Aboubaker Lasebae
Orcid: 0000-0003-2312-9694
According to our database1,
Aboubaker Lasebae
authored at least 48 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Novel Bio-Inspired Bat Node Scheduling Algorithm for Dependable Safety-Critical Wireless Sensor Network Systems.
Sensors, March, 2024
2023
Efficient Design for Smart Environment Using Raspberry Pi with Blockchain and IoT (BRIoT).
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023
Proceedings of the Advanced Information Networking and Applications, 2023
2022
Novel group handover mechanism for Cooperative and Coordinated Mobile Femtocells technology in railway environment.
Array, 2022
2021
Heuristic Edge Server Placement in Industrial Internet of Things and Cellular Networks.
IEEE Internet Things J., 2021
Robust Continuous User Authentication System Using Long Short Term Memory Network for Healthcare.
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health Management, 2021
Cooperative and Coordinated Mobile Femtocells Technology in High-Speed Vehicular Environments - Mobility and Interference Management.
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Continuous User Authentication Featuring Keystroke Dynamics Based on Robust Recurrent Confidence Model and Ensemble Learning Approach.
IEEE Access, 2020
Evaluation of Energy Consumption and Delay in Different Modes of Data Aggregation for Wireless Sensor Networks.
Proceedings of the 2020 International Conference on UK-China Emerging Technologies, 2020
Proceedings of the 2020 International Conference on UK-China Emerging Technologies, 2020
2019
Implementing Fingerprint Recognition on One-Time Password Device to Enhance User Authentication.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019
2018
Int. J. Electron. Secur. Digit. Forensics, 2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
2017
Mobile femtocell utilisation in LTE vehicular environment: Vehicular penetration loss elimination and performance enhancement.
Veh. Commun., 2017
Int. J. Inf. Syst. Serv. Sect., 2017
Towards data privacy in heterogeneous cloud environments: An extension to the SANTA policy language.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017
2016
A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 12th International Conference on Intelligent Environments, 2016
2015
Comparison between resource reservation protocol and next steps in signalling in mobile IP networks.
IET Networks, 2015
2014
Concern level assessment: Building domain knowledge into a visual system to support network-security situation awareness.
Inf. Vis., 2014
LOC algorithm: Location-aware opportunistic forwarding by using node's approximate location.
Int. J. Pervasive Comput. Commun., 2014
An efficient traffic engineering based on multi-topology routing for future Internet.
Comput. Networks, 2014
A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP).
Proceedings of the 13th IEEE International Conference on Trust, 2014
System capacity improvement by on request channel allocation in LTE cellular network.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014
Instant Channel Allocation Technique to Improve System Throughput in Joint LTE Cellular Network.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
2013
An Efficient Resource Reservation for Domain Based Mobile IP Networks: Analytical Approach.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013
The impacts of internal threats towards Routing Protocol for Low power and lossy network performance.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
On demand-based frequency allocation to mitigate interference in Femto-Macro LTE cellular network.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
Supporting communications in the IoTs using the location/ID split protocol: A security analysis.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
2012
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach.
Int. J. Commun. Syst., 2012
A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR.
EURASIP J. Wirel. Commun. Netw., 2012
CoRR, 2012
Proceedings of the 2012 Wireless Telecommunications Symposium, 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012
Recognising the Activities of Low Entropy Mobile People Using Wireless Proximity Data.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012
M-Sieve: A visualisation tool for supporting network security analysts: VAST 2012 Mini Challenge 1 award: "Subject matter expert's award".
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012
2011
Proceedings of the IFIP Wireless Days Conference 2011, 2011
2010
Security Models for Heterogeneous Networking.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010