Hassan N. Noura
Orcid: 0000-0003-1768-9193Affiliations:
- University of Franche-Comté, Institut FEMTO-ST, France
- American University of Beirut (AUB), Department of Electrical and Computer Engineering, Lebanon (former)
According to our database1,
Hassan N. Noura
authored at least 116 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Explainable artificial intelligence of tree-based algorithms for fault detection and diagnosis in grid-connected photovoltaic systems.
Eng. Appl. Artif. Intell., 2025
2024
A deep learning object detection method to improve cluster analysis of two-dimensional data.
Multim. Tools Appl., August, 2024
Multim. Tools Appl., January, 2024
Wind turbine fault detection and identification using a two-tier machine learning framework.
Intell. Syst. Appl., 2024
Leveraging the power of machine learning and data balancing techniques to evaluate stability in smart grids.
Eng. Appl. Artif. Intell., 2024
Proceedings of the 38th ECMS International Conference on Modelling and Simulation, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
The internet of modular robotic things: Issues, limitations, challenges, & solutions.
Internet Things, October, 2023
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms.
J. Inf. Secur. Appl., August, 2023
J. Inf. Secur. Appl., August, 2023
Ad Hoc Networks, 2023
Ad Hoc Networks, 2023
2022
Veh. Commun., 2022
DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm.
J. Supercomput., 2022
J. Supercomput., 2022
An efficient and secure cipher scheme for MIMO-OFDM systems based on physical layer security.
Telecommun. Syst., 2022
Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacks.
Multim. Tools Appl., 2022
J. Ambient Intell. Humaniz. Comput., 2022
J. Inf. Secur. Appl., 2022
Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms.
J. Inf. Secur. Appl., 2022
A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices.
IEEE Internet Things J., 2022
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations.
Internet Things, 2022
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations.
Int. J. Inf. Sec., 2022
Ad Hoc Networks, 2022
Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022
A Novel Lightweight and Robust Source-Channel Coding Solution for MIoT Communication Based on DL Denoising/Super Resolution Model.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022
Machine Learning for Physical Layer Security: Limitations, Challenges and Recommendation.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
2021
Microprocess. Microsystems, November, 2021
Wirel. Networks, 2021
Telecommun. Syst., 2021
IEEE Trans. Cloud Comput., 2021
J. Inf. Secur. Appl., 2021
Security of Power Line Communication systems: Issues, limitations and existing solutions.
Comput. Sci. Rev., 2021
CoRR, 2021
Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations.
CoRR, 2021
Comput. Networks, 2021
Ann. des Télécommunications, 2021
Proceedings of the International Symposium on Networks, Computers and Communications, 2021
2020
Multim. Tools Appl., 2020
Multim. Tools Appl., 2020
ESSENCE: GPU-based and dynamic key-dependent efficient stream cipher for multimedia contents.
Multim. Tools Appl., 2020
Microprocess. Microsystems, 2020
Internet Things, 2020
Internet Things, 2020
Int. J. Inf. Sec., 2020
Securing internet of medical things systems: Limitations, issues and recommendations.
Future Gener. Comput. Syst., 2020
Efficient and secure multi-homed systems based on binary random linear network coding.
Comput. Electr. Eng., 2020
Proceedings of the Mobile, Secure, and Programmable Networking, 2020
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 10th International Conference on Cloud Computing and Services Science, 2020
2019
Signal Process. Image Commun., 2019
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach.
Mob. Networks Appl., 2019
IEEE Internet Things J., 2019
Design and realization of efficient & secure multi-homed systems based on random linear network coding.
Comput. Networks, 2019
Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks.
Ann. des Télécommunications, 2019
A robust image-encryption approach against transmission errors in Communicating Things Networks.
Ad Hoc Networks, 2019
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Secure and Lightweight Mutual Multi-Factor Authentication for IoT Communication Systems.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Proceedings of the Fourth International Conference on Advances in Computational Tools for Engineering Applications, 2019
2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Multim. Syst., 2018
A secure client-side framework for protecting the privacy of health data stored on the cloud.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
2017
Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications.
J. Inf. Secur. Appl., 2017
CoRR, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Secure and resilient scheme for data protection in unattended wireless sensor networks.
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications.
Proceedings of the Risks and Security of Internet and Systems, 2017
2016
Signal Process. Image Commun., 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network.
IACR Cryptol. ePrint Arch., 2015
An integrated multimedia data reduction and content confidentiality approach for limited networked devices.
Ad Hoc Networks, 2015
ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015
Secure and Error Resilient Approach for Multimedia Data Transmission in Constrained Networks.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015
Proceedings of the Ad Hoc Networks, 2015
2014
Signal Process. Image Commun., 2014
Comput. Networks, 2014
EDCA: Efficient diffusion cipher and authentication scheme for Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014
Proceedings of the SECRYPT 2014, 2014
Efficient and Secure Visual Data Transmission Approach for Wireless Multimedia Sensor Networks.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014
2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the 16th ACM International Conference on Modeling, 2013
Proceedings of the 12th Annual Mediterranean Ad Hoc Networking Workshop, 2013
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
2012
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011