Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
Derhab, Abdelouahid, Bouras, Abdelghani, Belaoued, Mohamed, Maglaras, Leandros, Khan, Farrukh Aslam
Published in Sensors (Basel, Switzerland) (01.11.2020)
Published in Sensors (Basel, Switzerland) (01.11.2020)
Get full text
Journal Article
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing
Derhab, Abdelouahid, Belaoued, Mohamed, Guerroumi, Mohamed, Khan, Farrukh Aslam
Published in IEEE access (2020)
Published in IEEE access (2020)
Get full text
Journal Article
MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance
Belaoued, Mohamed, Derhab, Abdelouahid, Mazouzi, Smaine, Khan, Farrukh Aslam
Published in IEEE access (2020)
Published in IEEE access (2020)
Get full text
Journal Article
Combined dynamic multi-feature and rule-based behavior for accurate malware detection
Belaoued, Mohamed, Boukellal, Abdelaziz, Koalal, Mohamed Amir, Derhab, Abdelouahid, Mazouzi, Smaine, Khan, Farrukh Aslam
Published in International journal of distributed sensor networks (01.11.2019)
Published in International journal of distributed sensor networks (01.11.2019)
Get full text
Journal Article
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks
Derhab, Abdelouahid, Belaoued, Mohamed, Mohiuddin, Irfan, Kurniawan, Fajri, Khan, Muhammad Khurram
Published in IEEE transactions on intelligent transportation systems (01.03.2022)
Published in IEEE transactions on intelligent transportation systems (01.03.2022)
Get full text
Journal Article
PARCA: Proactive Anti-Ransomware Cybersecurity Approach
Djenna, Amir, Belaoued, Mohamed, Lifa, Nourdine, Moualdi, Diaa Eddine
Published in Procedia computer science (2024)
Published in Procedia computer science (2024)
Get full text
Journal Article
A Survey on Multi-Agent Based Collaborative Intrusion Detection Systems
Bougueroua, Nassima, Mazouzi, Smaine, Belaoued, Mohamed, Seddari, Noureddine, Derhab, Abdelouahid, Bouras, Abdelghani
Published in Journal of Artificial Intelligence and Soft Computing Research (01.04.2021)
Published in Journal of Artificial Intelligence and Soft Computing Research (01.04.2021)
Get full text
Journal Article
Statistical Study of Imported APIs by PE Type Malware
Belaoued, Mohamed, Mazouzi, Smaine
Published in 2014 International Conference on Advanced Networking Distributed Systems and Applications (01.06.2014)
Published in 2014 International Conference on Advanced Networking Distributed Systems and Applications (01.06.2014)
Get full text
Conference Proceeding
Using Chi-Square test and heuristic search for detecting metamorphic malware
Belaoued, Mohamed, Mazouzi, Smaine, Noureddine, Seddari, Salah, Bougueroua
Published in 2015 First International Conference on New Technologies of Information and Communication (NTIC) (01.11.2015)
Published in 2015 First International Conference on New Technologies of Information and Communication (NTIC) (01.11.2015)
Get full text
Conference Proceeding