BibTeX records: Youcef Begriche

download as .bib file

@article{DBLP:journals/adhoc/HammiZLKBK20,
  author       = {Badis Hammi and
                  Sherali Zeadally and
                  Houda Labiod and
                  Rida Khatoun and
                  Youcef Begriche and
                  Lyes Khoukhi},
  title        = {A secure multipath reactive protocol for routing in IoT and HANETs},
  journal      = {Ad Hoc Networks},
  volume       = {103},
  pages        = {102118},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.adhoc.2020.102118},
  doi          = {10.1016/J.ADHOC.2020.102118},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/HammiZLKBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/HammiFKZB20,
  author       = {Badis Hammi and
                  Achraf Fayad and
                  Rida Khatoun and
                  Sherali Zeadally and
                  Youcef Begriche},
  title        = {A Lightweight ECC-Based Authentication Scheme for Internet of Things
                  (IoT)},
  journal      = {{IEEE} Syst. J.},
  volume       = {14},
  number       = {3},
  pages        = {3440--3450},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSYST.2020.2970167},
  doi          = {10.1109/JSYST.2020.2970167},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/HammiFKZB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/KhatounBK19,
  author       = {Rida Khatoun and
                  Youcef Begriche and
                  Lyes Khoukhi},
  title        = {A statistical detection mechanism for node misbehaviours in wireless
                  mesh networks},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {31},
  number       = {1},
  pages        = {23--35},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJAHUC.2019.099637},
  doi          = {10.1504/IJAHUC.2019.099637},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/KhatounBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RmaytiKBKG17,
  author       = {Mohammad Rmayti and
                  Rida Khatoun and
                  Youcef Begriche and
                  Lyes Khoukhi and
                  Dominique Ga{\"{\i}}ti},
  title        = {A stochastic approach for packet dropping attacks detection in mobile
                  Ad hoc networks},
  journal      = {Comput. Networks},
  volume       = {121},
  pages        = {53--64},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2017.04.027},
  doi          = {10.1016/J.COMNET.2017.04.027},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/RmaytiKBKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/DromardKKB17,
  author       = {Juliette Dromard and
                  Lyes Khoukhi and
                  Rida Khatoun and
                  Youcef Begriche},
  title        = {Towards combining admission control and link scheduling in wireless
                  mesh networks},
  journal      = {Telecommun. Syst.},
  volume       = {66},
  number       = {1},
  pages        = {39--54},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11235-016-0273-0},
  doi          = {10.1007/S11235-016-0273-0},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/DromardKKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/GuKBS17,
  author       = {Pengwenlong Gu and
                  Rida Khatoun and
                  Youcef Begriche and
                  Ahmed Serhrouchni},
  title        = {Support Vector Machine {(SVM)} Based Sybil Attack Detection in Vehicular
                  Networks},
  booktitle    = {2017 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2017, San Francisco, CA, USA, March 19-22, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WCNC.2017.7925783},
  doi          = {10.1109/WCNC.2017.7925783},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/GuKBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/KhatounBDKS16,
  author       = {Rida Khatoun and
                  Youcef Begriche and
                  Juliette Dromard and
                  Lyes Khoukhi and
                  Ahmed Serhrouchni},
  title        = {A statistical trust system in wireless mesh networks},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {71},
  number       = {5-6},
  pages        = {187--199},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12243-015-0488-1},
  doi          = {10.1007/S12243-015-0488-1},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/KhatounBDKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/GuKBS16,
  author       = {Pengwenlong Gu and
                  Rida Khatoun and
                  Youcef Begriche and
                  Ahmed Serhrouchni},
  editor       = {Jinjun Chen and
                  Laurence T. Yang},
  title        = {Vehicle Driving Pattern Based Sybil Attack Detection},
  booktitle    = {18th {IEEE} International Conference on High Performance Computing
                  and Communications; 14th {IEEE} International Conference on Smart
                  City; 2nd {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
  pages        = {1282--1288},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0182},
  doi          = {10.1109/HPCC-SMARTCITY-DSS.2016.0182},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/GuKBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssic/BegricheKKC15,
  author       = {Youcef Begriche and
                  Rida Khatoun and
                  Lyes Khoukhi and
                  Xiuzhen Chen},
  title        = {Bayesian-based model for a reputation system in vehicular networks},
  booktitle    = {International Conference on Cyber Security of Smart Cities, Industrial
                  Control System and Communications, {SSIC} 2015, Shanghai, China, August
                  5-7, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SSIC.2015.7245332},
  doi          = {10.1109/SSIC.2015.7245332},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/ssic/BegricheKKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssic/RmaytiBKKG15,
  author       = {Mohammad Rmayti and
                  Youcef Begriche and
                  Rida Khatoun and
                  Lyes Khoukhi and
                  Dominique Ga{\"{\i}}ti},
  title        = {Flooding attacks detection in MANETs},
  booktitle    = {International Conference on Cyber Security of Smart Cities, Industrial
                  Control System and Communications, {SSIC} 2015, Shanghai, China, August
                  5-7, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SSIC.2015.7245675},
  doi          = {10.1109/SSIC.2015.7245675},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssic/RmaytiBKKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/BegricheTA14,
  author       = {Youcef Begriche and
                  Messaoud Thameri and
                  Karim Abed{-}Meraim},
  title        = {Exact conditional and unconditional Cram{\'{e}}r-Rao bounds for
                  near field localization},
  journal      = {Digit. Signal Process.},
  volume       = {31},
  pages        = {45--58},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.dsp.2014.04.006},
  doi          = {10.1016/J.DSP.2014.04.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/BegricheTA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MakiouBS14,
  author       = {Abdelhamid Makiou and
                  Youcef Begriche and
                  Ahmed Serhrouchni},
  title        = {Improving Web Application Firewalls to detect advanced {SQL} injection
                  attacks},
  booktitle    = {10th International Conference on Information Assurance and Security,
                  {IAS} 2014, Okinawa, Japan, November 28-30, 2014},
  pages        = {35--40},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIAS.2014.7064617},
  doi          = {10.1109/ISIAS.2014.7064617},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MakiouBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/MakiouBS14,
  author       = {Abdelhamid Makiou and
                  Youcef Begriche and
                  Ahmed Serhrouchni},
  editor       = {Elisa Bertino and
                  Shu{-}Ching Chen and
                  Karl Aberer and
                  Prashant Krishnamurthy and
                  Murat Kantarcioglu},
  title        = {Hybrid approach to detect SQLi attacks and evasion techniques},
  booktitle    = {10th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2014, Miami, Florida,
                  USA, October 22-25, 2014},
  pages        = {452--456},
  publisher    = {{ICST} / {IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2014.257568},
  doi          = {10.4108/ICST.COLLABORATECOM.2014.257568},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/MakiouBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/giis/RmaytiBKKG14,
  author       = {Mohammad Rmayti and
                  Youcef Begriche and
                  Rida Khatoun and
                  Lyes Khoukhi and
                  Dominique Ga{\"{\i}}ti},
  title        = {Denial of Service (DoS) attacks detection in MANETs through statistical
                  models},
  booktitle    = {Global Information Infrastructure and Networking Symposium, {GIIS}
                  2014, Montreal, QC, Canada, September 15-19, 2014},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/GIIS.2014.6934261},
  doi          = {10.1109/GIIS.2014.6934261},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/giis/RmaytiBKKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scvt/RmaytiBKKG14,
  author       = {Mohammad Rmayti and
                  Youcef Begriche and
                  Rida Khatoun and
                  Lyes Khoukhi and
                  Dominique Ga{\"{\i}}ti},
  title        = {Denial of service (DoS) attacks detection in MANETs using Bayesian
                  classifiers},
  booktitle    = {21st {IEEE} Symposium on Communications and Vehicular Technology in
                  the Benelux, {SCVT} 2014, Delft, The Netherlands, November 10, 2014},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SCVT.2014.7046699},
  doi          = {10.1109/SCVT.2014.7046699},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/scvt/RmaytiBKKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-1725,
  author       = {Youcef Begriche and
                  Messaoud Thameri and
                  Karim Abed{-}Meraim},
  title        = {Exact Conditional and Unconditional Cram{\`{e}}r-Rao Bounds for Near
                  Field Localization},
  journal      = {CoRR},
  volume       = {abs/1303.1725},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.1725},
  eprinttype    = {arXiv},
  eprint       = {1303.1725},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-1725.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspa/BegricheTA12,
  author       = {Youcef Begriche and
                  Messaoud Thameri and
                  Karim Abed{-}Meraim},
  title        = {Exact Cramer Rao Bound for near field source localization},
  booktitle    = {11th International Conference on Information Science, Signal Processing
                  and their Applications, {ISSPA} 2012, Montreal, QC, Canada, July 2-5,
                  2012},
  pages        = {718--721},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSPA.2012.6310646},
  doi          = {10.1109/ISSPA.2012.6310646},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/isspa/BegricheTA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/DjahelBN10,
  author       = {Soufiene Djahel and
                  Youcef Begriche and
                  Farid Na{\"{\i}}t{-}Abdesselam},
  title        = {A Bayesian Statistical Model to Alleviate Greediness in Wireless Mesh
                  Networks},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5683525},
  doi          = {10.1109/GLOCOM.2010.5683525},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/DjahelBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/BegricheS10,
  author       = {Youcef Begriche and
                  Ahmed Serhrouchni},
  title        = {Bayesian statistical analysis for spams},
  booktitle    = {The 35th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings},
  pages        = {989--992},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/LCN.2010.5735846},
  doi          = {10.1109/LCN.2010.5735846},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/BegricheS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/BeghricheTL08,
  author       = {Youcef Beghriche and
                  Vincent Toubiana and
                  Houda Labiod},
  editor       = {Akshai Aggarwal and
                  Mohamad Badra and
                  Fabio Massacci},
  title        = {A Bayesian Filter to Detect Misbehaving Nodes in MANETs},
  booktitle    = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility
                  and Security, November 5-7, 2008, Tangier, Morocco},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NTMS.2008.ECP.7},
  doi          = {10.1109/NTMS.2008.ECP.7},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/BeghricheTL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics