L'état de la production scientifique de la division est présenté selon les critères reconnus en la matière, à savoir :

  • Publications et communications internationales.
  • Publications et communications nationales.
  • Rapports internes de recherche.
  • Rapports techniques.

 

DSI: Production Scientifique Année 2024

1. Ahmed Saidi, Abdelouahab Amira, Omar Nouali : Securing Decentralized Federated Learning: Cryptographic Mechanisms for Privacy and Trust, The Journal of Networks Software Tools and Applications, 2024.

DSI: Production Scientifique Année 2023

1. Ahmed Saidi, Abdelouahab Amira, Omar Nouali : a Secure Multi-Authority Attribute based encryption approach for Robust Smart Grids, journal Concurrency and Computation: Practice and Experience, 2023.

2. Amira A, Derhab A, Nouali O : A survey of malware analysis using community detection algorithms, journal: ACM Computing Surveys, ACM DL, 2023.

3. Abdelouahab Amira, Abdelouahid Derhab, Samir Hadjar, Mustapha Merazka, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan : Detection and Analysis of Fake News Users’ Communities in Social Media, IEEE Transactions on Computational Social Systems, pp. 1-10, 15 juin 2023.

4. Boulemtafes A, Derhab A, & Challal Y : PRIviLY: Private Remote Inference over fulLY connected deep networks for pervasive health monitoring with constrained client-side, Journal: (Elsevier) Journal of Information Security and Applications, 21 Juillet 2023.

1Boulemtafes A, Amira A, Derki M.S, Hadjar S: Investigating security and privacy concerns in deep-leerning-based pervasive health monitoring architectures, PAIS’23, 5ème Conférence internationale IEEE on pattern analysis and intelligent systems, 25-26 octobre 2023, Sétif, Algérie, IEEE Xplore: 22 Novembre 2023.

 

DSI: Production Scientifique Année 2022

1. Boulemtafes, A., Derhab, A., & Challal, Y Khan : Privacy-preserving deep learning for pervasive health monitoring : A study of environment requirements and existing solutions adequacy, Health and technology, 1-20, Journal (Springer) Health and Technology, 4 Février 2022, published 29 June 2020.

2Kharroubi, Sahraoui, Dahmani, Youcef, Nouali Omar, :  Improving collaborative recommendation based on item weight link predictionTurkish journal of electrical engineering and computer sciences, Volume 30, Page 109-126, 2022, DOI : 10.3906/elk-2008-26, ISSN : 1300-0632, eISSN : 1303-6203, Journal Citation Indicator (JCI=0.2).

3. Boulemtafes A, Khemissa H, Derki M. S, Amira A, Djedjig N : Deep learning in pervasive health monitoring, design goals, applications, and architectures: An overview and a brief synthesis. Journal Smart Health, Novembre 2021.

1. Boulemtafes A, Derhab A, Challal Y : PReDIHERO : Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring, In 2021 ACS/IEEE 18th International Conference on Computer Systems and Applications (AICCSA) (pp. 1-8). IEEE, Du 30/11 au 03/12/2021, Rank "B2", Indexée par DBLP et IEEE, Date en ligne (IEEE): Published 25 January 2022.

 

1. Abdeldjalil Mouzaoui, Abdelwahab Amira: CCpider: "A Web covert channel using the Slowloris DoS Attack", Conférence Tamarics, 8-11 Décembre 2022, University of Tamanghasset, Algeria.

2. Mohamed Saddek Derki: Sensing A Scalable SDN-based Architecture for Smart Hospitals, Conférence TAMARICS 2022, 8-11 Décembre 2022, University of Tamanghasset, Algeria.

 

DSI: Production Scientifique Année 2021

1. Ahmed Saidi, Omar Nouali & Abdelouahab  : SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing, Cluster Computing:The Journal of Networks, Software Tools and Applications, 2021.

2. Medjek Faiza, Tandjaoui D., Djedjig Nabil, ImedRomdhani : Fault-Tolerant AI-Driven Intrusion Détection System for the Internet of Things, International Journal of Critical Infrastructure Protection, Elsevier, Volume 34, September 2021.

3. Medjek Faiza, Tandjaoui D, Djedjig Nabil, ImedRomdhani: Multicast DIS Attack Mitigation in RPL-Based IoT-LLNs”, Journal of Information Security and Applications ». Volume 61, September 2021.

4. Boulemtafes, Abdelouahid Derhab, Nassim Ait Ali Braham, Yacine Challal : Privacy-preserving remote deep-learning-based inference under constrained client-side environment, Journal of Ambient Intelligence and Humanized Computing, Springer, June 2021.

5. Boulemtafes, A, Khemissa, H, Derki, M. S, Amira, A, Djedjig, : Deep learning in pervasive health monitoring, design goals, applications, and architectures: An overview and a brief synthesis, Journal Smart Health, Novembre 2021.

6. Messaoud CHAA, Omar Nouali, Patrice Bellot: Leveraging App Features to Improve Mobile App Retrieval”, In the International Journal of Intelligent Information and Database Systems, Inderscience, Scopus, Elsevier, 2021. ISSN : 1751-5858, EISSN : 1751-5866, Vol 14, N°1, Page 177-197, 2021. DOI : 10.1504/IJIIDS.2021.10035966.

1. Fateh Boucenna, Omar Nouali, Kamel Adi and Samir Kechid: Access Pattern Hiding in Searchable Encryption”, the 8th International Conference on Future Internet of Things and Cloud (FiCloud 2021), 23-25 August 2021.

2. Boulemtafes A, Derhab A, Challal Y: PReDIHERO – Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring”, Conférence AICCSA’21 (Ranking C: ERA, B1: Qualis) - Organisée par: IEEE/ACS - Du 30/11 au 03/12/2021.

3. Mohamed Saddek Derki, Nadia Taboudjemat-Nouali , and Omar Nouali: A fine-grained access control scheme in fog-IoT based environment”, conférence internationale AI2SD 2020, The 3rd International Conference on Advanced Intelligent Systems for Sustainable Development, du 21 au 26 Décembre 2020 à Tanger, Maroc.

 

DSI: Production Scientifique Année 2020

1. Amira Abdelouahab, Abdelouahid Derhab, ElMouatezBillah Karbab, Omar Nouali, FarrukhAslam Khan : TriDroid: a triage and classification framework for fast detection of mobile threats in android markets, Journal of Ambient Intelligence and HumanizedComputing, JAIHC, Springer, Published 29 June 2020.

2. Djedjig Nabil, Tandjaoui D : Trust-aware and Cooperative Routing Protocol for IoT Securityin Journal of Information Security and Applications, Volume 52, Pages 102467, Publisher Elsevier, Publication date 01-06-2020. DOI: 10.1016/j.jisa.2020.102467.

3. Hadjer BENHADJ DJILALI, Tandjaoui D, Hamza KHEMISSA: Enhanced dynamic team access control for collaborative Internet of Things using context, Transactions on Emerging Telecommunications TechnologiesJournal: "Transactions on Emerging Telecommunications Technologies". Numéro special: Securing the Internet-of-Things: Advances, Challenges, Future Trends, 2020. 

4Fehis Saad, Nouali Omar, and Mohand-Tahar Kechadi: Encryption Key Management as a Trusted SecaaS based on TPM in Cloud ComputingInternational Journal of Security and Networks, Inder science publisher, 2020. 

1Ahmed Saidi, Omar Nouali And Abdelouahab Amira: Collaborative And Fast Decryption Using Fog Computing And A Hidden Access Policy, 6th international conference on computer science, engineering and information technology (cseit), november 23-34, zurich, switzerland.

2Mohamed SaddekDerki, Nadia Taboudjemat-Nouali , Omar Nouali: A fine-grained access control scheme in fog-IoT based environment, conférence internationale AI2SD 2020, The 3rd International Conferenceon Advanced Intelligent Systems for Sustainable Development, du 21 au 26 Décembre 2020 à Tanger, Maroc. PROCEEDINGS INDEXED SCOPUS & DBLP. 

1. Sahraoui Kharroubi, Youcef Dahmani and Omar Nouali: Improvement of recommender systems with item link prediction”, ICMBWA2020, The International Conference on Managing Business through Web Analytics:“Strategies, Guidance and Best Practices”, Khemis Miliana, Algeria, December 7-8, 2020.

 

 

DSI: Production Scientifique Année 2019

1. Fateh Boucenna, Omar Nouali, Samir Kechid : Secure Inverted Index based Search over Encrypted Cloud Data with User Access Rights Management, Journal of Computer Science and Technology and key agreement scheme for e-health applications in the context of Internet of Things. January 2019, (IF 1.185), Volume 34, Issue 1, pp 133–154, DOI 10.1007/s11390-019-1903-2. ©2019 Springer Science +Business Media, LLC & Science Press, China.

2. Amine Boulemtafes, Nadjib Badache: Sensing Platforms for Prototyping and Experimenting Wearable Continuous Health Monitoring Systems: A Quick Starter Point Guide. Chapitre dans le livre : "Incorporating the Internet of Things in Healthcare Applications and Wearable Devices" publié par IGI Global, 2019.

3. Amine Boulemtafes, Abdelouahid Derhab, Yacine Challal: A Review of Privacy-Preserving Techniques for Deep Learning. Journal Neurocomputing, Édité par Elsevier, Date en ligne Décembre 2019.

4. Hamza Khemissa, Djamel Tandjaoui, Samia Bouzefrane: An efficient authentication and key agreement scheme for e-health applications in the context of Internet of Things. IJICS, International Journal of Information and Computer Security, Inderscience publishers, Numéro spécial: Cyber Security Issues and Solutions.

1. Abdelghani Krinah, Yacine Challal, Omar Nouali  : Using ABE for Medical Data Protection in Fog Computing. in ICEIS 2019, Heraklion – Grèce, 3-5 Mai 2019.

2. Ahmed Saidi, Omar Nouali, Abdelouahab Amira : Collaborative And Fast Decryption Using Fog Computing And A Hidden Access Policy.6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY (CSEIT-2019), pages 57-71.

 

DSI: Production Scientifique Année 2018

1. Hamza Khemissa, Djamel Tandjaoui, Samia Bouzefrane : An efficient authentication and key agreement scheme for e-health applications in the context of Internet of Things.IJICS, International Journal of Information and Computer Security, Inderscience publishers, Abstract online, Juillet 2018.

2. Fateh Boucenna, Omar Nouali, Samir Kechid, Tahar Kechadi : Secure Inverted Index based Search over Encrypted Cloud Data with User Access Rights Management. Journal of Computer Science and Technology, 2018.

1. 1. Yacine Challal, Fatima Z. Benhamida, Omar Nouali  : Scalable Key Management for Elastic Security Domains in Fog networks. WETICE 2018, 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, Proceedings will be included to IEEE Xplore and indexed through INSPEC, Compendex, and Thomson Reuters, DBLP, Google Scholar and EI Index, 27-29 Juin 2018, Paris, France.

 

DSI: Production Scientifique Année 2017

1. Amira Abdelouahab, Oudjaout Aberraouf, Derhab Abdelouahid, Badache Nadjib: Sound and Static Analysis of Session Fixation Vulnerabilities in PHP web Applications. CODASPY 2017, 7TH ACM Conference on Data and Application Security and Privacy.

2. Fateh Boucenna , Omar Nouali, Adel Dabah and Samir Kechid: Accelerated Semantic Search over Encrypted CloudData. BIGCUMPUTING 2017.

 

DSI: Production Scientifique Année 2016

1. Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani :Lightweighted and Energy-Aware Mikey-Ticket For E-Health Applications in the Context of Internet of Things.Accepted for publication in International Journal of Sensor Networks (IJSNET), Inderscience publisher, 2016.

1. Nikolaos Sarantinos, Chafika Benzaid, Omar Arabiat, Ameer Al-Nemrat : Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. In Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 2016.

2. Nadia Benchikha, Mohamed Krim, Khaled Zeraoulia, Chafika Benzaid : IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework. In Proceedings of Cybersecurity and Cyberforensics Conference (CCC), pp. 35 – 40, 2016.

3. Mourad Benmalek, Yacine Challal : MK-AMI: efficient Multi-group Key management scheme for secure communications in AMI systems. IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 2016.

4. Lyes Touati, Yacine Challal :Collaborative KP-ABE for Cloud-Based Internet of Things Applications.IEEE International conference on Computer Communications (ICC), Kualalampur, Malaysia, 2016.

5. Lyes Touati, Yacine Challal : Instantaneous proxy-based Key Update for CP-ABE.IEEE LCN, Dubai, 2016.

6. Lyes Touati, Hamed Hellaoui, Yacine Challal : Threshold Yoking/Grouping proofs based on CP-ABE for IoT applications. IEEE TrustCom, China, 2016.

7. Zakaria Gheid, Yacine Challal : Efficient and privacy preserving k-means clustering for big data mining.IEEE TrustCom, China, 2016.

8. Zakaria Gheid, Yacine Challal : Novel efficient and privacy-preserving protocols for sensor based human activity recognition. IEEE UIC, Toulouse France, 2016.

9. Benzaid, Abderrahman Boulgheraif, Fatma Zohra Dahmane, Ameer Al-Nemrat, Khaled Zeraoulia : Intelligent Detection of MAC Spoofing Attack in 802.11 Network. In Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN 2016), Singapore, 4th -7th January, 2016.

10. A. Djellalbia, S. Benmeziane, N. Badache, S. Bensimessaoud:An Anonymous Authentication Scheme in e-Health Cloud environment. 7th International workshop on Cloud Applications and Security in conjunction with The 11th IEEE International Conference for Internet Technology and Secured Transactions, December 5-7, 2016, Barcelona, Spain.

11. S. Bensimessaoud, S. Benmeziane, N. Badache, A. Djellalbia: An Enhanced Approach to Preserving Privacy in Social Network Data Publishing.BDSN 2016, The 4th International workshop on Big Data and Social Networking Management and Security, December 5-7, 2016, Barcelona, Spain.

12. Fateh Boucenna , Omar Nouali and Samir Kechid: Concept-based Semantic Search over Encrypted Cloud Data.WEBIST 2016 12th International Conference on Web Information Systems and Technologies, Apr 23, 2016 - Apr 25, 2016, Rome, Italy. Digital Object Identifier: 10.5220/0005858302350242. Proceedings of WEBIST 2016, ISBN: 978-989-758-186-1, available on-line in the SciTePress Digital Library at http://www.scitepress.org/DigitalLibrary.

13. H. Khemissa and D. Tandjaoui :A Novel Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things.in Proceedings of the 2016 Wireless Telecommunications Symposium (WTS), London, United Kingdom, 2016, pp. 1-6.

14. Ameer Al-Nemrat, Nikolaos Sarantinos, Chafika Benzaid and Omar Arabyat : Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. Submitted to Concurrency and Computation: Practice and Experience Journal. Numéro special sur « Advances in Cyber-Security Techniques and Applications" du journal "Concurrency and Computation : Practice and Experience".

 

DSI: Production Scientifique Année 2015

1. Mohammed Riyadh Abdmeziem, Djamel Tandjaoui : An end-to-end secure key management protocol for e-health applications. Computers & Electrical Engineering, Special Issue on Emerging Research in Internet of Things, Vol 44: 184-197 (2015).

1. Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani : Architecting the Internet of Things: State of the Art. Robots and Sensor Clouds book, Pages 55-75, Août 2015.

1. Mourad Benmalek, Yacine Challal : eSKAMI: Efficient and Scalable multi-group Key management for Advanced Metering Infrastructure in Smart Grid. RATSP Symposium in Conjunction with IEEE Trustcom, Helsinki, Finland, 2015.

2. Zakaria Gheid, Yacine Challal : <An Efficient and Privacy-preserving Similarity Evaluation For Big Data Analytics. ACM / IEEE Utility and Cloud Computing (UCC), Cyprus, Greece, 2015.

3. Mourad Benmalek, Yacine Challal, Abdelmadjid Bouabdallah : Scalable multi-group key management for Advanced Metering Infrastructure. IEEE International Conference on Computer and Information Technology (CIT), Liverpool, UK, 2015.

4. Lyes Touati, Yacine Challal : Poster: Activity based access control for IoT ACM SmartObjects, Paris, France 2015.

5. Lyes Touati, Yacine Challal : Efficient CP-ABE Attribute/Key Management for IoT Applications.IEEE International Conference on Computer and Information Technology (CIT), Liverpool, UK, 2015.

6. Mourad Benmalek, Yacine Challal : MK-AMI: efficient Multi-group Key management scheme for secure communications in AMI systems. IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 2016.

7. Lyes Touati, Yacine Challal :Collaborative KP-ABE for Cloud-Based Internet of Things Applications.IEEE International conference on Computer Communications (ICC), Kualalampur, Malaysia, 2016.

8. Ameer Al-Nemrat, Chafika Benzaid : Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. conférence IEEE Trustcom2015/ISPA2015/BigDataSE2015, les 20 et 22 Août 2015 à Helsinki, Finland.

9. BENZAÏD, Abderrahman Boulgheraif, Fatma Zohra Dahmane, Ameer Al-Nemrat, Khaled Zeraoulia: Intelligent Detection of MAC Spoofing Attack in 802.11 Network. In Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN 2016), Singapore, 4th -7th January, 2016. (To appear).

10. Amina DJELLALBIA, BenMeziane Souad, Nadjib Badache, Sihem BENSIMESSAOUD : An Adaptive Anonymous Authentication for Cloud Environment. International Conference on Cloud Computing Technologies and Applications, CLOUDTECH 2015, June 2-4 2015, Marrakesh, Morocco.

11. Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani : A Decentralized Batch-based Group Key Management Protocol for Mobile Internet of Things (DBGK). In The 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015) Liverpool, England, UK, 26-28 October 2015.

12. Nabil Djedjig, Djamel Tandjaoui, Faiza Medjek : Trust-based RPL for the Internet of Things.In The Twentieth IEEE Symposium on Computers and Communications, Larnaca, Cyprus, 2015.

13. Faiza Medjek, Djamel Tandjaoui, Mohammed Riyadh Abdmeziem, Nabil Djedjig : Analytical evaluation of the impacts of Sybil attacks against RPL under mobility.The 12 th International Symposium on Programming and Systems (ISPS), Alger (Algérie), 29 April 2015.

14. Hamza Khemissa, Djamel Tandjaoui : A Lightweight Authentication Scheme for E-health applications in the context of Internet of Things. In the 9th International Conference on Next Generation Mobile Applications, Services and Technologies,Cambridge UK, 2015.

15. Boualouache Abdelwahab, Nouali Omar et Moussaoui Samira : A BLE-based data collection system for IoT. 10th International Conference on Future Networks and Communications, FNC-2015 and the 12th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2015, inexé Elsevier, August 17-20, 2015, Belfort, France (accepté).

16. Fehis Saad, Nouali Omar : A new Graph based Chinese Wall Security Policy Model. 5th International Conference on Information Systems and Technologies (ICIST 2015), March 21-23, 2015. Istanbul, Turkey. (article accepté et non présenté).

17. Fehis Saad, Nouali Omar : A new Chinese Wall Security Policy Model Based On the Subject’s Wall and Object’s Wall. ICACC-2015, First International Conference on Anti-Cybercrime (ICACC-2015), Under the Patronage of the Custodian of the Two Holy Mosques King Abdullah Bin Abdulaziz Al Saud, 9-11 February 2015 - Riyadh, Saudi Arabia (article accepté et non présenté).

1. Mohammed Riyadh Abdmeziem, Djamel Tandjaoui : Securing e-Health Applications in the Context of Internet of Things: Tailoring Mikey Ticket. Conférence sur l’Ingénierie Informatique (C2i), Ecole Militaire Polytechnique (Bordj El Bahri, Alger), 17 Décembre 2014.

 

DSI: Production Scientifique Année 2014

1. R. Abdemezian, D. Tandjaoui : A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things.extended version submitted to ad hoc networks Special Issue on Internet of Things security and privacy: design methods, detection, prevention and countermeasures.

2. R. Abdemezian, D. Tandjaoui: A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things. extended version submitted to Computers & Electrical Engineering.

3. Boualouache Abdelwahab: UPCS : Urban Pseudonym Changing Strategy for Location Privacy in VANETs. Ad Hoc Networks, international and archival journal, Editor-in-Chief: I.F. Akyildiz, Impact Factor (2013): 1.943, Imprint: ELSEVIER, ISSN: 1570-8705, soumission en Novembre 2014.

1. Ahmed Saidi, Omar Nouali, Lila Guemraoui: Automatic Response to e-mail: An Architecture based Question Response and Questions Classification, The Third International Conference on Software Engineering and New Technologies (ICSENT2014) Hammamet, Tunisia, December 20 - 22 December 2014 Proceedings.

2. R. Abdemezian, D. Tandjaoui: A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things. International Conference on Next Generation Computing and Communication Technologies 2014 (ICNGCCT'14), 23-24 April 2014, Dubai, UAE.

3. R. Abdemezian, D. Tandjaoui: Tailoring Mikey-Ticket to E-health Applications in the Context of Internet of Things. In the International Conference on Advanced Networking, Distributed Systems and Applications (INDS 2014), 17-19 June 2014, Bejaia, Algeria.

4. R. Abdemezian, D. Tandjaoui: A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things. 2nd International Workshop on Emerging Technologies for Smart Devices (ETSD 2014), 22-27 June 2014, Benidorm, Spain.

5. S. Benmeziane, N. Badache: A clustering technique to analyse anonymous systems.International Conference on Communications Systems and Technologies, ICCST’2014, Tunisia, August 2014.

6. Fehis Saad, Nouali Omar: Metadata’s Protection of CKMS in CKMS-As-A-Security Services. 4th International Conference on Information Systems and Technologies (ICIST 2014), Valencia, Spain, March 22-24, 2014.

7. D. Tandjaoui: A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things.accepté pour publication dans le proceeding de la conférence International Conference on Next Generation Computing and Communication Technologies 2014.

8. Brahim Hadaoui, Taboudjemat Nadia, Nouali Omar: Privacy Aware Multi-attribute Bucketization Technique in Database as a Service model for Disaster Management Systems. The International Conference on Data Mining, Internet Computing, and Big Data (BigData2014), as part of The Third World Congress on Computing and Information Technology (WCIT),17th to 19th November 2014, Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia, 2014 (article accepté).

9. Fehis Saad, Nouali Omar: A new Graph based Chinese Wall Security Policy Model. 5th International Conference on Information Systems and Technologies (ICIST 2015).

 

© 2017 DSI, CERIST. All Rights Reserved.