AI-driven zero touch network and service management in 5G and beyond: Challenges and research directions C Benzaid, T Taleb Ieee Network 34 (2), 186-194, 2020 | 175 | 2020 |
Fast authentication in wireless sensor networks C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab Future Generation Computer Systems 55, 362-375, 2016 | 88 | 2016 |
AI for beyond 5G networks: a cyber-security defense or offense enabler? C Benzaïd, T Taleb IEEE network 34 (6), 140-147, 2020 | 69 | 2020 |
ZSM security: Threat surface and best practices C Benzaid, T Taleb IEEE Network 34 (3), 124-133, 2020 | 50 | 2020 |
Trust in 5G and beyond networks C Benzaïd, T Taleb, MZ Farooqi IEEE Network 35 (3), 212-222, 2021 | 43 | 2021 |
INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks J Ortiz, R Sanchez-Iborra, JB Bernabe, A Skarmeta, C Benzaid, T Taleb, ... Proceedings of the 15th International Conference on Availability …, 2020 | 38 | 2020 |
Efficient clock synchronization for clustered wireless sensor networks C Benzaid, M Bagaa, M Younis Ad Hoc Networks 56, 13-27, 2017 | 31 | 2017 |
Efficient offloading mechanism for UAVs-based value added services S Ouahouah, T Taleb, JS Song, C Benzaid 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 28 | 2017 |
Forensic malware analysis: The value of fuzzy hashing algorithms in identifying similarities N Sarantinos, C Benzaïd, O Arabiat, A Al-Nemrat 2016 IEEE Trustcom/BigDataSE/ISPA, 1782-1787, 2016 | 21 | 2016 |
Secure pairwise broadcast time synchronization in wireless sensor networks C Benzaid, A Saiah, N Badache 2011 International Conference on Distributed Computing in Sensor Systems and …, 2011 | 21 | 2011 |
Robust self-protection against application-layer (D) DoS attacks in SDN environment C Benzaïd, M Boukhalfa, T Taleb 2020 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2020 | 20 | 2020 |
Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks M Chenait, B Zebbane, C Benzaid, N Badache Computer Networks 127, 1-12, 2017 | 19 | 2017 |
Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G O Hireche, C Benzaïd, T Taleb Computer Networks 203, 108668, 2022 | 18 | 2022 |
Intelligent detection of mac spoofing attack in 802.11 network C Benzaïd, A Boulgheraif, FZ Dahmane, A Al-Nemrat, K Zeraoulia Proceedings of the 17th International Conference on Distributed Computing …, 2016 | 16 | 2016 |
ARP cache poisoning mitigation and forensics investigation HA Mangut, A Al-Nemrat, C Benzaïd, ARH Tawil 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1392-1397, 2015 | 15 | 2015 |
Analysis of malware behaviour: Using data mining clustering techniques to support forensics investigation EI Edem, C Benzaïd, A Al-Nemrat, P Watters 2014 Fifth Cybercrime and Trustworthy Computing Conference, 54-63, 2014 | 13 | 2014 |
Mobi_Causal: a protocol for causal message ordering in mobile computing systems C Benzaid, N Badache ACM SIGMOBILE Mobile Computing and Communications Review 9 (2), 19-28, 2005 | 13 | 2005 |
Deep-ensemble-learning-based GPS spoofing detection for cellular-connected UAVs Y Dang, C Benzaïd, B Yang, T Taleb, Y Shen IEEE Internet of Things Journal 9 (24), 25068-25085, 2022 | 12 | 2022 |
GPS spoofing detector with adaptive trustable residence area for cellular based-UAVs Y Dang, C Benzaïd, Y Shen, T Taleb GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 12 | 2020 |
An optimal causal broadcast protocol in mobile dynamic groups C Benzaid, N Badache 2008 IEEE International Symposium on Parallel and Distributed Processing …, 2008 | 12 | 2008 |