Name
Affiliation
Papers
ABDELOUAHID DERHAB
CERIST, Dept Comp Engn, Algiers, Algeria
78
Collaborators
Citations 
PageRank 
131
277
32.68
Referers 
Referees 
References 
841
2851
1126
Search Limit
1001000
Title
Citations
PageRank
Year
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks00.342022
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism For Detecting Internal Attacks In Internet Of Things40.382021
Tridroid: A Triage And Classification Framework For Fast Detection Of Mobile Threats In Android Markets00.342021
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning00.342020
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing10.352020
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.10.372020
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues150.642020
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues30.452020
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset10.352020
Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges40.362020
Intrusion Detection System For Internet Of Things Based On Temporal Convolution Neural Network And Efficient Feature Engineering00.342020
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges20.362020
MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance00.342020
A review of privacy-preserving techniques for deep learning.00.342020
Formal Analysis of Language-Based Android Security Using Theorem Proving Approach.00.342019
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks.00.342019
Accurate detection of sitting posture activities in a secure IoT based assisted living environment.10.352019
Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures.00.342019
Blockchain Technologies for the Internet of Things: Research Issues and Challenges.340.802019
An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks00.342019
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends.10.342019
Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges00.342019
Toward an optimal solution against Denial of Service attacks in Software Defined Networks.40.482019
Reducing the effects of DoS attacks in software defined networks using parallel flow installation00.342019
TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection.30.392019
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.60.382019
Trust models of internet of smart things: A survey, open issues, and future directions.60.422019
Combined Dynamic Multi-Feature And Rule-Based Behavior For Accurate Malware Detection00.342019
VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems.20.372018
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.10.352018
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures.20.392018
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.00.342018
Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices00.342018
Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers.00.342018
MalDozer: Automatic framework for android malware detection using deep learning.210.872018
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.90.542018
Efficient and privacy-aware multi-party classification protocol for human activity recognition.00.342017
Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications.00.342017
Android Malware Detection using Deep Learning on API Method Sequences.10.352017
A Survey of Authentication Schemes in Telecare Medicine Information Systems.70.472017
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness.20.372017
Wireless and mobile sensing technologies for the future Internet.20.422017
Mmsmac: A Multi-Mode Medium Access Control Protocol For Wireless Sensor Networks10.352016
Cypider: building community-based cyber-defense infrastructure for android malware detection.60.472016
Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks.00.342016
Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network.10.362016
Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.00.342016
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.50.422016
A review of secure routing approaches for current and next-generation wireless multimedia sensor networks30.362015
Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society.221.212015
  • 1
  • 2