Name
Papers
Collaborators
CHAFIKA BENZAID
34
56
Citations 
PageRank 
Referers 
54
13.06
188
Referees 
References 
479
240
Search Limit
100479
Title
Citations
PageRank
Year
Robust Self-Protection Against Application-Layer (D)Dos Attacks In Sdn Environment00.342020
Energy-aware Collision Avoidance stochastic Optimizer for a UAVs set.00.342020
ZSM Security: Threat Surface and Best Practices30.442020
AI-Driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research Directions130.782020
INSPIRE-5Gplus - intelligent security and pervasive trust for 5G and beyond networks.10.362020
GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs.00.342020
AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?30.412020
Connectivity-aware Relay Node Deployment in Grid-based Wireless Sensor Networks00.342019
Energy and Delay Aware Physical Collision Avoidance in Unmanned Aerial Vehicles.00.342018
Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks.20.372017
Efficient clock synchronization for clustered wireless sensor networks.30.372017
Efficient Offloading Mechanism For Uavs-Based Value Added Services10.352017
MS-WMSN: service-oriented planning tool for wireless multimedia monitoring services.00.342016
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities00.342016
CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networks00.342016
Intelligent detection of MAC spoofing attack in 802.11 network.10.352016
Fast authentication in wireless sensor networks50.442016
Virtualization and Cyber Security: Arming Future Security Practitioners00.342015
Sleep scheduling with predictive coverage redundancy check in wireless sensor networks20.372015
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation00.342015
A Low-Complex Coverage Eligibility Algorithm For Wireless Sensor Networks00.342015
Virtualization and Cyber Security: Arming Future Security Practitioners00.342015
ARP Cache Poisoning Mitigation and Forensics Investigation00.342015
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation00.342015
LSEA: Light Weight Sector Eligibility Algorithm for k-Coverage in Wireless Sensor Networks00.342015
ARP Cache Poisoning Mitigation and Forensics Investigation20.492015
An efficient clock synchronization protocol for wireless sensor networks30.452014
Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks20.392012
Fast verification of an ID-based signature scheme for broadcast authentication inwireless sensor networks00.342012
Secure pairwise broadcast time synchronization in wireless sensor networks.40.512011
A causal multicast protocol for dynamic groups in cellular networks20.372008
BMobi_Causal: a causal broadcast protocol in mobile dynamic groups10.362008
An Optimal Causal Broadcast Protocol in Mobile Dynamic Groups20.372008
Mobi_Causal: a protocol for causal message ordering in mobile computing systems40.472005