Yasmine Harbi

Orcid: 0000-0001-6731-7895

According to our database1, Yasmine Harbi authored at least 16 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature.
Clust. Comput., October, 2024

Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems.
Sensors, August, 2024

Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment.
Comput. Commun., 2024

Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review.
Comput. Electr. Eng., 2024

Bio-inspired Intrusion Detection System for Internet of Things Networks Security.
Proceedings of the Cognitive Models and Artificial Intelligence Conference, 2024

2023
Machine learning-based clustering protocols for Internet of Things networks: An overview.
Int. J. Commun. Syst., 2023

A systematic literature review of machine learning applications in IoT.
Int. J. Commun. Syst., 2023

Lightweight Mutual Authentication and Key Agreement Scheme for Wearable Devices in Fog-enabled WBAN.
Proceedings of the 5th International Conference on Pattern Analysis and Intelligent Systems, 2023

Secure IIoT networks with hybrid CNN-GRU model using Edge-IIoTset.
Proceedings of the 15th International Conference on Innovations in Information Technology, 2023

2022
Improved bio-inspired security scheme for privacy-preserving in the internet of things.
Peer-to-Peer Netw. Appl., 2022

Temporal Requirements Aware Based Communication Protocol for Wireless Sensor Networks.
Proceedings of the 13th IEEE Annual Ubiquitous Computing, 2022

2021
Recent Security Trends in Internet of Things: A Comprehensive Survey.
IEEE Access, 2021

2019
A Review of Security in Internet of Things.
Wirel. Pers. Commun., 2019

Enhanced authentication and key management scheme for securing data transmission in the internet of things.
Ad Hoc Networks, 2019

2018
Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things.
Proceedings of the Modelling and Implementation of Complex Systems, 2018

Enhancement of IoT Applications Dependability Using Bayesian Networks.
Proceedings of the Computational Intelligence and Its Applications, 2018


  Loading...