Attacks and Defenses in Short-Range Wireless Technologies for IoT K Lounis, M Zulkernine IEEE Access 8, 88892-88932, 2020 | 127 | 2020 |
Fast Authentication in Wireless Sensor Networks C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab Future Generation Computer Systems 55, 362-375, 2016 | 91 | 2016 |
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0 O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua International Conference on Quantitative Evaluation of Systems, 159-162, 2016 | 60 | 2016 |
Bad-Token: Denial of Service Attacks on WPA3 K Lounis, M Zulkernine 12th International Conference on Security of Information and Networks, 1-8, 2019 | 34 | 2019 |
T2T-MAP: A PUF-based Thing-to-Thing Mutual Authentication Protocol for IoT K Lounis, M Zulkernine IEEE Access 8, 137384-137405, 2021 | 30 | 2021 |
Bluetooth Low Energy Makes "Just Works" not Work K Lounis, M Zulkernine 3rd Cyber Security in Networking Conference, 2019 | 28 | 2019 |
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees R Jhawar, K Lounis, S Mauw International Workshop on Security and Trust Management, 138-153, 2016 | 28 | 2016 |
CSKES: A Context-based Secure Keyless Entry System J Wang, K Lounis, M Zulkernine 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019 | 26 | 2019 |
Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT K Lounis, M Zulkernine Digital Threats: Research and Practice, 33, 2021 | 25 | 2021 |
WPA3 Connection Deprivation Attacks K Lounis, M Zulkernine International Conference on Risks and Security of Internet and Systems, 164-176, 2019 | 24 | 2019 |
Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library R Jhawar, K Lounis, S Mauw, Y Ramırez-Cruz International Workshop on Security and Trust Management, 2018 | 23 | 2018 |
A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus K Lounis, Z Mansour, M Wrana, MAA Elsayed, SHH Ding, M Zulkernine IEEE Transactions on Aerospace and Electronic Systems, 19, 2022 | 16 | 2022 |
Stochastic-based Semantics of Attack-Defense Trees for Security Assessment K Lounis International Workshop on Practical Applications of Stochastic Modelling 337 …, 2017 | 15 | 2017 |
D2D-MAP: A Drone to Drone Authentication Protocol using Physical Unclonable Functions K Lounis, HHD Steven, M Zulkernine IEEE Transactions on Vehicular Technology, 16, 2022 | 14 | 2022 |
Exploiting Race Condition for Wi-Fi Denial of Service Attacks K Lounis, M Zulkernine 13th International Conference on Security of Information and Networks (SIN …, 2020 | 13 | 2020 |
Modeling Attack-Defense Trees' Countermeasures using Continuous Time Markov Chains K Lounis, S Ouchani 2nd International Workshop on Automated and Verifiable Software System …, 2020 | 13 | 2020 |
Security of Wireless Short-Range Technologies and an Authentication Protocol for IoT K Lounis Ph. D. dissertation, School Comput., Queen’s Univ., Kingston, ON, Canada, 2020 | 9* | 2020 |
Connection Dumping Vulnerability Affecting Bluetooth Availability K Lounis, M Zulkernine International Conference on Risks and Security of Internet and Systems, 188-204, 2018 | 9 | 2018 |
AdaptIDS: Adaptive Intrusion Detection for Mission-critical Aerospace Vehicles MAA Elsayed, M Wrana, Z Mansour, K Lounis, SHH Ding, M Zulkernine IEEE Transactions on Intelligent Transportation Systems, 2022 | 8 | 2022 |
More Lessons: Analysis of PUF-based Authentication Protocols for IoT K Lounis, M Zulkernine Cryptology ePrint Archive, 2021 | 7 | 2021 |