A multi-hop graph-based approach for an energy-efficient routing protocol in wireless sensor networks H Rhim, K Tamine, R Abassi, D Sauveron, S Guemara Human-centric Computing and Information Sciences 8, 1-21, 2018 | 71 | 2018 |
Toward a distributed trust management scheme for vanet A Kchaou, R Abassi, S Guemara Proceedings of the 13th international conference on availability …, 2018 | 65 | 2018 |
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity A Ameziane El Hassani, A Abou El Kalam, A Bouhoula, R Abassi, ... International Journal of Information Security 14, 367-385, 2015 | 42 | 2015 |
VANET security and forensics: Challenges and opportunities R Abassi Wiley Interdisciplinary Reviews: Forensic Science 1 (2), e1324, 2019 | 38 | 2019 |
TSME: a trust-based security scheme for message exchange in vehicular Ad hoc networks R Abassi, A Ben Chehida Douss, D Sauveron Human-centric Computing and Information Sciences 10, 1-19, 2020 | 31 | 2020 |
Towards a secured clustering mechanism for messages exchange in VANET A Kchaou, R Abassi, SG El Fatmi 2018 32nd International Conference on Advanced Information Networking and …, 2018 | 28 | 2018 |
An Automated Validation Method for Security Policies: the firewall case R Abassi, SG El Fatmi 2008 The Fourth International Conference on Information Assurance and …, 2008 | 20 | 2008 |
Towards a generic trust management model R Abassi, SG El Fatmi 2012 19th International Conference on Telecommunications (ICT), 1-6, 2012 | 18 | 2012 |
A reputation-based clustering mechanism for manet routing security AB Chehida, R Abassi, SG El Fatmi 2013 International Conference on Availability, Reliability and Security, 310-315, 2013 | 16 | 2013 |
A trust management based security mechanism against collusion attacks in a MANET environment ABC Douss, R Abassi, SG El Fatmi 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 15 | 2014 |
A ticket-based authentication scheme for vanets preserving privacy O Chikhaoui, AB Chehida, R Abassi, SGE Fatmi Ad-hoc, Mobile, and Wireless Networks: 16th International Conference on Ad …, 2017 | 13 | 2017 |
A Model for Specification and Validation of Security Policies in Communication Networks: the firewall case R Abassi, SG El Fatmi 2008 Third International Conference on Availability, Reliability and …, 2008 | 13 | 2008 |
Towards a new clustering algorithm based on trust management and edge computing for IoT N Kammoun, R Abassi, S Guemara 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 12 | 2019 |
XML access control: from XACML to annotated schemas R Abassi, M Rusinowitch, F Jacquemard, SG El Fatmi The Second International Conference on Communications and Networking, 1-8, 2010 | 12 | 2010 |
A secure network coding-enabled approach for a confidential cluster-based routing in wireless sensor networks H Rhim, R Abassi, K Tamine, D Sauveron, S Guemara Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2151-2157, 2020 | 9 | 2020 |
Dealing with collusion attack in a trust-based MANET R Abassi Cybernetics and Systems 49 (7-8), 475-496, 2018 | 8 | 2018 |
Towards the definition of a mobility-based clustering environment for MANET AB Chehida, R Abassi, SG El Fatmi the Ninth International Conference on Wireless and Mobile Communications …, 2013 | 8 | 2013 |
Towards the performance evaluation of a clustering and trust based security mechanism for VANET A Kchaou, R Abassi, S guemara Proceedings of the 15th International Conference on Availability …, 2020 | 7 | 2020 |
A new trust based routing protocol for VANETs A Kchaou, R Abassi, SG El Fatmi 2018 Seventh International Conference on Communications and Networking …, 2018 | 7 | 2018 |
S-Promela: An executable specification security policies language R Abbassi, SG El Fatmi 2009 First International Conference on Communications and Networking, 1-8, 2009 | 7 | 2009 |