Seguir
Chafika Benzaid
Título
Citado por
Citado por
Año
AI-driven zero touch network and service management in 5G and beyond: Challenges and research directions
C Benzaid, T Taleb
Ieee Network 34 (2), 186-194, 2020
2432020
AI for beyond 5G networks: A cyber-security defense or offense enabler?
C Benzaïd, T Taleb
IEEE network 34 (6), 140-147, 2020
982020
Fast authentication in wireless sensor networks
C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab
Future Generation Computer Systems 55, 362-375, 2016
902016
ZSM security: Threat surface and best practices
C Benzaid, T Taleb
IEEE Network 34 (3), 124-133, 2020
692020
Trust in 5G and beyond networks
C Benzaïd, T Taleb, MZ Farooqi
IEEE Network 35 (3), 212-222, 2021
622021
INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks
J Ortiz, R Sanchez-Iborra, JB Bernabe, A Skarmeta, C Benzaid, T Taleb, ...
Proceedings of the 15th International Conference on Availability …, 2020
502020
Robust self-protection against application-layer (D) DoS attacks in SDN environment
C Benzaïd, M Boukhalfa, T Taleb
2020 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2020
322020
Efficient clock synchronization for clustered wireless sensor networks
C Benzaid, M Bagaa, M Younis
Ad Hoc Networks 56, 13-27, 2017
312017
Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G
O Hireche, C Benzaïd, T Taleb
Computer Networks 203, 108668, 2022
302022
Deep-ensemble-learning-based GPS spoofing detection for cellular-connected UAVs
Y Dang, C Benzaïd, B Yang, T Taleb, Y Shen
IEEE Internet of Things Journal 9 (24), 25068-25085, 2022
292022
Efficient offloading mechanism for UAVs-based value added services
S Ouahouah, T Taleb, JS Song, C Benzaid
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
272017
Ai-based autonomic and scalable security management architecture for secure network slicing in b5g
C Benzaid, T Taleb, JS Song
IEEE Network 36 (6), 165-174, 2022
262022
Forensic malware analysis: The value of fuzzy hashing algorithms in identifying similarities
N Sarantinos, C Benzaïd, O Arabiat, A Al-Nemrat
2016 IEEE Trustcom/BigDataSE/ISPA, 1782-1787, 2016
262016
Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks
M Chenait, B Zebbane, C Benzaid, N Badache
Computer Networks 127, 1-12, 2017
222017
Secure pairwise broadcast time synchronization in wireless sensor networks
C Benzaid, A Saiah, N Badache
2011 International Conference on Distributed Computing in Sensor Systems and …, 2011
212011
GPS spoofing detector with adaptive trustable residence area for cellular based-UAVs
Y Dang, C Benzaïd, Y Shen, T Taleb
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
202020
Intelligent detection of MAC spoofing attack in 802.11 network
C Benzaïd, A Boulgheraif, FZ Dahmane, A Al-Nemrat, K Zeraoulia
Proceedings of the 17th International Conference on Distributed Computing …, 2016
182016
ARP cache poisoning mitigation and forensics investigation
HA Mangut, A Al-Nemrat, C Benzaïd, ARH Tawil
2015 IEEE Trustcom/BigDataSE/ISPA 1, 1392-1397, 2015
172015
Analysis of malware behaviour: Using data mining clustering techniques to support forensics investigation
EI Edem, C Benzaïd, A Al-Nemrat, P Watters
2014 Fifth Cybercrime and Trustworthy Computing Conference, 54-63, 2014
142014
Mobi_Causal: a protocol for causal message ordering in mobile computing systems
C Benzaid, N Badache
ACM SIGMOBILE Mobile Computing and Communications Review 9 (2), 19-28, 2005
142005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20