default search action
Mohamed Amine Ferrag
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j75]Abdechakour Mechri, Mohamed Amine Ferrag, Mérouane Debbah:
SecureQwen: Leveraging LLMs for vulnerability detection in python codebases. Comput. Secur. 148: 104151 (2025) - 2024
- [j74]Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Thierry Lestable, Narinderjit Singh Thandi:
Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices. IEEE Access 12: 23733-23750 (2024) - [j73]Qingsong Zhao, Lei Shu, Kailiang Li, Mohamed Amine Ferrag, Ximeng Liu, Yanbin Li:
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges. IEEE CAA J. Autom. Sinica 11(1): 58-73 (2024) - [j72]Iqbal H. Sarker, Helge Janicke, Mohamed Amine Ferrag, Alsharif Abuadbba:
Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures. Internet Things 25: 101110 (2024) - [j71]Djallel Hamouda, Mohamed Amine Ferrag, Nadjette Benhamida, Hamid Seridi, Mohamed Chahine Ghanem:
Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques. Internet Things 26: 101149 (2024) - [j70]Bui Duc Son, Tien Hoa Nguyen, Trinh Van Chien, Waqas Khalid, Mohamed Amine Ferrag, Wan Choi, Mérouane Debbah:
Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems. IEEE Internet Things J. 11(11): 19168-19187 (2024) - [j69]Muna Al-Hawawreh, Mamoun Alazab, Mohamed Amine Ferrag, M. Shamim Hossain:
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms. J. Netw. Comput. Appl. 223: 103809 (2024) - [j68]Poonam Lohan, Burak Kantarci, Mohamed Amine Ferrag, Norbert Tihanyi, Yi Shi:
From 5G to 6G Networks: A Survey on AI-Based Jamming and Interference Detection and Mitigation. IEEE Open J. Commun. Soc. 5: 3920-3974 (2024) - [j67]Othmane Friha, Mohamed Amine Ferrag, Burak Kantarci, Burak Çakmak, Arda Ozgun, Nassira Ghoualmi-Zine:
LLM-Based Edge Intelligence: A Comprehensive Survey on Architectures, Applications, Security and Trustworthiness. IEEE Open J. Commun. Soc. 5: 5799-5856 (2024) - [c21]Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamás Bisztray, Mérouane Debbah:
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge. CSR 2024: 296-302 - [c20]Olanrewaju Mueez Adesanya, Naghmeh Moradpoor, Leandros Maglaras, Ik Soo Lim, Mohamed Amine Ferrag:
Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario. DCOSS-IoT 2024: 556-563 - [c19]Ridhi Jain, Norbert Tihanyi, Mthandazo Ndhlovu, Mohamed Amine Ferrag, Lucas C. Cordeiro:
Rapid Taint Assisted Concolic Execution (TACE). SIGSOFT FSE Companion 2024: 627-631 - [i30]Bui Duc Son, Tien Hoa Nguyen, Trinh Van Chien, Waqas Khalid, Mohamed Amine Ferrag, Wan Choi, Mérouane Debbah:
Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems. CoRR abs/2401.14780 (2024) - [i29]Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Mérouane Debbah:
CyberMetric: A Benchmark Dataset for Evaluating Large Language Models Knowledge in Cybersecurity. CoRR abs/2402.07688 (2024) - [i28]Norbert Tihanyi, Tamás Bisztray, Mohamed Amine Ferrag, Ridhi Jain, Lucas C. Cordeiro:
Do Neutral Prompts Produce Insecure Code? FormAI-v2 Dataset: Labelling Vulnerabilities in Code Generated by Large Language Models. CoRR abs/2404.18353 (2024) - [i27]Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke:
Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities. CoRR abs/2405.04874 (2024) - [i26]Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi:
Generative AI and Large Language Models for Cyber Security: All Insights You Need. CoRR abs/2405.12750 (2024) - [i25]Ridhi Jain, Norbert Tihanyi, Mohamed Amine Ferrag:
Securing Tomorrow's Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies. CoRR abs/2407.16410 (2024) - [i24]Norbert Tihanyi, Tamás Bisztray, Richard A. Dubniczky, Rebeka Tóth, Bertalan Borsos, Bilel Cherif, Mohamed Amine Ferrag, Lajos Muzsai, Ridhi Jain, Ryan Marinelli, Lucas C. Cordeiro, Mérouane Debbah:
Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence. CoRR abs/2410.15490 (2024) - 2023
- [j66]Mohamed Chahine Ghanem, Thomas M. Chen, Mohamed Amine Ferrag, Mohyi E. Kettouche:
ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance. IEEE Access 11: 129840-129853 (2023) - [j65]Karima Khettabi, Zineddine Kouahla, Brahim Farou, Hamid Seridi, Mohamed Amine Ferrag:
Efficient Method for Continuous IoT Data Stream Indexing in the Fog-Cloud Computing Level. Big Data Cogn. Comput. 7(2): 119 (2023) - [j64]Othmane Friha, Mohamed Amine Ferrag, Mohamed Benbouzid, Tarek Berghout, Burak Kantarci, Kim-Kwang Raymond Choo:
2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT. Comput. Secur. 127: 103097 (2023) - [j63]Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo:
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. IEEE Commun. Surv. Tutorials 25(4): 2654-2713 (2023) - [j62]Metty Paul, Leandros Maglaras, Mohamed Amine Ferrag, Iman M. Almomani:
Digitization of healthcare sector: A study on privacy and security concerns. ICT Express 9(4): 571-588 (2023) - [j61]Rofaida Khemaissia, Makhlouf Derdour, Mohamed Amine Ferrag, Mohammed Mounir Bouhamed:
PrSChain: A Blockchain Based Privacy Preserving Approach for Data Service Composition. Informatica (Slovenia) 47(8) (2023) - [j60]Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke:
A Novel Authentication Method That Combines Honeytokens and Google Authenticator. Inf. 14(7): 386 (2023) - [j59]Ala-Eddine Benrazek, Brahim Farou, Zineddine Kouahla, Mohamed Amine Ferrag, Hamid Seridi:
IoVT-based efficient solution for optimal active smart camera selection in a tracking mission. Internet Things 24: 100941 (2023) - [j58]Karima Khettabi, Zineddine Kouahla, Brahim Farou, Hamid Seridi, Mohamed Amine Ferrag:
A new method for indexing continuous IoT data flows in metric space. Internet Technol. Lett. 6(6) (2023) - [j57]Mohamed Amine Ferrag, Leandros Maglaras, Mohamed Benbouzid:
Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications. J. Sens. Actuator Networks 12(3): 40 (2023) - [j56]Nestoras Chouliaras, Ioanna Kantzavelou, Leandros Maglaras, Grammati E. Pantziou, Mohamed Amine Ferrag:
A novel autonomous container-based platform for cybersecurity training and research. PeerJ Comput. Sci. 9: e1574 (2023) - [j55]Djallel Hamouda, Mohamed Amine Ferrag, Nadjette Benhamida, Hamid Seridi:
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs. Pervasive Mob. Comput. 88: 101738 (2023) - [j54]Aymen Dia Eddine Berini, Mohamed Amine Ferrag, Brahim Farou, Hamid Seridi:
HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones. Pervasive Mob. Comput. 92: 101798 (2023) - [j53]Messaoud Babaghayou, Noureddine Chaib, Nasreddine Lagraa, Mohamed Amine Ferrag, Leandros Maglaras:
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing. Sensors 23(1): 531 (2023) - [j52]Ali Belgacem, Saïd Mahmoudi, Mohamed Amine Ferrag:
A machine learning model for improving virtual machine migration in cloud computing. J. Supercomput. 79(9): 9486-9508 (2023) - [j51]Ala-Eddine Benrazek, Zineddine Kouahla, Brahim Farou, Hamid Seridi, Imane Allele, Mohamed Amine Ferrag:
Tree-based indexing technique for efficient and real-time label retrieval in the object tracking system. J. Supercomput. 79(18): 20562-20599 (2023) - [j50]Tarek Berghout, Mohamed Benbouzid, Mohamed Amine Ferrag:
Multiverse Recurrent Expansion With Multiple Repeats: A Representation Learning Algorithm for Electricity Theft Detection in Smart Grids. IEEE Trans. Smart Grid 14(6): 4693-4703 (2023) - [j49]Abdelouahid Derhab, Omar Cheikhrouhou, Azza Allouch, Anis Koubaa, Basit Qureshi, Mohamed Amine Ferrag, Leandros Maglaras, Farrukh Aslam Khan:
Internet of drones security: Taxonomies, open issues, and future directions. Veh. Commun. 39: 100552 (2023) - [j48]Marwa Ahmim, Ahmed Ahmim, Mohamed Amine Ferrag, Nacira Ghoualmi-Zine, Leandros Maglaras:
ESIKE: An Efficient and Secure Internet Key Exchange Protocol. Wirel. Pers. Commun. 128(2): 1309-1324 (2023) - [c18]Mohamed Amine Ferrag, Mérouane Debbah, Muna Al-Hawawreh:
Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks. CCGridW 2023: 16-25 - [c17]Mohamed Amine Ferrag, Djallel Hamouda, Mérouane Debbah, Leandros Maglaras, Abderrahmane Lakas:
Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things. DCOSS-IoT 2023: 196-200 - [c16]Mohamed Amine Ferrag, Burak Kantarci, Lucas C. Cordeiro, Mérouane Debbah, Kim-Kwang Raymond Choo:
Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-Enabled IoTs: An Anticipatory Study. ICC Workshops 2023: 1253-1258 - [c15]Norbert Tihanyi, Tamás Bisztray, Ridhi Jain, Mohamed Amine Ferrag, Lucas C. Cordeiro, Vasileios Mavroeidis:
The FormAI Dataset: Generative AI in Software Security through the Lens of Formal Verification. PROMISE 2023: 33-43 - [c14]Yagmur Yigit, Leandros Maglaras, Mohamed Amine Ferrag, Naghmeh Moradpoor, Georgios Lambropoulos:
Reliability Analysis of Fault Tolerant Memory Systems. SEEDA-CECNSM 2023: 1-6 - [c13]Messaoud Babaghayou, Noureddine Chaib, Leandros Maglaras, Yagmur Yigit, Mohamed Amine Ferrag, Carol Marsh:
Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing. WiCON 2023: 29-44 - [d3]Yiannis Charalambous, Norbert Tihanyi, Ridhi Jain, Youcheng Sun, Mohamed Amine Ferrag, Lucas C. Cordeiro:
Dataset for : A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification. Zenodo, 2023 - [d2]Norbert Tihanyi, Tamás Bisztray, Ridhi Jain, Mohamed Amine Ferrag, Lucas C. Cordeiro, Vasileios Mavroeidis:
FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications. IEEE DataPort, 2023 - [i23]Mohamed Amine Ferrag, Burak Kantarci, Lucas C. Cordeiro, Mérouane Debbah, Kim-Kwang Raymond Choo:
Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study. CoRR abs/2303.11745 (2023) - [i22]Mohamed Amine Ferrag, Mérouane Debbah, Muna Al-Hawawreh:
Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks. CoRR abs/2303.11751 (2023) - [i21]Mohamed Amine Ferrag, Djallel Hamouda, Mérouane Debbah, Leandros Maglaras, Abderrahmane Lakas:
Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things. CoRR abs/2304.05644 (2023) - [i20]Yiannis Charalambous, Norbert Tihanyi, Ridhi Jain, Youcheng Sun, Mohamed Amine Ferrag, Lucas C. Cordeiro:
A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification. CoRR abs/2305.14752 (2023) - [i19]Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo:
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. CoRR abs/2306.10309 (2023) - [i18]Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Thierry Lestable:
Revolutionizing Cyber Threat Detection with Large Language Models. CoRR abs/2306.14263 (2023) - [i17]Norbert Tihanyi, Tamás Bisztray, Ridhi Jain, Mohamed Amine Ferrag, Lucas C. Cordeiro, Vasileios Mavroeidis:
The FormAI Dataset: Generative AI in Software Security Through the Lens of Formal Verification. CoRR abs/2307.02192 (2023) - [i16]Mohamed Amine Ferrag, Ammar Battah, Norbert Tihanyi, Mérouane Debbah, Thierry Lestable, Lucas C. Cordeiro:
SecureFalcon: The Next Cyber Reasoning System for Cyber Security. CoRR abs/2307.06616 (2023) - [i15]Mohamed Chahine Ghanem, Thomas M. Chen, Mohamed Amine Ferrag, Mohyi E. Kettouche:
ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance. CoRR abs/2307.10967 (2023) - [i14]Yagmur Yigit, Leandros Maglaras, Mohamed Amine Ferrag, Naghmeh Moradpoor, Georgios Lambropoulos:
Reliability Analysis of Fault Tolerant Memory Systems. CoRR abs/2311.12849 (2023) - [i13]Messaoud Babaghayou, Noureddine Chaib, Leandros Maglaras, Yagmur Yigit, Mohamed Amine Ferrag:
Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing. CoRR abs/2311.14308 (2023) - 2022
- [j47]Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke:
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access 10: 40281-40306 (2022) - [j46]Zakaria Tolba, Makhlouf Derdour, Mohamed Amine Ferrag, S. M. Muyeen, Mohamed Benbouzid:
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment. IEEE Access 10: 94019-94039 (2022) - [j45]Leandros A. Maglaras, Mohamed Amine Ferrag, Helge Janicke, Nick Ayres, Leandros Tassiulas:
Reliability, Security, and Privacy in Power Grids. Computer 55(9): 85-88 (2022) - [j44]Karima Khettabi, Zineddine Kouahla, Brahim Farou, Hamid Seridi, Mohamed Amine Ferrag:
Clustering and parallel indexing of big IoT data in the fog-cloud computing level. Trans. Emerg. Telecommun. Technol. 33(7) (2022) - [j43]Zineddine Kouahla, Ala-Eddine Benrazek, Mohamed Amine Ferrag, Brahim Farou, Hamid Seridi, Muhammet Kurulay, Adeel Anjum, Alia Asheralieva:
A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues. Future Internet 14(1): 19 (2022) - [j42]Mohamed Amine Ferrag, Lei Shu, Othmane Friha, Xing Yang:
Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions. IEEE CAA J. Autom. Sinica 9(3): 407-436 (2022) - [j41]Othmane Friha, Mohamed Amine Ferrag, Leandros Maglaras, Lei Shu:
Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends. IEEE Internet Things Mag. 5(3): 82-90 (2022) - [j40]Aymen Dia Eddine Berini, Brahim Farou, Mohamed Amine Ferrag, Hamid Seridi, Herman Akdag:
A new static path planning strategy for drones. Internet Technol. Lett. 5(6) (2022) - [j39]Othmane Friha, Mohamed Amine Ferrag, Lei Shu, Leandros Maglaras, Kim-Kwang Raymond Choo, Mehdi Nafaa:
FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. J. Parallel Distributed Comput. 165: 17-31 (2022) - [j38]Geetanjali Rathee, Chaker Abdelaziz Kerrache, Mohamed Amine Ferrag:
A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems. J. Sens. Actuator Networks 11(4): 71 (2022) - [j37]Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag:
Cybersecurity of Critical Infrastructures: Challenges and Solutions. Sensors 22(14): 5105 (2022) - [j36]Xing Yang, Lei Shu, Ye Liu, Gerhard Petrus Hancke, Mohamed Amine Ferrag, Kai Huang:
Physical Security and Safety of IoT Equipment: A Survey of Recent Advances and Opportunities. IEEE Trans. Ind. Informatics 18(7): 4319-4330 (2022) - [c12]Tarek Berghout, Mohamed Benbouzid, Mohamed Amine Ferrag:
Deep Learning with Recurrent Expansion for Electricity Theft Detection in Smart Grids. IECON 2022: 1-6 - [c11]Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke:
Security Revisited: Honeytokens meet Google Authenticator. SEEDA-CECNSM 2022: 1-8 - [d1]Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke:
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning. IEEE DataPort, 2022 - 2021
- [j35]Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu:
Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access 9: 138509-138542 (2021) - [j34]Xing Yang, Lei Shu, Jianing Chen, Mohamed Amine Ferrag, Jun Wu, Edmond Nurellari, Kai Huang:
A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges. IEEE CAA J. Autom. Sinica 8(2): 273-302 (2021) - [j33]Othmane Friha, Mohamed Amine Ferrag, Lei Shu, Leandros Maglaras, Xiaochan Wang:
Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies. IEEE CAA J. Autom. Sinica 8(4): 718-752 (2021) - [j32]Mohamed Amine Ferrag, Lei Shu, Kim-Kwang Raymond Choo:
Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives. IEEE CAA J. Autom. Sinica 8(9): 1477-1499 (2021) - [j31]Mohamed Amine Ferrag, Lei Shu:
The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial. IEEE Internet Things J. 8(24): 17236-17260 (2021) - [j30]Merzougui Salah Eddine, Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras:
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles. J. Inf. Secur. Appl. 59: 102802 (2021) - [j29]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke:
WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors 21(7): 2443 (2021) - [c10]Rofaida Khemaissia, Makhlouf Derdour, Ala Djeddai, Mohamed Amine Ferrag:
SDGchain: When Service Dependency Graph Meets Blockchain to Enhance Privacy. IWSPA@CODASPY 2021: 37-43 - [c9]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Nasreddine Lagraa, Mohamed Amine Ferrag, Leandros Maglaras:
SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles. CrownCom/WiCON 2021: 343-360 - [c8]Maria Papathanasaki, Panagiotis Fountas, Leandros Maglaras, Christos Douligeris, Mohamed Amine Ferrag:
Quantum Cryptography in Maritime Telecommunications. CSR 2021: 530-535 - [c7]Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris:
A novel Two-Factor HoneyToken Authentication Mechanism. ICCCN 2021: 1-7 - [c6]Messaoud Babaghayou, Nabila Labraoui, Mohamed Amine Ferrag, Leandros Maglaras:
Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles. ICCE 2021: 1-5 - [c5]David Holmes, Maria Papathanasaki, Leandros Maglaras, Mohamed Amine Ferrag, Surya Nepal, Helge Janicke:
Digital Twins and Cyber Security - solution or challenge? SEEDA-CECNSM 2021: 1-8 - [c4]Taha Abdelgalil, Vasileios Manolas, Leandros Maglaras, Ioanna Kantzavelou, Mohamed Amine Ferrag:
Blockchain Technology: A case study in supply chain management. TPS-ISA 2021: 331-339 - [i12]Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke:
Cybersecurity Revisited: Honeytokens meet Google Authenticator. CoRR abs/2112.08431 (2021) - 2020
- [j28]Mohamed Amine Ferrag, Lei Shu, Xing Yang, Abdelouahid Derhab, Leandros Maglaras:
Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges. IEEE Access 8: 32031-32053 (2020) - [j27]Ala-Eddine Benrazek, Zineddine Kouahla, Brahim Farou, Mohamed Amine Ferrag, Hamid Seridi, Muhammet Kurulay:
An efficient indexing for Internet of Things massive data based on cloud-fog computing. Trans. Emerg. Telecommun. Technol. 31(3) (2020) - [j26]Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim, Makhlouf Derdour, Helge Janicke:
RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet 12(3): 44 (2020) - [j25]James Howden, Leandros Maglaras, Mohamed Amine Ferrag:
The Security Aspects of Automotive Over-the-Air Updates. Int. J. Cyber Warf. Terror. 10(2): 64-81 (2020) - [j24]Mohamed Amine Ferrag, Leandros Maglaras, Sotiris Moschoyiannis, Helge Janicke:
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50 (2020) - [j23]Mohamed Amine Ferrag, Messaoud Babaghayou, Mehmet Akif Yazici:
Cyber security for fog-based smart grid SCADA systems: Solutions and challenges. J. Inf. Secur. Appl. 52: 102500 (2020) - [j22]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Nasreddine Lagraa, Mohamed Amine Ferrag:
Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey. J. Inf. Secur. Appl. 55: 102618 (2020) - [j21]Leandros Maglaras, Tiago Cruz, Mohamed Amine Ferrag, Helge Janicke:
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technol. Lett. 3(1) (2020) - [j20]Ioannis Vourgidis, Leandros Maglaras, Ahmed S. Alfakeeh, Ali H. Al-Bayatti, Mohamed Amine Ferrag:
Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems. Sensors 20(4): 997 (2020) - [j19]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke:
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues. Telecommun. Syst. 73(2): 317-348 (2020) - [j18]Mohamed Amine Ferrag, Leandros Maglaras:
DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids. IEEE Trans. Engineering Management 67(4): 1285-1297 (2020) - [c3]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Mohamed Amine Ferrag, Leandros Maglaras:
The Impact of the Adversary's Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles. SEEDA-CECNSM 2020: 1-6 - [e2]Hamid Seridi, Muhammet Kurulay, Zineddine Kouahla, Brahim Farou, Mohamed Nadjib Kouahla, Mohamed Amine Ferrag, Mohamed Amine Boudia:
The 1st International Conference on Innovative Trends in Computer Science, CITSC 2019, Guelma, Algeria, November 20-21, 2019. CEUR Workshop Proceedings 2589, CEUR-WS.org 2020 [contents] - [e1]Hamid Seridi, Muhammet Kurulay, Mohamed Nadjib Kouahla, Zineddine Kouahla, Brahim Farou, Mohamed Amine Ferrag, Khaled Halimi:
Proceedings of the third Conference on Informatics and Applied Mathematics, Guelma, Algeria, Online, October 21-22, 2020. CEUR Workshop Proceedings 2748, CEUR-WS.org 2020 [contents] - [i11]Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke:
A novel Two-Factor HoneyToken Authentication Mechanism. CoRR abs/2012.08782 (2020)
2010 – 2019
- 2019
- [j17]Mohamed Amine Ferrag, Leandros A. Maglaras:
DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services. Comput. 8(3): 58 (2019) - [j16]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros A. Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet Things J. 6(2): 2188-2204 (2019) - [j15]Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab:
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. Secur. Commun. Networks 2019: 5452870:1-5452870:20 (2019) - [j14]Abdelouahid Derhab, Mohamed Guerroumi, Abdu Gumaei, Leandros A. Maglaras, Mohamed Amine Ferrag, Mithun Mukherjee, Farrukh Aslam Khan:
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors 19(14): 3119 (2019) - [c2]Ahmed Ahmim, Leandros A. Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke:
A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models. DCOSS 2019: 228-233 - [i10]Leandros A. Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures. CoRR abs/1901.03899 (2019) - [i9]Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab:
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends. CoRR abs/1901.09374 (2019) - 2018
- [j13]Leandros A. Maglaras, Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, Tiago J. Cruz:
Cyber security of critical infrastructures. ICT Express 4(1): 42-45 (2018) - [j12]Ahmed Ahmim, Makhlouf Derdour, Mohamed Amine Ferrag:
An intrusion detection system based on combining probability predictions of a tree of classifiers. Int. J. Commun. Syst. 31(9) (2018) - [j11]Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke:
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 101: 55-82 (2018) - [j10]Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. EAI Endorsed Trans. Security Safety 5(16): e1 (2018) - [c1]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Abdelaziz Amara Korba:
Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices. PAIS 2018: 1-8 - [p1]Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, Awais Yousaf:
Vulnerability Assessment of Cyber Security for SCADA Systems. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 59-80 - [i8]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Athanasios V. Vasilakos, Stylianos Rallis, Helge Janicke:
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues. CoRR abs/1803.10281 (2018) - [i7]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. CoRR abs/1806.09099 (2018) - [i6]Ahmed Ahmim, Leandros Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke:
A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models. CoRR abs/1812.09059 (2018) - 2017
- [j9]Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros A. Maglaras, Mohamed Amine Ferrag, Nikumani Choudhury, Vikas Kumar:
Security and Privacy in Fog Computing: Challenges. IEEE Access 5: 19293-19304 (2017) - [j8]Mohamed Amine Ferrag, Leandros A. Maglaras, Ahmed Ahmim:
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey. IEEE Commun. Surv. Tutorials 19(4): 3015-3045 (2017) - [j7]Barnaby Stewart, Luís Rosa, Leandros A. Maglaras, Tiago J. Cruz, Mohamed Amine Ferrag, Paulo Simões, Helge Janicke:
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes. EAI Endorsed Trans. Ind. Networks Intell. Syst. 4(10): e4 (2017) - [j6]Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, Lei Shu:
Authentication Protocols for Internet of Things: A Comprehensive Survey. Secur. Commun. Networks 2017: 6562953:1-6562953:41 (2017) - [j5]Mohamed Amine Ferrag, Ahmed Ahmim:
ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network. Telecommun. Syst. 66(3): 481-503 (2017) - [j4]Mohamed Amine Ferrag:
EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications. Telecommun. Syst. 66(4): 671-688 (2017) - [i5]Mohamed Amine Ferrag, Leandros A. Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke:
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes. CoRR abs/1708.04027 (2017) - [i4]Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin I. Jones, Helge Janicke:
Internet of Cloud: Security and Privacy issues. CoRR abs/1711.00525 (2017) - 2016
- [j3]Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi:
EPSA: an efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks. Int. J. Secur. Networks 11(3): 107-125 (2016) - [i3]Mohamed Amine Ferrag, Leandros A. Maglaras, Ahmed Ahmim:
Privacy-preserving schemes for Ad Hoc Social Networks: A survey. CoRR abs/1610.06095 (2016) - [i2]Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang:
A Survey on Privacy-preserving Schemes for Smart Grid Communications. CoRR abs/1611.07722 (2016) - [i1]Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang:
Authentication Protocols for Internet of Things: A Comprehensive Survey. CoRR abs/1612.07206 (2016) - 2014
- [j2]Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi:
SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network. Int. J. Inf. Comput. Secur. 6(3): 241-269 (2014) - 2013
- [j1]Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi:
ECPDR: An Efficient Conditional Privacy-Preservation Scheme with Demand Response for Secure Ad hoc Social Communications. Int. J. Embed. Real Time Commun. Syst. 4(3): 43-71 (2013)
Coauthor Index
aka: Leandros A. Maglaras
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint