Mohamed Amine Ferrag
Orcid: 0000-0002-0632-3172
According to our database1,
Mohamed Amine Ferrag
authored at least 118 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
IEEE Internet Things J., June, 2024
Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures.
Internet Things, April, 2024
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms.
J. Netw. Comput. Appl., March, 2024
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges.
IEEE CAA J. Autom. Sinica, January, 2024
From 5G to 6G Networks: A Survey on AI-Based Jamming and Interference Detection and Mitigation.
IEEE Open J. Commun. Soc., 2024
LLM-Based Edge Intelligence: A Comprehensive Survey on Architectures, Applications, Security and Trustworthiness.
IEEE Open J. Commun. Soc., 2024
Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques.
Internet Things, 2024
Securing Tomorrow's Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Do Neutral Prompts Produce Insecure Code? FormAI-v2 Dataset: Labelling Vulnerabilities in Code Generated by Large Language Models.
CoRR, 2024
CyberMetric: A Benchmark Dataset for Evaluating Large Language Models Knowledge in Cybersecurity.
CoRR, 2024
Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices.
IEEE Access, 2024
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Tree-based indexing technique for efficient and real-time label retrieval in the object tracking system.
J. Supercomput., December, 2023
IoVT-based efficient solution for optimal active smart camera selection in a tracking mission.
Internet Things, December, 2023
Multiverse Recurrent Expansion With Multiple Repeats: A Representation Learning Algorithm for Electricity Theft Detection in Smart Grids.
IEEE Trans. Smart Grid, November, 2023
FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications.
Dataset, September, 2023
ICT Express, August, 2023
J. Supercomput., June, 2023
Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications.
J. Sens. Actuator Networks, June, 2023
Dataset for : A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification.
Dataset, June, 2023
2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT.
Comput. Secur., April, 2023
Veh. Commun., February, 2023
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs.
Pervasive Mob. Comput., January, 2023
Wirel. Pers. Commun., 2023
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing.
Sensors, 2023
HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones.
Pervasive Mob. Comput., 2023
PeerJ Comput. Sci., 2023
Internet Technol. Lett., 2023
Inf., 2023
PrSChain: A Blockchain Based Privacy Preserving Approach for Data Service Composition.
Informatica (Slovenia), 2023
Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing.
CoRR, 2023
ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance.
CoRR, 2023
A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification.
CoRR, 2023
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses.
IEEE Commun. Surv. Tutorials, 2023
Efficient Method for Continuous IoT Data Stream Indexing in the Fog-Cloud Computing Level.
Big Data Cogn. Comput., 2023
ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance.
IEEE Access, 2023
Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing.
Proceedings of the Wireless Internet - 16th EAI International Conference, 2023
Proceedings of the 8th South-East Europe Design Automation, 2023
The FormAI Dataset: Generative AI in Software Security through the Lens of Formal Verification.
Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering, 2023
Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-Enabled IoTs: An Anticipatory Study.
Proceedings of the IEEE International Conference on Communications, 2023
Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023
2022
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning.
Dataset, April, 2022
Physical Security and Safety of IoT Equipment: A Survey of Recent Advances and Opportunities.
IEEE Trans. Ind. Informatics, 2022
A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems.
J. Sens. Actuator Networks, 2022
FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.
J. Parallel Distributed Comput., 2022
Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends.
IEEE Internet Things Mag., 2022
Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions.
IEEE CAA J. Autom. Sinica, 2022
A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues.
Future Internet, 2022
Trans. Emerg. Telecommun. Technol., 2022
IEEE Access, 2022
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.
IEEE Access, 2022
Proceedings of the 7th South-East Europe Design Automation, 2022
Deep Learning with Recurrent Expansion for Electricity Theft Detection in Smart Grids.
Proceedings of the IECON 2022, 2022
2021
WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.
Sensors, 2021
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles.
J. Inf. Secur. Appl., 2021
The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial.
IEEE Internet Things J., 2021
A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges.
IEEE CAA J. Autom. Sinica, 2021
Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies.
IEEE CAA J. Autom. Sinica, 2021
Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives.
IEEE CAA J. Autom. Sinica, 2021
Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.
IEEE Access, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the 6th South-East Europe Design Automation, 2021
Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles.
Proceedings of the Cognitive Radio Oriented Wireless Networks and Wireless Internet, 2021
Proceedings of the IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, 2021
2020
DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids.
IEEE Trans. Engineering Management, 2020
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues.
Telecommun. Syst., 2020
Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems.
Sensors, 2020
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.
Internet Technol. Lett., 2020
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study.
J. Inf. Secur. Appl., 2020
J. Inf. Secur. Appl., 2020
Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey.
J. Inf. Secur. Appl., 2020
Int. J. Cyber Warf. Terror., 2020
RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.
Future Internet, 2020
An efficient indexing for Internet of Things massive data based on cloud-fog computing.
Trans. Emerg. Telecommun. Technol., 2020
Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges.
IEEE Access, 2020
The Impact of the Adversary's Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles.
Proceedings of the 5th South-East Europe Design Automation, 2020
2019
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.
Sensors, 2019
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.
Secur. Commun. Networks, 2019
IEEE Internet Things J., 2019
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends.
CoRR, 2019
CoRR, 2019
DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services.
Comput., 2019
A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
2018
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures.
EAI Endorsed Trans. Security Safety, 2018
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes.
J. Netw. Comput. Appl., 2018
An intrusion detection system based on combining probability predictions of a tree of classifiers.
Int. J. Commun. Syst., 2018
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.
CoRR, 2018
Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), 2018
2017
ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network.
Telecommun. Syst., 2017
EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications.
Telecommun. Syst., 2017
Secur. Commun. Networks, 2017
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017
IEEE Commun. Surv. Tutorials, 2017
2016
EPSA: an efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks.
Int. J. Secur. Networks, 2016
2014
SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network.
Int. J. Inf. Comput. Secur., 2014
2013
ECPDR: An Efficient Conditional Privacy-Preservation Scheme with Demand Response for Secure Ad hoc Social Communications.
Int. J. Embed. Real Time Commun. Syst., 2013