Abdelouahid Derhab
Orcid: 0000-0002-6498-1528Affiliations:
- King Saud University
According to our database1,
Abdelouahid Derhab
authored at least 118 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Comput. Soc. Syst., August, 2024
DDoS attack forecasting based on online multiple change points detection and time series analysis.
Multim. Tools Appl., May, 2024
ACM Comput. Surv., February, 2024
Crowd Congestion Forecasting Framework Using Ensemble Learning Model and Decision Making Algorithm: Umrah Use Case.
IEEE Access, 2024
2023
Two-Stage Intrusion Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023
PRIviLY: Private Remote Inference over fulLY connected deep networks for pervasive health monitoring with constrained client-side.
J. Inf. Secur. Appl., September, 2023
SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features.
Expert Syst. Appl., September, 2023
Veh. Commun., February, 2023
Increasing Continuous Engagement With Open Government Data: Learning From the Saudi Experience.
J. Glob. Inf. Manag., 2023
Privacy-preserving remote deep-learning-based inference under constrained client-side environment.
J. Ambient Intell. Humaniz. Comput., 2023
2022
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks.
IEEE Trans. Intell. Transp. Syst., 2022
Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques.
Comput. Electr. Eng., 2022
A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media.
IEEE Access, 2022
Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
2021
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence
Advances in Information Security 86, Springer, ISBN: 978-3-030-74663-6, 2021
BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks.
Wirel. Commun. Mob. Comput., 2021
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things.
Sensors, 2021
J. Artif. Intell. Soft Comput. Res., 2021
TriDroid: a triage and classification framework for fast detection of mobile threats in android markets.
J. Ambient Intell. Humaniz. Comput., 2021
CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover.
Complex., 2021
Comput. Electr. Eng., 2021
IEEE Access, 2021
PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021
2020
Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering.
Wirel. Commun. Mob. Comput., 2020
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues.
Telecommun. Syst., 2020
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.
Sensors, 2020
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset.
Neural Comput. Appl., 2020
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues.
Knowl. Based Syst., 2020
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges.
J. Inf. Secur. Appl., 2020
Android Malware Clustering using Community Detection on Android Packages Similarity Network.
CoRR, 2020
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning.
Comput. Secur., 2020
Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
2019
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks.
J. Supercomput., 2019
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.
Sensors, 2019
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.
Secur. Commun. Networks, 2019
Trust models of internet of smart things: A survey, open issues, and future directions.
J. Netw. Comput. Appl., 2019
IEEE Internet Things J., 2019
Combined dynamic multi-feature and rule-based behavior for accurate malware detection.
Int. J. Distributed Sens. Networks, 2019
Reducing the effects of DoS attacks in software defined networks using parallel flow installation.
Hum. centric Comput. Inf. Sci., 2019
Accurate detection of sitting posture activities in a secure IoT based assisted living environment.
Future Gener. Comput. Syst., 2019
Toward an optimal solution against Denial of Service attacks in Software Defined Networks.
Future Gener. Comput. Syst., 2019
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends.
CoRR, 2019
CoRR, 2019
An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
2018
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics Informatics, 2018
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures.
EAI Endorsed Trans. Security Safety, 2018
Digit. Investig., 2018
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.
CoRR, 2018
Comput. Networks, 2018
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.
IEEE Access, 2018
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.
IEEE Access, 2018
Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), 2018
Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers.
Proceedings of the Machine Learning for Networking - First International Conference, 2018
2017
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness.
Wirel. Pers. Commun., 2017
Efficient and privacy-aware multi-party classification protocol for human activity recognition.
J. Netw. Comput. Appl., 2017
J. Medical Syst., 2017
Ann. des Télécommunications, 2017
Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
Sensors, 2016
Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network.
Mob. Inf. Syst., 2016
Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.
Comput. Hum. Behav., 2016
Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016
Cypider: building community-based cyber-defense infrastructure for android malware detection.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
ACM Trans. Sens. Networks, 2015
Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems.
Secur. Commun. Networks, 2015
Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks.
Int. J. Distributed Sens. Networks, 2015
A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Comput. Hum. Behav., 2015
Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society.
Comput. Hum. Behav., 2015
Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience.
Comput. Hum. Behav., 2015
Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks.
Proceedings of the 12th International Conference on Information Technology, 2015
Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink.
Proceedings of the 12th International Conference on Information Technology, 2015
On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications.
Proceedings of the 17th International Conference on E-health Networking, 2015
2014
Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges.
IEEE Commun. Surv. Tutorials, 2014
Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN.
Comput. Networks, 2014
Third line of defense strategy to fight against SMS-based malware in android smartphones.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
Proceedings of the 21st International Conference on Telecommunications, 2014
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014
2013
2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Semi-structured and unstructured data aggregation scheduling in wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
MOB-TOSSIM: An Extension Framework for TOSSIM Simulator to Support Mobility in Wireless Sensor and Actuator Networks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012
2011
Distributed algorithm for the actor coverage problem in WSN-based precision irrigation applications.
Proceedings of the Distributed Computing in Sensor Systems, 2011
2010
A Comparison on MANETs' Service Replication Schemes: Interest versus Topology Prediction.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2010
2009
IEEE Commun. Surv. Tutorials, 2009
Efficient Monitoring Mechanisms for Cooperative Storage in Mobile Ad-Hoc Networks: Detection Time and Accuracy Tradeoffs.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009
2008
A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks.
IEEE Trans. Parallel Distributed Syst., 2008
A distributed mutual exclusion algorithm over multi-routing protocol for mobile <i>ad hoc</i> networks.
Int. J. Parallel Emergent Distributed Syst., 2008
Self-stabilizing algorithm for high service availability in spite of concurrent topology changes in ad hoc mobile networks.
J. Parallel Distributed Comput., 2008
Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service.
Ad Hoc Networks, 2008
SQUIRREL: Self-Organizing Qos-roUting for IntRa-flow Contention in Ad-Hoc wiRELess Networks.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008
Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008
2007
Eur. Trans. Telecommun., 2007
Clust. Comput., 2007
2006
Proceedings of the Wireless Algorithms, 2006
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006
Localized Hybrid Data Delivery Scheme using K-hop Clustering Algorithm in Ad Hoc Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Proceedings of the 2nd International Conference on Wireless on Demand Network Systems and Service (WONS 2005), 2005