Mohamed Belaoued

Orcid: 0000-0002-9412-1959

According to our database1, Mohamed Belaoued authored at least 14 papers between 2015 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks.
IEEE Trans. Intell. Transp. Syst., 2022

A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media.
IEEE Access, 2022

2021
BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks.
Wirel. Commun. Mob. Comput., 2021

A Survey on Multi-Agent Based Collaborative Intrusion Detection Systems.
J. Artif. Intell. Soft Comput. Res., 2021

A new transformation approach for complex systems modelling and simulation: application to industrial control system.
Int. J. Simul. Process. Model., 2021

2020
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.
Sensors, 2020

SCOL: similarity and credibility-based approach for opinion leaders detection in collaborative filtering-based recommender systems.
Int. J. Reason. based Intell. Syst., 2020

Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing.
IEEE Access, 2020

MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance.
IEEE Access, 2020

2019
Combined dynamic multi-feature and rule-based behavior for accurate malware detection.
Int. J. Distributed Sens. Networks, 2019

2018
Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers.
Proceedings of the Machine Learning for Networking - First International Conference, 2018

2016
A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features.
J. Inf. Process. Syst., 2016

2015
Towards an Automatic Method for API Association Extraction for PE-Malware Categorization.
Proceedings of the IPAC '15: International Conference on Intelligent Information Processing, 2015

A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features.
Proceedings of the Computer Science and Its Applications, 2015


  Loading...