level assessment: Building domain knowledge into a visual system to support network-security situation awareness.
Inf. Vis., 2014

LOC algorithm: Location-aware opportunistic forwarding by using node's approximate location.
Int. J. Pervasive Comput. Commun., 2014

An efficient traffic engineering based on multi-topology routing for future Internet.
Comput. Networks, 2014

A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP).
Proceedings of the 13th IEEE International Conference on Trust, 2014

System capacity improvement by on request channel allocation in LTE cellular network.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

Instant Channel Allocation Technique to Improve System Throughput in Joint LTE Cellular Network.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Performance Evaluation of LTE Network via Using Fixed/Mobile Femtocells.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

A Secure Framework for Communications in Heterogeneous Networks.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
An Efficient Resource Reservation for Domain Based Mobile IP Networks: Analytical Approach.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Efficient NSIS mobility support for mobile networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

The impacts of internal threats towards Routing Protocol for Low power and lossy network performance.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

On demand-based frequency allocation to mitigate interference in Femto-Macro LTE cellular network.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

From fixed to mobile femtocells in LTE systems: Issues and challenges.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

Supporting communications in the IoTs using the location/ID split protocol: A security analysis.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

Security analysis of the constrained application protocol in the Internet of Things.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

2012
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach.
Int. J. Commun. Syst., 2012

A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR.
EURASIP J. Wirel. Commun. Netw., 2012

A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks
CoRR, 2012

A survey of potential architectures for communication in heterogeneous networks.
Proceedings of the 2012 Wireless Telecommunications Symposium, 2012

Tiered approach to infer the behaviour of low entropy mobile people.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

A Formally Verified Device Authentication Protocol Using Casper/FDR.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Behavioural analysis of low entropy mobile people using contextual information.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Using aggregated RSVP in nested HMIPv6.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Recognising the Activities of Low Entropy Mobile People Using Wireless Proximity Data.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

M-Sieve: A visualisation tool for supporting network security analysts: VAST 2012 Mini Challenge 1 award: "Subject matter expert's award".
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

2011
Specification-based IDS for securing RPL from topology attacks.
Proceedings of the IFIP Wireless Days Conference 2011, 2011

2010
Security Models for Heterogeneous Networking.
Proceedings of the SECRYPT 2010, 2010

Providing Security in 4G Systems: Unveiling the Challenges.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010


  Loading...