Follow
Karim Lounis
Karim Lounis
Assistant Professor at ENSIA, The National School of Artificial Intelligence, Algeria.
Verified email at ensia.edu.dz
Title
Cited by
Cited by
Year
Attacks and Defenses in Short-Range Wireless Technologies for IoT
K Lounis, M Zulkernine
IEEE Access 8, 88892-88932, 2020
1202020
Fast Authentication in Wireless Sensor Networks
C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab
Future Generation Computer Systems 55, 362-375, 2016
902016
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
International Conference on Quantitative Evaluation of Systems, 159-162, 2016
632016
Bad-Token: Denial of Service Attacks on WPA3
K Lounis, M Zulkernine
12th International Conference on Security of Information and Networks, 1-8, 2019
332019
T2T-MAP: A PUF-based Thing-to-Thing Mutual Authentication Protocol for IoT
K Lounis, M Zulkernine
IEEE Access 8, 137384-137405, 2021
282021
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
R Jhawar, K Lounis, S Mauw
International Workshop on Security and Trust Management, 138-153, 2016
282016
Bluetooth Low Energy Makes "Just Works" not Work
K Lounis, M Zulkernine
3rd Cyber Security in Networking Conference, 2019
262019
CSKES: A Context-based Secure Keyless Entry System
J Wang, K Lounis, M Zulkernine
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019
252019
WPA3 Connection Deprivation Attacks
K Lounis, M Zulkernine
International Conference on Risks and Security of Internet and Systems, 164-176, 2019
242019
Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library
R Jhawar, K Lounis, S Mauw, Y Ramırez-Cruz
International Workshop on Security and Trust Management, 2018
232018
Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
K Lounis, M Zulkernine
Digital Threats: Research and Practice, 33, 2021
212021
A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus
K Lounis, Z Mansour, M Wrana, MAA Elsayed, SHH Ding, M Zulkernine
IEEE Transactions on Aerospace and Electronic Systems, 19, 2022
172022
Stochastic-based Semantics of Attack-Defense Trees for Security Assessment
K Lounis
International Workshop on Practical Applications of Stochastic Modelling 337 …, 2017
152017
Exploiting Race Condition for Wi-Fi Denial of Service Attacks
K Lounis, M Zulkernine
13th International Conference on Security of Information and Networks (SIN …, 2020
132020
Modeling Attack-Defense Trees' Countermeasures using Continuous Time Markov Chains
K Lounis, S Ouchani
2nd International Workshop on Automated and Verifiable Software System …, 2020
132020
D2D-MAP: A Drone to Drone Authentication Protocol using Physical Unclonable Functions
K Lounis, HHD Steven, M Zulkernine
IEEE Transactions on Vehicular Technology, 16, 2022
102022
Security of Wireless Short-Range Technologies and an Authentication Protocol for IoT
K Lounis
Ph. D. dissertation, School Comput., Queen’s Univ., Kingston, ON, Canada, 2020
9*2020
Connection Dumping Vulnerability Affecting Bluetooth Availability
K Lounis, M Zulkernine
International Conference on Risks and Security of Internet and Systems, 188-204, 2018
92018
AdaptIDS: Adaptive Intrusion Detection for Mission-critical Aerospace Vehicles
MAA Elsayed, M Wrana, Z Mansour, K Lounis, SHH Ding, M Zulkernine
IEEE Transactions on Intelligent Transportation Systems, 2022
82022
More Lessons: Analysis of PUF-based Authentication Protocols for IoT
K Lounis, M Zulkernine
Cryptology ePrint Archive, 2021
72021
The system can't perform the operation now. Try again later.
Articles 1–20