Chafika Benzaid
Cited by
Cited by
AI-driven zero touch network and service management in 5G and beyond: Challenges and research directions
C Benzaid, T Taleb
Ieee Network 34 (2), 186-194, 2020
Fast authentication in wireless sensor networks
C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab
Future Generation Computer Systems 55, 362-375, 2016
AI for beyond 5G networks: a cyber-security defense or offense enabler?
C Benzaïd, T Taleb
IEEE network 34 (6), 140-147, 2020
ZSM security: Threat surface and best practices
C Benzaid, T Taleb
IEEE Network 34 (3), 124-133, 2020
Trust in 5G and beyond networks
C Benzaïd, T Taleb, MZ Farooqi
IEEE Network 35 (3), 212-222, 2021
INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks
J Ortiz, R Sanchez-Iborra, JB Bernabe, A Skarmeta, C Benzaid, T Taleb, ...
Proceedings of the 15th International Conference on Availability …, 2020
Efficient clock synchronization for clustered wireless sensor networks
C Benzaid, M Bagaa, M Younis
Ad Hoc Networks 56, 13-27, 2017
Efficient offloading mechanism for UAVs-based value added services
S Ouahouah, T Taleb, JS Song, C Benzaid
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
Robust self-protection against application-layer (D) DoS attacks in SDN environment
C Benzaïd, M Boukhalfa, T Taleb
2020 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2020
Forensic malware analysis: The value of fuzzy hashing algorithms in identifying similarities
N Sarantinos, C Benzaïd, O Arabiat, A Al-Nemrat
2016 IEEE Trustcom/BigDataSE/ISPA, 1782-1787, 2016
Secure pairwise broadcast time synchronization in wireless sensor networks
C Benzaid, A Saiah, N Badache
2011 International Conference on Distributed Computing in Sensor Systems and …, 2011
Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G
O Hireche, C Benzaïd, T Taleb
Computer Networks 203, 108668, 2022
Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks
M Chenait, B Zebbane, C Benzaid, N Badache
Computer Networks 127, 1-12, 2017
Intelligent detection of mac spoofing attack in 802.11 network
C Benzaïd, A Boulgheraif, FZ Dahmane, A Al-Nemrat, K Zeraoulia
Proceedings of the 17th International Conference on Distributed Computing …, 2016
ARP cache poisoning mitigation and forensics investigation
HA Mangut, A Al-Nemrat, C Benzaïd, ARH Tawil
2015 IEEE Trustcom/BigDataSE/ISPA 1, 1392-1397, 2015
Deep-ensemble-learning-based GPS spoofing detection for cellular-connected UAVs
Y Dang, C Benzaïd, B Yang, T Taleb, Y Shen
IEEE Internet of Things Journal 9 (24), 25068-25085, 2022
GPS spoofing detector with adaptive trustable residence area for cellular based-UAVs
Y Dang, C Benzaïd, Y Shen, T Taleb
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
Analysis of malware behaviour: Using data mining clustering techniques to support forensics investigation
EI Edem, C Benzaïd, A Al-Nemrat, P Watters
2014 Fifth Cybercrime and Trustworthy Computing Conference, 54-63, 2014
Mobi_Causal: a protocol for causal message ordering in mobile computing systems
C Benzaid, N Badache
ACM SIGMOBILE Mobile Computing and Communications Review 9 (2), 19-28, 2005
An optimal causal broadcast protocol in mobile dynamic groups
C Benzaid, N Badache
2008 IEEE International Symposium on Parallel and Distributed Processing …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20