Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security A Derhab, M Guerroumi, A Gumaei, L Maglaras, MA Ferrag, M Mukherjee, ... Sensors 19 (14), 3119, 2019 | 158 | 2019 |
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges S Aoufi, A Derhab, M Guerroumi Journal of Information Security and Applications 54, 102518, 2020 | 102 | 2020 |
Semi-supervised statistical approach for network anomaly detection NB Aissa, M Guerroumi Procedia Computer Science 83, 1090-1095, 2016 | 52 | 2016 |
BMC‐SDN: Blockchain‐Based Multicontroller Architecture for Secure Software‐Defined Networks A Derhab, M Guerroumi, M Belaoued, O Cheikhrouhou Wireless Communications and Mobile Computing 2021 (1), 9984666, 2021 | 42 | 2021 |
Data replication in mobile ad hoc networks S Moussaoui, M Guerroumi, N Badache Mobile Ad-hoc and Sensor Networks: Second International Conference, MSN 2006 …, 2006 | 41 | 2006 |
Intrusion detection system against sink hole attack in wireless sensor networks with mobile sink M Guerroumi, A Derhab, K Saleem 2015 12th International Conference on Information Technology-New Generations …, 2015 | 37 | 2015 |
Two-factor mutual authentication offloading for mobile cloud computing A Derhab, M Belaoued, M Guerroumi, FA Khan IEEE Access 8, 28956-28969, 2020 | 34 | 2020 |
BCFR: Blockchain-based controller against false flow rule injection in SDN S Boukria, M Guerroumi, I Romdhani 2019 IEEE symposium on computers and communications (ISCC), 1034-1039, 2019 | 30 | 2019 |
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset N Belhadj aissa, M Guerroumi, A Derhab Neural Computing and Applications 32 (8), 3475-3501, 2020 | 28 | 2020 |
Intrusion detection system for SDN network using deep learning approach S BOUKRIA, M GUERROUMI 2019 International Conference on Theoretical and Applicative Aspects of …, 2019 | 27 | 2019 |
A genetic clustering technique for Anomaly-based Intrusion Detection Systems NB Aissa, M Guerroumi 2015 IEEE/ACIS 16th International Conference on Software Engineering …, 2015 | 24 | 2015 |
Mobile sink and power management for efficient data dissemination in wireless sensor networks M Guerroumi, N Badache, S Moussaoui Telecommunication Systems 58, 279-292, 2015 | 19 | 2015 |
On the medium access control protocols suitable for wireless sensor networks-a survey M Guerroumi, ASK Pathan, N Badache, S Moussaoui International Journal of Communication Networks and Information Security 6 …, 2014 | 14 | 2014 |
Hybrid data dissemination protocol (HDDP) for wireless sensor networks M Guerroumi, ASK Pathan Wireless Networks 24 (5), 1739-1754, 2018 | 12 | 2018 |
Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks M Guerroumi, ASK Pathan, N Badache, S Moussaoui International Journal of Communication Networks and Information Security 5 …, 2013 | 12 | 2013 |
MMSMAC: A multi-mode medium access control protocol for wireless sensor networks with latency and energy-awareness M Guerroumi, ASK Pathan, A Derhab, N Badache, S Moussaoui Wireless Personal Communications 96, 4973-5010, 2017 | 11 | 2017 |
Internet of Things for smart living ASK Pathan, ZM Fadlullah, S Choudhury, M Guerroumi Wireless Networks 27, 4293-4295, 2021 | 10 | 2021 |
A comparative study of perceptual hashing algorithms: Application on fingerprint images M Hamadouche, K Zebbiche, M Guerroumi, H Tebbi, Y Zafoune The 2nd International Conference on Computer Science’s Complex Systems and …, 2021 | 10 | 2021 |
Local density estimation for vanets N Haouari, S Moussaoui, M Guerroumi, SM Senouci 2016 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2016 | 10 | 2016 |
Two phase replication approach for MANETs S Moussaoui, M Guerroumi, N Badache International Journal of Ad Hoc and Ubiquitous Computing 4 (5), 292-303, 2009 | 9 | 2009 |