Karim Lounis
Orcid: 0000-0003-4197-4189
According to our database1,
Karim Lounis
authored at least 27 papers
between 2016 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions.
IEEE Trans. Veh. Technol., April, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation.
ACM Trans. Cyber Phys. Syst., 2022
IEEE Trans. Aerosp. Electron. Syst., 2022
2021
PhD thesis, 2021
IACR Cryptol. ePrint Arch., 2021
PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart.
IACR Cryptol. ePrint Arch., 2021
IEEE Access, 2021
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Proceedings of the Software Engineering and Formal Methods. SEFM 2020 Collocated Workshops, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
2019
Proceedings of the 12th International Conference on Security of Information and Networks, 2019
Proceedings of the 3rd Cyber Security in Networking Conference, 2019
Proceedings of the Risks and Security of Internet and Systems, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
2018
Proceedings of the Security and Trust Management - 14th International Workshop, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
2017
Proceedings of the Ninth International Workshop on the Practical Application of Stochastic Modelling, 2017
2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016