关注
Ahmed Serhrouchni
Ahmed Serhrouchni
Professor
在 telecom-paris.fr 的电子邮件经过验证 - 首页
标题
引用次数
年份
" Privacy Leak Identification in Third-Party Android Libraries" Christian Schindler, Muesluem Atas, Thomas Strametz, Johannes Feiner, Reinhard Hofer Internet Technologies …
KL Skaug, EB Smebye, B Tola, Y Jiang, M Nabeel, M Manalastas, A Ijaz, ...
1.1 Design Analysis of Wireless Sensors in BAN for Stress Monitoring of Fighter Pilots
S Network
11éme édition annuelle de la Conférence Internationale sur les NOuvelles Technologies de la REpartition (NOTERE)
I Demeure, T Robert, A Serhrouchni
2007 1 st International Global Information Infrastructure Symposium
N Agoulmine, R Boutaba, A Serhrouchni
2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings: Foreward
A Serhrouchni, E Damiani, F Frati
2011 Conference on Network and Information Systems Security, SAR-SSI 2011 …, 2011
2011
2019 Index IEEE Photonics Technology Letters Vol. 31
MLF Abbade, S Abbaslou, M Abdallah, M Abdou Ahmed, A Abramovich, ...
IEEE Photonics Technology Letters 31 (24), 2019
2019
33rd Annual IEEE Conference on Local Computer Networks-LCN
M Hefeeda, B Noorizadeh, J Seibert, D Zage, S Fahmy, C Nita-Rotaru, ...
35th Annual IEEE Conference on Local Computer Networks
P Scheme
A blockchain-based certificate revocation management and status verification system
YCE Adja, B Hammi, A Serhrouchni, S Zeadally
Computers & Security 104, 102209, 2021
572021
A blockchain-based lightweight authentication solution for IoT
A Fayad, B Hammi, R Khatoun, A Serhrouchni
2019 3rd Cyber Security in Networking Conference (CSNet), 28-34, 2019
52019
A collaborative peer-to-peer architecture to defend against DDoS attacks
R Saad, F Nait-Abdesselam, A Serhrouchni
2008 33rd IEEE Conference on Local Computer Networks (LCN), 427-434, 2008
272008
A control architecture for active networks
R Kilany, A Serhrouchni, M Riguidel, D Zebiane
SoftCom2001, http://www. fesb. hr/SoftCOM, 2001
122001
A cooperative agent approach based on a peer-to-peer model for DDoS attacks detection and reaction
R Khatoun, R Saad, G Doyen, A Serhrouchni, D Gaïti, ...
Networking and Electronic Commerce Research Conference 2008, 2008
2008
A dynamic probabilistic marking approach with multi-tag for tracing ICMP-based DoS attacks
X Chen, J Ma, S Li, K Chen, A Serhrouchni
Wuhan University Journal of Natural Sciences 18 (6), 484-488, 2013
12013
A healthcare delivery system powered by semantic data description and blockchain
R Azzi, R Kilany Chamoun, A Serhrouchni, M Sokhn
Future of Information and Communication Conference, 224-242, 2023
12023
A heuristic approach to minimum-cost network hardening using attack graph. In 2008 New Technologies, Mobility and Security
T Islam, L Wang
IEEE, 2008
22008
A hybrid messaging-based scheme for IP traceback
A Fadlallah, A Serhrouchni, Y Begriche, F Naït-Abdesselam
2008 3rd International Conference on Information and Communication …, 2008
142008
A lightweight identity authentication protocol for wireless networks
M Badra, A Serhrouchni, P Urien
Computer Communications 27 (17), 1738-1745, 2004
112004
A lightweight IoT security protocol
MT Hammi, E Livolant, P Bellot, A Serhrouchni, P Minet
2017 1st cyber security in networking conference (CSNet), 1-8, 2017
432017
A lightweight mutual authentication protocol for the IoT
A Serhrouchni, P Minet
Proc. ICMWT 425, 3, 2017
22017
系统目前无法执行此操作,请稍后再试。
文章 1–20