Name
Affiliation
Papers
MARTINE BELLAÏCHE
Corresponding author.
24
Collaborators
Citations 
PageRank 
18
75
9.68
Referers 
Referees 
References 
248
689
283
Search Limit
100689
Title
Citations
PageRank
Year
Fog Computing Security Assessment for Device Authentication in the Internet of Things.00.342020
Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach10.352020
Live Placement of Interdependent Virtual Machines to Optimize Cloud Service Profits and Penalties on SLAs20.362019
A Decentralized Reputation Management System for Securing the Internet of Vehicles00.342019
Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game00.342019
Multi-cloud cooperative intrusion detection system: trust and fairness assurance00.342019
A deep learning approach for proactive multi-cloud cooperative intrusion detection system30.382019
Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures00.342019
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis.00.342019
A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments00.342018
On trustworthy federated clouds: A coalitional game approach.00.342018
Online Allocation of Cloud Resources Based on Security Satisfaction00.342018
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment30.402018
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment20.372018
A broker-based framework for standardization and management of Cloud Security-SLAs.50.512018
Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation00.342018
Towards quantification and evaluation of security of Cloud Service Providers.80.592017
Service Assignment in Federated Cloud Environments Based on Multi-objective Optimization of Security00.342017
A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing.30.382017
VANET security surveys.381.042014
New Distributed Approach for an Autonomous Dynamic Management of Interdependent Virtual Machines00.342014
SYN flooding attack detection by TCP handshake anomalies10.382012
Avoiding DDoS with active management of backlog queues20.372011
SYN flooding attack detection based on entropy computing70.502009