Wafa Ben Jaballah

Orcid: 0000-0002-6699-6846

According to our database1, Wafa Ben Jaballah authored at least 29 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning.
Proc. Priv. Enhancing Technol., January, 2023

A survey on misbehavior detection for connected and autonomous vehicles.
Veh. Commun., 2023

2022
Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
FADIA: fairness-driven collaborative remote attestation.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Spatial and Temporal Cross-Validation Approach for Misbehavior Detection in C-ITS.
Proceedings of the Research Challenges in Information Science, 2021

2020
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks.
Comput. Secur., 2020

Security and design requirements for software-defined VANETs.
Comput. Networks, 2020

2019
A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions.
CoRR, 2019

2018
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks.
Comput. Commun., 2018

The position cheating attack on inter-vehicular online gaming.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
A secure electric energy management in smart home.
Int. J. Commun. Syst., 2017

Android inter-app communication threats and detection techniques.
Comput. Secur., 2017

An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
Android App Collusion Threat and Mitigation Techniques.
CoRR, 2016

The impact of malicious nodes positioning on vehicular alert messaging system.
Ad Hoc Networks, 2016

A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

A broadcast authentication scheme in IoT environments.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Lightweight secure group communications for resource constrained devices.
Int. J. Space Based Situated Comput., 2015

Enhanced LEAP authentication delay for higher immunity against DoS attack.
Proceedings of the International Conference on Protocol Engineering, 2015

Impact of security threats in vehicular alert messaging systems.
Proceedings of the IEEE International Conference on Communication, 2015

A secure authentication mechanism for resource constrained devices.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
Securing wireless sensor and vehicular networks. (Sécurité des réseaux de capteurs et des communications véhiculaires).
PhD thesis, 2014

Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication.
IEEE Trans. Intell. Transp. Syst., 2014

A secure alert messaging system for safe driving.
Comput. Commun., 2014

2013
Performance evaluation of key disclosure delay-based schemes in wireless sensor networks.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Secure Verification of Location Claims on a Vehicular Safety Application.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Lightweight Source Authentication Mechanisms for Group Communications in Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2010
An efficient source authentication scheme in wireless sensor networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010


  Loading...