Martine Bellaïche

Orcid: 0000-0001-9530-7643

According to our database1, Martine Bellaïche authored at least 34 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Game-theoretic Approach for DDoS Attack Mitigation in IIoT Deterministic Networking.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

2023
An ensemble deep learning based IDS for IoT using Lambda architecture.
Cybersecur., December, 2023

A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks.
Comput. Secur., 2023

Community Detection Algorithm for Mitigating Eclipse Attacks on Blockchain-enabled Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

A Study on the Efficiency of Intrusion Detection Systems in IoT Networks.
Proceedings of the International Conference on Computer, 2023

2022
An Emergency Event Detection Ensemble Model Based on Big Data.
Big Data Cogn. Comput., 2022

Towards Adaptive Cybersecurity for Green IoT.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2022

2021
The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment.
J. Hardw. Syst. Secur., 2021

Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach.
IEEE Trans. Cloud Comput., 2020

Fog Computing Security Assessment for Device Authentication in the Internet of Things.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Live Placement of Interdependent Virtual Machines to Optimize Cloud Service Profits and Penalties on SLAs.
IEEE Trans. Cloud Comput., 2019

Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis.
J. Hardw. Syst. Secur., 2019

A deep learning approach for proactive multi-cloud cooperative intrusion detection system.
Future Gener. Comput. Syst., 2019

Multi-cloud cooperative intrusion detection system: trust and fairness assurance.
Ann. des Télécommunications, 2019

Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

A Decentralized Reputation Management System for Securing the Internet of Vehicles.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment.
J. Cloud Comput., 2018

A broker-based framework for standardization and management of Cloud Security-SLAs.
Comput. Secur., 2018

On trustworthy federated clouds: A coalitional game approach.
Comput. Networks, 2018

Online Allocation of Cloud Resources Based on Security Satisfaction.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

2017
Towards quantification and evaluation of security of Cloud Service Providers.
J. Inf. Secur. Appl., 2017

A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing.
Future Internet, 2017

Evaluation and selection of Cloud security services based on Multi-Criteria Analysis MCA.
Proceedings of the 2017 International Conference on Computing, 2017

Service Assignment in Federated Cloud Environments Based on Multi-objective Optimization of Security.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

2014
VANET security surveys.
Comput. Commun., 2014

New Distributed Approach for an Autonomous Dynamic Management of Interdependent Virtual Machines.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

2012
SYN flooding attack detection by TCP handshake anomalies.
Secur. Commun. Networks, 2012

2011
Avoiding DDoS with active management of backlog queues.
Proceedings of the 5th International Conference on Network and System Security, 2011

2009
SYN Flooding Attack Detection Based on Entropy Computing.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009


  Loading...