Amel Meddeb-Makhlouf

Orcid: 0000-0003-0551-4927

According to our database1, Amel Meddeb-Makhlouf authored at least 53 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
CADS-ML/DL: efficient cloud-based multi-attack detection system.
Int. J. Inf. Sec., December, 2023

Layer-based cooperation for intrusion detection in mobile cloud environment.
Int. J. Mob. Commun., 2023

QTc-Based Machine Learning Analysis of COVID-19 and Post-COVID-19 Patients.
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023

COVID-19 Patient Secure Classification Based on ANN and Risk Analysis.
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023

Blockchain-Based Trust Management for IoMT Environment.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2023

Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Fog-cloud distributed intrusion detection and cooperation.
Trans. Emerg. Telecommun. Technol., 2022

Secure IoT Assistant-Based System for Alzheimer's Disease.
IEEE Access, 2022

Review of Authentication with Privacy-preserving Schemes for 5G-enabled Vehicular Networks.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Reputation management for trusted VCC architecture.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Robust Jamming Attacks Detection Algorithm for Healthcare Applications.
Proceedings of the 19th International Multi-Conference on Systems, Signals & Devices, 2022

2021
Secure and Efficient Video Transmission in VANET.
Int. J. Commun. Networks Inf. Secur., 2021

Secure architecture for Cloud/Fog computing based on firewalls and controllers.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

SACP: Secure Access Control Protocol.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

2020
A Learning based Secure Anomaly Detection for Healthcare Applications.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Learning-Based Evaluation of Routing Protocol in Vehicular Network Using WEKA.
Proceedings of the Network and Parallel Computing, 2020

Trust-Based NOMA for Resource Allocation in Vehicular Communications.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Comparative Study of Classification Algorithms for Cloud IDS using NSL-KDD Dataset in WEKA.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Securing a power management chain for Smart Grids.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

An Embedded ANN Raspberry PI for Inertial Sensor Based Human Activity Recognition.
Proceedings of the Impact of Digital Technologies on Public Health in Developed and Developing Countries, 2020

Intrusion Detection based on Correlation of Multiple Health Signals in WBSN.
Proceedings of the 17th International Multi-Conference on Systems, Signals & Devices, 2020

2019
DVF-fog: distributed virtual firewall in fog computing based on risk analysis.
Int. J. Sens. Networks, 2019

OAP-WMN: optimised and secure authentication protocol for wireless mesh networks.
Int. J. Secur. Networks, 2019

SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications.
Int. J. Inf. Sec., 2019

TACRM: trust access control and resource management mechanism in fog computing.
Hum. centric Comput. Inf. Sci., 2019

Dynamic Scheduling Algorithm based on Priority Assignment for LTE-V2X vehicular Networks.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Intrusion cancellation for anomaly detection in healthcare applications.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Priority based Safety Management and Slot Reservation for Authenticated Vehicle.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Service Management Algorithm-based on Security Monitoring Mechanism for Fog IoT Users in Fog Networks.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Improved Mutual Authentication in VANETs.
Ad Hoc Sens. Wirel. Networks, 2018

Correlation for efficient anomaly detection in medical environment.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Multilevel Authentication Protocol (MAP) for Human Safety in VANET.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Risk-based Decision for a Distributed and Cooperative network policy in Cloud Computing.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environment.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Model of Role-Risk Based Intrusion Prevention for Cloud Environment.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Distributed Firewall and Controller for Mobile Cloud Computing.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

A Trust-based Access Control Scheme for e-Health Cloud.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

Distributed and Cooperative firewall/controller in cloud environments.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Multi-layer Cooperative Intrusion Detection System for Cloud Environment.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

An Enhanced Multilevel Authentication Protocol for VANETs.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2015
A MSCTP-Based Authentication Protocol: MSCTPAP.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

Error/Intrusion Target Identification on the Physical Layer over a BICM Scheme.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
A SCTP-based Authentication Protocol: SCTPAP.
Proceedings of the DCNET 2014, 2014

A Robust Stream Control Transmission Protocol (SCTP)-Based Authentication Protocol.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

2009
Multilayer Statistical Intrusion Detection in Wireless Networks.
EURASIP J. Adv. Signal Process., 2009

2007
Global intrusion detection and tolerance in networked systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Radio-based Cooperation Scheme for DDoS Detection.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

Radio-Based Cooperation for Wireless Intrusion Detection.
Proceedings of the Global Communications Conference, 2007

Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2005
New correlation method for an efficient intrusion detection system.
Proceedings of the 12th IEEE International Conference on Electronics, 2005


  Loading...