Chafika Benzaid

Orcid: 0000-0001-5841-2014

Affiliations:
  • University of Sciences and Technology Houari Boumediene, Algeria


According to our database1, Chafika Benzaid authored at least 55 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Encryption as a Service for IoT: Opportunities, Challenges, and Solutions.
IEEE Internet Things J., 2024

2023
AI/ML for beyond 5G systems: Concepts, technology enablers & solutions.
Comput. Networks, December, 2023

Security in Cloud-Native Services: A Survey.
J. Cybersecur. Priv., October, 2023

Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023

3D-PM: A ML-powered Probabilistic Detection of DDoS Attacks in P4 Switches.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023

Linear Complexity for k-Coverage Sensor Redundancy Determination in IoT.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023

Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments.
Proceedings of the IEEE Global Communications Conference, 2023

Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture.
Proceedings of the IEEE Global Communications Conference, 2023

Enhancing 5G Network Slicing: Slice Isolation Via Actor-Critic Reinforcement Learning with Optimal Graph Features.
Proceedings of the IEEE Global Communications Conference, 2023

Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection.
Proceedings of the IEEE Global Communications Conference, 2023

A Deep Transfer Learning-Powered EDoS Detection Mechanism for 5G and Beyond Network Slicing.
Proceedings of the IEEE Global Communications Conference, 2023

2022
AI-Based Autonomic and Scalable Security Management Architecture for Secure Network Slicing in B5G.
IEEE Netw., 2022

Deep-Ensemble-Learning-Based GPS Spoofing Detection for Cellular-Connected UAVs.
IEEE Internet Things J., 2022

Deep Learning for GPS Spoofing Detection in Cellular Enabled Unmanned Aerial Vehicle Systems.
CoRR, 2022

Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G.
Comput. Networks, 2022

Transfer Learning based GPS Spoofing Detection for Cellular-Connected UAVs.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

TopoTrust: A Blockchain-based Trustless and Secure Topology Discovery in SDNs.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

2021
Trust in 5G and Beyond Networks.
IEEE Netw., 2021

Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Distributed AI-based Security for Massive Numbers of Network Slices in 5G & Beyond Mobile Systems.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

2020
AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?
IEEE Netw., 2020

ZSM Security: Threat Surface and Best Practices.
IEEE Netw., 2020

AI-Driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research Directions.
IEEE Netw., 2020

Robust Self-Protection Against Application-Layer (D)DoS Attacks in SDN Environment.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Energy-aware Collision Avoidance stochastic Optimizer for a UAVs set.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs.
Proceedings of the IEEE Global Communications Conference, 2020


2019
Connectivity-aware Relay Node Deployment in Grid-based Wireless Sensor Networks.
Proceedings of the 2019 Wireless Days, 2019

2018
RTCP: a redundancy aware topology control protocol for wireless sensor networks.
Int. J. Inf. Commun. Technol., 2018

Energy and Delay Aware Physical Collision Avoidance in Unmanned Aerial Vehicles.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks.
Comput. Networks, 2017

Efficient clock synchronization for clustered wireless sensor networks.
Ad Hoc Networks, 2017

Efficient offloading mechanism for UAVs-based value added services.
Proceedings of the IEEE International Conference on Communications, 2017

2016
MS-WMSN: service-oriented planning tool for wireless multimedia monitoring services.
Int. J. Inf. Commun. Technol., 2016

Fast authentication in wireless sensor networks.
Future Gener. Comput. Syst., 2016

Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networks.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

Intelligent detection of MAC spoofing attack in 802.11 network.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

2015
Virtualization and Cyber Security: Arming Future Security Practitioners.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

ARP Cache Poisoning Mitigation and Forensics Investigation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

LSEA: Light Weight Sector Eligibility Algorithm for k-Coverage in Wireless Sensor Networks.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

Sleep scheduling with predictive coverage redundancy check in wireless sensor networks.
Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), 2015

A Low-Complex Coverage Eligibility Algorithm For Wireless Sensor Networks.
Proceedings of the IPAC '15: International Conference on Intelligent Information Processing, 2015

2014
An Enhanced Secure Pairwise Broadcast Time Synchronization Protocol in Wireless Sensor Networks.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

An efficient clock synchronization protocol for wireless sensor networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

2012
Fast verification of an ID-based signature scheme for broadcast authentication inwireless sensor networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

2011
Secure pairwise broadcast time synchronization in wireless sensor networks.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2008
BMobi_Causal: a causal broadcast protocol in mobile dynamic groups.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

An Optimal Causal Broadcast Protocol in Mobile Dynamic Groups.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

A causal multicast protocol for dynamic groups in cellular networks.
Proceedings of the 2008 Euro American conference on Telematics and Information Systems, 2008

2005
Mobi_Causal: a protocol for causal message ordering in mobile computing systems.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005


  Loading...