Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks A Baadache, A Belmehdi arXiv preprint arXiv:1002.1681, 2010 | 102 | 2010 |
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks A Baadache, A Belmehdi Journal of Network and Computer Applications 35 (3), 1130-1139, 2012 | 83 | 2012 |
A Machine Learning-Based Lightweight Intrusion Detection System for the Internet of Things. S Fenanir, F Semchedine, A Baadache Revue d'Intelligence Artificielle 33 (3), 2019 | 69 | 2019 |
Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks A Baadache, A Belmehdi Computer Networks 73, 173-184, 2014 | 49 | 2014 |
A Semi-supervised Deep Auto-encoder Based Intrusion Detection for IoT. S Fenanir, F Semchedine, S Harous, A Baadache Ingenierie des Systemes d'Information 25 (5), 2020 | 12 | 2020 |
Minimizing the Energy Consumption in Wireless Sensor Networks. A Baadache, R Adouane Adhoc & Sensor Wireless Networks 27, 2015 | 8 | 2015 |
A novel detection intrusion approach for ubiquitous and pervasive environments L Sellami, D Idoughi, A Baadache, P Tiako Procedia Computer Science 94, 429-434, 2016 | 7 | 2016 |
Comparative Study of Security Methods against DDOS Attacks in Cloud Computing Environment H Sabrine, B Abderrahmane, S Fouzi 2019 International Symposium on Networks, Computers and Communications …, 2019 | 5 | 2019 |
Intrusions Detection System Based on Ubiquitous Network Nodes L Sellami, D Idoughi, A Baadache arXiv preprint arXiv:1407.7715, 2014 | 3 | 2014 |
Hierarchical and scalable peer-to-peer architecture for online social network Y Moualkia, M Amad, A Baadache Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 2 | 2022 |
Convolutional Neural Network to Extract the Best Treatment Way of Warts Based on Data Mining. MS Bascil Revue d'Intelligence Artificielle 33 (3), 2019 | 2 | 2019 |
Coping with Spoofed PS-Poll Based DoS Attack in IEEE 802.11 Networks. H Souilah, A Baadache, L Bouallouche-Medjkoune VECoS, 57-62, 2014 | 2 | 2014 |
Computer and Information Sciences Y Moualkia, M Amad, A Baadache | | 2021 |
A challenge-based countermeasure against the spoofed PS-Poll-based DoS attack in IEEE 802.11 networks H Souilah, A Baadache, L Bouallouche-Medjkoune International Journal of Critical Computer-Based Systems 9 (3), 193-214, 2019 | | 2019 |
Mise En Place D’un Serveur De Messagerie Électronique Au Sein De l’Entreprise Portuaire De Béjaia EPB M Moad, M Moulai, D Touazi Université abderrahmane mira béjaia, 2017 | | 2017 |
Configuration sécurisée d’un contrôleur de domaine pour une gestion centralisée des utilisateurs au sein d’une entreprise cas «Tchin-Lait» Y Ikhlef, A Baadache, O Adjouadi Université abderrahmane mira béjaia, 2017 | | 2017 |
Détection et Prévention des Intrusions dans un Système Informatique en utilisant SNORT B Abderrahmane, Y Ouari, F Bakouri Université abderrahmane mira béjaia, 2012 | | 2012 |
A Semi-supervised Deep Auto-encoder Based Intrusion Detection for IoT A Semi-supervised Deep Auto-encoder Based Intrusion Detection for IoT S Fenanir, F Semchedine, S Harous, A Baadache | | |
sécurité de routage dans les réseaux ad hoc A BAADACHE Université de Béjaia-Abderrahmane Mira, 0 | | |
A Machine Learning-Based Lightweight Intrusion Detection System for the Internet of Things A Machine Learning-Based Lightweight Intrusion Detection System for the Internet of … S Fenanir, F Semchedine, A Baadache | | |