متابعة
Mohamed Belaoued
Mohamed Belaoued
Research Associate - Lab-I* - Université de Reims Champagne-Ardenne
بريد إلكتروني تم التحقق منه على univ-reims.fr
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
A hybrid linguistic and knowledge-based analysis approach for fake news detection on social media
N Seddari, A Derhab, M Belaoued, W Halboob, J Al-Muhtadi, A Bouras
IEEE Access 10, 62097-62109, 2022
882022
Histogram-based intrusion detection and filtering framework for secure and safe in-vehicle networks
A Derhab, M Belaoued, I Mohiuddin, F Kurniawan, MK Khan
IEEE Transactions on Intelligent Transportation Systems 23 (3), 2366-2379, 2021
532021
A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features
M Belaoued, S Mazouzi
IFIP International Conference on Computer Science and its Applications, 416-425, 2015
522015
BMC‐SDN: Blockchain‐Based Multicontroller Architecture for Secure Software‐Defined Networks
A Derhab, M Guerroumi, M Belaoued, O Cheikhrouhou
Wireless Communications and Mobile Computing 2021 (1), 9984666, 2021
472021
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing
A Derhab, M Belaoued, M Guerroumi, FA Khan
IEEE Access 8, 28956-28969, 2020
372020
A chi-square-based decision for real-time malware detection using PE-file features
M Belaoued, S Mazouzi
Journal of Information Processing Systems 12 (4), 644-660, 2016
362016
Combined dynamic multi-feature and rule-based behavior for accurate malware detection
M Belaoued, A Boukellal, MA Koalal, A Derhab, S Mazouzi, FA Khan
International Journal of Distributed Sensor Networks 15 (11), 1550147719889907, 2019
232019
Statistical Study of imported APIs by PE type malware
M Belaoued, S Mazouzi
2014 International Conference on Advanced Networking Distributed Systems and …, 2014
222014
MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance
M Belaoued, A Derhab, S Mazouzi, FA Khan
IEEE Access 8, 14329-14343, 2020
202020
A Survey on Multi-Agent Based Collaborative Intrusion Detection Systems
N Bougueroua, S Mazouzi, M Belaoued, N Seddari, A Derhab, A Bouras
Journal of Artificial Intelligence and Soft Computing Research 11 (2), 111-142, 2021
182021
A new transformation approach for complex systems modelling and simulation: application to industrial control system
N Seddari, S Boukelkoul, A Bouras, M Belaoued, M Redjimi
International Journal of Simulation and Process Modelling 16 (1), 34-48, 2021
132021
Security in the internet of things: recent challenges and solutions
H Belkhiri, A Messai, M Belaoued, F Haider
International Conference on Electrical Engineering and Control Applications …, 2019
112019
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
A Derhab, A Bouras, M Belaoued, L Maglaras, FA Khan
Sensors 20 (21), 6106, 2020
92020
Agent/group/role organizational model to simulate an industrial control system
N Seddari, M Belaoued, S Bougueroua
World Academy of Science, Engineering and Technology, International Journal …, 2017
62017
Using Chi-Square test and heuristic search for detecting metamorphic malware
M Belaoued, S Mazouzi, S Noureddine, B Salah
2015 First International Conference on New Technologies of Information and …, 2015
52015
An MCA Based Method for API Association Extraction for PE Malware Categorization
M Belaoued, S Mazouzi
International Journal of Information and Electronics Engineering 5 (3), 225-231, 2015
52015
Approches Collectives et Coopératives en Sécurité des Systèmes Informatiques
M BELAOUED
Université de Skikda, 2016
4*2016
Towards an automatic method for api association extraction for pe-malware categorization
M Belaoued, S Mazouzi
Proceedings of the International Conference on Intelligent Information …, 2015
42015
Cyber-attack Proactive Defense Using Multivariate Time Series and Machine Learning with Fuzzy Inference-based Decision System
R Bitit, A Derhab, M Guerroumi, M Belaoued
International Conference on Machine Learning for Networking, 24-35, 2022
32022
Malware detection system based on an in-depth analysis of the portable executable headers
M Belaoued, B Guelib, Y Bounaas, A Derhab, M Boufaida
Machine Learning for Networking: First International Conference, MLN 2018 …, 2019
32019
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20