Tarek Abbes

Orcid: 0000-0002-2034-1115

According to our database1, Tarek Abbes authored at least 34 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Smartphone-Key: Hands-Free Two-Factor Authentication for Voice-Controlled Devices Using Wi-Fi Location.
IEEE Trans. Netw. Serv. Manag., September, 2023

IoT Routing Attacks Detection Using Machine Learning Algorithms.
Wirel. Pers. Commun., February, 2023

Privacy-preserving hands-free voice authentication leveraging edge technology.
Secur. Priv., 2023

IoT botnet detection using deep learning.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

The Passport: A Single-Node Authentication System for Heterogeneous Voice-Controlled IoT Networks.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Transfer learning-based Mirai botnet detection in IoT networks.
Proceedings of the International Conference on Innovations in Intelligent Systems and Applications, 2023

2019
Qualitative and Quantitative Risk Analysis and Safety Assessment of Unmanned Aerial Vehicles Missions Over the Internet.
IEEE Access, 2019

MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2017
Detection of Covert Channels Over ICMP Protocol.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Behavior-based approach to detect spam over IP telephony attacks.
Int. J. Inf. Sec., 2016

Detection of firewall configuration errors with updatable tree.
Int. J. Inf. Sec., 2016

Risk Management for Spam over IP Telephony using Combined Countermeasures.
Proceedings of the 10th International Conference on Informatics and Systems, 2016

Risk management for spam over IP telephony using optimal countermeasure.
Proceedings of the International Conference on Digital Economy, 2016

2014
Characterization of attacks collected from the deployment of Web service honeypot.
Secur. Commun. Networks, 2014

Behavior Analysis of Web Service Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2013
A SPIT detection algorithm based on user's call behavior.
Proceedings of the 21st International Conference on Software, 2013

2012
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

2011
Trusted intrusion detection architecture for high-speed networks based on traffic classification, load balancing and high availability mechanism.
Secur. Commun. Networks, 2011

Network Security Alerts Management Architecture for Signature-Based Intrusions Detection Systems within a NAT Environment.
J. Netw. Syst. Manag., 2011

Design and implementation of Web service honeypot.
Proceedings of the 19th International Conference on Software, 2011

2010
Efficient decision tree for protocol analysis in intrusion detection.
Int. J. Secur. Networks, 2010

Experimental analysis of attacks against web services and countermeasures.
Proceedings of the iiWAS'2010, 2010

Data analyzer based on data mining for Honeypot Router.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Ensuring security in depth based on heterogeneous network security technologies.
Int. J. Inf. Sec., 2009

Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Honeypot router for routing protocols protection.
Proceedings of the CRiSIS 2009, 2009

Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
An inference system for detecting firewall filtering rules anomalies.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Collaboration between Security Devices toward improving Network Defense.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
A Stateful Real Time Intrusion Detection System for high-speed network.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

A Traffic Classification Algorithm for Intrusion Detection.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2004
Classification du trafic et optimisation des règles de filtrage pour la détection d'intrusions.
PhD thesis, 2004

On the fly pattern matching for intrusion detection with Snort.
Ann. des Télécommunications, 2004

Protocol Analysis in Intrusion Detection Using Decision Tree.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004


  Loading...