Blockchain-Based Privacy-Aware Pseudonym Management Framework for Vehicular Networks
Benarous, Leila, Kadri, Benamar, Bouridane, Ahmed
Published in Arabian journal for science and engineering (2011) (01.08.2020)
Published in Arabian journal for science and engineering (2011) (01.08.2020)
Get full text
Journal Article
Gas-Net: A deep neural network for gastric tumor semantic segmentation
KAZI TANI, Lamia Fatiha, KAZI TANI, Mohammed Yassine, KADRI, Benamar
Published in AIMS bioengineering (01.01.2022)
Published in AIMS bioengineering (01.01.2022)
Get full text
Journal Article
Securing vehicular cloud networks
Moussaoui, Djilali, Feham, Mohamed, Bensaber, Boucif Amar, Kadri, Benamar
Published in International journal of electrical and computer engineering (Malacca, Malacca) (01.10.2019)
Published in International journal of electrical and computer engineering (Malacca, Malacca) (01.10.2019)
Get full text
Journal Article
Detecting network cyber-attacks using an integrated statistical approach
Bouyeddou, Benamar, Harrou, Fouzi, Kadri, Benamar, Sun, Ying
Published in Cluster computing (01.06.2021)
Published in Cluster computing (01.06.2021)
Get full text
Journal Article
Alloyed Pseudonym Change Strategy for Location Privacy in VANETs
Benarous, Leila, Kadri, Benamar, Boudjit, Saadi
Published in 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) (01.01.2020)
Published in 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) (01.01.2020)
Get full text
Conference Proceeding
Secured and Optimized AODV for Wireless Sensor Networks
KADRI, Benamar, FEHAM, Mohammed, MHAMMED, Abdellah
Published in International journal of information technology and computer science (01.05.2013)
Published in International journal of information technology and computer science (01.05.2013)
Get full text
Journal Article
A new management scheme of cluster based PKI for ad hoc networks using multi-signature
Benamar, K., Mohammed, F., Abdallah, M.
Published in 2007 First International Global Information Infrastructure Symposium (01.07.2007)
Published in 2007 First International Global Information Infrastructure Symposium (01.07.2007)
Get full text
Conference Proceeding
Privacy Preserving Scheme for Pseudonym Refilling in VANET
Benarous, Leila, Kadri, Benamar
Published in 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT) (01.10.2018)
Published in 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT) (01.10.2018)
Get full text
Conference Proceeding
Securing reactive routing protocols in MANETs using PKI (PKI-DSR)
Kadri, Benamar, Feham, Mohammed, M'hamed, Abdallah
Published in Security and communication networks (01.07.2009)
Published in Security and communication networks (01.07.2009)
Get full text
Journal Article
Early Fire Detection System Using Wireless Sensor Networks
Kadri, Benamar, Bouyeddou, Benamar, Moussaoui, Djillali
Published in 2018 International Conference on Applied Smart Systems (ICASS) (01.11.2018)
Published in 2018 International Conference on Applied Smart Systems (ICASS) (01.11.2018)
Get full text
Conference Proceeding
Ensuring privacy and authentication for V2V resource sharing
Benarous, Leila, Kadri, Benamar
Published in 2017 Seventh International Conference on Emerging Security Technologies (EST) (01.09.2017)
Published in 2017 Seventh International Conference on Emerging Security Technologies (EST) (01.09.2017)
Get full text
Conference Proceeding
A Distributed Blockchain Based PKI (BCPKI) architecture to enhance privacy in VANET
Moussaoui, Djilali, Kadri, Benamar, Feham, Mohammed, Ammar Bensaber, Boucif
Published in 2020 2nd International Workshop on Human-Centric Smart Environments for Health and Well-being (IHSH) (09.02.2021)
Published in 2020 2nd International Workshop on Human-Centric Smart Environments for Health and Well-being (IHSH) (09.02.2021)
Get full text
Conference Proceeding
Detection of smurf flooding attacks using Kullback-Leibler-based scheme
Bouyeddou, Benamar, Harrou, Fouzi, Sun, Ying, Kadri, Benamar
Published in 2018 4th International Conference on Computer and Technology Applications (ICCTA) (01.05.2018)
Published in 2018 4th International Conference on Computer and Technology Applications (ICCTA) (01.05.2018)
Get full text
Conference Proceeding
Nonparametric Kullback-Leibler distance-based method for networks intrusion detection
Bouyeddou, Benamar, Kadri, Benamar, Harrou, Fouzi, Sun, Ying
Published in 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI) (26.10.2020)
Published in 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI) (26.10.2020)
Get full text
Conference Proceeding