Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Youcef Begriche
@article{DBLP:journals/adhoc/HammiZLKBK20, author = {Badis Hammi and Sherali Zeadally and Houda Labiod and Rida Khatoun and Youcef Begriche and Lyes Khoukhi}, title = {A secure multipath reactive protocol for routing in IoT and HANETs}, journal = {Ad Hoc Networks}, volume = {103}, pages = {102118}, year = {2020}, url = {https://doi.org/10.1016/j.adhoc.2020.102118}, doi = {10.1016/J.ADHOC.2020.102118}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/HammiZLKBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/HammiFKZB20, author = {Badis Hammi and Achraf Fayad and Rida Khatoun and Sherali Zeadally and Youcef Begriche}, title = {A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)}, journal = {{IEEE} Syst. J.}, volume = {14}, number = {3}, pages = {3440--3450}, year = {2020}, url = {https://doi.org/10.1109/JSYST.2020.2970167}, doi = {10.1109/JSYST.2020.2970167}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/HammiFKZB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/KhatounBK19, author = {Rida Khatoun and Youcef Begriche and Lyes Khoukhi}, title = {A statistical detection mechanism for node misbehaviours in wireless mesh networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {31}, number = {1}, pages = {23--35}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.099637}, doi = {10.1504/IJAHUC.2019.099637}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/KhatounBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RmaytiKBKG17, author = {Mohammad Rmayti and Rida Khatoun and Youcef Begriche and Lyes Khoukhi and Dominique Ga{\"{\i}}ti}, title = {A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks}, journal = {Comput. Networks}, volume = {121}, pages = {53--64}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2017.04.027}, doi = {10.1016/J.COMNET.2017.04.027}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RmaytiKBKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/DromardKKB17, author = {Juliette Dromard and Lyes Khoukhi and Rida Khatoun and Youcef Begriche}, title = {Towards combining admission control and link scheduling in wireless mesh networks}, journal = {Telecommun. Syst.}, volume = {66}, number = {1}, pages = {39--54}, year = {2017}, url = {https://doi.org/10.1007/s11235-016-0273-0}, doi = {10.1007/S11235-016-0273-0}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/DromardKKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/GuKBS17, author = {Pengwenlong Gu and Rida Khatoun and Youcef Begriche and Ahmed Serhrouchni}, title = {Support Vector Machine {(SVM)} Based Sybil Attack Detection in Vehicular Networks}, booktitle = {2017 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2017, San Francisco, CA, USA, March 19-22, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WCNC.2017.7925783}, doi = {10.1109/WCNC.2017.7925783}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/GuKBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/KhatounBDKS16, author = {Rida Khatoun and Youcef Begriche and Juliette Dromard and Lyes Khoukhi and Ahmed Serhrouchni}, title = {A statistical trust system in wireless mesh networks}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {71}, number = {5-6}, pages = {187--199}, year = {2016}, url = {https://doi.org/10.1007/s12243-015-0488-1}, doi = {10.1007/S12243-015-0488-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/KhatounBDKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/GuKBS16, author = {Pengwenlong Gu and Rida Khatoun and Youcef Begriche and Ahmed Serhrouchni}, editor = {Jinjun Chen and Laurence T. Yang}, title = {Vehicle Driving Pattern Based Sybil Attack Detection}, booktitle = {18th {IEEE} International Conference on High Performance Computing and Communications; 14th {IEEE} International Conference on Smart City; 2nd {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016}, pages = {1282--1288}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0182}, doi = {10.1109/HPCC-SMARTCITY-DSS.2016.0182}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/GuKBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssic/BegricheKKC15, author = {Youcef Begriche and Rida Khatoun and Lyes Khoukhi and Xiuzhen Chen}, title = {Bayesian-based model for a reputation system in vehicular networks}, booktitle = {International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, {SSIC} 2015, Shanghai, China, August 5-7, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SSIC.2015.7245332}, doi = {10.1109/SSIC.2015.7245332}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/ssic/BegricheKKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssic/RmaytiBKKG15, author = {Mohammad Rmayti and Youcef Begriche and Rida Khatoun and Lyes Khoukhi and Dominique Ga{\"{\i}}ti}, title = {Flooding attacks detection in MANETs}, booktitle = {International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, {SSIC} 2015, Shanghai, China, August 5-7, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SSIC.2015.7245675}, doi = {10.1109/SSIC.2015.7245675}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssic/RmaytiBKKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/BegricheTA14, author = {Youcef Begriche and Messaoud Thameri and Karim Abed{-}Meraim}, title = {Exact conditional and unconditional Cram{\'{e}}r-Rao bounds for near field localization}, journal = {Digit. Signal Process.}, volume = {31}, pages = {45--58}, year = {2014}, url = {https://doi.org/10.1016/j.dsp.2014.04.006}, doi = {10.1016/J.DSP.2014.04.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/BegricheTA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MakiouBS14, author = {Abdelhamid Makiou and Youcef Begriche and Ahmed Serhrouchni}, title = {Improving Web Application Firewalls to detect advanced {SQL} injection attacks}, booktitle = {10th International Conference on Information Assurance and Security, {IAS} 2014, Okinawa, Japan, November 28-30, 2014}, pages = {35--40}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIAS.2014.7064617}, doi = {10.1109/ISIAS.2014.7064617}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MakiouBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/MakiouBS14, author = {Abdelhamid Makiou and Youcef Begriche and Ahmed Serhrouchni}, editor = {Elisa Bertino and Shu{-}Ching Chen and Karl Aberer and Prashant Krishnamurthy and Murat Kantarcioglu}, title = {Hybrid approach to detect SQLi attacks and evasion techniques}, booktitle = {10th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2014, Miami, Florida, USA, October 22-25, 2014}, pages = {452--456}, publisher = {{ICST} / {IEEE}}, year = {2014}, url = {https://doi.org/10.4108/icst.collaboratecom.2014.257568}, doi = {10.4108/ICST.COLLABORATECOM.2014.257568}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/MakiouBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/giis/RmaytiBKKG14, author = {Mohammad Rmayti and Youcef Begriche and Rida Khatoun and Lyes Khoukhi and Dominique Ga{\"{\i}}ti}, title = {Denial of Service (DoS) attacks detection in MANETs through statistical models}, booktitle = {Global Information Infrastructure and Networking Symposium, {GIIS} 2014, Montreal, QC, Canada, September 15-19, 2014}, pages = {1--3}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GIIS.2014.6934261}, doi = {10.1109/GIIS.2014.6934261}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/giis/RmaytiBKKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scvt/RmaytiBKKG14, author = {Mohammad Rmayti and Youcef Begriche and Rida Khatoun and Lyes Khoukhi and Dominique Ga{\"{\i}}ti}, title = {Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers}, booktitle = {21st {IEEE} Symposium on Communications and Vehicular Technology in the Benelux, {SCVT} 2014, Delft, The Netherlands, November 10, 2014}, pages = {7--12}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SCVT.2014.7046699}, doi = {10.1109/SCVT.2014.7046699}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/scvt/RmaytiBKKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-1725, author = {Youcef Begriche and Messaoud Thameri and Karim Abed{-}Meraim}, title = {Exact Conditional and Unconditional Cram{\`{e}}r-Rao Bounds for Near Field Localization}, journal = {CoRR}, volume = {abs/1303.1725}, year = {2013}, url = {http://arxiv.org/abs/1303.1725}, eprinttype = {arXiv}, eprint = {1303.1725}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-1725.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspa/BegricheTA12, author = {Youcef Begriche and Messaoud Thameri and Karim Abed{-}Meraim}, title = {Exact Cramer Rao Bound for near field source localization}, booktitle = {11th International Conference on Information Science, Signal Processing and their Applications, {ISSPA} 2012, Montreal, QC, Canada, July 2-5, 2012}, pages = {718--721}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSPA.2012.6310646}, doi = {10.1109/ISSPA.2012.6310646}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/isspa/BegricheTA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/DjahelBN10, author = {Soufiene Djahel and Youcef Begriche and Farid Na{\"{\i}}t{-}Abdesselam}, title = {A Bayesian Statistical Model to Alleviate Greediness in Wireless Mesh Networks}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5683525}, doi = {10.1109/GLOCOM.2010.5683525}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/DjahelBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/BegricheS10, author = {Youcef Begriche and Ahmed Serhrouchni}, title = {Bayesian statistical analysis for spams}, booktitle = {The 35th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings}, pages = {989--992}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/LCN.2010.5735846}, doi = {10.1109/LCN.2010.5735846}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/BegricheS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/BeghricheTL08, author = {Youcef Beghriche and Vincent Toubiana and Houda Labiod}, editor = {Akshai Aggarwal and Mohamad Badra and Fabio Massacci}, title = {A Bayesian Filter to Detect Misbehaving Nodes in MANETs}, booktitle = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NTMS.2008.ECP.7}, doi = {10.1109/NTMS.2008.ECP.7}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/BeghricheTL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.