Подписаться
Badis Hammi
Badis Hammi
Institut Polytechnique de Paris, Télécom SudParis
Подтвержден адрес электронной почты в домене telecom-sudparis.eu
Название
Процитировано
Процитировано
Год
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
MT Hammi, B Hammi, P Bellot, A Serhrouchni
Computers & Security 78, 126-142, 2018
8082018
IoT technologies<? show [AQ ID= Q1]?> for smart cities
B Hammi, R Khatoun, S Zeadally, A Fayad, L Khoukhi
IET networks 7 (1), 1-13, 2018
3752018
A lightweight ECC-based authentication scheme for Internet of Things (IoT)
B Hammi, A Fayad, R Khatoun, S Zeadally, Y Begriche
IEEE Systems Journal 14 (3), 3440-3450, 2020
1462020
Survey on smart homes: Vulnerabilities, risks, and countermeasures
B Hammi, S Zeadally, R Khatoun, J Nebhen
Computers & Security 117, 102677, 2022
1212022
A blockchain-based certificate revocation management and status verification system
EA Yves Christian, H Badis, S Ahmed, Z Sherali
Computers & Security 104, 102209, 2021
702021
Security threats, countermeasures, and challenges of digital supply chains
B Hammi, S Zeadally, J Nebhen
ACM Computing Surveys 55 (14s), 1-40, 2023
632023
Non-fungible tokens: a review
B Hammi, S Zeadally, AJ Perez
IEEE Internet of Things Magazine 6 (1), 46-50, 2023
382023
A secure multipath reactive protocol for routing in IoT and HANETs
B Hammi, S Zeadally, H Labiod, R Khatoun, Y Begriche, L Khoukhi
Ad Hoc Networks 103, 102118, 2020
342020
Understanding botclouds from a system perspective: A principal component analysis
H Badis, G Doyen, R Khatoun
2014 IEEE Network Operations and Management Symposium (NOMS), 1-9, 2014
332014
An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach
A Fayad, B Hammi, R Khatoun
2018 Third International Conference on Security of Smart Cities, Industrial …, 2018
322018
Total eclipse: How to completely isolate a bitcoin peer
AE Yves-Christian, B Hammi, A Serhrouchni, H Labiod
2018 Third International Conference on Security of Smart Cities, Industrial …, 2018
292018
Blockchain-based solution for detecting and preventing fake check scams
B Hammi, S Zeadally, YCE Adja, M Del Giudice, J Nebhen
IEEE Transactions on Engineering Management 69 (6), 3710-3725, 2021
262021
Is it really easy to detect sybil attacks in c-its environments: a position paper
B Hammi, YM Idir, S Zeadally, R Khatoun, J Nebhen
IEEE Transactions on Intelligent Transportation Systems 23 (10), 18273-18287, 2022
242022
Detecting botclouds at large scale: A decentralized and robust detection method for multi-tenant virtualized environments
R Cogranne, G Doyen, N Ghadban, B Hammi
IEEE Transactions on Network and Service Management 15 (1), 68-82, 2017
242017
A collaborative approach for a source based detection of botclouds
H Badis, G Doyen, R Khatoun
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
222015
Securing pki requests for c-its systems
JP Monteuuis, B Hammi, E Salles, H Labiod, R Blancher, E Abalea, ...
2017 26th International Conference on Computer Communication and Networks …, 2017
202017
PKIs in C-ITS: Security functions, architectures and projects: A survey
B Hammi, JP Monteuuis, J Petit
Vehicular Communications 38, 100531, 2022
142022
Toward a source detection of botclouds: a pca-based approach
H Badis, G Doyen, R Khatoun
Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014
142014
Software supply-chain security: Issues and countermeasures
B Hammi, S Zeadally
Computer 56 (7), 54-66, 2023
122023
Phishgnn: A phishing website detection framework using graph neural networks
T Bilot, G Geis, B Hammi
19th International Conference on Security and Cryptography, 428-435, 2022
122022
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20