A survey of internet of things (IoT) authentication schemes M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni Sensors 19 (5), 1141, 2019 | 344 | 2019 |
On blockchain security and relevant attacks J Moubarak, E Filiol, M Chamoun 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), 1-6, 2018 | 124 | 2018 |
A multilingual system for cyberbullying detection: Arabic content detection using machine learning B Haidar, M Chamoun, A Serhrouchni Advances in Science, Technology and Engineering Systems Journal 2 (6), 275-284, 2017 | 85 | 2017 |
Analysis of authentication techniques in Internet of Things (IoT) M El-Hajj, M Chamoun, A Fadlallah, A Serhrouchni 2017 1st Cyber Security in Networking Conference (CSNet), 1-3, 2017 | 82 | 2017 |
Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content B Haidar, M Chamoun, A Serhrouchni 2017 1st cyber security in networking conference (CSNet), 1-8, 2017 | 55 | 2017 |
SDN security problems and solutions analysis A Feghali, R Kilany, M Chamoun 2015 International Conference on Protocol Engineering (ICPE) and …, 2015 | 55 | 2015 |
Analysis of cryptographic algorithms on iot hardware platforms M El-Haii, M Chamoun, A Fadlallah, A Serhrouchni 2018 2nd Cyber Security in Networking Conference (CSNet), 1-5, 2018 | 43 | 2018 |
Taxonomy of authentication techniques in Internet of Things (IoT) M El-Hajj, M Chamoun, A Fadlallah, A Serhrouchni 2017 IEEE 15th Student Conference on Research and Development (SCOReD), 67-71, 2017 | 39 | 2017 |
Cyberbullying detection: A survey on multilingual techniques B Haidar, M Chamoun, F Yamout 2016 European modelling symposium (EMS), 165-171, 2016 | 35 | 2016 |
On blockchain technology: Overview of bitcoin and future insights H Hellani, AE Samhat, M Chamoun, H El Ghor, A Serhrouchni 2018 IEEE International Multidisciplinary Conference on Engineering …, 2018 | 33 | 2018 |
Arabic cyberbullying detection: Using deep learning B Haidar, M Chamoun, A Serhrouchni 2018 7th international conference on computer and communication engineering …, 2018 | 32 | 2018 |
Comparative analysis of blockchain technologies and tor network: Two faces of the same reality? J Moubarak, E Filiol, M Chamoun 2017 1st Cyber Security in Networking Conference (CSNet), 1-9, 2017 | 28 | 2017 |
Arabic cyberbullying detection: Enhancing performance by using ensemble machine learning B Haidar, M Chamoun, A Serhrouchni 2019 international conference on internet of things (ithings) and ieee green …, 2019 | 22 | 2019 |
Comparative study of recent mea malware phylogeny J Moubarak, M Chamoun, E Filiol 2017 2nd International Conference on Computer and Communication Systems …, 2017 | 21 | 2017 |
On distributed ledgers security and illegal uses J Moubarak, M Chamoun, E Filiol Future Generation Computer Systems 113, 183-195, 2020 | 20 | 2020 |
Developing a Κ-ary malware using blockchain J Moubarak, M Chamoun, E Filiol NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-4, 2018 | 19 | 2018 |
On DGHV and BGV fully homomorphic encryption schemes K Hariss, M Chamoun, AE Samhat 2017 1St cyber security in networking conference (CSNet), 1-9, 2017 | 19 | 2017 |
Ethereum for secure authentication of iot using pre-shared keys (psks) M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni 2019 International Conference on Wireless Networks and Mobile Communications …, 2019 | 16 | 2019 |
Design and realization of a fully homomorphic encryption algorithm for cloud applications K Hariss, H Noura, AE Samhat, M Chamoun Risks and Security of Internet and Systems: 12th International Conference …, 2018 | 11 | 2018 |
A Survey of DNS Tunnelling Detection Techniques Using Machine Learning. S Yassine, J Khalife, M Chamoun, H El Ghor BDCSIntell, 63-66, 2018 | 10 | 2018 |