Mohamed-Lamine Messai

Orcid: 0000-0003-0376-0657

According to our database1, Mohamed-Lamine Messai authored at least 28 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
1
1
2
2
1
1
1
1
1
1
5
5
2
1
1
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks.
CoRR, January, 2025

2024
AdaPtive and rObust Key pre-distribution for multi-phase IoT networks.
Int. J. Commun. Syst., 2024

Deep Reinforcement Learning-Based Moving Target Defense Approach to Secure Network Slicing in 5G and Beyond.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024

Node Compromising Detection to Mitigate Poisoning Attacks in IoT Networks.
Proceedings of the International Wireless Communications and Mobile Computing, 2024

(POSTER) A Graph Dataset for Security Enforcement in IoT Networks : GRASEC-IoT.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

Autonomous Bio-inspired 3D Deployment of Aerial Base Stations for Optimal Wireless Coverage in 5G Networks.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat Detection.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
A robust and efficient vector-based key management scheme for IoT networks.
Ad Hoc Networks, October, 2023

A survey on implementations of homomorphic encryption schemes.
J. Supercomput., September, 2023

POSTER: Activity Graph Learning for Attack Detection in IoT Networks.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023

Study on Poisoning Attacks: Application Through an IoT Temperature Dataset.
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023

BKRSC-IoT: Blockchain-Based Key Revocation Using Smart Contracts for IoT Networks.
Proceedings of the Management of Digital EcoSystems - 15th International Conference, 2023

A Self-Healing Pairwise Key Pre-Distribution Scheme in IoT-based WSNs.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
IFKMS: Inverse Function-based Key Management Scheme for IoT networks.
J. Inf. Secur. Appl., 2022

Using Machine Learning in WSNs for Performance Prediction MAC Layer.
Int. J. Inf. Secur. Priv., 2022

Détection d'anomalies dans les flux de graphes et attaques d'empoisonnement.
Proceedings of the Extraction et Gestion des Connaissances, 2022

Taxonomie des attaques sur les méthodes d'apprentissage automatique.
Proceedings of the Business Intelligence & Big Data, 2022

2020
Short Paper: Privacy Comparison of Contact Tracing Mobile Applications for COVID-19.
CoRR, 2020

2019
A Full-Healing Key Distribution Scheme for Resource-Constrained Devices.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

2018
EAHKM+: energy-aware secure clustering scheme in wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2018

2017
A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless Sensor Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
A survey of key management schemes in multi-phase wireless sensor networks.
Comput. Networks, 2016

A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

2015
A lightweight key management scheme for wireless sensor networks.
J. Supercomput., 2015

A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks.
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015

2014
Classification of Attacks in Wireless Sensor Networks.
CoRR, 2014

2010
Tree Based Protocol for Key Management in Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010


  Loading...