Rida Khatoun

According to our database1, Rida Khatoun authored at least 41 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A statistical detection mechanism for node misbehaviours in wireless mesh networks.
IJAHUC, 2019

An empirical investigation of botnet as a service for cyberattacks.
Trans. Emerging Telecommunications Technologies, 2019

Cybersecurity in networking.
Annales des Télécommunications, 2019

Wave Performance Analysis and Enhancement for Safety Applications in Vehicular Networks.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

2018
Cooperative Antijamming Relaying for Control Channel Jamming in Vehicular Networks.
IEEE Trans. Vehicular Technology, 2018

IoT technologies for smart cities.
IET Networks, 2018

Cooperative relay beamforming for control channel jamming in vehicular networks.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

CDBE: A cooperative way to improve end-to-end congestion control in mobile network.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Performance evaluation of CQIC and TCP BBR in mobile network.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

Perils of using CQIC in LTE network and a quick fix with delayed ACK.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Towards combining admission control and link scheduling in wireless mesh networks.
Telecommunication Systems, 2017

Localization of multiple jamming attackers in vehicular ad hoc network.
IJDSN, 2017

A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks.
Comput. Networks, 2017

Cybersecurity and Privacy Solutions in Smart Cities.
IEEE Communications Magazine, 2017

Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm.
Proceedings of the Data Science, 2017

Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2016
Smart cities: concepts, architectures, research opportunities.
Commun. ACM, 2016

A statistical trust system in wireless mesh networks.
Annales des Télécommunications, 2016

Vehicle Driving Pattern Based Sybil Attack Detection.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Survey on packet marking fields and information for IP traceback.
Proceedings of the International Conference on Protocol Engineering, 2015

A collaborative approach for a source based detection of botclouds.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
Robust clustering methods for detecting smartphone's abnormal behavior.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers.
Proceedings of the 21st IEEE Symposium on Communications and Vehicular Technology in the Benelux, 2014

A Factorial Space for a System-Based Detection of Botcloud Activity.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Understanding botclouds from a system perspective: A principal component analysis.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Clustering-based anomaly detection for smartphone applications.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Denial of Service (DoS) attacks detection in MANETs through statistical models.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis.
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

Toward a Source Detection of Botclouds: A PCA-Based Approach.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
An efficient admission control model based on dynamic link scheduling in wireless mesh networks.
EURASIP J. Wireless Comm. and Networking, 2013

A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network.
Proceedings of the 20st International Conference on Telecommunications, 2013

Diagnosing smartphone's abnormal behavior through robust outlier detection methods.
Proceedings of the Global Information Infrastructure Symposium, 2013

An Admission Control Scheme Based on Transmissions Scheduling for Wireless Mesh Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
An Admission Control Scheme Based on Links' Activity Scheduling for Wireless Mesh Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

2011
Content pollution quantification in large P2P networks : A measurement study on KAD.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

2008
A situatedness-based Knowledge Plane for autonomic networking.
Int. Journal of Network Management, 2008

Decentralized Alerts Correlation Approach for DDoS Intrusion Detection.
Proceedings of the NTMS 2008, 2008


  Loading...