Folgen
Yasmine Harbi
Yasmine Harbi
Université Ferhat Abbas Sétif1 (Associate professor)
Bestätigte E-Mail-Adresse bei univ-setif.dz
Titel
Zitiert von
Zitiert von
Jahr
A review of security in internet of things
Y Harbi, Z Aliouat, S Harous, A Bentaleb, A Refoufi
Wireless Personal Communications 108, 325-344, 2019
782019
Enhanced authentication and key management scheme for securing data transmission in the internet of things
Y Harbi, Z Aliouat, A Refoufi, S Harous, A Bentaleb
Ad Hoc Networks 94, 101948, 2019
642019
Recent security trends in internet of things: A comprehensive survey
Y Harbi, Z Aliouat, A Refoufi, S Harous
IEEE Access 9, 113292-113314, 2021
612021
Secure data transmission scheme based on elliptic curve cryptography for internet of things
Y Harbi, Z Aliouat, S Harous, A Bentaleb
Modelling and Implementation of Complex Systems: Proceedings of the 5th …, 2019
152019
Hybrid deep learning-based intrusion detection system for industrial internet of things
A Khacha, R Saadouni, Y Harbi, Z Aliouat
2022 5th International Symposium on Informatics and its Applications (ISIA), 1-6, 2022
132022
Blockchain for internet of vehicles security
A Herbadji, H Goumidi, Y Harbi, K Medani, Z Aliouat
Blockchain for cybersecurity and privacy, 159-197, 2020
112020
A systematic literature review of blockchain technology for internet of drones security
Y Harbi, K Medani, C Gherbi, O Senouci, Z Aliouat, S Harous
Arabian Journal for Science and Engineering 48 (2), 1053-1074, 2023
82023
Improved bio-inspired security scheme for privacy-preserving in the internet of things
Y Harbi, A Refoufi, Z Aliouat, S Harous
Peer-to-Peer Networking and Applications 15 (6), 2488-2502, 2022
62022
Efficient end-to-end security scheme for privacy-preserving in iot
Y Harbi, Z Aliouat, A Refoufi, S Harous
2019 International Conference on Networking and Advanced Systems (ICNAS), 1-6, 2019
62019
Enhancement of iot applications dependability using bayesian networks
Y Harbi, Z Aliouat, S Hammoudi
Computational Intelligence and Its Applications: 6th IFIP TC 5 International …, 2018
62018
A systematic literature review of machine learning applications in IoT
C Gherbi, O Senouci, Y Harbi, K Medani, Z Aliouat
International Journal of Communication Systems 36 (11), e5500, 2023
52023
Security in internet of things
Y Harbi
32021
Machine learning‐based clustering protocols for Internet of Things networks: An overview
M Merah, Z Aliouat, Y Harbi, MS Batta
International Journal of Communication Systems 36 (10), e5487, 2023
22023
Fog computing security and privacy for internet of things (iot) and industrial internet of things (iiot) applications: State of the art
Y Harbi, Z Aliouat, S Harous
Security Issues in Fog Computing from 5G to 6G: Architectures, Applications …, 2022
12022
Lightweight blockchain-based remote user authentication for fog-enabled iot deployment
Y Harbi, Z Aliouat, S Harous, AM Gueroui
Available at SSRN 4149706, 0
1
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
R Saadouni, C Gherbi, Z Aliouat, Y Harbi, A Khacha
Cluster Computing, 1-27, 2024
2024
Secure IIoT networks with hybrid CNN-GRU model using Edge-IIoTset
R Saadouni, A Khacha, Y Harbi, C Gherbi, S Harous, Z Aliouat
2023 15th International Conference on Innovations in Information Technology …, 2023
2023
Lightweight Mutual Authentication and Key Agreement Scheme for Wearable Devices in Fog-enabled WBAN
R Hireche, H Mansouri, Y Harbi, ASK Pathan
2023 5th International Conference on Pattern Analysis and Intelligent …, 2023
2023
Robust Intrusion Detection for IoT Networks: an Integrated CNN-LSTM-GRU Approach
A Khacha, R Saadouni, Y Harbi, C Gherbi, S Harous, Z Aliouat
2023 International Conference on Networking and Advanced Systems (ICNAS), 1-6, 2023
2023
Temporal Requirements Aware Based Communication Protocol for Wireless Sensor Networks
Z Aliouat, L Aliouat, K Mdani, Y Harbi, C Gherbi, O Senouci
2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile …, 2022
2022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20