Suivre
Badis Hammi
Badis Hammi
Institut Polytechnique de Paris, Télécom SudParis
Adresse e-mail validée de telecom-sudparis.eu
Titre
Citée par
Citée par
Année
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
MT Hammi, B Hammi, P Bellot, A Serhrouchni
Computers & Security 78, 126-142, 2018
7872018
IoT technologies<? show [AQ ID= Q1]?> for smart cities
B Hammi, R Khatoun, S Zeadally, A Fayad, L Khoukhi
IET networks 7 (1), 1-13, 2018
3692018
A lightweight ECC-based authentication scheme for Internet of Things (IoT)
B Hammi, A Fayad, R Khatoun, S Zeadally, Y Begriche
IEEE Systems Journal 14 (3), 3440-3450, 2020
1342020
Survey on smart homes: Vulnerabilities, risks, and countermeasures
B Hammi, S Zeadally, R Khatoun, J Nebhen
Computers & Security 117, 102677, 2022
1002022
A blockchain-based certificate revocation management and status verification system
EA Yves Christian, H Badis, S Ahmed, Z Sherali
Computers & Security 104, 102209, 2021
622021
Security threats, countermeasures, and challenges of digital supply chains
B Hammi, S Zeadally, J Nebhen
ACM Computing Surveys 55 (14s), 1-40, 2023
462023
A secure multipath reactive protocol for routing in IoT and HANETs
B Hammi, S Zeadally, H Labiod, R Khatoun, Y Begriche, L Khoukhi
Ad Hoc Networks 103, 102118, 2020
342020
Understanding botclouds from a system perspective: A principal component analysis
H Badis, G Doyen, R Khatoun
2014 IEEE Network Operations and Management Symposium (NOMS), 1-9, 2014
322014
An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach
A Fayad, B Hammi, R Khatoun
2018 Third International Conference on Security of Smart Cities, Industrial …, 2018
312018
Non-fungible tokens: a review
B Hammi, S Zeadally, AJ Perez
IEEE Internet of Things Magazine 6 (1), 46-50, 2023
302023
Total eclipse: How to completely isolate a bitcoin peer
AE Yves-Christian, B Hammi, A Serhrouchni, H Labiod
2018 Third International Conference on Security of Smart Cities, Industrial …, 2018
252018
Blockchain-based solution for detecting and preventing fake check scams
B Hammi, S Zeadally, YCE Adja, M Del Giudice, J Nebhen
IEEE Transactions on Engineering Management 69 (6), 3710-3725, 2021
242021
A collaborative approach for a source based detection of botclouds
H Badis, G Doyen, R Khatoun
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
222015
Is it really easy to detect sybil attacks in c-its environments: a position paper
B Hammi, YM Idir, S Zeadally, R Khatoun, J Nebhen
IEEE Transactions on Intelligent Transportation Systems 23 (10), 18273-18287, 2022
212022
Securing pki requests for c-its systems
JP Monteuuis, B Hammi, E Salles, H Labiod, R Blancher, E Abalea, ...
2017 26th International Conference on Computer Communication and Networks …, 2017
202017
Detecting botclouds at large scale: A decentralized and robust detection method for multi-tenant virtualized environments
R Cogranne, G Doyen, N Ghadban, B Hammi
IEEE Transactions on Network and Service Management 15 (1), 68-82, 2017
192017
PKIs in C-ITS: Security functions, architectures and projects: A survey
B Hammi, JP Monteuuis, J Petit
Vehicular Communications 38, 100531, 2022
142022
Toward a source detection of botclouds: a pca-based approach
H Badis, G Doyen, R Khatoun
Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014
132014
Software supply-chain security: Issues and countermeasures
B Hammi, S Zeadally
Computer 56 (7), 54-66, 2023
122023
An empirical investigation of botnet as a service for cyberattacks
B Hammi, S Zeadally, R Khatoun
Transactions on emerging telecommunications technologies 30 (3), e3537, 2019
112019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20