Farid Naït-Abdesselam

Orcid: 0000-0002-5042-5387

According to our database1, Farid Naït-Abdesselam authored at least 140 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BLE-WBAN: RF real-world dataset of BLE devices in human-centric healthcare environments.
Dataset, July, 2024

Addressing Trust Challenges in Blockchain Oracles Using Asymmetric Byzantine Quorums.
CoRR, 2024

Enhancing Privacy Protection for Federated Learning with Distributed Differential Privacy.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024

Bluetooth Low Energy (BLE) RF Dataset for Machine Learning in WBANs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Leveraging Human-In-The-Loop Machine Learning and GAN-Synthesized Data for Intrusion Detection in Unmanned Aerial Vehicle Networks.
Proceedings of the IEEE International Conference on Communications, 2024

Multi-Agent Reinforcement Learning-Based Extended Boid Modeling for Drone Swarms.
Proceedings of the IEEE International Conference on Communications, 2024

A Convolutional Neural Network-based Approach For Image Analysis and Injection Detection.
Proceedings of the IEEE International Conference on Advanced Video and Signal Based Surveillance, 2024

2023
Lightweight anonymous and mutual authentication scheme for wireless body area networks.
Comput. Networks, April, 2023

Asymmetric Byzantine Quorum Approach to Resolve Trust Issues in Decentralized Blockchain Oracles.
Proceedings of the International Conference on Software, 2023

An LSTM-Based Outlier Detection Approach for IoT Sensor Data in Hierarchical Edge Computing.
Proceedings of the International Conference on Software, 2023

Realtime Intrusion Detection In Unmanned Aerial Vehicles Using Active Learning and Generative Adversarial Networks.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Defensive Randomization Against Adversarial Attacks in Image-Based Android Malware Detection.
Proceedings of the IEEE International Conference on Communications, 2023

Lightweight TLS 1.3 Handshake for C-ITS Systems.
Proceedings of the IEEE International Conference on Communications, 2023

A HITL-Integrated Machine Learning Approach to Secure Drone Networks for IIoT Applications.
Proceedings of the IEEE Globecom Workshops 2023, 2023

FoMS: Fog-Enabled Mobile Sensor Virtualization Architecture for IoT Applications.
Proceedings of the IEEE Global Communications Conference, 2023

Detecting CAM Flooding Attacks in Vehicular Networks Using Online K-means Algorithm.
Proceedings of the IEEE Global Communications Conference, 2023

Study of Spiking Neural Network-Based Regressor on Applications in Digital Predistortion for Power Amplifiers.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

Scalable Blockchain Through Prioritised Sharding.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

Scaling A Blockchain System With Layered Architecture.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

Prioritised Sharding: A Novel Approach to Enhance Blockchain Scalability.
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023

Scaling a Blockchain System from Eventual to Full Atomicity Using Confederation Approach.
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023

Parallel Committees: High-Performance, Scalable, Secure and Fault-Tolerant Data Replication Using a Novel Sharding Technique.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

Scalable Blockchain System for Load Balancing DNS Servers Using Heuristic Sharding.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Diff-Price: Differential Pricing Scheme for Provisioning Safety-as-a-Service in Vehicular IoT Applications.
IEEE Trans. Veh. Technol., 2022

Range-Price Trade-Off in Sensor-Cloud for Provisioning Sensors-as-a-Service.
IEEE Trans. Cloud Comput., 2022

X-haul Outage Compensation in 5G/6G Using Reconfigurable Intelligent Surfaces.
CoRR, 2022

A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial Systems.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Detecting False Data Injections in Images Collected by Drones: A Deep Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2022

TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2022

A Channel-based Authentication Using Machine Learning for Body Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Malware Forensics: Legacy Solutions, Recent Advances, and Future Challenges.
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022

2021
Permissioned vs. Permissionless Blockchain: How and Why There Is Only One Right Choice.
J. Softw., 2021

Towards enabling unmanned aerial vehicles as a service for heterogeneous applications.
J. Commun. Networks, 2021

A WAVE Based and Collaboration Driven Framework for Reduced Traffic Congestion in Smart Cities.
IEEE Intell. Transp. Syst. Mag., 2021

Securing Unmanned Aerial Systems Using Mobile Agents and Artificial Neural Networks.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

A Lightweight Security Technique For Unmanned Aerial Vehicles Against GPS Spoofing Attack.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Comparing ANN and SVM Algorithms for Predicting Exercise Routines of Diabetic Patients.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Anxiety and Depression Management For Elderly Using Internet of Things and Symphonic Melodies.
Proceedings of the ICC 2021, 2021

Robustness of Image-based Android Malware Detection Under Adversarial Attacks.
Proceedings of the ICC 2021, 2021

Enabling Real-Time Dashboards for Anxiety Risk Classification Using the Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2021

A Bayesian Game Model for Dynamic Channel Sensing Intervals in Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2021

Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding.
Proceedings of the IEEE Global Communications Conference, 2021

2020
D3S: A Framework for Enabling Unmanned AerialVehicles as a Service.
CoRR, 2020

A Data Cleansing Approach In Smart Home Environments Using Artificial Neural Networks.
Proceedings of the 16th International Conference on Wireless and Mobile Computing, 2020

An Intelligent Malware Detection and Classification System Using Apps-to-Images Transformations and Convolutional Neural Networks.
Proceedings of the 16th International Conference on Wireless and Mobile Computing, 2020

An Online Anomaly Detection Approach For Unmanned Aerial Vehicles.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

RGB-based Android Malware Detection and Classification Using Convolutional Neural Network.
Proceedings of the IEEE Global Communications Conference, 2020

An Efficient Probabilistic Model for Anomaly Prediction in Aerial Ad Hoc Networks.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

Data Quality Improvements for Internet of Things Using Artificial Neural Networks.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
JCN October special issue on IoT security and privacy.
J. Commun. Networks, 2019

A blockchain-based framework to secure vehicular social networks.
Trans. Emerg. Telecommun. Technol., 2019

Detection and Prediction of Cardiac Anomalies Using Wireless Body Sensors and Bayesian Belief Networks.
CoRR, 2019

DODS: A Distributed Outlier Detection Scheme for Wireless Sensor Networks.
Comput. Networks, 2019

A Novel Data Cleansing Approach for Sensitive Applications of Wireless Sensor Networks.
Proceedings of the International Conference on Smart Applications, 2019

Predicting Cardiac Anomalies Using Probabilistic Models on Historical Electrocardiogram Data.
Proceedings of the International Conference on Smart Applications, 2019

Towards a Smart Parking Management System for Smart Cities.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

A Multivariate Outlier Detection Algorithm for Wireless Sensor Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
A comprehensive 3-dimensional security analysis of a controller in software-defined networking.
Secur. Priv., 2018

Secure transmission of multimedia contents over low-power mobile devices.
J. Inf. Secur. Appl., 2018

SENAD: Securing Network Application Deployment in Software Defined Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Optimized Proactive Caching Scheme Based on Mobility Prediction for Vehicular Networks.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Hybrid alternative receiver-sender approach with a coloured DR/BDR mechanism for the broadcast of safety messages in VANETs.
Int. J. Ad Hoc Ubiquitous Comput., 2017

Controller DAC: Securing SDN controller with dynamic access control.
Proceedings of the IEEE International Conference on Communications, 2017

2016
ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

SRV: Switch-based rules verification in software defined networking.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

ST-segment and T-wave anomalies prediction in an ECG data using RUSBoost.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

2015
Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems.
Secur. Commun. Networks, 2015

A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP).
Secur. Commun. Networks, 2015

An overview of localization algorithms in mobile wireless sensor networks.
Proceedings of the International Conference on Protocol Engineering, 2015

Optimal data placement to improve data dissemination in vehicular networks.
Proceedings of the International Conference on Protocol Engineering, 2015

A comparative study of supervised learning techniques for ECG T-wave anomalies detection in a WBS context.
Proceedings of the International Conference on Protocol Engineering, 2015

Optimal caching of encoded data for content distribution in vehicular networks.
Proceedings of the IEEE International Conference on Communication, 2015

An ECG T-wave anomalies detection using a lightweight classification model for wireless body sensors.
Proceedings of the IEEE International Conference on Communication, 2015

2014
Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

An Efficient Admission Control Algorithm for Virtual Sensor Networks.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

An ECG monitoring system for prediction of cardiac anomalies using WBAN.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

Padovan sequence based Backoff Algorithm for improved wireless medium access in MANETs.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

2013
An asynchronous low-power medium access control protocol for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2013

Privacy-Preserving Wireless Medical Sensor Network.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A lightweight countermeasure to cope with flooding attacks against session initiation protocol.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Early detection of Myocardial Infarction using WBAN.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

2012
Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs.
IEEE Wirel. Commun. Lett., 2012

Improving the quality of service routing in OLSR protocol.
Proceedings of the International Conference on Communications and Information Technology, 2012

Anomaly detection in network traffic using Jensen-Shannon divergence.
Proceedings of IEEE International Conference on Communications, 2012

2011
Architectures and protocols for wireless mesh, ad hoc, and sensor networks.
Wirel. Commun. Mob. Comput., 2011

Characterizing the greedy behavior in wireless <i>ad hoc</i> networks.
Secur. Commun. Networks, 2011

Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges.
IEEE Commun. Surv. Tutorials, 2011

Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks.
Comput. Secur., 2011

Strategy based proxy to secure user agent from flooding attack in SIP.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
RADAR: A reputation-driven anomaly detection system for wireless mesh networks.
Wirel. Networks, 2010

Cross-Layer Optimized MAC to Support Multihop QoS Routing for Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2010

A vehicle gateway to manage IP multimedia subsystem autonomous mobility.
Int. J. Auton. Adapt. Commun. Syst., 2010

Thwarting back-off rules violation in tactical wireless ad hoc networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

A Bayesian Statistical Model to Alleviate Greediness in Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2010

Overlapping Clusters Algorithm in Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2010

2009
Optimizing distortion for real-time data gathering in randomly deployed sensor networks.
Wirel. Commun. Mob. Comput., 2009

Distortion Analysis for Real-Time Data Collection of Spatially Temporally Correlated Data Fields in Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2009

FLSAC: A new scheme to defend against greedy behavior in wireless mesh networks.
Int. J. Commun. Syst., 2009

Predictive channel estimation for optimized resources allocation in DVB-S2 networks.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

The 2nd IEEE Workshop on Wireless and Internet Services (WISe 2009).
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

A cross layer framework to mitigate a joint MAC and routing attack in multihop wireless networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Neighbor based channel hopping coordination: Practical against jammer?
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

A Fuzzy Logic Based Scheme to Detect Adaptive Cheaters in Wireless LAN.
Proceedings of IEEE International Conference on Communications, 2009

An Effective Strategy for Greedy Behavior in Wireless Ad hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Highlighting the effects of joint MAC layer misbehavior and virtual link attack in wireless ad hoc networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Defending against packet dropping attack in vehicular <i>ad hoc</i> networks.
Secur. Commun. Networks, 2008

Rate-lifetime tradeoff for reliable communication in wireless sensor networks.
Comput. Networks, 2008

Detecting and avoiding wormhole attacks in wireless ad hoc networks.
IEEE Commun. Mag., 2008

RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A model-based semi-quantitative approach for evaluating security of enterprise networks.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A collaborative peer-to-peer architecture to defend against DDoS attacks.
Proceedings of the LCN 2008, 2008

Performance Analysis of an Energy Efficient MAC Protocol for Sensor Networks.
Proceedings of the 9th International Symposium on Parallel Architectures, 2008

Applying a self-configuring admission control algorithm in a new QoS architecture for IEEE 802.16 networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

F<sup>2</sup>-TCP: A fairer and TCP-friendlier congestion control protocol for high-speed networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol.
Proceedings of IEEE International Conference on Communications, 2008

On Physical-Aware Directional MAC Protocol for Indoor Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Avoiding virtual link attacks in wireless ad hoc networks.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

Performance evaluation of TCP handoffs over mobile IP connections.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender.
Proceedings of the The Third International Conference on Availability, 2008

2007
Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

PPN 2007 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Performance modelling of the o-mac protocol.
Proceedings of the 2nd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2007

R-MAC: Reservation Medium Access Control Protocol for Wireless Sensor Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

802.11 Qos Cross-Layer Protocol Based Propagation Conditions Adaptation.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

O-MAC: An Organized Energy-Aware MAC Protocol for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

DPS-MAC: An Asynchronous MAC Protocol for Wireless Sensor Networks.
Proceedings of the High Performance Computing, 2007

Route Optimization for Large Scale Network Mobility Assisted by BGP.
Proceedings of the Global Communications Conference, 2007

Logical Wormhole Prevention in Optimized Link State Routing Protocol.
Proceedings of the Global Communications Conference, 2007

RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless Local Area Networks.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
Maximum Data Collection Least-Cost Routing in Energy Constrained Wireless Sensor Networks.
Proceedings of the LCN 2006, 2006

Energy-Aware Fair Routing in Wireless Sensor Networks with Maximum Data Collection.
Proceedings of IEEE International Conference on Communications, 2006

Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2004
Enhanced Routing-Aware Adaptive MAC with Traffic Differentiation and Smoothed Contention Window in Wireless Ad-Hoc Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

2003
Achieving Routing Based Medium Access Fairness in Wireless Ad-Hoc Networks.
Proceedings of the Distributed Computing, 2003

1999
Cooperative Adaptation to Quality of Servive Using Active Software Agents.
Netw. Inf. Syst. J., 1999

Qos Control and Adaptation in Distributed Multimedia Systems.
Proceedings of the Parallel and Distributed Processing, 1999

Cooperative Adaptation to Quality of Service Using Distributed Agents.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Intelligent Agents for QoS Control and Adaptation in Distributed Multimedia Systems.
Proceedings of the 1st International Conference on Enterprise Information Systems, 1999


  Loading...