Mohamed Amine Ferrag

Orcid: 0000-0002-0632-3172

According to our database1, Mohamed Amine Ferrag authored at least 104 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures.
Internet Things, April, 2024

Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms.
J. Netw. Comput. Appl., March, 2024

Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges.
IEEE CAA J. Autom. Sinica, January, 2024

CyberMetric: A Benchmark Dataset for Evaluating Large Language Models Knowledge in Cybersecurity.
CoRR, 2024

Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems.
CoRR, 2024

Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices.
IEEE Access, 2024

2023
Tree-based indexing technique for efficient and real-time label retrieval in the object tracking system.
J. Supercomput., December, 2023

IoVT-based efficient solution for optimal active smart camera selection in a tracking mission.
Internet Things, December, 2023

Multiverse Recurrent Expansion With Multiple Repeats: A Representation Learning Algorithm for Electricity Theft Detection in Smart Grids.
IEEE Trans. Smart Grid, November, 2023

Digitization of healthcare sector: A study on privacy and security concerns.
ICT Express, August, 2023

A machine learning model for improving virtual machine migration in cloud computing.
J. Supercomput., June, 2023

Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications.
J. Sens. Actuator Networks, June, 2023

2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT.
Comput. Secur., April, 2023

Internet of drones security: Taxonomies, open issues, and future directions.
Veh. Commun., February, 2023

PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs.
Pervasive Mob. Comput., January, 2023

ESIKE: An Efficient and Secure Internet Key Exchange Protocol.
Wirel. Pers. Commun., 2023

A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing.
Sensors, 2023

HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones.
Pervasive Mob. Comput., 2023

A novel autonomous container-based platform for cybersecurity training and research.
PeerJ Comput. Sci., 2023

A new method for indexing continuous IoT data flows in metric space.
Internet Technol. Lett., 2023

A Novel Authentication Method That Combines Honeytokens and Google Authenticator.
Inf., 2023

PrSChain: A Blockchain Based Privacy Preserving Approach for Data Service Composition.
Informatica (Slovenia), 2023

Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing.
CoRR, 2023

ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance.
CoRR, 2023

SecureFalcon: The Next Cyber Reasoning System for Cyber Security.
CoRR, 2023

Revolutionizing Cyber Threat Detection with Large Language Models.
CoRR, 2023

A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification.
CoRR, 2023

Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things.
CoRR, 2023

Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses.
IEEE Commun. Surv. Tutorials, 2023

Efficient Method for Continuous IoT Data Stream Indexing in the Fog-Cloud Computing Level.
Big Data Cogn. Comput., 2023

ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance.
IEEE Access, 2023

Reliability Analysis of Fault Tolerant Memory Systems.
Proceedings of the 8th South-East Europe Design Automation, 2023

The FormAI Dataset: Generative AI in Software Security through the Lens of Formal Verification.
Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering, 2023

Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-Enabled IoTs: An Anticipatory Study.
Proceedings of the IEEE International Conference on Communications, 2023

Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning.
Dataset, April, 2022

Physical Security and Safety of IoT Equipment: A Survey of Recent Advances and Opportunities.
IEEE Trans. Ind. Informatics, 2022

Cybersecurity of Critical Infrastructures: Challenges and Solutions.
Sensors, 2022

A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems.
J. Sens. Actuator Networks, 2022

FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.
J. Parallel Distributed Comput., 2022

A new static path planning strategy for drones.
Internet Technol. Lett., 2022

Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends.
IEEE Internet Things Mag., 2022

Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions.
IEEE CAA J. Autom. Sinica, 2022

A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues.
Future Internet, 2022

Clustering and parallel indexing of big IoT data in the fog-cloud computing level.
Trans. Emerg. Telecommun. Technol., 2022

Reliability, Security, and Privacy in Power Grids.
Computer, 2022

Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment.
IEEE Access, 2022

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.
IEEE Access, 2022

Security Revisited: Honeytokens meet Google Authenticator.
Proceedings of the 7th South-East Europe Design Automation, 2022

Deep Learning with Recurrent Expansion for Electricity Theft Detection in Smart Grids.
Proceedings of the IECON 2022, 2022

2021
WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.
Sensors, 2021

EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles.
J. Inf. Secur. Appl., 2021

The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial.
IEEE Internet Things J., 2021

A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges.
IEEE CAA J. Autom. Sinica, 2021

Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies.
IEEE CAA J. Autom. Sinica, 2021

Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives.
IEEE CAA J. Autom. Sinica, 2021

Cybersecurity Revisited: Honeytokens meet Google Authenticator.
CoRR, 2021

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.
IEEE Access, 2021

Blockchain Technology: A case study in supply chain management.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Digital Twins and Cyber Security - solution or challenge?
Proceedings of the 6th South-East Europe Design Automation, 2021

Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

A novel Two-Factor HoneyToken Authentication Mechanism.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Quantum Cryptography in Maritime Telecommunications.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles.
Proceedings of the Cognitive Radio Oriented Wireless Networks and Wireless Internet, 2021

SDGchain: When Service Dependency Graph Meets Blockchain to Enhance Privacy.
Proceedings of the IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, 2021

2020
DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids.
IEEE Trans. Engineering Management, 2020

Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues.
Telecommun. Syst., 2020

Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems.
Sensors, 2020

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.
Internet Technol. Lett., 2020

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study.
J. Inf. Secur. Appl., 2020

Cyber security for fog-based smart grid SCADA systems: Solutions and challenges.
J. Inf. Secur. Appl., 2020

Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey.
J. Inf. Secur. Appl., 2020

The Security Aspects of Automotive Over-the-Air Updates.
Int. J. Cyber Warf. Terror., 2020

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.
Future Internet, 2020

An efficient indexing for Internet of Things massive data based on cloud-fog computing.
Trans. Emerg. Telecommun. Technol., 2020

A novel Two-Factor HoneyToken Authentication Mechanism.
CoRR, 2020

Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges.
IEEE Access, 2020

The Impact of the Adversary's Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles.
Proceedings of the 5th South-East Europe Design Automation, 2020

2019
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.
Sensors, 2019

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.
Secur. Commun. Networks, 2019

Blockchain Technologies for the Internet of Things: Research Issues and Challenges.
IEEE Internet Things J., 2019

Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends.
CoRR, 2019

Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures.
CoRR, 2019

DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services.
Comput., 2019

A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

2018
Vulnerability Assessment of Cyber Security for SCADA Systems.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures.
EAI Endorsed Trans. Security Safety, 2018

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes.
J. Netw. Comput. Appl., 2018

An intrusion detection system based on combining probability predictions of a tree of classifiers.
Int. J. Commun. Syst., 2018

Cyber security of critical infrastructures.
ICT Express, 2018

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.
CoRR, 2018

Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices.
Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), 2018

2017
ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network.
Telecommun. Syst., 2017

EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications.
Telecommun. Syst., 2017

Authentication Protocols for Internet of Things: A Comprehensive Survey.
Secur. Commun. Networks, 2017

A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017

Internet of Cloud: Security and Privacy issues.
CoRR, 2017

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2017

Security and Privacy in Fog Computing: Challenges.
IEEE Access, 2017

2016
EPSA: an efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks.
Int. J. Secur. Networks, 2016

Authentication Protocols for Internet of Things: A Comprehensive Survey.
CoRR, 2016

A Survey on Privacy-preserving Schemes for Smart Grid Communications.
CoRR, 2016

2014
SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network.
Int. J. Inf. Comput. Secur., 2014

2013
ECPDR: An Efficient Conditional Privacy-Preservation Scheme with Demand Response for Secure Ad hoc Social Communications.
Int. J. Embed. Real Time Commun. Syst., 2013


  Loading...