Gueltoum Bendiab

Orcid: 0000-0002-9843-5496

According to our database1, Gueltoum Bendiab authored at least 37 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain and AI for Collaborative Intrusion Detection in 6G-enabled IoT Networks.
Proceedings of the 25th IEEE International Conference on High Performance Switching and Routing, 2024

Video-Based Abnormal Human Behaviour Detection for Video Forensics.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence.
IEEE Trans. Intell. Transp. Syst., April, 2023

BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Cybersecurity Challenges in the Maritime Sector.
Network, 2022

IDERES: Intrusion detection and response system using machine learning and attack graphs.
J. Syst. Archit., 2022

IPASS: A Novel Open-Source Intelligence Password Scoring System.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

CIDS: Collaborative Intrusion Detection System using Blockchain Technology.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
913 Malicious Network Traffic PCAPs and Binary Visualisation Images Dataset.
Dataset, March, 2021

A Novel Multimodal Biometric Authentication System using Machine Learning and Blockchain.
CoRR, 2021

Tools for Network Traffic Generation - A Quantitative Comparison.
CoRR, 2021

Insider Detection using Deep Autoencoder and Variational Autoencoder Neural Networks.
CoRR, 2021

Thermal Management in Large Data Centers: Security Threats and Mitigation.
CoRR, 2021

On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance.
Comput. Networks, 2021

Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Data Exfiltration: Methods and Detection Countermeasures.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Thermal Management in Large Data Centres: Security Threats and Mitigation.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues.
Proceedings of the 2020 IEEE World Congress on Services, 2020

A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning.
Proceedings of the 2020 IEEE World Congress on Services, 2020

SoMIAP: Social Media Images Analysis and Prediction Framework.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

BotSpot: Deep Learning Classification of Bot Accounts Within Twitter.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Detection of Insider Threats using Artificial Intelligence and Visualisation.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

IoT Malware Network Traffic Classification using Visual Representation and Deep Learning.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Advanced metering infrastructures: security risks and mitigation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
A machine-learning approach to Detect users' suspicious behaviour through the Facebook wall.
CoRR, 2019

A Novel Blockchain-based Trust Model for Cloud Identity Management.
CoRR, 2019

FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management.
Comput. Secur., 2019

Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Improving Sentiment Analysis of Arabic Tweets.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

FaceWallGraph: Using Machine Learning for Profiling User Behaviour from Facebook Wall.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

2018
A New Dynamic Trust Model for "On Cloud" Federated Identity Management.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
A dynamic federated identity management approach for cloud-based environments.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017


  Loading...