Energy efficiency in wireless sensor networks: A top-down survey T Rault, A Bouabdallah, Y Challal Computer networks 67, 104-122, 2014 | 1065 | 2014 |
A roadmap for security challenges in the Internet of Things AR Sfar, E Natalizio, Y Challal, Z Chtourou Digital Communications and Networks 4 (2), 118-137, 2018 | 494 | 2018 |
Group key management protocols: A novel taxonomy H Seba International journal of information technology 2 (1), 105-118, 2005 | 289* | 2005 |
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy M Omar, Y Challal, A Bouabdallah Journal of Network and Computer Applications 35 (1), 268-286, 2012 | 212 | 2012 |
Wireless sensor networks for rehabilitation applications: Challenges and opportunities A Hadjidj, M Souil, A Bouabdallah, Y Challal, H Owen Journal of Network and Computer Applications 36 (1), 1-15, 2013 | 206 | 2013 |
A systemic approach for IoT security A Riahi, Y Challal, E Natalizio, Z Chtourou, A Bouabdallah 2013 IEEE international conference on distributed computing in sensor …, 2013 | 200 | 2013 |
Secure and scalable cloud-based architecture for e-health wireless sensor networks A Lounis, A Hadjidj, A Bouabdallah, Y Challal 2012 21st International Conference on Computer Communications and Networks …, 2012 | 152 | 2012 |
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks A Lounis, A Hadjidj, A Bouabdallah, Y Challal Future Generation Computer Systems 55, 266-277, 2016 | 147 | 2016 |
A study of wireless sensor networks for urban traffic monitoring: applications and architectures MA Kafi, Y Challal, D Djenouri, M Doudou, A Bouabdallah, N Badache Procedia computer science 19, 617-626, 2013 | 145 | 2013 |
A highly scalable key pre-distribution scheme for wireless sensor networks W Bechkit, Y Challal, A Bouabdallah, V Tarokh Wireless Communications, IEEE Transactions on 12 (2), 948-959, 2013 | 141 | 2013 |
Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks Y Challal, A Ouadjaout, N Lasla, M Bagaa, A Hadjidj Journal of Network and Computer Applications 34 (4), 1380-1397, 2011 | 135 | 2011 |
Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks Y Challal, A Ouadjaout, N Lasla, M Bagaa, A Hadjidj Journal of network and computer applications 34 (4), 1380-1397, 2011 | 135 | 2011 |
Reliable and fully distributed trust model for mobile ad hoc networks M Omar, Y Challal, A Bouabdallah Computers & Security 28 (3-4), 199-214, 2009 | 130 | 2009 |
A survey of energy-efficient context recognition systems using wearable sensors for healthcare applications T Rault, A Bouabdallah, Y Challal, F Marin Pervasive and Mobile Computing 37, 23-44, 2017 | 128 | 2017 |
A review of privacy-preserving techniques for deep learning A Boulemtafes, A Derhab, Y Challal Neurocomputing 384, 21-45, 2020 | 112 | 2020 |
A taxonomy of multicast data origin authentication: Issues and solutions Y Challal, H Bettahar, A Bouabdallah IEEE Communications Surveys & Tutorials 6 (3), 34-57, 2004 | 109 | 2004 |
Data aggregation scheduling algorithms in wireless sensor networks: Solutions and challenges M Bagaa, Y Challal, A Ksentini, A Derhab, N Badache IEEE Communications Surveys & Tutorials 16 (3), 1339-1368, 2014 | 101 | 2014 |
C-cp-abe: Cooperative ciphertext policy attribute-based encryption for the internet of things L Touati, Y Challal, A Bouabdallah 2014 International Conference on Advanced Networking Distributed Systems and …, 2014 | 98 | 2014 |
A systemic and cognitive approach for IoT security A Riahi, E Natalizio, Y Challal, N Mitton, A Iera 2014 International conference on computing, networking and communications …, 2014 | 90 | 2014 |
SAKM: a scalable and adaptive key management approach for multicast communications Y Challal, H Bettahar, A Bouabdallah ACM SIGCOMM Computer Communication Review 34 (2), 55-70, 2004 | 89 | 2004 |