Follow
Mohamed Guerroumi
Mohamed Guerroumi
PHD, Computer science at USTHB University
Verified email at usthb.dz
Title
Cited by
Cited by
Year
Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security
A Derhab, M Guerroumi, A Gumaei, L Maglaras, MA Ferrag, M Mukherjee, ...
Sensors 19 (14), 3119, 2019
1582019
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges
S Aoufi, A Derhab, M Guerroumi
Journal of Information Security and Applications 54, 102518, 2020
1022020
Semi-supervised statistical approach for network anomaly detection
NB Aissa, M Guerroumi
Procedia Computer Science 83, 1090-1095, 2016
522016
BMC‐SDN: Blockchain‐Based Multicontroller Architecture for Secure Software‐Defined Networks
A Derhab, M Guerroumi, M Belaoued, O Cheikhrouhou
Wireless Communications and Mobile Computing 2021 (1), 9984666, 2021
422021
Data replication in mobile ad hoc networks
S Moussaoui, M Guerroumi, N Badache
Mobile Ad-hoc and Sensor Networks: Second International Conference, MSN 2006 …, 2006
412006
Intrusion detection system against sink hole attack in wireless sensor networks with mobile sink
M Guerroumi, A Derhab, K Saleem
2015 12th International Conference on Information Technology-New Generations …, 2015
372015
Two-factor mutual authentication offloading for mobile cloud computing
A Derhab, M Belaoued, M Guerroumi, FA Khan
IEEE Access 8, 28956-28969, 2020
342020
BCFR: Blockchain-based controller against false flow rule injection in SDN
S Boukria, M Guerroumi, I Romdhani
2019 IEEE symposium on computers and communications (ISCC), 1034-1039, 2019
302019
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset
N Belhadj aissa, M Guerroumi, A Derhab
Neural Computing and Applications 32 (8), 3475-3501, 2020
282020
Intrusion detection system for SDN network using deep learning approach
S BOUKRIA, M GUERROUMI
2019 International Conference on Theoretical and Applicative Aspects of …, 2019
272019
A genetic clustering technique for Anomaly-based Intrusion Detection Systems
NB Aissa, M Guerroumi
2015 IEEE/ACIS 16th International Conference on Software Engineering …, 2015
242015
Mobile sink and power management for efficient data dissemination in wireless sensor networks
M Guerroumi, N Badache, S Moussaoui
Telecommunication Systems 58, 279-292, 2015
192015
On the medium access control protocols suitable for wireless sensor networks-a survey
M Guerroumi, ASK Pathan, N Badache, S Moussaoui
International Journal of Communication Networks and Information Security 6 …, 2014
142014
Hybrid data dissemination protocol (HDDP) for wireless sensor networks
M Guerroumi, ASK Pathan
Wireless Networks 24 (5), 1739-1754, 2018
122018
Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks
M Guerroumi, ASK Pathan, N Badache, S Moussaoui
International Journal of Communication Networks and Information Security 5 …, 2013
122013
MMSMAC: A multi-mode medium access control protocol for wireless sensor networks with latency and energy-awareness
M Guerroumi, ASK Pathan, A Derhab, N Badache, S Moussaoui
Wireless Personal Communications 96, 4973-5010, 2017
112017
Internet of Things for smart living
ASK Pathan, ZM Fadlullah, S Choudhury, M Guerroumi
Wireless Networks 27, 4293-4295, 2021
102021
A comparative study of perceptual hashing algorithms: Application on fingerprint images
M Hamadouche, K Zebbiche, M Guerroumi, H Tebbi, Y Zafoune
The 2nd International Conference on Computer Science’s Complex Systems and …, 2021
102021
Local density estimation for vanets
N Haouari, S Moussaoui, M Guerroumi, SM Senouci
2016 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2016
102016
Two phase replication approach for MANETs
S Moussaoui, M Guerroumi, N Badache
International Journal of Ad Hoc and Ubiquitous Computing 4 (5), 292-303, 2009
92009
The system can't perform the operation now. Try again later.
Articles 1–20