Hichem Sedjelmaci

Orcid: 0000-0001-5854-1852

According to our database1, Hichem Sedjelmaci authored at least 57 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture.
J. Netw. Syst. Manag., April, 2024

When Two-Layer Federated Learning and Mean-Field Game Meet 5G and Beyond Security: Cooperative Defense Systems for 5G and Beyond Network Slicing.
IEEE Trans. Netw. Serv. Manag., February, 2024

Zero Trust Architecture Empowered Attack Detection Framework to Secure 6G Edge Computing.
IEEE Netw., January, 2024

Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles.
IEEE Trans. Veh. Technol., 2024

2023
A Distributed Zero Trust Framework for 6G RAN.
Proceedings of the NOMS 2023, 2023

2022
Guest Editorial: Managing Next-Generation Networks for Intelligent Services and Applications.
IEEE Netw., 2022

Attacks detection and decision framework based on generative adversarial network approach: Case of vehicular edge computing network.
Trans. Emerg. Telecommun. Technol., 2022

A Trusted Hybrid Learning Approach to Secure Edge Computing.
IEEE Consumer Electron. Mag., 2022

Cooperative and smart attacks detection systems in 6G-enabled Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Consortium Blockchain for Cooperative Location Privacy Preservation in 5G-Enabled Vehicular Fog Computing.
IEEE Trans. Veh. Technol., 2021

Cyber Security Framework for Vehicular Network Based on a Hierarchical Game.
IEEE Trans. Emerg. Top. Comput., 2021

Attacks and failures prediction framework for a collaborative 5G mobile network.
Computing, 2021

Cooperative attacks detection based on artificial intelligence system for 5G networks.
Comput. Electr. Eng., 2021

2020
Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems.
IEEE Netw., 2020

UAVs for traffic monitoring: A sequential game-based computation offloading/sharing approach.
Comput. Networks, 2020

Homomorphic Encryption at Work for Private Analysis of Security Logs.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Attacks Detection Approach Based on a Reinforcement Learning Process to Secure 5G Wireless Network.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

2019
A Game Theory Based Efficient Computation Offloading in an UAV Network.
IEEE Trans. Veh. Technol., 2019

Cyber Security Game for Intelligent Transportation Systems.
IEEE Netw., 2019

Incentive edge caching in software-defined internet of vehicles: A Stackelberg game approach.
Int. J. Commun. Syst., 2019

Toward a lightweight and efficient UAV-aided VANET.
Trans. Emerg. Telecommun. Technol., 2019

Recent advances on security and privacy in intelligent transportation systems (ITSs).
Ad Hoc Networks, 2019

An efficient cyber defense framework for UAV-Edge computing network.
Ad Hoc Networks, 2019

2018
Efficient Data Processing in Software-Defined UAV-Assisted Vehicular Networks: A Sequential Game Approach.
Wirel. Pers. Commun., 2018

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2018

Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution.
J. Supercomput., 2018

An efficient Intrusion Detection System against cyber-physical attacks in the smart grid.
Comput. Electr. Eng., 2018

A fuzzy logic approach for improving the tracking accuracy in indoor localisation applications.
Proceedings of the 2018 Wireless Days, 2018

Cooperative Security Framework for CBTC Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Two-Levels Verification for Secure Data Aggregation in Resource-Constrained Environments.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Security Framework for Vehicular Edge Computing Network Based on Behavioral Game.
Proceedings of the IEEE Global Communications Conference, 2018

A generic cyber defense scheme based on stackelberg game for vehicular network.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Predict and prevent from misbehaving intruders in heterogeneous vehicular networks.
Veh. Commun., 2017

An Accurate Security Game for Low-Resource IoT Devices.
IEEE Trans. Veh. Technol., 2017

Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology.
IEEE Trans. Intell. Transp. Syst., 2017

Implementing an emerging mobility model for a fleet of UAVs based on a fuzzy logic inference system.
Pervasive Mob. Comput., 2017

Computation offloading game for an UAV network in mobile edge computing.
Proceedings of the IEEE International Conference on Communications, 2017

Software-Defined heterogeneous vehicular networks: Taxonomy and architecture.
Proceedings of the 2017 Global Information Infrastructure and Networking Symposium, 2017

2016
Game model to optimally combine electric vehicles with green and non-green sources into an end-to-end smart grid architecture.
J. Netw. Comput. Appl., 2016

A distributed detection and prevention scheme from malicious nodes in vehicular networks.
Int. J. Commun. Syst., 2016

Smart grid Security: A new approach to detect intruders in a smart grid Neighborhood Area Network.
Proceedings of the 2016 International Conference on Wireless Networks and Mobile Communications, 2016

Network connectivity and area coverage for UAV fleet mobility model with energy constraint.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

A distributed prevention scheme from malicious nodes in VANETs' routing protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network?
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
An accurate and efficient collaborative intrusion detection framework to secure vehicular networks.
Comput. Electr. Eng., 2015

How to prevent cyber-attacks in inter-vehicle communication network?
Proceedings of the International Conference on Protocol Engineering, 2015

A new intrusion detection approach against lethal attacks in the smart grid: temporal and spatial based detections.
Proceedings of the 2015 Global Information Infrastructure and Networking Symposium, 2015

2014
An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks.
IEEE Internet Things J., 2014

A lightweight hybrid security framework for wireless sensor networks.
Proceedings of the IEEE International Conference on Communications, 2014

A new Intrusion Detection Framework for Vehicular Networks.
Proceedings of the IEEE International Conference on Communications, 2014

Detection and prevention from misbehaving intruders in vehicular networks.
Proceedings of the IEEE Global Communications Conference, 2014

2013
An efficient intrusion detection framework in cluster-based wireless sensor networks.
Secur. Commun. Networks, 2013

Efficient and lightweight intrusion detection based on nodes' behaviors in wireless sensor networks.
Proceedings of the Global Information Infrastructure Symposium, 2013

2012
Intrusion detection framework of cluster-based wireless sensor network.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

2011
Design and Implementation of an Algorithm for Cardiac Pathologies Detection on Mobile Phone.
Int. J. Wirel. Inf. Networks, 2011

Novel hybrid intrusion detection system for clustered wireless sensor network
CoRR, 2011


  Loading...