Karim Lounis

Orcid: 0000-0003-4197-4189

According to our database1, Karim Lounis authored at least 26 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions.
IEEE Trans. Veh. Technol., April, 2023

2022
AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation.
ACM Trans. Cyber Phys. Syst., 2022

A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus.
IEEE Trans. Aerosp. Electron. Syst., 2022

Wi-Fi Security: Do We Still Have to Look Back?
IACR Cryptol. ePrint Arch., 2022

2021
Security of Short-Range Wireless Technologies and an Authentication Protocol for IoT
PhD thesis, 2021

More Lessons: Analysis of PUF-based Authentication Protocols for IoT.
IACR Cryptol. ePrint Arch., 2021

PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart.
IACR Cryptol. ePrint Arch., 2021

T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT.
IEEE Access, 2021

Cut It: Deauthentication Attack on Bluetooth.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2020
Attacks and Defenses in Short-Range Wireless Technologies for IoT.
IEEE Access, 2020

Exploiting Race Condition for Wi-Fi Denial of Service Attacks.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Modeling Attack-Defense Trees' Countermeasures Using Continuous Time Markov Chains.
Proceedings of the Software Engineering and Formal Methods. SEFM 2020 Collocated Workshops, 2020

Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
Bad-token: denial of service attacks on WPA3.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Bluetooth Low Energy Makes "Just Works" Not Work.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

WPA3 Connection Deprivation Attacks.
Proceedings of the Risks and Security of Internet and Systems, 2019

Security Features for Proximity Verification.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

CSKES: A Context-Based Secure Keyless Entry System.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018

Connection Dumping Vulnerability Affecting Bluetooth Availability.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
Stochastic-based Semantics Of Attack-Defense Trees For Security Assessment.
Proceedings of the Ninth International Workshop on the Practical Application of Stochastic Modelling, 2017

2016
Fast authentication in wireless sensor networks.
Future Gener. Comput. Syst., 2016

A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016


  Loading...