Secured clustering algorithm for mobile ad hoc networks B Kadri, A M’hamed, M Feham International Journal of Computer Science and Network Security 7 (3), 27-34, 2007 | 55 | 2007 |
DDOS-attacks detection using an efficient measurement-based statistical mechanism B Bouyeddou, B Kadri, F Harrou, Y Sun Engineering Science and Technology, an International Journal 23 (4), 870-878, 2020 | 37 | 2020 |
Alloyed pseudonym change strategy for location privacy in vanets L Benarous, B Kadri, S Boudjit 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC …, 2020 | 34 | 2020 |
Early fire detection system using wireless sensor networks B Kadri, B Bouyeddou, D Moussaoui 2018 International conference on applied smart systems (ICASS), 1-4, 2018 | 34 | 2018 |
Detecting network cyber-attacks using an integrated statistical approach B Bouyeddou, F Harrou, B Kadri, Y Sun Cluster Computing 24, 1435-1453, 2021 | 32 | 2021 |
An efficient key management scheme for hierarchical wireless sensor networks K Benamar, M Djilalli, F Mohammed, M Abdellah Wireless Sensor Network 2012, 2012 | 29 | 2012 |
A survey on cyber security evolution and threats: biometric authentication solutions L Benarous, B Kadri, A Bouridane Biometric Security and Privacy: Opportunities & Challenges in The Big Data …, 2017 | 28 | 2017 |
Weight based DSR for mobile ad hoc networks B Kadri, M Feham, A M'hamed 2008 3rd International Conference on Information and Communication …, 2008 | 28 | 2008 |
Blockchain-based privacy-aware pseudonym management framework for vehicular networks L Benarous, B Kadri, A Bouridane Arabian Journal for Science and Engineering 45, 6033-6049, 2020 | 27 | 2020 |
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles L Benarous, B Kadri Peer-to-Peer Networking and Applications 15 (1), 461-472, 2022 | 25 | 2022 |
Detection of smurf flooding attacks using Kullback-Leibler-based scheme B Bouyeddou, F Harrou, Y Sun, B Kadri 2018 4th International Conference on Computer and Technology Applications …, 2018 | 24 | 2018 |
A Distributed Blockchain Based PKI (BCPKI) architecture to enhance privacy in VANET D Moussaoui, B Kadri, M Feham, BA Bensaber 2020 2nd international workshop on human-centric smart environments for …, 2021 | 23 | 2021 |
Privacy‐preserving authentication scheme for on‐road on‐demand refilling of pseudonym in VANET L Benarous, B Kadri, S Bitam, A Mellouk International Journal of Communication Systems 33 (10), e4087, 2020 | 23 | 2020 |
Detecting SYN flood attacks via statistical monitoring charts: A comparative study B Bouyeddou, F Harrou, Y Sun, B Kadri 2017 5th International Conference on Electrical Engineering-Boumerdes (ICEE …, 2017 | 23 | 2017 |
Lightweight PKI for WSN µPKI B Kadri, M Feham, A M’hamed The Journal of Security and Communication Networks 10 (2), 135-141, 2010 | 23 | 2010 |
Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks. B Kadri, M Feham, A Mhammed Int. J. Netw. Secur. 16 (2), 149-156, 2014 | 21 | 2014 |
Ensuring privacy and authentication for V2V resource sharing L Benarous, B Kadri 2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017 | 13 | 2017 |
A method to detect dos and ddos attacks based on generalized likelihood ratio test F Harrou, B Bouyeddou, Y Sun, B Kadri 2018 International Conference on Applied Smart Systems (ICASS), 1-6, 2018 | 11 | 2018 |
A new management scheme of cluster based PKI for ad hoc networks using multi-signature K Benamar, F Mohammed 2007 First International Global Information Infrastructure Symposium, 167-172, 2007 | 10 | 2007 |
Detecting cyber-attacks using a CRPS-based monitoring approach F Harrou, B Bouyeddou, Y Sun, B Kadri 2018 IEEE Symposium Series on Computational Intelligence (SSCI), 618-622, 2018 | 9 | 2018 |