Mohamed Belaoued
Orcid: 0000-0002-9412-1959
According to our database1,
Mohamed Belaoued
authored at least 18 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Exploring the Landscape of IoT Ransomware Prediction Through Machine Learning Techniques: A Comprehensive Survey.
SN Comput. Sci., March, 2025
2024
Proceedings of the Information Security Theory and Practice, 2024
Proceedings of the 8th Cyber Security in Networking Conference, 2024
Proceedings of the 15th International Conference on Ambient Systems, 2024
2022
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks.
IEEE Trans. Intell. Transp. Syst., 2022
A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media.
IEEE Access, 2022
2021
BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks.
Wirel. Commun. Mob. Comput., 2021
J. Artif. Intell. Soft Comput. Res., 2021
A new transformation approach for complex systems modelling and simulation: application to industrial control system.
Int. J. Simul. Process. Model., 2021
2020
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.
Sensors, 2020
SCOL: similarity and credibility-based approach for opinion leaders detection in collaborative filtering-based recommender systems.
Int. J. Reason. based Intell. Syst., 2020
IEEE Access, 2020
IEEE Access, 2020
2019
Combined dynamic multi-feature and rule-based behavior for accurate malware detection.
Int. J. Distributed Sens. Networks, 2019
2018
Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers.
Proceedings of the Machine Learning for Networking - First International Conference, 2018
2016
J. Inf. Process. Syst., 2016
2015
Towards an Automatic Method for API Association Extraction for PE-Malware Categorization.
Proceedings of the IPAC '15: International Conference on Intelligent Information Processing, 2015
A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features.
Proceedings of the Computer Science and Its Applications, 2015