Roadsense: Smartphone application to estimate road conditions using accelerometer and gyroscope A Allouch, A Koubâa, T Abbes, A Ammar IEEE Sensors Journal 17 (13), 4231-4238, 2017 | 195 | 2017 |
MAVSec: Securing the MAVLink protocol for ardupilot/PX4 unmanned aerial systems A Allouch, O Cheikhrouhou, A Koubâa, M Khalgui, T Abbes 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 135 | 2019 |
Protocol analysis in intrusion detection using decision tree T Abbes, A Bouhoula, M Rusinowitch International Conference on Information Technology: Coding and Computing …, 2004 | 134 | 2004 |
Qualitative and quantitative risk analysis and safety assessment of unmanned aerial vehicles missions over the internet A Allouch, A Koubaa, M Khalgui, T Abbes Ieee Access 7, 53392-53410, 2019 | 106 | 2019 |
Efficient decision tree for protocol analysis in intrusion detection T Abbes, A Bouhoula, M Rusinowitch International Journal of Security and Networks 5 (4), 220-235, 2010 | 48 | 2010 |
An inference system for detecting firewall filtering rules anomalies T Abbes, A Bouhoula, M Rusinowitch Proceedings of the 2008 ACM symposium on Applied computing, 2122-2128, 2008 | 43 | 2008 |
Misbehavior detection using implicit trust relations in the AODV routing protocol MA Ayachi, C Bidan, T Abbes, A Bouhoula 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 38 | 2009 |
Detection of firewall configuration errors with updatable tree T Abbes, A Bouhoula, M Rusinowitch International Journal of Information Security 15 (3), 301-317, 2016 | 35 | 2016 |
IoT routing attacks detection using machine learning algorithms S Rabhi, T Abbes, F Zarai Wireless Personal Communications 128 (3), 1839-1857, 2023 | 29 | 2023 |
Behavior-based approach to detect spam over IP telephony attacks R Jabeur Ben Chikha, T Abbes, W Ben Chikha, A Bouhoula International Journal of Information Security 15, 131-143, 2016 | 25 | 2016 |
Data analyzer based on data mining for honeypot router A Ghourabi, T Abbes, A Bouhoula ACS/IEEE International Conference on Computer Systems and Applications …, 2010 | 25 | 2010 |
Ensuring security in depth based on heterogeneous network security technologies M Sourour, B Adel, A Tarek International Journal of Information Security 8 (4), 233-246, 2009 | 24 | 2009 |
Honeypot router for routing protocols protection A Ghourabi, T Abbes, A Bouhoula 2009 Fourth International Conference on Risks and Security of Internet and …, 2009 | 21 | 2009 |
On the fly pattern matching for intrusion detection with Snort T Abbes, A Bouhoula, M Rusinowitch Annales des télécommunications 59 (9/10), 1045-1071, 2004 | 21 | 2004 |
Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives M Sourour, B Adel, A Tarek 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 107-114, 2009 | 20 | 2009 |
Characterization of attacks collected from the deployment of Web service honeypot A Ghourabi, T Abbes, A Bouhoula Security and Communication Networks 7 (2), 338-351, 2014 | 15 | 2014 |
Experimental analysis of attacks against web services and countermeasures A Ghourabi, T Abbes, A Bouhoula Proceedings of the 12th International Conference on Information Integration …, 2010 | 13 | 2010 |
Network security alerts management architecture for signature-based intrusions detection systems within a NAT environment M Sourour, B Adel, A Tarek Journal of Network and Systems Management 19 (4), 472-495, 2011 | 12 | 2011 |
Classification du trafic et optimisation des règles de filtrage pour la détection d'intrusions. T Abbes Henri Poincaré University, Nancy, France, 2004 | 12 | 2004 |
Detection of covert channels over ICMP protocol S Sayadi, T Abbes, A Bouhoula 2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017 | 11 | 2017 |