Omar Cheikhrouhou

Orcid: 0000-0002-9898-3898

According to our database1, Omar Cheikhrouhou authored at least 93 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT).
Int. J. Inf. Sec., June, 2024

Advances in IoMT for Healthcare Systems.
Sensors, 2024

Blockchain-Based Data Storage for Internet of Things Networks.
Int. J. Bus. Data Commun. Netw., 2024

An enhanced MSU-TSCH scheduling algorithms for industrial wireless sensor networks.
Concurr. Comput. Pract. Exp., 2024

From Text to Insight: An Integrated CNN-BiLSTM-GRU Model for Arabic Cyberbullying Detection.
IEEE Access, 2024

Machine Learning based Outlier Detection in IoT Greenhouse.
Proceedings of the 27th IEEE International Symposium on Real-Time Distributed Computing, 2024

2023
Machine learning based efficient prediction of positive cases of waterborne diseases.
BMC Medical Informatics Decis. Mak., December, 2023

Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review.
Internet Things, December, 2023

ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles.
Wirel. Pers. Commun., November, 2023

CERP: Cooperative and Efficient Routing Protocol for Wireless Sensor Networks.
Sensors, October, 2023

MSU-TSCH: A Mobile Scheduling Updated Algorithm for TSCH in the Internet of Things.
IEEE Trans. Ind. Informatics, July, 2023

A lightweight blockchain and fog-enabled secure remote patient monitoring system.
Internet Things, July, 2023

Internet of drones security: Taxonomies, open issues, and future directions.
Veh. Commun., February, 2023

Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles.
IEEE Access, 2023

IoT DOS and DDOS Attacks Detection Using an Effective Convolutional Neural Network.
Proceedings of the International Conference on Cyberworlds, 2023

Malware Detection Using Deep Learning and CNN Models.
Proceedings of the International Conference on Cyberworlds, 2023

GDLS-FS: Scaling Feature Selection for Intrusion Detection with GRASP-FS and Distributed Local Search.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Regularized least square multi-hops localization algorithm based on DV-Hop for wireless sensor networks.
Telecommun. Syst., 2022

A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption.
Secur. Commun. Networks, 2022

IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network.
IET Image Process., 2022

Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions.
Comput. Sci. Rev., 2022

Blockchain for the Cybersecurity of Smart City Applications.
CoRR, 2022

BSI: Blockchain to secure routing protocol in Internet of Things.
Concurr. Comput. Pract. Exp., 2022

Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques.
Comput. Electr. Eng., 2022

A Segmented PageRank-Based Value Compensation Method for Personal Data in Alliance Blockchains.
Big Data Res., 2022

Intrusion Detection System for IoMT through Blockchain-based Federated Learning.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

SWAF: A Smart Web Application Firewall Based on Convolutional Neural Network.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Intrusion Detection in Industrial IoT.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Preface.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

A blockchain-based storage intelligent.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Incorporate mobility management into industrial wireless sensor networks.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

2021
BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks.
Wirel. Commun. Mob. Comput., 2021

Proof of accumulated trust: A new consensus protocol for the security of the IoV.
Veh. Commun., 2021

Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images.
ACM Trans. Internet Techn., 2021

Prioritising Organisational Factors Impacting Cloud ERP Adoption and the Critical Issues Related to Security, Usability, and Vendors: A Systematic Literature Review.
Sensors, 2021

Optimal Scheduling of Campus Microgrid Considering the Electric Vehicle Integration in Smart Grid.
Sensors, 2021

Improved Recursive DV-Hop Localization Algorithm with RSSI Measurement for Wireless Sensor Networks.
Sensors, 2021

UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones.
Sensors, 2021

An Efficient Dynamic-Decision Based Task Scheduler for Task Offloading Optimization and Energy Management in Mobile Cloud Computing.
Sensors, 2021

Software-Defined Networking: An Evolving Network Architecture - Programmability and Security Perspective.
Secur. Commun. Networks, 2021

Optimizing Quality of Service of Clustering Protocols in Large-Scale Wireless Sensor Networks with Mobile Data Collector and Machine Learning.
Secur. Commun. Networks, 2021

Implementation of Blockchain Consensus Algorithm on Embedded Architecture.
Secur. Commun. Networks, 2021

Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems.
Secur. Commun. Networks, 2021

CoopECC: A Collaborative Cryptographic Mechanism for the Internet of Things.
J. Sensors, 2021

A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy.
Comput. Sci. Rev., 2021

A Comprehensive Survey on the Multiple Travelling Salesman Problem: Applications, Approaches and Taxonomy.
CoRR, 2021

Analytic Study of a Novel Color Image Encryption Method Based on the Chaos System and Color Codes.
Complex., 2021

Performance evaluation of Convolutional Neural Network for web security.
Comput. Commun., 2021

HealthBlock: A secure blockchain-based healthcare data management system.
Comput. Networks, 2021

A Heuristic-Driven and Cost Effective Majority/ Minority Logic Synthesis for Post-CMOS Emerging Technology.
IEEE Access, 2021

Regularized Least Square Multi-Hops Localization Algorithm for Wireless Sensor Networks.
IEEE Access, 2021

One-Dimensional CNN Approach for ECG Arrhythmia Analysis in Fog-Cloud Environments.
IEEE Access, 2021

Secure and Privacy-aware Blockchain-based Remote Patient Monitoring System for Internet of Healthcare Things.
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021

Multi-objective Computation Offloading for Cloud Robotics using NSGA-II.
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021

A Blockchain based Authentication Scheme for Mobile Data Collector in IoT.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

A Novel Blockchain Secure to Routing Protocol in WSN.
Proceedings of the 22nd IEEE International Conference on High Performance Switching and Routing, 2021

2020
Light Deep Model for Pulmonary Nodule Detection from CT Scan Images for Mobile Devices.
Wirel. Commun. Mob. Comput., 2020

Leveraging Deep Learning Techniques for Malaria Parasite Detection Using Mobile Application.
Wirel. Commun. Mob. Comput., 2020

A Cloud Based Disaster Management System.
J. Sens. Actuator Networks, 2020

Deep learning-based intelligent face recognition in IoT-cloud environment.
Comput. Commun., 2020

Framework for Efficient Medical Image Encryption Using Dynamic S-Boxes and Chaotic Maps.
IEEE Access, 2020

CyberSecurity Attack Prediction: A Deep Learning Approach.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

ASCII Embedding: An Efficient Deep Learning Method for Web Attacks Detection.
Proceedings of the Pattern Recognition and Artificial Intelligence, 2020

Malicious Http Request Detection Using Code-Level Convolutional Neural Network.
Proceedings of the Risks and Security of Internet and Systems, 2020

An OWASP Top Ten Driven Survey on Web Application Protection Methods.
Proceedings of the Risks and Security of Internet and Systems, 2020

AI-based Pilgrim Detection using Convolutional Neural Networks.
Proceedings of the 5th International Conference on Advanced Technologies for Signal and Image Processing, 2020

M-CNN: A New Hybrid Deep Learning Model for Web Security.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

2019
Dronemap Planner: A service-oriented cloud-based management system for the Internet-of-Drones.
Ad Hoc Networks, 2019

BlockLoc: Secure Localization in the Internet of Things using Blockchain.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Towards a Distributed Computation Offloading Architecture for Cloud Robotics.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
Robot Path Planning and Cooperation - Foundations, Algorithms and Experimentations
Studies in Computational Intelligence 772, Springer, ISBN: 978-3-319-77040-6, 2018

A Hybrid DV-Hop Algorithm Using RSSI for Localization in Large-Scale Wireless Sensor Networks.
Sensors, 2018

An analytical hierarchy process-based approach to solve the multi-objective multiple traveling salesman problem.
Intell. Serv. Robotics, 2018

2017
FL-MTSP: a fuzzy logic approach to solve the multi-objective multiple traveling salesman problem for multi-robot systems.
Soft Comput., 2017

Move and Improve: a Market-Based Mechanism for the Multiple Depot Multiple Travelling Salesmen Problem.
J. Intell. Robotic Syst., 2017

2016
Secure Group Communication in Wireless Sensor Networks: A survey.
J. Netw. Comput. Appl., 2016

An Efficient Secure scheme for Wireless Sensor Networks.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Lightweight Trust Model with High Longevity for Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A Clustering Market-Based Approach for Multi-robot Emergency Response Applications.
Proceedings of the 2016 International Conference on Autonomous Robot Systems and Competitions, 2016

Analytical Hierarchy Process based Multi-objective Multiple Traveling Salesman Problem.
Proceedings of the 2016 International Conference on Autonomous Robot Systems and Competitions, 2016

Poster: 3D Virtual Disaster Management Environment using Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016

2014
Co-RPL: RPL routing for mobile low power wireless sensor networks using Corona mechanism.
Proceedings of the 9th IEEE International Symposium on Industrial Embedded Systems, 2014

Move and improve: A distributed multi-robot coordination approach for multiple depots multiple travelling salesmen problem.
Proceedings of the 2014 IEEE International Conference on Autonomous Robot Systems and Competitions, 2014

A Distributed Market-based Algorithm for the Multi-robot Assignment Problem.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2012
LNT: A logical neighbor tree secure group communication scheme for wireless sensor networks.
Ad Hoc Networks, 2012

2011
RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks.
Pers. Ubiquitous Comput., 2011

LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

2010
An EAP-EHash authentication method adapted to resource constrained terminals.
Ann. des Télécommunications, 2010

RiSeG: A logical ring based secure group communication protocol for Wireless Sensor Networks.
Proceedings of the International Conference on Wireless and Ubiquitous Systems , 2010

Z-Cast: A Multicast Routing Mechanism in ZigBee Cluster-Tree Wireless Sensor Networks.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

A lightweight user authentication scheme for Wireless Sensor Networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Attacks and improvement of "security enhancement for a dynamic id-based remote user authentication scheme".
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009


  Loading...