default search action
Wafa Ben Jaballah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti:
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning. Proc. Priv. Enhancing Technol. 2023(1): 140-157 (2023) - [j10]Mohammed Lamine Bouchouia, Houda Labiod, Ons Jelassi, Jean-Philippe Monteuuis, Wafa Ben Jaballah, Jonathan Petit, Zonghua Zhang:
A survey on misbehavior detection for connected and autonomous vehicles. Veh. Commun. 41: 100586 (2023) - 2022
- [c15]Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah:
Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning. ACSAC 2022: 146-158 - 2021
- [c14]Mohammed Lamine Bouchouia, Jean-Philippe Monteuuis, Ons Jelassi, Houda Labiod, Wafa Ben Jaballah, Jonathan Petit:
Spatial and Temporal Cross-Validation Approach for Misbehavior Detection in C-ITS. RCIS 2021: 452-468 - [c13]Mohamad Mansouri, Wafa Ben Jaballah, Melek Önen, Md Masoom Rabbani, Mauro Conti:
FADIA: fairness-driven collaborative remote attestation. WISEC 2021: 60-71 - 2020
- [j9]Wafa Ben Jaballah, Mauro Conti, Chhagan Lal:
Security and design requirements for software-defined VANETs. Comput. Networks 169: 107099 (2020) - [j8]Pallavi Kaliyar, Wafa Ben Jaballah, Mauro Conti, Chhagan Lal:
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Comput. Secur. 94: 101849 (2020)
2010 – 2019
- 2019
- [i2]Wafa Ben Jaballah, Mauro Conti, Chhagan Lal:
A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions. CoRR abs/1904.04577 (2019) - 2018
- [j7]Wafa Ben Jaballah, Mauro Conti, Gilberto Filé, Mohamed Mosbah, Akka Zemmari:
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks. Comput. Commun. 119: 66-82 (2018) - [c12]Wafa Ben Jaballah, Mauro Conti, Claudio E. Palazzi:
The position cheating attack on inter-vehicular online gaming. CCNC 2018: 1-6 - 2017
- [j6]Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti:
Android inter-app communication threats and detection techniques. Comput. Secur. 70: 392-421 (2017) - [j5]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A secure electric energy management in smart home. Int. J. Commun. Syst. 30(17) (2017) - [c11]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks. ANT/SEIT 2017: 553-559 - 2016
- [j4]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
The impact of malicious nodes positioning on vehicular alert messaging system. Ad Hoc Networks 52: 3-16 (2016) - [c10]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A broadcast authentication scheme in IoT environments. AICCSA 2016: 1-6 - [c9]Wafa Ben Jaballah, Nizar Kheir:
A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications. MIST@CCS 2016: 1-12 - [i1]Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mauro Conti:
Android App Collusion Threat and Mitigation Techniques. CoRR abs/1611.10076 (2016) - 2015
- [j3]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef, Akka Zemmari:
Lightweight secure group communications for resource constrained devices. Int. J. Space Based Situated Comput. 5(4): 187-200 (2015) - [c8]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A secure authentication mechanism for resource constrained devices. AICCSA 2015: 1-7 - [c7]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
Impact of security threats in vehicular alert messaging systems. ICC Workshops 2015: 2627-2632 - [c6]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
Enhanced LEAP authentication delay for higher immunity against DoS attack. CFIP/NOTERE 2015: 1-6 - 2014
- [b1]Wafa Ben Jaballah:
Securing wireless sensor and vehicular networks. (Sécurité des réseaux de capteurs et des communications véhiculaires). University of Bordeaux, France, 2014 - [j2]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
A secure alert messaging system for safe driving. Comput. Commun. 46: 29-42 (2014) - [j1]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication. IEEE Trans. Intell. Transp. Syst. 15(1): 433-450 (2014) - 2013
- [c5]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef, Akka Zemmari:
Lightweight Source Authentication Mechanisms for Group Communications in Wireless Sensor Networks. AINA 2013: 598-605 - [c4]Wafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde:
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices. CRiSIS 2013: 1-6 - [c3]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
Secure Verification of Location Claims on a Vehicular Safety Application. ICCCN 2013: 1-7 - [c2]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef:
Performance evaluation of key disclosure delay-based schemes in wireless sensor networks. PerCom Workshops 2013: 566-571 - 2010
- [c1]Wafa Ben Jaballah, Aref Meddeb, Habib Youssef:
An efficient source authentication scheme in wireless sensor networks. AICCSA 2010: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint