Badis Hammi

Orcid: 0000-0002-4470-6406

According to our database1, Badis Hammi authored at least 32 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain Technology in the Healthcare Sector: Overview and Security Analysis.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

Addressing Security Challenges in Copyright Management Applications: The Blockchain Perspective.
Proceedings of the Advanced Information Networking and Applications, 2024

An End-to-End Approach for the Detection of Phishing Attacks.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Non-Fungible Tokens: A Review.
IEEE Internet Things Mag., March, 2023

Security Threats, Countermeasures, and Challenges of Digital Supply Chains.
ACM Comput. Surv., 2023

Software Supply-Chain Security: Issues and Countermeasures.
Computer, 2023

2022
PKIs in C-ITS: Security functions, architectures and projects: A survey.
Veh. Commun., 2022

Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper.
IEEE Trans. Intell. Transp. Syst., 2022

Blockchain-Based Solution for Detecting and Preventing Fake Check Scams.
IEEE Trans. Engineering Management, 2022

Survey on smart homes: Vulnerabilities, risks, and countermeasures.
Comput. Secur., 2022

PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

A machine learning based approach for the detection of sybil attacks in C-ITS.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
A blockchain-based certificate revocation management and status verification system.
Comput. Secur., 2021

2020
A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT).
IEEE Syst. J., 2020

A secure multipath reactive protocol for routing in IoT and HANETs.
Ad Hoc Networks, 2020

2019
An empirical investigation of botnet as a service for cyberattacks.
Trans. Emerg. Telecommun. Technol., 2019

A Blockchain-based Lightweight Authentication Solution for IoT.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

2018
Detecting Botclouds at Large Scale: A Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments.
IEEE Trans. Netw. Serv. Manag., 2018

IoT technologies for smart cities.
IET Networks, 2018

Bubbles of Trust: A decentralized blockchain-based authentication system for IoT.
Comput. Secur., 2018

Total Eclipse: How To Completely Isolate a Bitcoin Peer.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

2017
ASN.1 Specification for ETSI Certificates and Encoding Performance Study.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017

Securing PKI Requests for C-ITS Systems.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2016
Clustering methods comparison: Application to source based detection of botclouds.
Proceedings of the International Conference on Security of Smart Cities, 2016

A New Service Advertisement Message for ETSI ITS Environments: CAM-Infrastructure.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

2015
Vers une détection à la source des activités malveillantes dans les clouds publics : application aux attaques de déni de service. (Toward a source based detection of malicious activities in public clouds : application to denial of service attacks).
PhD thesis, 2015

A collaborative approach for a source based detection of botclouds.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
A Factorial Space for a System-Based Detection of Botcloud Activity.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Understanding botclouds from a system perspective: A principal component analysis.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Toward a Source Detection of Botclouds: A PCA-Based Approach.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014


  Loading...