VANet security challenges and solutions: A survey H Hasrouny, AE Samhat, C Bassil, A Laouiti Vehicular Communications 7, 7-20, 2017 | 729 | 2017 |
Trust model for secure group leader-based communications in VANET H Hasrouny, AE Samhat, C Bassil, A Laouiti Wireless Networks, 1-23, 0 | 75 | |
Group-based authentication in V2V communications H Hasrouny, C Bassil, AE Samhat, A Laouiti Digital Information and Communication Technology and its Applications …, 2015 | 48 | 2015 |
Security risk analysis of a trust model for secure group leader-based communication in VANET H Hasrouny, C Bassil, AE Samhat, A Laouiti Vehicular Ad-Hoc Networks for Smart Cities, 71-83, 2017 | 47 | 2017 |
Misbehavior detection and efficient revocation within VANET H Hasrouny, AE Samhat, C Bassil, A Laouiti Journal of information security and applications 46, 193-209, 2019 | 36 | 2019 |
DDoS attack detection and mitigation in SDN using machine learning F Khashab, J Moubarak, A Feghali, C Bassil 2021 IEEE 7th International Conference on Network Softwarization (NetSoft …, 2021 | 33 | 2021 |
VPN analysis and new perspective for securing voice over VPN networks WB Diab, S Tohme, C Bassil Networking and Services, 2008. ICNS 2008. Fourth International Conference on …, 2008 | 31 | 2008 |
A review of broadcasting safety data in V2V: Weaknesses and requirements HS Basheer, C Bassil Ad Hoc Networks 65, 13-25, 2017 | 29 | 2017 |
Critical vpn security analysis and new approach for securing voip communications over vpn networks W Bou Diab, S Tohme, C Bassil Proceedings of the 3rd ACM workshop on Wireless multimedia networking and …, 2007 | 26 | 2007 |
A security solution for V2V communication within VANETs H Hasrouny, AE Samhat, C Bassil, A Laouiti Wireless Days (WD), 2018, 181-183, 2018 | 19 | 2018 |
Investigating the darknet RB Zeid, J Moubarak, C Bassil 2020 International Wireless Communications and Mobile Computing (IWCMC), 727-732, 2020 | 15 | 2020 |
Trust model for group leader selection in VANET H Hasrouny, AE Samhat, C Bassil, A Laouiti Int J Digital Inf Wirel Commun 8 (2), 139-144, 2018 | 12 | 2018 |
Privacy using mobile cloud computing JB Abdo, J Demerjian, H Chaouchi, T Atechian, C Bassil Digital Information and Communication Technology and its Applications …, 2015 | 11 | 2015 |
Critical analysis and new perspective for securing voice networks C Bassil, A Serhrouchni, N Rouhana International Conference on Networking, 810-818, 2005 | 10 | 2005 |
On the dissemination of cyber threat intelligence through hyperledger J Moubarak, C Bassil, J Antoun 2021 17th International Conference on the Design of Reliable Communication …, 2021 | 9 | 2021 |
approach for securing Voice over IP Communications C Bassil, N Rouhana, A Serhrouchni | 8* | 2005 |
Bayesian Trust Scheme: A Decentralized Safety Message Trust Method in Multi-Hop V2V Networks HS Basheer, C Bassil, B Chebaro Journal of Communications 12 (4), 2017 | 6 | 2017 |
On darknet honeybots J Moubarak, C Bassil 2020 4th Cyber Security in Networking Conference (CSNet), 1-3, 2020 | 5 | 2020 |
Simple voice security protocol C Bassil, A Serhrouchni, N Rouhana Proceedings of the 2006 international conference on Wireless communications …, 2006 | 5 | 2006 |
Toward using data trust model in VANETs HS Basheer, C Bassil, B Chebaro Applied Research in Computer Science and Engineering (ICAR), 2015 …, 2015 | 4 | 2015 |