Bubbles of Trust: A decentralized blockchain-based authentication system for IoT MT Hammi, B Hammi, P Bellot, A Serhrouchni Computers & Security 78, 126-142, 2018 | 810 | 2018 |
A survey of internet of things (IoT) authentication schemes M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni Sensors 19 (5), 1141, 2019 | 482 | 2019 |
Pre-shared key ciphersuites for transport layer security (TLS) P Eronen, H Tschofenig | 400 | 2005 |
Handbook of peer-to-peer networking X Shen, H Yu, J Buford, M Akon Springer Science & Business Media, 2010 | 278 | 2010 |
Analysis of cyber security for industrial control systems Z Drias, A Serhrouchni, O Vogel 2015 international conference on cyber security of smart cities, industrial …, 2015 | 138 | 2015 |
A multilingual system for cyberbullying detection: Arabic content detection using machine learning B Haidar, M Chamoun, A Serhrouchni Advances in Science, Technology and Engineering Systems Journal 2 (6), 275-284, 2017 | 132 | 2017 |
BCTrust: A decentralized authentication blockchain-based mechanism MT Hammi, P Bellot, A Serhrouchni 2018 IEEE wireless communications and networking conference (WCNC), 1-6, 2018 | 128 | 2018 |
Taxonomy of attacks on industrial control protocols Z Drias, A Serhrouchni, O Vogel 2015 International Conference on Protocol Engineering (ICPE) and …, 2015 | 125 | 2015 |
Decentralized access control mechanism with temporal dimension based on blockchain M Jemel, A Serhrouchni 2017 IEEE 14th International Conference on e-business Engineering (ICEBE …, 2017 | 102 | 2017 |
Analysis of authentication techniques in Internet of Things (IoT) M El-Hajj, M Chamoun, A Fadlallah, A Serhrouchni 2017 1st Cyber Security in Networking Conference (CSNet), 1-3, 2017 | 102 | 2017 |
Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content B Haidar, M Chamoun, A Serhrouchni 2017 1st cyber security in networking conference (CSNet), 1-8, 2017 | 83 | 2017 |
A blockchain-based certificate revocation management and status verification system YCE Adja, B Hammi, A Serhrouchni, S Zeadally Computers & Security 104, 102209, 2021 | 70 | 2021 |
Analysis of cryptographic algorithms on iot hardware platforms M El-Haii, M Chamoun, A Fadlallah, A Serhrouchni 2018 2nd Cyber Security in Networking Conference (CSNet), 1-5, 2018 | 65 | 2018 |
Support vector machine (svm) based sybil attack detection in vehicular networks P Gu, R Khatoun, Y Begriche, A Serhrouchni 2017 IEEE wireless communications and networking conference (WCNC), 1-6, 2017 | 64 | 2017 |
Arabic cyberbullying detection: Using deep learning B Haidar, M Chamoun, A Serhrouchni 2018 7th international conference on computer and communication engineering …, 2018 | 60 | 2018 |
Named-data security scheme for named data networking B Hamdane, A Serhrouchni, A Fadlallah, SG El Fatmi 2012 Third International Conference on The Network of the Future (NOF), 1-6, 2012 | 59 | 2012 |
On blockchain technology: Overview of bitcoin and future insights H Hellani, AE Samhat, M Chamoun, H El Ghor, A Serhrouchni 2018 IEEE International Multidisciplinary Conference on Engineering …, 2018 | 58 | 2018 |
Improving Web Application Firewalls to detect advanced SQL injection attacks A Makiou, Y Begriche, A Serhrouchni 2014 10th international conference on information assurance and security, 35-40, 2014 | 57 | 2014 |
An intelligent mechanism for sybil attacks detection in vanets CHOO Quevedo, AMBC Quevedo, GA Campos, RL Gomes, J Celestino, ... ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 55 | 2020 |
Taxonomy of authentication techniques in Internet of Things (IoT) M El-Hajj, M Chamoun, A Fadlallah, A Serhrouchni 2017 IEEE 15th Student Conference on Research and Development (SCOReD), 67-71, 2017 | 52 | 2017 |