Follow
Nabil Djedjig
Nabil Djedjig
PhD, Research Centre on Scientific and Technical Information (CERIST)
Verified email at cerist.dz
Title
Cited by
Cited by
Year
Trust-aware and cooperative routing protocol for IoT security
N Djedjig, D Tandjaoui, F Medjek, I Romdhani
Journal of Information Security and Applications 52, 102467, 2020
982020
New trust metric for the RPL routing protocol
N Djedjig, D Tandjaoui, F Medjek, I Romdhani
2017 8th International Conference on Information and Communication Systems …, 2017
822017
Trust-based RPL for the Internet of Things
N Djedjig, D Tandjaoui, F Medjek
2015 IEEE Symposium on Computers and Communication (ISCC), 962-967, 2015
522015
A trust-based intrusion detection system for mobile RPL based networks
F Medjek, D Tandjaoui, I Romdhani, N Djedjig
2017 IEEE international conference on Internet of Things (IThings) and IEEE …, 2017
442017
Analytical evaluation of the impacts of Sybil attacks against RPL under mobility
F Medjek, D Tandjaoui, MR Abdmeziem, N Djedjig
2015 12th International Symposium on Programming and Systems (ISPS), 1-9, 2015
372015
Multicast DIS attack mitigation in RPL-based IoT-LLNs
F Medjek, D Tandjaoui, N Djedjig, I Romdhani
Journal of Information Security and Applications 61, 102939, 2021
312021
Performance evaluation of RPL protocol under mobile sybil attacks
F Medjek, D Tandjaoui, I Romdhani, N Djedjig
2017 IEEE Trustcom/BigDataSE/ICESS, 1049-1055, 2017
292017
Trust management in the internet of things
N Djedjig, D Tandjaoui, I Romdhani, F Medjek
Security and Privacy in Smart Sensor Networks, 122-146, 2018
232018
Fault-tolerant AI-driven intrusion detection system for the internet of things
F Medjek, D Tandjaoui, N Djedjig, I Romdhani
International Journal of Critical Infrastructure Protection 34, 100436, 2021
202021
Security Threats in the Internet of Things: RPL's Attacks and Countermeasures
F Medjek, D Tandjaoui, I Romdhani, N Djedjig
Security and privacy in smart sensor networks, 147-178, 2018
82018
Deep learning in pervasive health monitoring, design goals, applications, and architectures: An overview and a brief synthesis
A Boulemtafes, H Khemissa, MS Derki, A Amira, N Djedjig
Smart Health 22, 100221, 2021
72021
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT
N Djedjig, D Tandjaoui, I Romdhani, F Medjek
International Academy, Research, and Industry Association, 2017
22017
New trust metric for the RPL routing protocol
I Romdhani, N Djedjig, F Medjek, D Tandjaoui
Institute of Electrical and Electronics Engineers, 2017
2017
Trust management in IoT routing protocol
N Djedjig, D Tandjaoui, F Medjek
CERIST, 2015
2015
Trust management in IoT routing protocol
D Tandjaoui, N Djedjig, F Medjek
Rapports de recherche internes, 2015
2015
Evaluation of the impacts of Sybil attacks against RPL under mobility
F Medjek, D Tandjaoui, N Djedjig
CERIST, 2014
2014
Evaluation of the impacts of Sybil attacks against RPL under mobility
D Tandjaoui, N Djedjig, F Medjek
Rapports de recherche internes, 2014
2014
Prévention and detection of cheating in peer-to-peer online games
H Khelafa, N Djedjig
Universié de bejaia, 2009
2009
Prevention and detection of cheating in peer-to-peer online games
N DJEDJIG
Université de Béjaia-Abderrahmane Mira, 0
Prevention and detection of cheating in peer-to-peer online games
D Nabil
Université de Béjaia-Abderrahmane Mira, 0
The system can't perform the operation now. Try again later.
Articles 1–20