Marianne Azer

Orcid: 0000-0002-8068-5120

According to our database1, Marianne Azer authored at least 46 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.
Cryptogr., March, 2024

A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization.
Inf., 2024

2023
IoT Vulnerabilities and Attacks: SILEX Malware Case Study.
Symmetry, November, 2023

A lightweight-X-authentication protocol over automotive gateway.
Comput. Electr. Eng., September, 2023

Analysis of ICS and SCADA Systems Attacks Using Honeypots.
Future Internet, July, 2023

Intrusion Detection for Electric Vehicle Charging Systems (EVCS).
Algorithms, February, 2023

NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack.
IEEE Access, 2023

2022
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs.
IEEE Trans. Cogn. Commun. Netw., 2022

Segmented OTA Platform Over ICN Vehicular Networks.
Mob. Networks Appl., 2022

Survey and taxonomy of information-centric vehicular networking security attacks.
Ad Hoc Networks, 2022

Vehicle to Pedestrian Systems: Survey, Challenges and Recent Trends.
IEEE Access, 2022

Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks.
IEEE Access, 2022

Malware Detection Techniques.
Proceedings of the 4th Novel Intelligent and Leading Emerging Sciences Conference, 2022

2021
Towards Safer Roads: An Efficient VANET-based Pedestrian Protection Scheme.
Proceedings of the International Conference on Communications, 2021

2020
Survey of Code Reuse Attacks and Comparison of Mitigation Techniques.
Proceedings of the ICSIE 2020: 2020 9th International Conference on Software and Information Engineering, 2020

Vehicle Software Update over ICN Architectures.
Proceedings of the Ad Hoc Networks - 12th EAI International Conference, 2020

2019
Cyber Threats and Policies for Industrial Control Systems.
Proceedings of the International Conference on Smart Applications, 2019

2018
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks.
Proceedings of the 2018 Wireless Days, 2018

Detection and Countermeasures of DDoS Attacks in Cloud Computing.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Tunnel-Based EAP Effective Security Attacks WPA2 Enterprise Evaluation and Proposed Amendments.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

SigPloit: A New Signaling Exploitation Framework.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

User Privacy in Legacy Mobile Network Protocols.
Proceedings of the 3rd International Conference on System Reliability and Safety, 2018

Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Cloud computing security: challenges and future trends.
Int. J. Comput. Appl. Technol., 2017

2016
Lightweight Authentication Protocol Deployment over FlexRay.
Proceedings of the 10th International Conference on Informatics and Systems, 2016

2015
A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks.
Secur. Commun. Networks, 2015

2014
Cluster Head election in Wireless Sensor Networks.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2013
Hardware Advancements Effects on MANET Development, Application and Research.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

Security access control research trends.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Performance evaluation of AODV under dos attacks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

A Novel Proximity Based Trust Model for Opportunistic Networks.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Organizational Risk Assessment Based on Attacks Repetition.
Proceedings of the Seventh International Conference on Availability, 2012

Janitor, Certificate and Jury (JCJ) Trust Scheme for Wireless Ad-hoc Networks.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Cultural Challenges in Developing E-Learning Content.
Int. J. Emerg. Technol. Learn., 2011

Combating Sybil Attacks in Vehicular Ad Hoc Networks.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

Immunizing the SAODV protocol against routing information disclosure.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Wormhole Attacks Mitigation in Ad Hoc Networks.
Proceedings of the Sixth International Conference on Availability, 2011

2010
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010

2009
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
CoRR, 2009

Security in Ad Hoc Networks: From Vulnerability to Risk Management.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes.
Proceedings of the SECRYPT 2009, 2009

2008
A Survey on Trust and Reputation Schemes in Ad Hoc Networks.
Proceedings of the The Third International Conference on Availability, 2008

Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
Proceedings of the The Third International Conference on Availability, 2008

2007
Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

2006
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.
Proceedings of the SECRYPT 2006, 2006


  Loading...