default search action
Hichem Sedjelmaci
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Hichem Sedjelmaci, Nirwan Ansari:
On Cooperative Federated Defense to Secure Multiaccess Edge Computing. IEEE Consumer Electron. Mag. 13(4): 24-31 (2024) - [j35]Adda Boualem, Marwane Ayaida, Cyril de Runz, Hisham A. Kholidy, Hichem Sedjelmaci:
Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication. Clust. Comput. 27(10): 13777-13793 (2024) - [j34]Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki:
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture. J. Netw. Syst. Manag. 32(2): 33 (2024) - [j33]Hichem Sedjelmaci, Nirwan Ansari:
Zero Trust Architecture Empowered Attack Detection Framework to Secure 6G Edge Computing. IEEE Netw. 38(1): 196-202 (2024) - [j32]Hichem Sedjelmaci, Kamel Tourki, Nirwan Ansari:
Enabling 6G Security: The Synergy of Zero Trust Architecture and Artificial Intelligence. IEEE Netw. 38(3): 171-177 (2024) - [j31]Hichem Sedjelmaci, Abdelwahab Boualouache:
When Two-Layer Federated Learning and Mean-Field Game Meet 5G and Beyond Security: Cooperative Defense Systems for 5G and Beyond Network Slicing. IEEE Trans. Netw. Serv. Manag. 21(1): 1178-1189 (2024) - [j30]Hichem Sedjelmaci, Nesrine Kaaniche, Aymen Boudguiga, Nirwan Ansari:
Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles. IEEE Trans. Veh. Technol. 73(2): 2633-2642 (2024) - [i2]Adda Boualem, Marwane Ayaida, Hichem Sedjelmaci, Chaimaa Khalfi, Kamilia Brahimi, Bochra Khelil, Sanaa Bouchama:
A New Classification of Clustering-based for Different Problems in Different Wireless Ad-hoc Networks. CoRR abs/2407.02498 (2024) - 2023
- [c24]Hichem Sedjelmaci, Kamel Tourki:
A Distributed Zero Trust Framework for 6G RAN. NOMS 2023: 1-5 - 2022
- [j29]Hichem Sedjelmaci, Sidi-Mohammed Senouci, Nirwan Ansari, Abdelwahab Boualouache:
A Trusted Hybrid Learning Approach to Secure Edge Computing. IEEE Consumer Electron. Mag. 11(3): 30-37 (2022) - [j28]Hichem Sedjelmaci:
Attacks detection and decision framework based on generative adversarial network approach: Case of vehicular edge computing network. Trans. Emerg. Telecommun. Technol. 33(10) (2022) - [j27]Moayad Aloqaily, Hichem Sedjelmaci, Lewis Tseng, Weverton Luis da Costa Cordeiro, Qian Zhang:
Guest Editorial: Managing Next-Generation Networks for Intelligent Services and Applications. IEEE Netw. 36(3): 4-6 (2022) - [c23]Hichem Sedjelmaci, Nizar Kheir, Aymen Boudguiga, Nesrine Kaaniche:
Cooperative and smart attacks detection systems in 6G-enabled Internet of Things. ICC 2022: 5238-5243 - 2021
- [j26]Hichem Sedjelmaci:
Cooperative attacks detection based on artificial intelligence system for 5G networks. Comput. Electr. Eng. 91: 107045 (2021) - [j25]Yosra Benslimen, Hichem Sedjelmaci, Ana-Cristina Manenti:
Attacks and failures prediction framework for a collaborative 5G mobile network. Computing 103(6): 1165-1181 (2021) - [j24]Hichem Sedjelmaci, Imane Horiya Brahmi, Nirwan Ansari, Mubashir Husain Rehmani:
Cyber Security Framework for Vehicular Network Based on a Hierarchical Game. IEEE Trans. Emerg. Top. Comput. 9(1): 429-440 (2021) - [j23]Abdelwahab Boualouache, Hichem Sedjelmaci, Thomas Engel:
Consortium Blockchain for Cooperative Location Privacy Preservation in 5G-Enabled Vehicular Fog Computing. IEEE Trans. Veh. Technol. 70(7): 7087-7102 (2021) - 2020
- [j22]Ahmed Alioua, Houssem-eddine Djeghri, Mohammed Elyazid Tayeb Cherif, Sidi-Mohammed Senouci, Hichem Sedjelmaci:
UAVs for traffic monitoring: A sequential game-based computation offloading/sharing approach. Comput. Networks 177: 107273 (2020) - [j21]Hichem Sedjelmaci, Fateh Guenab, Sidi-Mohammed Senouci, Hassnaa Moustafa, Jiajia Liu, Shuai Han:
Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems. IEEE Netw. 34(3): 6-7 (2020) - [c22]Hichem Sedjelmaci:
Attacks Detection Approach Based on a Reinforcement Learning Process to Secure 5G Wireless Network. ICC Workshops 2020: 1-6 - [c21]Aymen Boudguiga, Oana Stan, Hichem Sedjelmaci, Sergiu Carpov:
Homomorphic Encryption at Work for Private Analysis of Security Logs. ICISSP 2020: 515-523
2010 – 2019
- 2019
- [j20]Hichem Sedjelmaci, Sidi Mohammed Senouci, Nirwan Ansari, Mubashir Husain Rehmani:
Recent advances on security and privacy in intelligent transportation systems (ITSs). Ad Hoc Networks 90 (2019) - [j19]Hichem Sedjelmaci, Aymen Boudguiga, Inès Ben Jemaa, Sidi Mohammed Senouci:
An efficient cyber defense framework for UAV-Edge computing network. Ad Hoc Networks 94 (2019) - [j18]Hichem Sedjelmaci, Mohamed Ayoub Messous, Sidi Mohammed Senouci, Imane Horiya Brahmi:
Toward a lightweight and efficient UAV-aided VANET. Trans. Emerg. Telecommun. Technol. 30(8) (2019) - [j17]Ahmed Alioua, Sidi-Mohammed Senouci, Hichem Sedjelmaci, Samira Moussaoui:
Incentive edge caching in software-defined internet of vehicles: A Stackelberg game approach. Int. J. Commun. Syst. 32(17) (2019) - [j16]Hichem Sedjelmaci, Makhlouf Hadji, Nirwan Ansari:
Cyber Security Game for Intelligent Transportation Systems. IEEE Netw. 33(4): 216-222 (2019) - [j15]Mohamed Ayoub Messous, Sidi-Mohammed Senouci, Hichem Sedjelmaci, Soumaya Cherkaoui:
A Game Theory Based Efficient Computation Offloading in an UAV Network. IEEE Trans. Veh. Technol. 68(5): 4964-4974 (2019) - 2018
- [j14]Mohamed Attia, Sidi Mohammed Senouci, Hichem Sedjelmaci, El-Hassane Aglzim, Daniela Chrenko:
An efficient Intrusion Detection System against cyber-physical attacks in the smart grid. Comput. Electr. Eng. 68: 499-512 (2018) - [j13]Hichem Sedjelmaci, Sidi-Mohammed Senouci:
Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. J. Supercomput. 74(10): 4928-4944 (2018) - [j12]Hichem Sedjelmaci, Sidi Mohammed Senouci, Nirwan Ansari:
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks. IEEE Trans. Syst. Man Cybern. Syst. 48(9): 1594-1606 (2018) - [j11]Ahmed Alioua, Sidi-Mohammed Senouci, Samira Moussaoui, Hichem Sedjelmaci, Mohamed Ayoub Messous:
Efficient Data Processing in Software-Defined UAV-Assisted Vehicular Networks: A Sequential Game Approach. Wirel. Pers. Commun. 101(4): 2255-2286 (2018) - [c20]Hichem Sedjelmaci, Imane Horiya Brahmi, Aymen Boudguiga, Witold Klaudel:
A generic cyber defense scheme based on stackelberg game for vehicular network. CCNC 2018: 1-6 - [c19]Hichem Sedjelmaci, Inès Ben Jemaa, Makhlouf Hadji, Arnaud Kaiser:
Security Framework for Vehicular Edge Computing Network Based on Behavioral Game. GLOBECOM 2018: 1-6 - [c18]Omar Rafik Merad Boudia, Hichem Sedjelmaci, Sidi Mohammed Senouci:
Two-Levels Verification for Secure Data Aggregation in Resource-Constrained Environments. ICC 2018: 1-6 - [c17]Hichem Sedjelmaci, Fateh Guenab, Aymen Boudguiga, Yohann Petiot:
Cooperative Security Framework for CBTC Network. ICC 2018: 1-6 - [c16]Imane Horiya Brahmi, Giovanni Abbruzzo, Michael J. Walsh, Hichem Sedjelmaci, Brendan O'Flynn:
A fuzzy logic approach for improving the tracking accuracy in indoor localisation applications. Wireless Days 2018: 137-144 - 2017
- [j10]Mohamed Ayoub Messous, Hichem Sedjelmaci, Sidi-Mohammed Senouci:
Implementing an emerging mobility model for a fleet of UAVs based on a fuzzy logic inference system. Pervasive Mob. Comput. 42: 393-410 (2017) - [j9]Hichem Sedjelmaci, Sidi Mohammed Senouci, Nirwan Ansari:
Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology. IEEE Trans. Intell. Transp. Syst. 18(5): 1143-1153 (2017) - [j8]Hichem Sedjelmaci, Sidi-Mohammed Senouci, Tarik Taleb:
An Accurate Security Game for Low-Resource IoT Devices. IEEE Trans. Veh. Technol. 66(10): 9381-9393 (2017) - [j7]Hichem Sedjelmaci, Sidi Mohammed Senouci, Tarek Bouali:
Predict and prevent from misbehaving intruders in heterogeneous vehicular networks. Veh. Commun. 10: 74-83 (2017) - [c15]Ahmed Alioua, Sidi-Mohammed Senouci, Samira Moussaoui, Hichem Sedjelmaci, Abdelwahab Boualouache:
Software-Defined heterogeneous vehicular networks: Taxonomy and architecture. GIIS 2017: 50-55 - [c14]Mohamed Ayoub Messous, Hichem Sedjelmaci, Noureddin Houari, Sidi-Mohammed Senouci:
Computation offloading game for an UAV network in mobile edge computing. ICC 2017: 1-6 - 2016
- [j6]Tarek Bouali, Sidi-Mohammed Senouci, Hichem Sedjelmaci:
A distributed detection and prevention scheme from malicious nodes in vehicular networks. Int. J. Commun. Syst. 29(10): 1683-1704 (2016) - [j5]Mohamed Attia, Hichem Sedjelmaci, Sidi Mohammed Senouci, El-Hassane Aglzim:
Game model to optimally combine electric vehicles with green and non-green sources into an end-to-end smart grid architecture. J. Netw. Comput. Appl. 72: 1-13 (2016) - [c13]Hichem Sedjelmaci, Sidi Mohammed Senouci, Mohamed Ayoub Messous:
How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network? GLOBECOM 2016: 1-6 - [c12]Hichem Sedjelmaci, Sidi Mohammed Senouci, Mohamad Al-Bahri:
A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology. ICC 2016: 1-6 - [c11]Tarek Bouali, Hichem Sedjelmaci, Sidi-Mohammed Senouci:
A distributed prevention scheme from malicious nodes in VANETs' routing protocols. WCNC 2016: 1-6 - [c10]Mohamed Ayoub Messous, Sidi-Mohammed Senouci, Hichem Sedjelmaci:
Network connectivity and area coverage for UAV fleet mobility model with energy constraint. WCNC 2016: 1-6 - [c9]Hichem Sedjelmaci, Sidi Mohammed Senouci:
Smart grid Security: A new approach to detect intruders in a smart grid Neighborhood Area Network. WINCOM 2016: 6-11 - 2015
- [j4]Hichem Sedjelmaci, Sidi-Mohammed Senouci:
An accurate and efficient collaborative intrusion detection framework to secure vehicular networks. Comput. Electr. Eng. 43: 33-47 (2015) - [c8]Mohammed Attia, Hichem Sedjelmaci, Sidi Mohammed Senouci, El-Hassane Aglzim:
A new intrusion detection approach against lethal attacks in the smart grid: temporal and spatial based detections. GIIS 2015: 1-3 - [c7]Hichem Sedjelmaci, Tarek Bouali, Mohamed Ayoub Messous, Sidi Mohammed Senouci:
How to prevent cyber-attacks in inter-vehicle communication network? CFIP/NOTERE 2015: 1-6 - 2014
- [j3]Hichem Sedjelmaci, Sidi Mohammed Senouci, Mosa Ali Abu-Rgheff:
An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks. IEEE Internet Things J. 1(6): 570-577 (2014) - [c6]Hichem Sedjelmaci, Tarek Bouali, Sidi Mohammed Senouci:
Detection and prevention from misbehaving intruders in vehicular networks. GLOBECOM 2014: 39-44 - [c5]Hichem Sedjelmaci, Sidi-Mohammed Senouci:
A new Intrusion Detection Framework for Vehicular Networks. ICC 2014: 538-543 - [c4]Hichem Sedjelmaci, Sidi-Mohammed Senouci:
A lightweight hybrid security framework for wireless sensor networks. ICC 2014: 3636-3641 - 2013
- [j2]Hichem Sedjelmaci, Sidi-Mohammed Senouci, Mohammed Feham:
An efficient intrusion detection framework in cluster-based wireless sensor networks. Secur. Commun. Networks 6(10): 1211-1224 (2013) - [c3]Hichem Sedjelmaci, Sidi Mohammed Senouci:
Efficient and lightweight intrusion detection based on nodes' behaviors in wireless sensor networks. GIIS 2013: 1-6 - 2012
- [c2]Hichem Sedjelmaci, Sidi-Mohammed Senouci, Mohammed Feham:
Intrusion detection framework of cluster-based wireless sensor network. ISCC 2012: 857-861 - [c1]Hichem Sedjelmaci, Sidi-Mohammed Senouci, Mohammed Feham:
Intrusion detection framework of cluster-based wireless sensor network. ISCC 2012: 893-897 - 2011
- [j1]Rachid Merzougui, Mohammed Feham, Hichem Sedjelmaci:
Design and Implementation of an Algorithm for Cardiac Pathologies Detection on Mobile Phone. Int. J. Wirel. Inf. Networks 18(1): 11-23 (2011) - [i1]Hichem Sedjelmaci, Mohammed Feham:
Novel hybrid intrusion detection system for clustered wireless sensor network. CoRR abs/1108.2656 (2011)
Coauthor Index
aka: Sidi Mohammed Senouci
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint