Rida Khatoun

According to our database1, Rida Khatoun authored at least 73 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Dynamic logic-based attack graph for risk assessment in complex computer systems.
Comput. Networks, June, 2023

Detecting DDoS attacks using adversarial neural network.
Comput. Secur., April, 2023

Enabling Programmable Deterministic Communications in 6G.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Lightweight TLS 1.3 Handshake for C-ITS Systems.
Proceedings of the IEEE International Conference on Communications, 2023

Comparison of Data Cleansing Methods for Network DDoS Attacks Mitigation.
Proceedings of the 9th International Conference on Control, 2023

Traffic Congestion Prediction Based on Multivariate Modelling and Neural Networks Regressions.
Proceedings of the 14th International Conference on Ambient Systems, 2023

AI-Powered Network Intrusion Detection: A New Frontier in Cybersecurity.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
A secure cross-layer architecture for reactive routing in vehicle to vehicle (V2V) communications.
Veh. Commun., 2022

Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper.
IEEE Trans. Intell. Transp. Syst., 2022

A cross-layered scheme for multichannel and reactive routing in vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022

Survey on smart homes: Vulnerabilities, risks, and countermeasures.
Comput. Secur., 2022

TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2022

Delay Measurement of 0-RTT Transport Layer Security (TLS) Handshake Protocol.
Proceedings of the 8th International Conference on Control, 2022

Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment.
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022

A machine learning based approach for the detection of sybil attacks in C-ITS.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
IEEE 802.11p performance enhancement based on Markov chain and neural networks for safety applications.
Ann. des Télécommunications, 2021

Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding.
Proceedings of the IEEE Global Communications Conference, 2021

2020
A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT).
IEEE Syst. J., 2020

Control Channel Anti-Jamming in Vehicular Networks via Cooperative Relay Beamforming.
IEEE Internet Things J., 2020

A secure multipath reactive protocol for routing in IoT and HANETs.
Ad Hoc Networks, 2020

Simulation of Cyberattacks in ITS-G5 Systems.
Proceedings of the Communication Technologies for Vehicles, 2020

Safe Traffic Adaptation Model in Wireless Mesh Networks.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

A comparative performance study of cryptographic algorithms for connected vehicles.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

Message Fabrication Detection Model based on Reactive Protocols in VANET.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

A Cross-Layered Interference in Multichannel MAC of VANET.
Proceedings of the 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2020

2019
A statistical detection mechanism for node misbehaviours in wireless mesh networks.
Int. J. Ad Hoc Ubiquitous Comput., 2019

An empirical investigation of botnet as a service for cyberattacks.
Trans. Emerg. Telecommun. Technol., 2019

Cybersecurity in networking.
Ann. des Télécommunications, 2019

Wave Performance Analysis and Enhancement for Safety Applications in Vehicular Networks.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

A Blockchain-based Lightweight Authentication Solution for IoT.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

2018
Cooperative Antijamming Relaying for Control Channel Jamming in Vehicular Networks.
IEEE Trans. Veh. Technol., 2018

IoT technologies for smart cities.
IET Networks, 2018

Cooperative relay beamforming for control channel jamming in vehicular networks.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

CDBE: A cooperative way to improve end-to-end congestion control in mobile network.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Performance evaluation of CQIC and TCP BBR in mobile network.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

Perils of using CQIC in LTE network and a quick fix with delayed ACK.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Towards combining admission control and link scheduling in wireless mesh networks.
Telecommun. Syst., 2017

Localization of multiple jamming attackers in vehicular ad hoc network.
Int. J. Distributed Sens. Networks, 2017

A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks.
Comput. Networks, 2017

Cybersecurity and Privacy Solutions in Smart Cities.
IEEE Commun. Mag., 2017

Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm.
Proceedings of the Data Science, 2017

Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2016
Smart cities: concepts, architectures, research opportunities.
Commun. ACM, 2016

A statistical trust system in wireless mesh networks.
Ann. des Télécommunications, 2016

Clustering methods comparison: Application to source based detection of botclouds.
Proceedings of the International Conference on Security of Smart Cities, 2016

Vehicle Driving Pattern Based Sybil Attack Detection.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Survey on packet marking fields and information for IP traceback.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Flooding attacks detection in MANETs.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

A reputation system for detection of black hole attack in vehicular networking.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Bayesian-based model for a reputation system in vehicular networks.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Survey on packet marking fields and information for IP traceback.
Proceedings of the International Conference on Protocol Engineering, 2015

A collaborative approach for a source based detection of botclouds.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
Robust clustering methods for detecting smartphone's abnormal behavior.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers.
Proceedings of the 21st IEEE Symposium on Communications and Vehicular Technology in the Benelux, 2014

A Factorial Space for a System-Based Detection of Botcloud Activity.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Understanding botclouds from a system perspective: A principal component analysis.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Clustering-based anomaly detection for smartphone applications.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Denial of Service (DoS) attacks detection in MANETs through statistical models.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis.
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

Toward a Source Detection of Botclouds: A PCA-Based Approach.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
An efficient admission control model based on dynamic link scheduling in wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2013

A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network.
Proceedings of the 20st International Conference on Telecommunications, 2013

Diagnosing smartphone's abnormal behavior through robust outlier detection methods.
Proceedings of the Global Information Infrastructure Symposium, 2013

An Admission Control Scheme Based on Transmissions Scheduling for Wireless Mesh Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
An Admission Control Scheme Based on Links' Activity Scheduling for Wireless Mesh Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

2011
Content pollution quantification in large P2P networks : A measurement study on KAD.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

2008
A situatedness-based Knowledge Plane for autonomic networking.
Int. J. Netw. Manag., 2008

Decentralized Alerts Correlation Approach for DDoS Intrusion Detection.
Proceedings of the NTMS 2008, 2008


  Loading...