Survey of routing attacks and countermeasures in mobile ad hoc networks A Amara Korba, M Nafaa, G Salim Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International …, 2013 | 96* | 2013 |
Handbook of research on cloud computing and big data applications in IoT BB Gupta, DP Agrawal IGI global, 2019 | 38 | 2019 |
Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks Y Labiod, A Amara Korba, N Ghoualmi Wireless Personal Communications, 1-29, 2022 | 35 | 2022 |
Accuracy and diversity-aware multi-objective approach for random forest construction NEI Karabadji, AA Korba, A Assi, H Seridi, S Aridhi, W Dhifli Expert Systems with Applications 225, 120138, 2023 | 34 | 2023 |
Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI AA Korba, N Tamani, Y Ghamri-Doudane Computers & Security 96, 101896, 2020 | 26 | 2020 |
Smart Grid Energy Fraud Detection Using SVM AA Korba, NEI karabadji 2019 International Conference on Networking and Advanced Systems (ICNAS), 2019 | 18 | 2019 |
Anomaly-based intrusion detection system for ad hoc networks AA Korba, M Nafaa, Y Ghamri-Doudane 2016 7th International Conference on the Network of the Future (NOF), 1-3, 2016 | 17 | 2016 |
Towards the development of realistic dos dataset for intelligent transportation systems R Rahal, A Amara Korba, N Ghoualmi-Zine Wireless Personal Communications 115 (2), 1415-1444, 2020 | 13 | 2020 |
Analysis of security attacks in AODV A Amara korba, M Nafaa, S Ghanemi Multimedia Computing and Systems (ICMCS), 2014 International Conference on …, 2014 | 10* | 2014 |
5G vehicle-to-everything at the cross-borders: security challenges and opportunities A Boualouache, B Brik, Q Tang, AA Korba, S Cherrier, SM Senouci, ... IEEE Internet of Things Magazine 6 (1), 114-119, 2023 | 9 | 2023 |
AntibotV: A multilevel behaviour-based framework for botnets detection in vehicular networks R Rahal, A Amara Korba, N Ghoualmi-Zine, Y Challal, ... Journal of Network and Systems Management 30 (1), 15, 2022 | 8 | 2022 |
An efficient intrusion detection and prevention framework for ad hoc networks A Amara korba, M Nafaa, S Ghanemi Information and Computer security 24 (4), 2016 | 8 | 2016 |
Taxonomy of biometric-based authentication schemes for mobile computing devices MA Ferrag, L Maglaras, A Derhab, AA Korba 2018 3rd international conference on pattern analysis and intelligent …, 2018 | 7 | 2018 |
Detecting DDoS attacks in IoT environment Y Labiod, AA Korba, N Ghoualmi-Zine International Journal of Information Security and Privacy (IJISP) 15 (2 …, 2021 | 6 | 2021 |
Hybrid intrusion detection framework for Ad hoc networks AA Korba, M Nafaa, S Ghanemi Securing the Internet of Things: Concepts, Methodologies, Tools, and …, 2020 | 6 | 2020 |
Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks AA Korba, A Boualouache, B Brik, R Rahal, Y Ghamri-Doudane, ... ICC 2023 - IEEE International Conference on Communications, 2023 | 4 | 2023 |
Energy Fraud Detection in Advanced Metering Infrastructure AMI AA Korba ICSENT 2018 Proceedings of the 7th International Conference on Software …, 2018 | 4 | 2018 |
Détection d'Intrusion et Sécurisation du Routage dans les Réseaux Ad hoc A Amara Korba UBMA, 2016 | 4* | 2016 |
Analysis of security attacks in aodv A korba Abdelaziz, G Salim Proceedings of the 2014 International Conference on Multimedia Computing and …, 2014 | 4 | 2014 |
Achieving Secure and Privacy-Preserving in Mobile Social Networks MA Ferrag, A Amara korba Handbook of Research on Cloud Computing and Big Data Applications in IoT, 2019 | 2 | 2019 |