AI-driven zero touch network and service management in 5G and beyond: Challenges and research directions C Benzaid, T Taleb Ieee Network 34 (2), 186-194, 2020 | 266 | 2020 |
AI for beyond 5G networks: A cyber-security defense or offense enabler? C Benzaïd, T Taleb IEEE network 34 (6), 140-147, 2020 | 107 | 2020 |
Fast authentication in wireless sensor networks C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab Future Generation Computer Systems 55, 362-375, 2016 | 91 | 2016 |
ZSM security: Threat surface and best practices C Benzaid, T Taleb IEEE Network 34 (3), 124-133, 2020 | 73 | 2020 |
Trust in 5G and beyond networks C Benzaïd, T Taleb, MZ Farooqi IEEE Network 35 (3), 212-222, 2021 | 68 | 2021 |
INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks J Ortiz, R Sanchez-Iborra, JB Bernabe, A Skarmeta, C Benzaid, T Taleb, ... Proceedings of the 15th International Conference on Availability …, 2020 | 56 | 2020 |
5G PPP architecture working group: View on 5G architecture S Redana, Ö Bulakci, A Zafeiropoulos, A Gavras, A Tzanakaki, ... European Commission, 2019 | 45 | 2019 |
Deep-ensemble-learning-based GPS spoofing detection for cellular-connected UAVs Y Dang, C Benzaïd, B Yang, T Taleb, Y Shen IEEE Internet of Things Journal 9 (24), 25068-25085, 2022 | 35 | 2022 |
Robust self-protection against application-layer (d) dos attacks in sdn environment C Benzaïd, M Boukhalfa, T Taleb 2020 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2020 | 34 | 2020 |
Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G O Hireche, C Benzaïd, T Taleb Computer Networks 203, 108668, 2022 | 32 | 2022 |
Efficient clock synchronization for clustered wireless sensor networks C Benzaid, M Bagaa, M Younis Ad Hoc Networks 56, 13-27, 2017 | 31 | 2017 |
Ai-based autonomic and scalable security management architecture for secure network slicing in b5g C Benzaid, T Taleb, JS Song IEEE Network 36 (6), 165-174, 2022 | 30 | 2022 |
Efficient offloading mechanism for UAVs-based value added services S Ouahouah, T Taleb, JS Song, C Benzaid 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 28 | 2017 |
Forensic malware analysis: The value of fuzzy hashing algorithms in identifying similarities N Sarantinos, C Benzaïd, O Arabiat, A Al-Nemrat 2016 IEEE Trustcom/BigDataSE/ISPA, 1782-1787, 2016 | 27 | 2016 |
Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks M Chenait, B Zebbane, C Benzaid, N Badache Computer Networks 127, 1-12, 2017 | 24 | 2017 |
Secure pairwise broadcast time synchronization in wireless sensor networks C Benzaid, A Saiah, N Badache 2011 International Conference on Distributed Computing in Sensor Systems and …, 2011 | 22 | 2011 |
GPS spoofing detector with adaptive trustable residence area for cellular based-UAVs Y Dang, C Benzaïd, Y Shen, T Taleb GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 21 | 2020 |
Intelligent detection of MAC spoofing attack in 802.11 network C Benzaïd, A Boulgheraif, FZ Dahmane, A Al-Nemrat, K Zeraoulia Proceedings of the 17th International Conference on Distributed Computing …, 2016 | 18 | 2016 |
ARP cache poisoning mitigation and forensics investigation HA Mangut, A Al-Nemrat, C Benzaïd, ARH Tawil 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1392-1397, 2015 | 18 | 2015 |
Analysis of malware behaviour: Using data mining clustering techniques to support forensics investigation EI Edem, C Benzaïd, A Al-Nemrat, P Watters 2014 Fifth Cybercrime and Trustworthy Computing Conference, 54-63, 2014 | 16 | 2014 |