BibTeX records: Abderrahmane Baadache

download as .bib file

@article{DBLP:journals/jksucis/MoualkiaAB22,
  author       = {Yamina Moualkia and
                  Mourad Amad and
                  Abderrahmane Baadache},
  title        = {Hierarchical and scalable peer-to-peer architecture for online social
                  network},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {10 Part {A}},
  pages        = {8623--8636},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2021.04.009},
  doi          = {10.1016/J.JKSUCI.2021.04.009},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/MoualkiaAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isi/FenanirSHB20,
  author       = {Samir Fenanir and
                  Fouzi Semchedine and
                  Saad Harous and
                  Abderrahmane Baadache},
  title        = {A Semi-supervised Deep Auto-encoder Based Intrusion Detection for
                  IoT},
  journal      = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.},
  volume       = {25},
  number       = {5},
  pages        = {569--577},
  year         = {2020},
  url          = {https://doi.org/10.18280/isi.250503},
  doi          = {10.18280/ISI.250503},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isi/FenanirSHB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijccbs/HocineBB19,
  author       = {Hocine Souilah and
                  Abderrahmane Baadache and
                  Louiza Bouallouche{-}Medjkoune},
  title        = {A challenge-based countermeasure against the spoofed PS-Poll-based
                  DoS attack in {IEEE} 802.11 networks},
  journal      = {Int. J. Crit. Comput. Based Syst.},
  volume       = {9},
  number       = {3},
  pages        = {193--214},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJCCBS.2019.104489},
  doi          = {10.1504/IJCCBS.2019.104489},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijccbs/HocineBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ria/FenanirSB19,
  author       = {Samir Fenanir and
                  Fouzi Semchedine and
                  Abderrahmane Baadache},
  title        = {A Machine Learning-Based Lightweight Intrusion Detection System for
                  the Internet of Things},
  journal      = {Rev. d'Intelligence Artif.},
  volume       = {33},
  number       = {3},
  pages        = {203--211},
  year         = {2019},
  url          = {https://doi.org/10.18280/ria.330306},
  doi          = {10.18280/RIA.330306},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ria/FenanirSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/SabrineAF19,
  author       = {Hedjaz Sabrine and
                  Abderrahmane Baadache and
                  Fouzi Semchedine},
  title        = {Comparative Study of Security Methods against {DDOS} Attacks in Cloud
                  Computing Environment},
  booktitle    = {2019 International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2019, Istanbul, Turkey, June 18-20, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISNCC.2019.8909110},
  doi          = {10.1109/ISNCC.2019.8909110},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isncc/SabrineAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnc/SellamiIBT16,
  author       = {Lynda Sellami and
                  Djilali Idoughi and
                  Abderrahmane Baadache and
                  Pierre F. Tiako},
  editor       = {Elhadi M. Shakshuki},
  title        = {A Novel Detection Intrusion Approach for Ubiquitous and Pervasive
                  Environments},
  booktitle    = {The 11th International Conference on Future Networks and Communications
                  {(FNC} 2016) / The 13th International Conference on Mobile Systems
                  and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, August
                  15-18, 2016, Montreal, Quebec, Canada},
  series       = {Procedia Computer Science},
  volume       = {94},
  pages        = {429--434},
  publisher    = {Elsevier},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.procs.2016.08.066},
  doi          = {10.1016/J.PROCS.2016.08.066},
  timestamp    = {Thu, 08 Jul 2021 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fnc/SellamiIBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/BaadacheA15,
  author       = {Abderrahmane Baadache and
                  Redha Adouane},
  title        = {Minimizing the Energy Consumption in Wireless Sensor Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {27},
  number       = {3-4},
  pages        = {223--237},
  year         = {2015},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-27-number-3-4/ahswn-27-3-4-p-223-237/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/BaadacheA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BaadacheB14,
  author       = {Abderrahmane Baadache and
                  Ali Belmehdi},
  title        = {Struggling against simple and cooperative black hole attacks in multi-hop
                  wireless ad hoc networks},
  journal      = {Comput. Networks},
  volume       = {73},
  pages        = {173--184},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comnet.2014.07.016},
  doi          = {10.1016/J.COMNET.2014.07.016},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BaadacheB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vecos/HocineAB14,
  author       = {Hocine Souilah and
                  Abderrahmane Baadache and
                  Louiza Bouallouche{-}Medjkoune},
  editor       = {Hassane Alla and
                  Louiza Bouallouche{-}Medjkoune},
  title        = {Coping with Spoofed PS-Poll Based DoS Attack in {IEEE} 802.11 Networks},
  booktitle    = {Proceedings of the 8th International Workshop on Verification and
                  Evaluation of Computer and Communication Systems, VECoS 2014, Beja{\"{\i}}a,
                  Algeria, September 29-30, 2014},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1256},
  pages        = {57--62},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1256/paper5.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:15 +0100},
  biburl       = {https://dblp.org/rec/conf/vecos/HocineAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SellamiIB14,
  author       = {Lynda Sellami and
                  Djilali Idoughi and
                  Abderrahmane Baadache},
  title        = {Intrusions Detection System Based on Ubiquitous Network Nodes},
  journal      = {CoRR},
  volume       = {abs/1407.7715},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.7715},
  eprinttype    = {arXiv},
  eprint       = {1407.7715},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SellamiIB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BaadacheB12,
  author       = {Abderrahmane Baadache and
                  Ali Belmehdi},
  title        = {Fighting against packet dropping misbehavior in multi-hop wireless
                  ad hoc networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {35},
  number       = {3},
  pages        = {1130--1139},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jnca.2011.12.012},
  doi          = {10.1016/J.JNCA.2011.12.012},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BaadacheB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-1681,
  author       = {Abderrahmane Baadache and
                  Ali Belmehdi},
  title        = {Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless
                  Ad hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1002.1681},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.1681},
  eprinttype    = {arXiv},
  eprint       = {1002.1681},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-1681.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics