default search action
Tarek Abbes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Zaid Shakir Al-Attar, Tarek Abbes, Faouzi Zerai:
Privacy-preserving hands-free voice authentication leveraging edge technology. Secur. Priv. 6(3) (2023) - [j11]Zaid Shakir Al-Attar, Tarek Abbes, Faouzi Zerai:
Smartphone-Key: Hands-Free Two-Factor Authentication for Voice-Controlled Devices Using Wi-Fi Location. IEEE Trans. Netw. Serv. Manag. 20(3): 3848-3864 (2023) - [j10]Sana Rabhi, Tarek Abbes, Faouzi Zarai:
IoT Routing Attacks Detection Using Machine Learning Algorithms. Wirel. Pers. Commun. 128(3): 1839-1857 (2023) - [c21]Sana Rabhi, Tarek Abbes, Faouzi Zarai:
Transfer learning-based Mirai botnet detection in IoT networks. INISTA 2023: 1-5 - [c20]Sana Rabhi, Tarek Abbes, Faouzi Zarai:
IoT botnet detection using deep learning. IWCMC 2023: 1107-1111 - [c19]Zaid Shakir Al-Attar, Tarek Abbes, Faouzi Zerai:
The Passport: A Single-Node Authentication System for Heterogeneous Voice-Controlled IoT Networks. IWCMC 2023: 1597-1604
2010 – 2019
- 2019
- [j9]Azza Allouch, Anis Koubaa, Mohamed Khalgui, Tarek Abbes:
Qualitative and Quantitative Risk Analysis and Safety Assessment of Unmanned Aerial Vehicles Missions Over the Internet. IEEE Access 7: 53392-53410 (2019) - [c18]Azza Allouch, Omar Cheikhrouhou, Anis Koubâa, Mohamed Khalgui, Tarek Abbes:
MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems. IWCMC 2019: 621-628 - [i2]Azza Allouch, Anis Koubaa, Mohamed Khalgui, Tarek Abbes:
Qualitative and Quantitative Risk Analysis and Safety Assessment of Unmanned Aerial Vehicles Missions over the Internet. CoRR abs/1904.09432 (2019) - [i1]Azza Allouch, Omar Cheikhrouhou, Anis Koubaa, Mohamed Khalgui, Tarek Abbes:
MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems. CoRR abs/1905.00265 (2019) - 2017
- [c17]Sirine Sayadi, Tarek Abbes, Adel Bouhoula:
Detection of Covert Channels Over ICMP Protocol. AICCSA 2017: 1247-1252 - 2016
- [j8]Randa Jabeur Ben Chikha, Tarek Abbes, Wassim Ben Chikha, Adel Bouhoula:
Behavior-based approach to detect spam over IP telephony attacks. Int. J. Inf. Sec. 15(2): 131-143 (2016) - [j7]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
Detection of firewall configuration errors with updatable tree. Int. J. Inf. Sec. 15(3): 301-317 (2016) - [c16]Randa Jabeur Ben Chikha, Tarek Abbes, Adel Bouhoula:
Risk management for spam over IP telephony using optimal countermeasure. ICDEc 2016: 53-59 - [c15]Randa Jabeur Ben Chikha, Tarek Abbes, Adel Bouhoula:
Risk Management for Spam over IP Telephony using Combined Countermeasures. INFOS 2016: 240-246 - 2014
- [j6]Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:
Characterization of attacks collected from the deployment of Web service honeypot. Secur. Commun. Networks 7(2): 338-351 (2014) - [c14]Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:
Behavior Analysis of Web Service Attacks. SEC 2014: 366-379 - 2013
- [c13]Randa Jabeur Ben Chikha, Tarek Abbes, Adel Bouhoula:
A SPIT detection algorithm based on user's call behavior. SoftCOM 2013: 1-5 - 2012
- [c12]Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques. CISIS/ICEUTE/SOCO Special Sessions 2012: 1-11 - 2011
- [j5]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Network Security Alerts Management Architecture for Signature-Based Intrusions Detection Systems within a NAT Environment. J. Netw. Syst. Manag. 19(4): 472-495 (2011) - [j4]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Trusted intrusion detection architecture for high-speed networks based on traffic classification, load balancing and high availability mechanism. Secur. Commun. Networks 4(4): 384-394 (2011) - [c11]Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:
Design and implementation of Web service honeypot. SoftCOM 2011: 1-5 - 2010
- [j3]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
Efficient decision tree for protocol analysis in intrusion detection. Int. J. Secur. Networks 5(4): 220-235 (2010) - [c10]Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:
Data analyzer based on data mining for Honeypot Router. AICCSA 2010: 1-6 - [c9]Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:
Experimental analysis of attacks against web services and countermeasures. iiWAS 2010: 195-201
2000 – 2009
- 2009
- [j2]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Ensuring security in depth based on heterogeneous network security technologies. Int. J. Inf. Sec. 8(4): 233-246 (2009) - [c8]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives. CICS 2009: 107-114 - [c7]Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:
Honeypot router for routing protocols protection. CRiSIS 2009: 127-130 - [c6]Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula:
Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol. CSE (2) 2009: 802-808 - 2008
- [c5]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Collaboration between Security Devices toward improving Network Defense. ACIS-ICIS 2008: 13-18 - [c4]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
An inference system for detecting firewall filtering rules anomalies. SAC 2008: 2122-2128 - 2007
- [c3]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
A Traffic Classification Algorithm for Intrusion Detection. AINA Workshops (1) 2007: 188-193 - [c2]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
A Stateful Real Time Intrusion Detection System for high-speed network. AINA 2007: 404-411 - 2004
- [b1]Tarek Abbes:
Classification du trafic et optimisation des règles de filtrage pour la détection d'intrusions. Henri Poincaré University, Nancy, France, 2004 - [j1]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
On the fly pattern matching for intrusion detection with Snort. Ann. des Télécommunications 59(9-10): 1045-1071 (2004) - [c1]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
Protocol Analysis in Intrusion Detection Using Decision Tree. ITCC (1) 2004: 404-408
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint