INtelligent Security and PervasIve tRust for 5G and Beyond

Pol Alemany , Charalampos Kalalas , Muñoz Raul , Ricard VIlalta
INSPIRE-5Gplus Consortium, WP3 3

1
2019
INtelligent Security and PervasIve tRust for 5G and Beyond

Vincent Lefebvre , Vinh Hoa La , Luisa Rossi , Pauline Derez

2019
INtelligent Security and PervasIve tRust for 5G and Beyond

Jean-Philippe Wary , Chrystel Gaber , Marc Lacoste , Jose Sanchez Vilchez

2019
INtelligent Security and PervasIve tRust for 5G and Beyond - Deliverable 4.2

Jean-Philippe Wary , Chrystel Gaber , Marc Lacoste , Jose Sanchez Vilchez

2019
White paper: Intelligent security architecture for 5g and beyond networks

C Benzaid , P Alemany , D Ayed , G Chollon
INSPIRE-5Gplus

11
2020
Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks

Chafika Benziad , Sana Medjadba , Ameer Al-Nemrat , Nadjib Badache
In Proc. of the 10th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2012) 7 -7

6
2012
MS-WMSN: Service-Oriented planning tool for Wireless Multimedia Monitoring Services

N. BADACHE. K. ZERAOULIA , C. BENZAID
International Journal of Information and Communication Technology

2014
5G PPP Architecture Working Group: View on 5G Architecture

Stefano Salsano , David Breitgand , Ömer Bulakci , Chafika Benzaid
EU CNC

5
2019
Trust in 5G and Beyond Networks

Chafika Benzaid , Tarik Taleb , Muhammad Zubair Farooqi
IEEE Network 1 -11

2021
GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs

Chafika Benzaid , Tarik Taleb , Yulong Shen , Yongchao Dang
global communications conference 1 -6

2020
Mobi_Causal: a protocol for causal message ordering in mobile computing systems

Chafika Benzaid , Nadjib Badache
Mobile Computing and Communications Review 9 ( 2) 19 -28

8
2005
Efficient offloading mechanism for UAVs-based value added services

Sihem Ouahouah , Tarik Taleb , JaeSeung Song , Chafika Benzaid
international conference on communications 1 -6

28
2017
Analysis of Malware Behaviour: Using Data Mining Clustering Techniques to Support Forensics Investigation

Edem Inang Edem , Chafika Benzaid , Ameer Al-Nemrat , Paul Watters
2014 Fifth Cybercrime and Trustworthy Computing Conference 54 -63

12
2014
CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networks

Amin Saiah , Chafika Benzaid , Nadjib Badache
network computing and applications 232 -236

1
2016
Robust Self-Protection Against Application-Layer (D)DoS Attacks in SDN Environment

Chafika Benzaid , Mohammed Boukhalfa , Tarik Taleb
wireless communications and networking conference 1 -6

10
2020
LSEA: Light Weight Sector Eligibility Algorithm for k-Coverage in Wireless Sensor Networks

Manel Chenait , Bahia Zebbane , Lyes Boufennara , Lotfi Haouaya
next generation mobile applications, services and technologies 294 -299

1
2015
145
2020
ZSM Security: Threat Surface and Best Practices

Chafika Benzaid , Tarik Taleb
IEEE Network 34 ( 3) 124 -133

10
2020
AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?

Chafika Benzaid , Tarik Taleb
IEEE Network 34 ( 6) 140 -147

53
2020