Network intrusion detection for IoT security based on learning techniques N Chaabouni, M Mosbah, A Zemmari, C Sauvignac, P Faruki IEEE Communications Surveys & Tutorials 21 (3), 2671-2701, 2019 | 959 | 2019 |
A machine learning based approach to detect malicious android apps using discriminant system calls P Vinod, A Zemmari, M Conti Future Generation Computer Systems 94, 333-350, 2019 | 89 | 2019 |
An optimal bit complexity randomized distributed MIS algorithm Y Métivier, JM Robson, N Saheb-Djahromi, A Zemmari Distributed Computing 23 (5-6), 331-340, 2011 | 73 | 2011 |
Android inter-app communication threats and detection techniques S Bhandari, WB Jaballah, V Jain, V Laxmi, A Zemmari, MS Gaur, ... Computers & Security 70, 392-421, 2017 | 60 | 2017 |
An optimal bit complexity randomized distributed MIS algorithm M Yves, JM Robson, SD Nasser, A Zemmari International Colloquium on Structural Information and Communication …, 2009 | 46 | 2009 |
DRACO: DRoid analyst combo an android malware analysis framework S Bhandari, R Gupta, V Laxmi, MS Gaur, A Zemmari, M Anikeev Proceedings of the 8th International Conference on Security of Information …, 2015 | 45 | 2015 |
Sword: semantic aware android malware detector S Bhandari, R Panihar, S Naval, V Laxmi, A Zemmari, MS Gaur Journal of information security and applications 42, 46-56, 2018 | 43 | 2018 |
A OneM2M intrusion detection and prevention system based on edge machine learning N Chaabouni, M Mosbah, A Zemmari, C Sauvignac NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2020 | 42* | 2020 |
Sublinear fully distributed partition with applications B Derbel, M Mosbah, A Zemmari Theory of Computing Systems 47 (2), 368-404, 2010 | 41* | 2010 |
Analysis of a randomized rendezvous algorithm Y Métivier, N Saheb, A Zemmari Information and Computation 184 (1), 109-128, 2003 | 40 | 2003 |
Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements J Gajrani, V Laxmi, M Tripathi, MS Gaur, A Zemmari, M Mosbah, M Conti Advances in Computers 119, 73-120, 2020 | 36* | 2020 |
Randomized rendezvous Y Metivier, N Saheb, A Zemmari Mathematics and Computer Science, 183-194, 2000 | 34 | 2000 |
Randomized local elections Y Métivier, N Saheb, A Zemmari Information processing letters 82 (6), 313-320, 2002 | 31 | 2002 |
Review of white box methods for explanations of convolutional neural networks in image classification tasks MP Ayyar, J Benois-Pineau, A Zemmari Journal of Electronic Imaging 30 (5), 050901-050901, 2021 | 30 | 2021 |
Distributed computation of a spanning tree in a dynamic graph by mobile agents S Abbas, M Mosbah, A Zemmari 2006 IEEE International Conference on Engineering of Intelligent Systems, 1-6, 2006 | 27 | 2006 |
EspyDroid+: Precise reflection analysis of android apps J Gajrani, U Agarwal, V Laxmi, B Bezawada, MS Gaur, M Tripathi, ... Computers & Security 90, 101688, 2020 | 26 | 2020 |
Counting in one-hop beeping networks A Casteigts, Y Métivier, JM Robson, A Zemmari Theoretical Computer Science 780, 20-28, 2019 | 26* | 2019 |
About randomised distributed graph colouring and graph partition algorithms Y Métivier, JM Robson, N Saheb-Djahromi, A Zemmari Information and Computation 208 (11), 1296-1304, 2010 | 24 | 2010 |
Merging time of random mobile agents S Abbas, M Mosbah, A Zemmari Dynamics in Logistics: First International Conference, LDIC 2007, Bremen …, 2008 | 24* | 2008 |
Design patterns in beeping algorithms: Examples, emulation, and analysis A Casteigts, Y Métivier, JM Robson, A Zemmari arXiv preprint arXiv:1607.02951, 2016 | 23 | 2016 |