A review of security in internet of things Y Harbi, Z Aliouat, S Harous, A Bentaleb, A Refoufi Wireless Personal Communications 108, 325-344, 2019 | 80 | 2019 |
Enhanced authentication and key management scheme for securing data transmission in the internet of things Y Harbi, Z Aliouat, A Refoufi, S Harous, A Bentaleb Ad Hoc Networks 94, 101948, 2019 | 71 | 2019 |
Recent security trends in internet of things: A comprehensive survey Y Harbi, Z Aliouat, A Refoufi, S Harous IEEE Access 9, 113292-113314, 2021 | 66 | 2021 |
Secure data transmission scheme based on elliptic curve cryptography for internet of things Y Harbi, Z Aliouat, S Harous, A Bentaleb Modelling and Implementation of Complex Systems: Proceedings of the 5th …, 2019 | 16 | 2019 |
Hybrid deep learning-based intrusion detection system for industrial internet of things A Khacha, R Saadouni, Y Harbi, Z Aliouat 2022 5th International Symposium on Informatics and its Applications (ISIA), 1-6, 2022 | 13 | 2022 |
Blockchain for internet of vehicles security A Herbadji, H Goumidi, Y Harbi, K Medani, Z Aliouat Blockchain for cybersecurity and privacy, 159-197, 2020 | 13 | 2020 |
A systematic literature review of blockchain technology for internet of drones security Y Harbi, K Medani, C Gherbi, O Senouci, Z Aliouat, S Harous Arabian Journal for Science and Engineering 48 (2), 1053-1074, 2023 | 12 | 2023 |
Improved bio-inspired security scheme for privacy-preserving in the internet of things Y Harbi, A Refoufi, Z Aliouat, S Harous Peer-to-Peer Networking and Applications 15 (6), 2488-2502, 2022 | 7 | 2022 |
Efficient end-to-end security scheme for privacy-preserving in iot Y Harbi, Z Aliouat, A Refoufi, S Harous 2019 International Conference on Networking and Advanced Systems (ICNAS), 1-6, 2019 | 6 | 2019 |
Enhancement of iot applications dependability using bayesian networks Y Harbi, Z Aliouat, S Hammoudi Computational Intelligence and Its Applications: 6th IFIP TC 5 International …, 2018 | 6 | 2018 |
A systematic literature review of machine learning applications in IoT C Gherbi, O Senouci, Y Harbi, K Medani, Z Aliouat International Journal of Communication Systems 36 (11), e5500, 2023 | 5 | 2023 |
Machine learning‐based clustering protocols for Internet of Things networks: An overview M Merah, Z Aliouat, Y Harbi, MS Batta International Journal of Communication Systems 36 (10), e5487, 2023 | 5 | 2023 |
Security in internet of things Y Harbi | 4 | 2021 |
Fog computing security and privacy for internet of things (iot) and industrial internet of things (iiot) applications: State of the art Y Harbi, Z Aliouat, S Harous Security Issues in Fog Computing from 5G to 6G: Architectures, Applications …, 2022 | 2 | 2022 |
Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment Y Harbi, Z Aliouat, S Harous, AM Gueroui Computer Communications 221, 90-105, 2024 | 1 | 2024 |
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature R Saadouni, C Gherbi, Z Aliouat, Y Harbi, A Khacha Cluster Computing, 1-27, 2024 | 1 | 2024 |
Secure IIoT networks with hybrid CNN-GRU model using Edge-IIoTset R Saadouni, A Khacha, Y Harbi, C Gherbi, S Harous, Z Aliouat 2023 15th International Conference on Innovations in Information Technology …, 2023 | 1 | 2023 |
Lightweight Mutual Authentication and Key Agreement Scheme for Wearable Devices in Fog-enabled WBAN R Hireche, H Mansouri, Y Harbi, ASK Pathan 2023 5th International Conference on Pattern Analysis and Intelligent …, 2023 | | 2023 |
Robust Intrusion Detection for IoT Networks: an Integrated CNN-LSTM-GRU Approach A Khacha, R Saadouni, Y Harbi, C Gherbi, S Harous, Z Aliouat 2023 International Conference on Networking and Advanced Systems (ICNAS), 1-6, 2023 | | 2023 |
Temporal Requirements Aware Based Communication Protocol for Wireless Sensor Networks Z Aliouat, L Aliouat, K Mdani, Y Harbi, C Gherbi, O Senouci 2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile …, 2022 | | 2022 |