A survey of trust management in the Internet of Vehicles A Hbaieb, S Ayed, L Chaari Computer Networks 203, 108558, 2022 | 93 | 2022 |
Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures F Tlili, LC Fourati, S Ayed, B Ouni Ad hoc networks 129, 102805, 2022 | 56 | 2022 |
A survey on trust management for WBAN: Investigations and future directions S Ayed, L Chaari, A Fares Sensors 20 (21), 6041, 2020 | 32 | 2020 |
Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey A Haddaji, S Ayed, LC Fourati Computers and Electrical Engineering 104, 108460, 2022 | 31 | 2022 |
Federated learning with blockchain approach for trust management in IoV A Haddaji, S Ayed, L Chaari International conference on advanced information networking and applications …, 2022 | 29 | 2022 |
Blockchain and trust-based clustering scheme for the IoV S Ayed, A Hbaieb, L Chaari Ad Hoc Networks 142, 103093, 2023 | 28 | 2023 |
Federated learning toward data preprocessing: COVID-19 context LC Fourati, A Samiha 2021 IEEE International Conference on Communications Workshops (ICC …, 2021 | 27 | 2021 |
Blockchain-based multi-levels trust mechanism against sybil attacks for vehicular networks A Haddaji, S Ayed, LC Fourati 2020 IEEE 14th International Conference on Big Data Science and Engineering …, 2020 | 25 | 2020 |
Federated learning based IDS approach for the IoV A Hbaieb, S Ayed, L Chaari Proceedings of the 17th international conference on availability …, 2022 | 24 | 2022 |
Deploying security policy in intra and inter workflow management systems S Ayed, N Cuppens-Boulahia, F Cuppens 2009 International Conference on Availability, Reliability and Security, 58-65, 2009 | 24 | 2009 |
Artificial intelligence based approach for fault and anomaly detection within uavs F Tlili, S Ayed, L Chaari, B Ouni International Conference on Advanced Information Networking and Applications …, 2022 | 21 | 2022 |
An integrated model for access control and information flow requirements S Ayed, N Cuppens-Boulahia, F Cuppens Advances in Computer Science–ASIAN 2007. Computer and Network Security: 12th …, 2007 | 18 | 2007 |
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures A Hamdi, L Fourati, S Ayed International Journal of Information Security 23 (2), 713-757, 2024 | 16 | 2024 |
Security aspects: a framework for enforcement of security policies using AOP S Ayed, MS Idrees, N Cuppens-Boulahia, F Cuppens, M Pinto, L Fuentes 2013 International Conference on Signal-Image Technology & Internet-Based …, 2013 | 14 | 2013 |
Deploying access control in distributed workflow S Ayed, N Cuppens-Boulahia, F Cuppens Proceedings of the sixth Australasian conference on Information security …, 2008 | 14 | 2008 |
Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS) F Tlili, S Ayed, LC Fourati Computers & Security 142, 103878, 2024 | 13 | 2024 |
A novel and efficient framework for in-vehicle security enforcement A Haddaji, S Ayed, LC Fourati Ad Hoc Networks 158, 103481, 2024 | 9 | 2024 |
Managing access and flow control requirements in distributed workflows S Ayed, N Cuppens-Boulahia, F Cuppens 2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008 | 9 | 2008 |
Advancing UAV security with artificial intelligence: A comprehensive survey of techniques and future directions F Tlili, S Ayed, LC Fourati Internet of Things, 101281, 2024 | 8 | 2024 |
A transfer learning based intrusion detection system for internet of vehicles A Haddaji, S Ayed, LC Fourati 2023 15th international conference on developments in esystems engineering …, 2023 | 8 | 2023 |