Follow
"Abdelouahid Derhab"
"Abdelouahid Derhab"
Cybersecurity Professor, King Saud University
Verified email at ksu.edu.sa - Homepage
Title
Cited by
Cited by
Year
Blockchain technologies for the internet of things: Research issues and challenges
MA Ferrag, M Derdour, M Mukherjee, A Derhab, L Maglaras, H Janicke
IEEE Internet of Things Journal 6 (2), 2188-2204, 2019
8072019
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
A Aldweesh, A Derhab, AZ Emam
Knowledge-Based Systems 189, 105124, 2020
5752020
MalDozer: Automatic framework for android malware detection using deep learning
EMB Karbab, M Debbabi, A Derhab, D Mouheb
Digital investigation 24, S48-S59, 2018
4332018
Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges
MA Ferrag, L Shu, X Yang, A Derhab, L Maglaras
IEEE access 8, 32031-32053, 2020
4202020
A novel two-stage deep learning model for efficient network intrusion detection
FA Khan, A Gumaei, A Derhab, A Hussain
Ieee Access 7, 30373-30385, 2019
3872019
A review of privacy-preserving techniques for deep learning
A Boulemtafes, A Derhab, Y Challal
Neurocomputing 384, 21-45, 2020
2132020
Privacy preservation in e-healthcare environments: State of the art and future directions
MA Sahi, H Abbas, K Saleem, X Yang, A Derhab, MA Orgun, W Iqbal, ...
Ieee Access 6, 464-478, 2017
1802017
Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security
A Derhab, M Guerroumi, A Gumaei, L Maglaras, MA Ferrag, M Mukherjee, ...
Sensors 19 (14), 3119, 2019
1612019
Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques
A Mihoub, OB Fredj, O Cheikhrouhou, A Derhab, M Krichen
Computers & Electrical Engineering 98, 107716, 2022
1572022
Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering
A Derhab, A Aldweesh, AZ Emam, FA Khan
Wireless Communications and Mobile Computing 2020 (1), 6689134, 2020
1142020
Trust models of internet of smart things: A survey, open issues, and future directions
A Altaf, H Abbas, F Iqbal, A Derhab
Journal of Network and Computer Applications 137, 93-111, 2019
1092019
Data replication protocols for mobile ad-hoc networks: a survey and taxonomy
A Derhab, N Badache
IEEE communications surveys & tutorials 11 (2), 33-51, 2009
1072009
Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges
M Bagaa, Y Challal, A Ksentini, A Derhab, N Badache
Communications Surveys & Tutorials, IEEE 16 (3), 1339-1368, 2014
1062014
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges
S Aoufi, A Derhab, M Guerroumi
Journal of Information Security and Applications 54, 102518, 2020
1042020
Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends
MA Ferrag, L Maglaras, A Derhab
Security and communication networks 2019 (1), 5452870, 2019
922019
A novel hybrid load forecasting framework with intelligent feature engineering and optimization algorithm in smart grid
G Hafeez, I Khan, S Jan, IA Shah, FA Khan, A Derhab
Applied Energy 299, 117178, 2021
912021
A self-stabilizing leader election algorithm in highly dynamic ad hoc mobile networks
A Derhab, N Badache
IEEE Transactions on Parallel and Distributed Systems 19 (7), 926-939, 2008
872008
Detection and prediction of diabetes using data mining: a comprehensive review
FA Khan, K Zeb, M Al-Rakhami, A Derhab, SAC Bukhari
IEEE Access 9, 43711-43735, 2021
842021
CyberSecurity attack prediction: a deep learning approach
O Ben Fredj, A Mihoub, M Krichen, O Cheikhrouhou, A Derhab
13th international conference on security of information and networks, 1-6, 2020
842020
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues
MA Ferrag, L Maglaras, A Derhab, H Janicke
Telecommunication Systems, 2019
842019
The system can't perform the operation now. Try again later.
Articles 1–20