Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Abderrahmane Baadache
@article{DBLP:journals/jksucis/MoualkiaAB22, author = {Yamina Moualkia and Mourad Amad and Abderrahmane Baadache}, title = {Hierarchical and scalable peer-to-peer architecture for online social network}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {10 Part {A}}, pages = {8623--8636}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2021.04.009}, doi = {10.1016/J.JKSUCI.2021.04.009}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/MoualkiaAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isi/FenanirSHB20, author = {Samir Fenanir and Fouzi Semchedine and Saad Harous and Abderrahmane Baadache}, title = {A Semi-supervised Deep Auto-encoder Based Intrusion Detection for IoT}, journal = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.}, volume = {25}, number = {5}, pages = {569--577}, year = {2020}, url = {https://doi.org/10.18280/isi.250503}, doi = {10.18280/ISI.250503}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isi/FenanirSHB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/HocineBB19, author = {Hocine Souilah and Abderrahmane Baadache and Louiza Bouallouche{-}Medjkoune}, title = {A challenge-based countermeasure against the spoofed PS-Poll-based DoS attack in {IEEE} 802.11 networks}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {9}, number = {3}, pages = {193--214}, year = {2019}, url = {https://doi.org/10.1504/IJCCBS.2019.104489}, doi = {10.1504/IJCCBS.2019.104489}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/HocineBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ria/FenanirSB19, author = {Samir Fenanir and Fouzi Semchedine and Abderrahmane Baadache}, title = {A Machine Learning-Based Lightweight Intrusion Detection System for the Internet of Things}, journal = {Rev. d'Intelligence Artif.}, volume = {33}, number = {3}, pages = {203--211}, year = {2019}, url = {https://doi.org/10.18280/ria.330306}, doi = {10.18280/RIA.330306}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ria/FenanirSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/SabrineAF19, author = {Hedjaz Sabrine and Abderrahmane Baadache and Fouzi Semchedine}, title = {Comparative Study of Security Methods against {DDOS} Attacks in Cloud Computing Environment}, booktitle = {2019 International Symposium on Networks, Computers and Communications, {ISNCC} 2019, Istanbul, Turkey, June 18-20, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISNCC.2019.8909110}, doi = {10.1109/ISNCC.2019.8909110}, timestamp = {Thu, 05 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isncc/SabrineAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/SellamiIBT16, author = {Lynda Sellami and Djilali Idoughi and Abderrahmane Baadache and Pierre F. Tiako}, editor = {Elhadi M. Shakshuki}, title = {A Novel Detection Intrusion Approach for Ubiquitous and Pervasive Environments}, booktitle = {The 11th International Conference on Future Networks and Communications {(FNC} 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, August 15-18, 2016, Montreal, Quebec, Canada}, series = {Procedia Computer Science}, volume = {94}, pages = {429--434}, publisher = {Elsevier}, year = {2016}, url = {https://doi.org/10.1016/j.procs.2016.08.066}, doi = {10.1016/J.PROCS.2016.08.066}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/fnc/SellamiIBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/BaadacheA15, author = {Abderrahmane Baadache and Redha Adouane}, title = {Minimizing the Energy Consumption in Wireless Sensor Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {27}, number = {3-4}, pages = {223--237}, year = {2015}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-27-number-3-4/ahswn-27-3-4-p-223-237/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/BaadacheA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BaadacheB14, author = {Abderrahmane Baadache and Ali Belmehdi}, title = {Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks}, journal = {Comput. Networks}, volume = {73}, pages = {173--184}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2014.07.016}, doi = {10.1016/J.COMNET.2014.07.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BaadacheB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vecos/HocineAB14, author = {Hocine Souilah and Abderrahmane Baadache and Louiza Bouallouche{-}Medjkoune}, editor = {Hassane Alla and Louiza Bouallouche{-}Medjkoune}, title = {Coping with Spoofed PS-Poll Based DoS Attack in {IEEE} 802.11 Networks}, booktitle = {Proceedings of the 8th International Workshop on Verification and Evaluation of Computer and Communication Systems, VECoS 2014, Beja{\"{\i}}a, Algeria, September 29-30, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1256}, pages = {57--62}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1256/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:15 +0100}, biburl = {https://dblp.org/rec/conf/vecos/HocineAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SellamiIB14, author = {Lynda Sellami and Djilali Idoughi and Abderrahmane Baadache}, title = {Intrusions Detection System Based on Ubiquitous Network Nodes}, journal = {CoRR}, volume = {abs/1407.7715}, year = {2014}, url = {http://arxiv.org/abs/1407.7715}, eprinttype = {arXiv}, eprint = {1407.7715}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SellamiIB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BaadacheB12, author = {Abderrahmane Baadache and Ali Belmehdi}, title = {Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {35}, number = {3}, pages = {1130--1139}, year = {2012}, url = {https://doi.org/10.1016/j.jnca.2011.12.012}, doi = {10.1016/J.JNCA.2011.12.012}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BaadacheB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-1681, author = {Abderrahmane Baadache and Ali Belmehdi}, title = {Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks}, journal = {CoRR}, volume = {abs/1002.1681}, year = {2010}, url = {http://arxiv.org/abs/1002.1681}, eprinttype = {arXiv}, eprint = {1002.1681}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-1681.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.