Bubbles of Trust: A decentralized blockchain-based authentication system for IoT MT Hammi, B Hammi, P Bellot, A Serhrouchni Computers & Security 78, 126-142, 2018 | 787 | 2018 |
IoT technologies<? show [AQ ID= Q1]?> for smart cities B Hammi, R Khatoun, S Zeadally, A Fayad, L Khoukhi IET networks 7 (1), 1-13, 2018 | 369 | 2018 |
A lightweight ECC-based authentication scheme for Internet of Things (IoT) B Hammi, A Fayad, R Khatoun, S Zeadally, Y Begriche IEEE Systems Journal 14 (3), 3440-3450, 2020 | 134 | 2020 |
Survey on smart homes: Vulnerabilities, risks, and countermeasures B Hammi, S Zeadally, R Khatoun, J Nebhen Computers & Security 117, 102677, 2022 | 100 | 2022 |
A blockchain-based certificate revocation management and status verification system EA Yves Christian, H Badis, S Ahmed, Z Sherali Computers & Security 104, 102209, 2021 | 62 | 2021 |
Security threats, countermeasures, and challenges of digital supply chains B Hammi, S Zeadally, J Nebhen ACM Computing Surveys 55 (14s), 1-40, 2023 | 46 | 2023 |
A secure multipath reactive protocol for routing in IoT and HANETs B Hammi, S Zeadally, H Labiod, R Khatoun, Y Begriche, L Khoukhi Ad Hoc Networks 103, 102118, 2020 | 34 | 2020 |
Understanding botclouds from a system perspective: A principal component analysis H Badis, G Doyen, R Khatoun 2014 IEEE Network Operations and Management Symposium (NOMS), 1-9, 2014 | 32 | 2014 |
An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach A Fayad, B Hammi, R Khatoun 2018 Third International Conference on Security of Smart Cities, Industrial …, 2018 | 31 | 2018 |
Non-fungible tokens: a review B Hammi, S Zeadally, AJ Perez IEEE Internet of Things Magazine 6 (1), 46-50, 2023 | 30 | 2023 |
Total eclipse: How to completely isolate a bitcoin peer AE Yves-Christian, B Hammi, A Serhrouchni, H Labiod 2018 Third International Conference on Security of Smart Cities, Industrial …, 2018 | 25 | 2018 |
Blockchain-based solution for detecting and preventing fake check scams B Hammi, S Zeadally, YCE Adja, M Del Giudice, J Nebhen IEEE Transactions on Engineering Management 69 (6), 3710-3725, 2021 | 24 | 2021 |
A collaborative approach for a source based detection of botclouds H Badis, G Doyen, R Khatoun 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 22 | 2015 |
Is it really easy to detect sybil attacks in c-its environments: a position paper B Hammi, YM Idir, S Zeadally, R Khatoun, J Nebhen IEEE Transactions on Intelligent Transportation Systems 23 (10), 18273-18287, 2022 | 21 | 2022 |
Securing pki requests for c-its systems JP Monteuuis, B Hammi, E Salles, H Labiod, R Blancher, E Abalea, ... 2017 26th International Conference on Computer Communication and Networks …, 2017 | 20 | 2017 |
Detecting botclouds at large scale: A decentralized and robust detection method for multi-tenant virtualized environments R Cogranne, G Doyen, N Ghadban, B Hammi IEEE Transactions on Network and Service Management 15 (1), 68-82, 2017 | 19 | 2017 |
PKIs in C-ITS: Security functions, architectures and projects: A survey B Hammi, JP Monteuuis, J Petit Vehicular Communications 38, 100531, 2022 | 14 | 2022 |
Toward a source detection of botclouds: a pca-based approach H Badis, G Doyen, R Khatoun Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014 | 13 | 2014 |
Software supply-chain security: Issues and countermeasures B Hammi, S Zeadally Computer 56 (7), 54-66, 2023 | 12 | 2023 |
An empirical investigation of botnet as a service for cyberattacks B Hammi, S Zeadally, R Khatoun Transactions on emerging telecommunications technologies 30 (3), e3537, 2019 | 11 | 2019 |