default search action
Chafika Benzaid
Person information
- affiliation: University of Sciences and Technology Houari Boumediene, Algeria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Amin Saiah, Chafika Benzaid, Mohamed F. Younis, Nadjib Badache:
SRST: A secure and resilient synchronization of time for WSNs in IoT applications. Ad Hoc Networks 169: 103749 (2025) - 2024
- [j20]Amir Javadpour, Forough Ja'fari, Tarik Taleb, Mohammad Shojafar, Chafika Benzaïd:
A comprehensive survey on cyber deception techniques to improve honeypot performance. Comput. Secur. 140: 103792 (2024) - [j19]Amir Javadpour
, Forough Ja'fari
, Tarik Taleb
, Yue Zhao
, Bin Yang
, Chafika Benzaïd
:
Encryption as a Service for IoT: Opportunities, Challenges, and Solutions. IEEE Internet Things J. 11(5): 7525-7558 (2024) - [j18]Amir Javadpour
, Forough Ja'fari
, Tarik Taleb
, Chafika Benzaïd
, Bin Yang, Yue Zhao
:
Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security. IEEE Internet Things J. 11(24): 39744-39766 (2024) - [j17]Chafika Benzaïd
, Tarik Taleb
, Ashkan Sami
, Othmane Hireche
:
FortisEDoS: A Deep Transfer Learning-Empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing. IEEE Trans. Dependable Secur. Comput. 21(4): 2818-2835 (2024) - [c39]Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd, Luís Rosa, Pedro Tomás, Luís Cordeiro:
Deploying Testbed Docker-based application for Encryption as a Service in Kubernetes. SoftCOM 2024: 1-7 - [c38]Chafika Benzaïd, Fahim Muhtasim Hossain, Tarik Taleb, Pedro Merino Gómez, Michael Dieudonne:
A Federated Continual Learning Framework for Sustainable Network Anomaly Detection in O-RAN. WCNC 2024: 1-6 - [i8]Samira Kamali Poorazad, Chafika Benzaid, Tarik Taleb:
Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments. CoRR abs/2401.00468 (2024) - [i7]Samira Kamali Poorazad, Chafika Benzaid, Tarik Taleb:
A Novel Buffered Federated Learning Framework for Privacy-Driven Anomaly Detection in IIoT. CoRR abs/2408.08722 (2024) - [i6]Somayeh Kianpisheh, Chafika Benzaid, Tarik Taleb:
Multi-Model based Federated Learning Against Model Poisoning Attack: A Deep Learning Based Model Selection for MEC Systems. CoRR abs/2409.08237 (2024) - [i5]Mojdeh Karbalaee Motalleb, Chafika Benzaid, Tarik Taleb, Marcos Katz, Vahid Shah-Mansouri, JaeSeung Song:
Towards Secure Intelligent O-RAN Architecture: Vulnerabilities, Threats and Promising Technical Solutions using LLMs. CoRR abs/2411.08640 (2024) - 2023
- [j16]Tarik Taleb, Chafika Benzaïd
, Rami Akrem Addad
, Konstantinos Samdanis
:
AI/ML for beyond 5G systems: Concepts, technology enablers & solutions. Comput. Networks 237: 110044 (2023) - [j15]Theodoros Theodoropoulos
, Luís Rosa, Chafika Benzaid
, Peter Gray, Eduard Marin, Antonios Makris
, Luís Cordeiro
, Ferran Diego, Pavel Sorokin, Marco Di Girolamo
, Paolo Barone, Tarik Taleb
, Konstantinos Tserpes
:
Security in Cloud-Native Services: A Survey. J. Cybersecur. Priv. 3(4): 758-793 (2023) - [j14]Amir Javadpour
, Forough Ja'fari
, Tarik Taleb
, Chafika Benzaïd
:
Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks. IEEE Trans. Netw. Serv. Manag. 20(3): 3930-3946 (2023) - [c37]Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd:
Enhancing 5G Network Slicing: Slice Isolation Via Actor-Critic Reinforcement Learning with Optimal Graph Features. GLOBECOM 2023: 31-37 - [c36]Samira Kamali Poorazad, Chafika Benzaïd, Tarik Taleb:
Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments. GLOBECOM 2023: 2760-2765 - [c35]Chafika Benzaïd, Tarik Taleb, Ashkan Sami
, Othmane Hireche:
A Deep Transfer Learning-Powered EDoS Detection Mechanism for 5G and Beyond Network Slicing. GLOBECOM 2023: 4747-4753 - [c34]Amir Javadpour, Forough Ja'fari, Tarik Taleb, Hamidreza Ahmadi, Chafika Benzaïd:
Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection. GLOBECOM 2023: 6005-6011 - [c33]Mojdeh Karbalaee Motalleb, Chafika Benzaid, Tarik Taleb, Vahid Shah-Mansouri:
Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture. GLOBECOM 2023: 6358-6363 - [c32]Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd:
A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques. ICECCS 2023: 81-88 - [c31]Manel Chenait, Chafika Benzaïd, Bahia Zebbane:
Linear Complexity for k-Coverage Sensor Redundancy Determination in IoT. ISNCC 2023: 1-6 - [c30]Ferhat Mecerhed, Amel Benabdallah, Khaled Zeraoulia, Chafika Benzaïd:
3D-PM: A ML-powered Probabilistic Detection of DDoS Attacks in P4 Switches. MeditCom 2023: 80-85 - [i4]Mojdeh Karbalaee Motalleb, Chafika Benzaïd, Tarik Taleb, Vahid Shah-Mansouri:
Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture. CoRR abs/2309.13444 (2023) - 2022
- [j13]Othmane Hireche, Chafika Benzaïd
, Tarik Taleb
:
Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G. Comput. Networks 203: 108668 (2022) - [j12]Yongchao Dang
, Chafika Benzaïd
, Bin Yang
, Tarik Taleb
, Yulong Shen
:
Deep-Ensemble-Learning-Based GPS Spoofing Detection for Cellular-Connected UAVs. IEEE Internet Things J. 9(24): 25068-25085 (2022) - [j11]Chafika Benzaïd
, Tarik Taleb, JaeSeung Song:
AI-Based Autonomic and Scalable Security Management Architecture for Secure Network Slicing in B5G. IEEE Netw. 36(6): 165-174 (2022) - [c29]Yongchao Dang, Chafika Benzaïd
, Tarik Taleb, Bin Yang, Yulong Shen:
Transfer Learning based GPS Spoofing Detection for Cellular-Connected UAVs. IWCMC 2022: 629-634 - [c28]Mohamed Lamine Adjou, Chafika Benzaïd
, Tarik Taleb:
TopoTrust: A Blockchain-based Trustless and Secure Topology Discovery in SDNs. IWCMC 2022: 1107-1112 - [i3]Yongchao Dang, Chafika Benzaid, Bin Yang, Tarik Taleb:
Deep Learning for GPS Spoofing Detection in Cellular Enabled Unmanned Aerial Vehicle Systems. CoRR abs/2201.00568 (2022) - [i2]Sihem Ouahouah, Jonathan Prados-Garzon, Tarik Taleb, Chafika Benzaid:
Energy and Delay aware Physical Collision Avoidance in Unmanned Aerial Vehicles. CoRR abs/2201.01414 (2022) - [i1]Chafika Benzaïd, Tarik Taleb:
AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler? CoRR abs/2201.02730 (2022) - 2021
- [j10]Chafika Benzaïd
, Tarik Taleb, Muhammad Zubair Farooqi
:
Trust in 5G and Beyond Networks. IEEE Netw. 35(3): 212-222 (2021) - [c27]Chafika Benzaid, Tarik Taleb, Cao-Thanh Phan, Christos Tselios, George Tsolis:
Distributed AI-based Security for Massive Numbers of Network Slices in 5G & Beyond Mobile Systems. EuCNC/6G Summit 2021: 401-406 - [c26]Yongchao Dang, Chafika Benzaïd
, Bin Yang, Tarik Taleb:
Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems. NaNA 2021: 501-506 - 2020
- [j9]Chafika Benzaid
, Tarik Taleb:
AI-Driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research Directions. IEEE Netw. 34(2): 186-194 (2020) - [j8]Chafika Benzaid
, Tarik Taleb:
ZSM Security: Threat Surface and Best Practices. IEEE Netw. 34(3): 124-133 (2020) - [j7]Chafika Benzaid
, Tarik Taleb:
AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler? IEEE Netw. 34(6): 140-147 (2020) - [c25]Jordi Ortiz
, Ramon Sanchez-Iborra, Jorge Bernal Bernabé
, Antonio F. Skarmeta, Chafika Benzaid
, Tarik Taleb, Pol Alemany, Raul Muñoz
, Ricard Vilalta, Chrystel Gaber, Jean-Philippe Wary, Dhouha Ayed, Pascal Bisson, Maria Christopoulou
, George Xilouris
, Edgardo Montes de Oca, Gürkan Gür
, Gianni Santinelli, Vincent Lefebvre, Antonio Pastor, Diego R. López:
INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks. ARES 2020: 105:1-105:10 - [c24]Yongchao Dang, Chafika Benzaïd
, Yulong Shen, Tarik Taleb:
GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs. GLOBECOM 2020: 1-6 - [c23]Sihem Ouahouah, Jonathan Prados-Garzon, Tarik Taleb, Chafika Benzaid
:
Energy-aware Collision Avoidance stochastic Optimizer for a UAVs set. IWCMC 2020: 1636-1641 - [c22]Chafika Benzaïd
, Mohammed Boukhalfa, Tarik Taleb:
Robust Self-Protection Against Application-Layer (D)DoS Attacks in SDN Environment. WCNC 2020: 1-6
2010 – 2019
- 2019
- [c21]Khadidja Tisseli, Chafika Benzaid
, Noureddine Lasla
, Nadjib Badache:
Connectivity-aware Relay Node Deployment in Grid-based Wireless Sensor Networks. Wireless Days 2019: 1-4 - 2018
- [j6]Bahia Zebbane, Manel Chenait, Chafika Benzaid, Nadjib Badache:
RTCP: a redundancy aware topology control protocol for wireless sensor networks. Int. J. Inf. Commun. Technol. 12(3/4): 271-298 (2018) - [c20]Sihem Ouahouah, Jonathan Prados-Garzon, Tarik Taleb, Chafika Benzaid
:
Energy and Delay Aware Physical Collision Avoidance in Unmanned Aerial Vehicles. GLOBECOM 2018: 1-7 - 2017
- [j5]Chafika Benzaid
, Miloud Bagaa
, Mohamed F. Younis
:
Efficient clock synchronization for clustered wireless sensor networks. Ad Hoc Networks 56: 13-27 (2017) - [j4]Manel Chenait, Bahia Zebbane, Chafika Benzaid
, Nadjib Badache:
Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks. Comput. Networks 127: 1-12 (2017) - [c19]Sihem Ouahouah, Tarik Taleb, JaeSeung Song, Chafika Benzaid
:
Efficient offloading mechanism for UAVs-based value added services. ICC 2017: 1-6 - 2016
- [j3]Chafika Benzaid
, Karim Lounis, Ameer Al-Nemrat, Nadjib Badache, Mamoun Alazab
:
Fast authentication in wireless sensor networks. Future Gener. Comput. Syst. 55: 362-375 (2016) - [j2]Khaled Zeraoulia, Chafika Benzaid
, Nadjib Badache:
MS-WMSN: service-oriented planning tool for wireless multimedia monitoring services. Int. J. Inf. Commun. Technol. 8(1): 50-68 (2016) - [c18]Nadia Benchikha, Mohamed Krim, Khaled Zeraoulia, Chafika Benzaid
:
IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework. CCC 2016: 35-40 - [c17]Chafika Benzaid
, Abderrahman Boulgheraif, Fatma Zohra Dahmane, Ameer Al-Nemrat, Khaled Zeraoulia:
Intelligent detection of MAC spoofing attack in 802.11 network. ICDCN 2016: 47:1-47:5 - [c16]Amin Saiah, Chafika Benzaid
, Nadjib Badache:
CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networks. NCA 2016: 232-236 - [c15]Nikolaos Sarantinos, Chafika Benzaid
, Omar Arabiat, Ameer Al-Nemrat:
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. Trustcom/BigDataSE/ISPA 2016: 1782-1787 - 2015
- [c14]Manel Chenait, Bahia Zebbane, Sihem Filali, Ibtissem Belhocine, Chafika Benzaid
, Nadjib Badache:
A Low-Complex Coverage Eligibility Algorithm For Wireless Sensor Networks. IPAC 2015: 85:1-85:5 - [c13]Manel Chenait, Bahia Zebbane, Chafika Benzaid
, Nadjib Badache:
Sleep scheduling with predictive coverage redundancy check in wireless sensor networks. ISWCS 2015: 366-370 - [c12]Manel Chenait, Bahia Zebbane, Lyes Boufennara, Lotfi Haouaya, Chafika Benzaid
, Nadjib Badache:
LSEA: Light Weight Sector Eligibility Algorithm for k-Coverage in Wireless Sensor Networks. NGMAST 2015: 294-299 - [c11]Ameer Al-Nemrat, Chafika Benzaid
:
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. TrustCom/BigDataSE/ISPA (1) 2015: 1380-1385 - [c10]Heman Awang Mangut, Ameer Al-Nemrat, Chafika Benzaid
, Abdel-Rahman H. Tawil
:
ARP Cache Poisoning Mitigation and Forensics Investigation. TrustCom/BigDataSE/ISPA (1) 2015: 1392-1397 - [c9]Midhun Babu Tharayanil, Gill Whitney, Mahdi Aiash, Chafika Benzaid
:
Virtualization and Cyber Security: Arming Future Security Practitioners. TrustCom/BigDataSE/ISPA (1) 2015: 1398-1402 - 2014
- [c8]Chafika Benzaid
, Miloud Bagaa
, Mohamed F. Younis
:
An efficient clock synchronization protocol for wireless sensor networks. IWCMC 2014: 718-723 - [c7]Chafika Benzaid
, Amin Saiah, Nadjib Badache:
An Enhanced Secure Pairwise Broadcast Time Synchronization Protocol in Wireless Sensor Networks. PDP 2014: 569-573 - 2012
- [c6]Chafika Benzaid
, Sana Medjadba, Ameer Al-Nemrat, Nadjib Badache:
Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks. CSE 2012: 633-639 - [c5]Chafika Benzaid
, Sana Medjadba, Nadjib Badache:
Fast verification of an ID-based signature scheme for broadcast authentication inwireless sensor networks. MASS Workshops 2012: 1-6 - 2011
- [c4]Chafika Benzaid
, Amin Saiah, Nadjib Badache:
Secure pairwise broadcast time synchronization in wireless sensor networks. DCOSS 2011: 1-6
2000 – 2009
- 2008
- [c3]Chafika Benzaid
, Nadjib Badache:
A causal multicast protocol for dynamic groups in cellular networks. EATIS 2008 - [c2]Chafika Benzaid
, Nadjib Badache:
An Optimal Causal Broadcast Protocol in Mobile Dynamic Groups. ISPA 2008: 477-484 - [c1]Chafika Benzaid, Nadjib Badache:
BMobi_Causal: a causal broadcast protocol in mobile dynamic groups. PODC 2008: 421 - 2005
- [j1]Chafika Benzaid, Nadjib Badache:
Mobi_Causal: a protocol for causal message ordering in mobile computing systems. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9(2): 19-28 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-26 23:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint