default search action
Rida Khatoun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c53]Ayoub Wehby, Sherali Zeadally, Rida Khatoun, Mohammed Lamine Bouchouia, Ahmad Fadlallah:
How Does Distributed Denial of Service Affect the Connected Cars Environment? CoDIT 2024: 164-170 - [c52]Razan Sujud, Walid Fahs, Rida Khatoun, Fadlallah Chbib:
Cyberbullying Detection Using Bidirectional Encoder Representations from Transformers (BERT). MeditCom 2024: 257-262 - [c51]Ayoub Wehby, Rida Khatoun, Ahmad Fadlallah:
Shielding the Connected Cars: A Dataset-Powered Defense Against DDoS. WINCOM 2024: 1-7 - 2023
- [j23]Antoine Boudermine, Rida Khatoun, Jean-Henri Choyer:
Dynamic logic-based attack graph for risk assessment in complex computer systems. Comput. Networks 228: 109730 (2023) - [j22]Ali Mustapha, Rida Khatoun, Sherali Zeadally, Fadlallah Chbib, Ahmad Fadlallah, Walid Fahs, Ali El Attar:
Detecting DDoS attacks using adversarial neural network. Comput. Secur. 127: 103117 (2023) - [c50]Ali Rachini, Charbel Fares, Maroun Abi Assaf, Buroog Jamal, Rida Khatoun:
AI-Powered Network Intrusion Detection: A New Frontier in Cybersecurity. ACIT 2023: 1-8 - [c49]Walid Fahs, Fadlallah Chbib, Abbas Rammal, Rida Khatoun, Ali El Attar, Issam Zaytoun, Joel Hachem:
Traffic Congestion Prediction Based on Multivariate Modelling and Neural Networks Regressions. ANT/EDI40 2023: 202-209 - [c48]Adonis Jamal, Ali El Attar, Fadlallah Chbib, Rida Khatoun:
Comparison of Data Cleansing Methods for Network DDoS Attacks Mitigation. CoDIT 2023: 459-464 - [c47]Danylo Goncharskyi, Sung Yong Kim, Pengwenlong Gu, Ahmed Serhrouchni, Rida Khatoun, Farid Naït-Abdesselam:
Lightweight TLS 1.3 Handshake for C-ITS Systems. ICC 2023: 1432-1437 - [c46]Minh-Thuyen Thi, Siwar Ben Hadj Said, Adrien Roberty, Fadlallah Chbib, Rida Khatoun, Leonardo Linguaglossa:
Enabling Programmable Deterministic Communications in 6G. MobiHoc 2023: 322-327 - 2022
- [j21]Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen:
Survey on smart homes: Vulnerabilities, risks, and countermeasures. Comput. Secur. 117: 102677 (2022) - [j20]Fadlallah Chbib, Lyes Khoukhi, Walid Fahs, Jamal Haydar, Rida Khatoun:
A cross-layered scheme for multichannel and reactive routing in vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. 33(7) (2022) - [j19]Badis Hammi, Yacine Mohamed Idir, Sherali Zeadally, Rida Khatoun, Jamel Nebhen:
Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Trans. Intell. Transp. Syst. 23(10): 18273-18287 (2022) - [j18]Fadlallah Chbib, Sherali Zeadally, Rida Khatoun, Lyes Khoukhi, Walid Fahs, Jamal Haydar:
A secure cross-layer architecture for reactive routing in vehicle to vehicle (V2V) communications. Veh. Commun. 38: 100541 (2022) - [c45]Badis Hammi, Yacine Mohamed Idir, Rida Khatoun:
A machine learning based approach for the detection of sybil attacks in C-ITS. APNOMS 2022: 1-4 - [c44]Antoine Boudermine, Rida Khatoun, Jean-Henri Choyer:
Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment. CIoT 2022: 24-31 - [c43]Danylo Goncharskyi, Sung Yong Kim, Ahmed Serhrouchni, Pengwenlong Gu, Rida Khatoun, Joel Hachem:
Delay Measurement of 0-RTT Transport Layer Security (TLS) Handshake Protocol. CoDIT 2022: 1450-1454 - [c42]Sung Yong Kim, Danylo Goncharskyi, Pengwenlong Gu, Ahmed Serhrouchni, Rida Khatoun, Farid Naït-Abdesselam, Jean-Jacques Grund:
TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things. GLOBECOM 2022: 3539-3544 - 2021
- [j17]Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun:
IEEE 802.11p performance enhancement based on Markov chain and neural networks for safety applications. Ann. des Télécommunications 76(9-10): 617-632 (2021) - [c41]Pengwenlong Gu, Dingjie Zhong, Cunqing Hua, Farid Naït-Abdesselam, Ahmed Serhrouchni, Rida Khatoun:
Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding. GLOBECOM 2021: 1-6 - 2020
- [j16]Badis Hammi, Sherali Zeadally, Houda Labiod, Rida Khatoun, Youcef Begriche, Lyes Khoukhi:
A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Networks 103: 102118 (2020) - [j15]Pengwenlong Gu, Cunqing Hua, Wenchao Xu, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Control Channel Anti-Jamming in Vehicular Networks via Cooperative Relay Beamforming. IEEE Internet Things J. 7(6): 5064-5077 (2020) - [j14]Badis Hammi, Achraf Fayad, Rida Khatoun, Sherali Zeadally, Youcef Begriche:
A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT). IEEE Syst. J. 14(3): 3440-3450 (2020) - [c40]Fadlallah Chbib, Lyes Khoukhi, Walid Fahs, Jamal Haydar, Rida Khatoun:
A Cross-Layered Interference in Multichannel MAC of VANET. Cloudtech 2020: 1-6 - [c39]Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun:
Message Fabrication Detection Model based on Reactive Protocols in VANET. CSNet 2020: 1-5 - [c38]Abdessamad Fazzat, Rida Khatoun, Houda Labiod, Renaud Dubois:
A comparative performance study of cryptographic algorithms for connected vehicles. CSNet 2020: 1-8 - [c37]Lyes Khoukhi, Rida Khatoun:
Safe Traffic Adaptation Model in Wireless Mesh Networks. CSNet 2020: 1-4 - [c36]Jean Cassou-Mounat, Houda Labiod, Rida Khatoun:
Simulation of Cyberattacks in ITS-G5 Systems. Nets4Cars/Nets4Trains/Nets4Aircraft 2020: 3-14
2010 – 2019
- 2019
- [j13]Rida Khatoun, Diogo Menezes Ferrazani Mattos, Otto Carlos Muniz Bandeira Duarte:
Cybersecurity in networking. Ann. des Télécommunications 74(3-4): 123-124 (2019) - [j12]Badis Hammi, Sherali Zeadally, Rida Khatoun:
An empirical investigation of botnet as a service for cyberattacks. Trans. Emerg. Telecommun. Technol. 30(3) (2019) - [j11]Rida Khatoun, Youcef Begriche, Lyes Khoukhi:
A statistical detection mechanism for node misbehaviours in wireless mesh networks. Int. J. Ad Hoc Ubiquitous Comput. 31(1): 23-35 (2019) - [c35]Achraf Fayad, Badis Hammi, Rida Khatoun, Ahmed Serhrouchni:
A Blockchain-based Lightweight Authentication Solution for IoT. CSNet 2019: 28-34 - [c34]Fadlallah Chbib, Lyes Khoukhi, Walid Fahs, Rida Khatoun, Jamal Haydar:
Wave Performance Analysis and Enhancement for Safety Applications in Vehicular Networks. NTMS 2019: 1-7 - 2018
- [j10]Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi:
IoT technologies for smart cities. IET Networks 7(1): 1-13 (2018) - [j9]Pengwenlong Gu, Cunqing Hua, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Cooperative Antijamming Relaying for Control Channel Jamming in Vehicular Networks. IEEE Trans. Veh. Technol. 67(8): 7033-7046 (2018) - [c33]Zhenzhe Zhong, Isabelle Hamchaoui, Rida Khatoun:
Perils of using CQIC in LTE network and a quick fix with delayed ACK. CCNC 2018: 1-2 - [c32]Zhenzhe Zhong, Isabelle Hamchaoui, Rida Khatoun, Ahmed Serhrouchni:
Performance evaluation of CQIC and TCP BBR in mobile network. ICIN 2018: 1-5 - [c31]Achraf Fayad, Badis Hammi, Rida Khatoun:
An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach. SSIC 2018: 1-7 - [c30]Zhenzhe Zhong, Isabelle Hamchaoui, Alexandre Ferrieux, Rida Khatoun, Ahmed Serhrouchni:
CDBE: A cooperative way to improve end-to-end congestion control in mobile network. WiMob 2018: 216-223 - [c29]Pengwenlong Gu, Cunqing Hua, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Cooperative relay beamforming for control channel jamming in vehicular networks. WiOpt 2018: 1-7 - 2017
- [j8]Rida Khatoun, Sherali Zeadally:
Cybersecurity and Privacy Solutions in Smart Cities. IEEE Commun. Mag. 55(3): 51-59 (2017) - [j7]Mohammad Rmayti, Rida Khatoun, Youcef Begriche, Lyes Khoukhi, Dominique Gaïti:
A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks. Comput. Networks 121: 53-64 (2017) - [j6]Liang Pang, Xiao Chen, Yong Shi, Zhi Xue, Rida Khatoun:
Localization of multiple jamming attackers in vehicular ad hoc network. Int. J. Distributed Sens. Networks 13(8) (2017) - [j5]Juliette Dromard, Lyes Khoukhi, Rida Khatoun, Youcef Begriche:
Towards combining admission control and link scheduling in wireless mesh networks. Telecommun. Syst. 66(1): 39-54 (2017) - [c28]Badis Hammi, Jean Philippe Monteuuis, Houda Labiod, Rida Khatoun, Ahmed Serhrouchni:
Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS. CSNet 2017: 1-6 - [c27]Pengwenlong Gu, Cunqing Hua, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks. GLOBECOM 2017: 1-6 - [c26]Liang Pang, Xiao Chen, Zhi Xue, Rida Khatoun:
A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm. ICPCSEE (2) 2017: 198-211 - [c25]Pengwenlong Gu, Rida Khatoun, Youcef Begriche, Ahmed Serhrouchni:
Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks. WCNC 2017: 1-6 - 2016
- [j4]Rida Khatoun, Youcef Begriche, Juliette Dromard, Lyes Khoukhi, Ahmed Serhrouchni:
A statistical trust system in wireless mesh networks. Ann. des Télécommunications 71(5-6): 187-199 (2016) - [j3]Rida Khatoun, Sherali Zeadally:
Smart cities: concepts, architectures, research opportunities. Commun. ACM 59(8): 46-57 (2016) - [c24]Pengwenlong Gu, Rida Khatoun, Youcef Begriche, Ahmed Serhrouchni:
Vehicle Driving Pattern Based Sybil Attack Detection. HPCC/SmartCity/DSS 2016: 1282-1288 - [c23]Badis Hammi, Mohamed Cherif Rahal, Rida Khatoun:
Clustering methods comparison: Application to source based detection of botclouds. SSIC 2016: 1-7 - 2015
- [c22]Badis Hammi, Guillaume Doyen, Rida Khatoun:
A collaborative approach for a source based detection of botclouds. IM 2015: 906-909 - [c21]Marion Vasseur, Rida Khatoun, Ahmed Serhrouchni:
Survey on packet marking fields and information for IP traceback. CFIP/NOTERE 2015: 1-8 - [c20]Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Xiuzhen Chen:
Bayesian-based model for a reputation system in vehicular networks. SSIC 2015: 1-6 - [c19]Rida Khatoun, P. Gut, R. Doulami, Lyes Khoukhi, Ahmed Serhrouchni:
A reputation system for detection of black hole attack in vehicular networking. SSIC 2015: 1-5 - [c18]Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaïti:
Flooding attacks detection in MANETs. SSIC 2015: 1-6 - [c17]Marion Vasseur, Xiuzhen Chen, Rida Khatoun, Ahmed Serhrouchni:
Survey on packet marking fields and information for IP traceback. SSIC 2015: 1-8 - 2014
- [c16]Juliette Dromard, Rida Khatoun, Lyes Khoukhi:
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks. AIMS 2014: 29-41 - [c15]Badis Hammi, Guillaume Doyen, Rida Khatoun:
Toward a Source Detection of Botclouds: A PCA-Based Approach. AIMS 2014: 105-117 - [c14]Ali El Attar, Rida Khatoun, Marc Lemercier:
Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis. EUC 2014: 315-320 - [c13]Ali El Attar, Rida Khatoun, Marc Lemercier:
A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications. GIIS 2014: 1-6 - [c12]Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaïti:
Denial of Service (DoS) attacks detection in MANETs through statistical models. GIIS 2014: 1-3 - [c11]Ali El Attar, Rida Khatoun, Marc Lemercier:
Clustering-based anomaly detection for smartphone applications. NOMS 2014: 1-4 - [c10]Badis Hammi, Guillaume Doyen, Rida Khatoun:
Understanding botclouds from a system perspective: A principal component analysis. NOMS 2014: 1-9 - [c9]Badis Hammi, Rida Khatoun, Guillaume Doyen:
A Factorial Space for a System-Based Detection of Botcloud Activity. NTMS 2014: 1-5 - [c8]Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaïti:
Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers. SCVT 2014: 7-12 - [c7]Ali El Attar, Rida Khatoun, Babiga Birregah, Marc Lemercier:
Robust clustering methods for detecting smartphone's abnormal behavior. WCNC 2014: 2552-2557 - 2013
- [j2]Juliette Dromard, Lyes Khoukhi, Rida Khatoun:
An efficient admission control model based on dynamic link scheduling in wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2013: 288 (2013) - [c6]Juliette Dromard, Rida Khatoun, Lyes Khoukhi:
An Admission Control Scheme Based on Transmissions Scheduling for Wireless Mesh Networks. AINA Workshops 2013: 75-81 - [c5]Ali El Attar, Rida Khatoun, Marc Lemercier:
Diagnosing smartphone's abnormal behavior through robust outlier detection methods. GIIS 2013: 1-3 - [c4]Juliette Dromard, Rida Khatoun, Lyes Khoukhi:
A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network. ICT 2013: 1-5 - 2012
- [c3]Juliette Dromard, Lyes Khoukhi, Rida Khatoun:
An Admission Control Scheme Based on Links' Activity Scheduling for Wireless Mesh Networks. ADHOC-NOW 2012: 399-412 - 2011
- [c2]Guillaume Montassier, Thibault Cholez, Guillaume Doyen, Rida Khatoun, Isabelle Chrisment, Olivier Festor:
Content pollution quantification in large P2P networks : A measurement study on KAD. Peer-to-Peer Computing 2011: 30-33
2000 – 2009
- 2008
- [j1]Thomas Bullot, Rida Khatoun, Louis Hugues, Dominique Gaïti, Leïla Merghem-Boulahia:
A situatedness-based Knowledge Plane for autonomic networking. Int. J. Netw. Manag. 18(2): 171-193 (2008) - [c1]Rida Khatoun, Guillaume Doyen, Dominique Gaïti, Radwane Saad, Ahmed Serhrouchni:
Decentralized Alerts Correlation Approach for DDoS Intrusion Detection. NTMS 2008: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint