Bacem Mbarek

Orcid: 0000-0002-2765-0578

According to our database1, Bacem Mbarek authored at least 28 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An Effective Replica Node Detection Scheme in Internet of Things Networks.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Selected Software and Tools for Smart Grid Simulation in Research.
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023

A Survey of Intrusion Detection-Based Trust Management Approaches in IoT Networks.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
An adaptive anti-jamming system in HyperLedger-based wireless sensor networks.
Wirel. Networks, 2022

Secure and Efficient Blockchain Scheme for the Internet of Bikes.
Comput. Informatics, 2022

Precisional Detection Strategy for 6LoWPAN Networks in IoT.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

An intelligent blockchain application for emergency medical services.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Blockchain-Based Real Time Healthcare Emergency.
Proceedings of the Distributed Computing for Emerging Smart Networks, 2022

2021
Trust-Based Authentication for Smart Home Systems.
Wirel. Pers. Commun., 2021

MBS: Multilevel Blockchain System for IoT.
Pers. Ubiquitous Comput., 2021

Proactive trust classification for detection of replication attacks in 6LoWPAN-based IoT.
Internet Things, 2021

Trust-Based Detection Strategy Against Replication Attacks in IoT.
Proceedings of the Advanced Information Networking and Applications, 2021

A Real time Healthcare Tracking System based on Blockchain Application.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021

2020
An Efficient Mutual Authentication Scheme for Internet of Things.
Internet Things, 2020

Enhanced network intrusion detection system protocol for internet of things.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Blockchain-Based Access Control for IoT in Smart Home Systems.
Proceedings of the Database and Expert Systems Applications, 2020

Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

An Enhanced Blockchain-Based Data Management Scheme for Microgrids.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
ECASS: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems.
Pers. Ubiquitous Comput., 2019

SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Self-adaptive RFID Authentication for Internet of Things.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
BFAN: A Bloom Filter-Based Authentication in Wireless Sensor Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
A secure electric energy management in smart home.
Int. J. Commun. Syst., 2017

An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
Energy efficient security protocols for wireless sensor networks : SPINS vs TinySec.
Proceedings of the 2016 International Symposium on Networks, Computers and Communications, 2016

A broadcast authentication scheme in IoT environments.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Enhanced LEAP authentication delay for higher immunity against DoS attack.
Proceedings of the International Conference on Protocol Engineering, 2015

A secure authentication mechanism for resource constrained devices.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015


  Loading...