Youcef Begriche

According to our database1, Youcef Begriche authored at least 19 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT).
IEEE Syst. J., 2020

A secure multipath reactive protocol for routing in IoT and HANETs.
Ad Hoc Networks, 2020

2019
A statistical detection mechanism for node misbehaviours in wireless mesh networks.
Int. J. Ad Hoc Ubiquitous Comput., 2019

2017
Towards combining admission control and link scheduling in wireless mesh networks.
Telecommun. Syst., 2017

A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks.
Comput. Networks, 2017

Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

2016
A statistical trust system in wireless mesh networks.
Ann. des Télécommunications, 2016

Vehicle Driving Pattern Based Sybil Attack Detection.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Flooding attacks detection in MANETs.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Bayesian-based model for a reputation system in vehicular networks.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

2014
Exact conditional and unconditional Cramér-Rao bounds for near field localization.
Digit. Signal Process., 2014

Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers.
Proceedings of the 21st IEEE Symposium on Communications and Vehicular Technology in the Benelux, 2014

Denial of Service (DoS) attacks detection in MANETs through statistical models.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Hybrid approach to detect SQLi attacks and evasion techniques.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Improving Web Application Firewalls to detect advanced SQL injection attacks.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2012
Exact Cramer Rao Bound for near field source localization.
Proceedings of the 11th International Conference on Information Science, 2012

2010
Bayesian statistical analysis for spams.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

A Bayesian Statistical Model to Alleviate Greediness in Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2010

2008
A Bayesian Filter to Detect Misbehaving Nodes in MANETs.
Proceedings of the NTMS 2008, 2008


  Loading...