עקוב אחר
Karim Lounis
Karim Lounis
Assistant Professor at ENSIA, The National School of Artificial Intelligence, Algeria.
כתובת אימייל מאומתת בדומיין ensia.edu.dz
כותרת
צוטט על ידי
צוטט על ידי
שנה
Attacks and Defenses in Short-Range Wireless Technologies for IoT
K Lounis, M Zulkernine
IEEE Access 8, 88892-88932, 2020
1432020
Fast Authentication in Wireless Sensor Networks
C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab
Future Generation Computer Systems 55, 362-375, 2016
912016
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
International Conference on Quantitative Evaluation of Systems, 159-162, 2016
622016
T2T-MAP: A PUF-based Thing-to-Thing Mutual Authentication Protocol for IoT
K Lounis, M Zulkernine
IEEE Access 8, 137384-137405, 2021
372021
Bad-Token: Denial of Service Attacks on WPA3
K Lounis, M Zulkernine
12th International Conference on Security of Information and Networks, 1-8, 2019
362019
Bluetooth Low Energy Makes "Just Works" not Work
K Lounis, M Zulkernine
3rd Cyber Security in Networking Conference, 2019
352019
Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
K Lounis, M Zulkernine
Digital Threats: Research and Practice, 33, 2021
342021
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
R Jhawar, K Lounis, S Mauw
International Workshop on Security and Trust Management, 138-153, 2016
302016
CSKES: A Context-based Secure Keyless Entry System
J Wang, K Lounis, M Zulkernine
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019
292019
Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library
R Jhawar, K Lounis, S Mauw, Y Ramırez-Cruz
International Workshop on Security and Trust Management, 2018
272018
WPA3 Connection Deprivation Attacks
K Lounis, M Zulkernine
International Conference on Risks and Security of Internet and Systems, 164-176, 2019
262019
A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus
K Lounis, Z Mansour, M Wrana, MAA Elsayed, SHH Ding, M Zulkernine
IEEE Transactions on Aerospace and Electronic Systems, 19, 2022
242022
D2D-MAP: A Drone to Drone Authentication Protocol using Physical Unclonable Functions
K Lounis, HHD Steven, M Zulkernine
IEEE Transactions on Vehicular Technology, 16, 2022
222022
AdaptIDS: Adaptive Intrusion Detection for Mission-critical Aerospace Vehicles
MAA Elsayed, M Wrana, Z Mansour, K Lounis, SHH Ding, M Zulkernine
IEEE Transactions on Intelligent Transportation Systems, 2022
212022
Exploiting Race Condition for Wi-Fi Denial of Service Attacks
K Lounis, M Zulkernine
13th International Conference on Security of Information and Networks (SIN …, 2020
152020
Stochastic-based Semantics of Attack-Defense Trees for Security Assessment
K Lounis
International Workshop on Practical Applications of Stochastic Modelling 337 …, 2017
152017
Modeling Attack-Defense Trees' Countermeasures using Continuous Time Markov Chains
K Lounis, S Ouchani
2nd International Workshop on Automated and Verifiable Software System …, 2020
132020
Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3
K Lounis, HHS Ding, M Zulkernine
The 14th International Symposium on Foundations & Practice of Security, 17, 2021
112021
More Lessons: Analysis of PUF-based Authentication Protocols for IoT
K Lounis, M Zulkernine
Cryptology ePrint Archive, 2021
102021
Connection Dumping Vulnerability Affecting Bluetooth Availability
K Lounis, M Zulkernine
International Conference on Risks and Security of Internet and Systems, 188-204, 2018
102018
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20