default search action
BibTeX records: Wafa Ben Jaballah
@article{DBLP:journals/popets/MansouriOJC23, author = {Mohamad Mansouri and Melek {\"{O}}nen and Wafa Ben Jaballah and Mauro Conti}, title = {SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {1}, pages = {140--157}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0009}, doi = {10.56553/POPETS-2023-0009}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/MansouriOJC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/BouchouiaLJMJPZ23, author = {Mohammed Lamine Bouchouia and Houda Labiod and Ons Jelassi and Jean{-}Philippe Monteuuis and Wafa Ben Jaballah and Jonathan Petit and Zonghua Zhang}, title = {A survey on misbehavior detection for connected and autonomous vehicles}, journal = {Veh. Commun.}, volume = {41}, pages = {100586}, year = {2023}, url = {https://doi.org/10.1016/j.vehcom.2023.100586}, doi = {10.1016/J.VEHCOM.2023.100586}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/BouchouiaLJMJPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MansouriOJ22, author = {Mohamad Mansouri and Melek {\"{O}}nen and Wafa Ben Jaballah}, title = {Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {146--158}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3568135}, doi = {10.1145/3564625.3568135}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MansouriOJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/BouchouiaMJLJP21, author = {Mohammed Lamine Bouchouia and Jean{-}Philippe Monteuuis and Ons Jelassi and Houda Labiod and Wafa Ben Jaballah and Jonathan Petit}, editor = {Samira Si{-}Said Cherfi and Anna Perini and Selmin Nurcan}, title = {Spatial and Temporal Cross-Validation Approach for Misbehavior Detection in {C-ITS}}, booktitle = {Research Challenges in Information Science - 15th International Conference, {RCIS} 2021, Limassol, Cyprus, May 11-14, 2021, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {415}, pages = {452--468}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75018-3\_30}, doi = {10.1007/978-3-030-75018-3\_30}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rcis/BouchouiaMJLJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MansouriJORC21, author = {Mohamad Mansouri and Wafa Ben Jaballah and Melek {\"{O}}nen and Md Masoom Rabbani and Mauro Conti}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {{FADIA:} fairness-driven collaborative remote attestation}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {60--71}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468284}, doi = {10.1145/3448300.3468284}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MansouriJORC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JaballahCL20, author = {Wafa Ben Jaballah and Mauro Conti and Chhagan Lal}, title = {Security and design requirements for software-defined VANETs}, journal = {Comput. Networks}, volume = {169}, pages = {107099}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107099}, doi = {10.1016/J.COMNET.2020.107099}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/JaballahCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KaliyarJCL20, author = {Pallavi Kaliyar and Wafa Ben Jaballah and Mauro Conti and Chhagan Lal}, title = {LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks}, journal = {Comput. Secur.}, volume = {94}, pages = {101849}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101849}, doi = {10.1016/J.COSE.2020.101849}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KaliyarJCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-04577, author = {Wafa Ben Jaballah and Mauro Conti and Chhagan Lal}, title = {A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions}, journal = {CoRR}, volume = {abs/1904.04577}, year = {2019}, url = {http://arxiv.org/abs/1904.04577}, eprinttype = {arXiv}, eprint = {1904.04577}, timestamp = {Thu, 25 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-04577.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/JaballahCFMZ18, author = {Wafa Ben Jaballah and Mauro Conti and Gilberto Fil{\'{e}} and Mohamed Mosbah and Akka Zemmari}, title = {Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks}, journal = {Comput. Commun.}, volume = {119}, pages = {66--82}, year = {2018}, url = {https://doi.org/10.1016/j.comcom.2018.01.010}, doi = {10.1016/J.COMCOM.2018.01.010}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/JaballahCFMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/JaballahCP18, author = {Wafa Ben Jaballah and Mauro Conti and Claudio E. Palazzi}, title = {The position cheating attack on inter-vehicular online gaming}, booktitle = {15th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2018, Las Vegas, NV, USA, January 12-15, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCNC.2018.8319160}, doi = {10.1109/CCNC.2018.8319160}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/JaballahCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BhandariJJLZGMC17, author = {Shweta Bhandari and Wafa Ben Jaballah and Vineeta Jain and Vijay Laxmi and Akka Zemmari and Manoj Singh Gaur and Mohamed Mosbah and Mauro Conti}, title = {Android inter-app communication threats and detection techniques}, journal = {Comput. Secur.}, volume = {70}, pages = {392--421}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.07.002}, doi = {10.1016/J.COSE.2017.07.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BhandariJJLZGMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/MbarekMJM17, author = {Bacem Mbarek and Aref Meddeb and Wafa Ben Jaballah and Mohamed Mosbah}, title = {A secure electric energy management in smart home}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {17}, year = {2017}, url = {https://doi.org/10.1002/dac.3347}, doi = {10.1002/DAC.3347}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/MbarekMJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/MbarekMJM17, author = {Bacem Mbarek and Aref Meddeb and Wafa Ben Jaballah and Mohamed Mosbah}, editor = {Elhadi M. Shakshuki}, title = {An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks}, booktitle = {The 8th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2017) / The 7th International Conference on Sustainable Energy Information Technology {(SEIT} 2017), 16-19 May 2017, Madeira, Portugal}, series = {Procedia Computer Science}, volume = {109}, pages = {553--559}, publisher = {Elsevier}, year = {2017}, url = {https://doi.org/10.1016/j.procs.2017.05.340}, doi = {10.1016/J.PROCS.2017.05.340}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ant/MbarekMJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/JaballahCMP16, author = {Wafa Ben Jaballah and Mauro Conti and Mohamed Mosbah and Claudio E. Palazzi}, title = {The impact of malicious nodes positioning on vehicular alert messaging system}, journal = {Ad Hoc Networks}, volume = {52}, pages = {3--16}, year = {2016}, url = {https://doi.org/10.1016/j.adhoc.2016.08.008}, doi = {10.1016/J.ADHOC.2016.08.008}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/JaballahCMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/MbarekMJM16, author = {Bacem Mbarek and Aref Meddeb and Wafa Ben Jaballah and Mohamed Mosbah}, title = {A broadcast authentication scheme in IoT environments}, booktitle = {13th {IEEE/ACS} International Conference of Computer Systems and Applications, {AICCSA} 2016, Agadir, Morocco, November 29 - December 2, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AICCSA.2016.7945807}, doi = {10.1109/AICCSA.2016.7945807}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/MbarekMJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JaballahK16, author = {Wafa Ben Jaballah and Nizar Kheir}, editor = {Ilsun You and Elisa Bertino}, title = {A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications}, booktitle = {Proceedings of the 8th {ACM} {CCS} International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {1--12}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2995966}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JaballahK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BhandariJJLZGC16, author = {Shweta Bhandari and Wafa Ben Jaballah and Vineeta Jain and Vijay Laxmi and Akka Zemmari and Manoj Singh Gaur and Mauro Conti}, title = {Android App Collusion Threat and Mitigation Techniques}, journal = {CoRR}, volume = {abs/1611.10076}, year = {2016}, url = {http://arxiv.org/abs/1611.10076}, eprinttype = {arXiv}, eprint = {1611.10076}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BhandariJJLZGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijssc/JaballahMYZ15, author = {Wafa Ben Jaballah and Mohamed Mosbah and Habib Youssef and Akka Zemmari}, title = {Lightweight secure group communications for resource constrained devices}, journal = {Int. J. Space Based Situated Comput.}, volume = {5}, number = {4}, pages = {187--200}, year = {2015}, url = {https://doi.org/10.1504/IJSSC.2015.073696}, doi = {10.1504/IJSSC.2015.073696}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijssc/JaballahMYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/MbarekMJM15, author = {Bacem Mbarek and Aref Meddeb and Wafa Ben Jaballah and Mohamed Mosbah}, title = {A secure authentication mechanism for resource constrained devices}, booktitle = {12th {IEEE/ACS} International Conference of Computer Systems and Applications, {AICCSA} 2015, Marrakech, Morocco, November 17-20, 2015}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AICCSA.2015.7507270}, doi = {10.1109/AICCSA.2015.7507270}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/MbarekMJM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/JaballahCMP15, author = {Wafa Ben Jaballah and Mauro Conti and Mohamed Mosbah and Claudio E. Palazzi}, title = {Impact of security threats in vehicular alert messaging systems}, booktitle = {{IEEE} International Conference on Communication, {ICC} 2015, London, United Kingdom, June 8-12, 2015, Workshop Proceedings}, pages = {2627--2632}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICCW.2015.7247575}, doi = {10.1109/ICCW.2015.7247575}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/JaballahCMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/notere/MbarekMJM15, author = {Bacem Mbarek and Aref Meddeb and Wafa Ben Jaballah and Mohamed Mosbah}, title = {Enhanced {LEAP} authentication delay for higher immunity against DoS attack}, booktitle = {International Conference on Protocol Engineering, {ICPE} 2015, and International Conference on New Technologies of Distributed Systems, {NTDS} 2015 {[CFIP} (Colloque francophone sur l'ing{\'{e}}nierie des protocoles) / {NOTERE} (Nouvelles Technologies de la R{\'{e}}partition)], Paris, France, July 22-24, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NOTERE.2015.7293497}, doi = {10.1109/NOTERE.2015.7293497}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/notere/MbarekMJM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/BenJaballah14, author = {Wafa Ben Jaballah}, title = {Securing wireless sensor and vehicular networks. (S{\'{e}}curit{\'{e}} des r{\'{e}}seaux de capteurs et des communications v{\'{e}}hiculaires)}, school = {University of Bordeaux, France}, year = {2014}, url = {https://tel.archives-ouvertes.fr/tel-01199395}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/BenJaballah14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/JaballahCMP14, author = {Wafa Ben Jaballah and Mauro Conti and Mohamed Mosbah and Claudio E. Palazzi}, title = {A secure alert messaging system for safe driving}, journal = {Comput. Commun.}, volume = {46}, pages = {29--42}, year = {2014}, url = {https://doi.org/10.1016/j.comcom.2014.03.010}, doi = {10.1016/J.COMCOM.2014.03.010}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/JaballahCMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/JaballahCMP14, author = {Wafa Ben Jaballah and Mauro Conti and Mohamed Mosbah and Claudio E. Palazzi}, title = {Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {15}, number = {1}, pages = {433--450}, year = {2014}, url = {https://doi.org/10.1109/TITS.2013.2277890}, doi = {10.1109/TITS.2013.2277890}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/JaballahCMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/JaballahMYZ13, author = {Wafa Ben Jaballah and Mohamed Mosbah and Habib Youssef and Akka Zemmari}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa and Tomoya Enokido and Hui{-}Huang Hsu}, title = {Lightweight Source Authentication Mechanisms for Group Communications in Wireless Sensor Networks}, booktitle = {27th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2013, Barcelona, Spain, March 25-28, 2013}, pages = {598--605}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/AINA.2013.56}, doi = {10.1109/AINA.2013.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/JaballahMYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/JaballahCPMV13, author = {Wafa Ben Jaballah and Mauro Conti and Roberto Di Pietro and Mohamed Mosbah and Nino Vincenzo Verde}, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {{MASS:} An efficient and secure broadcast authentication scheme for resource constrained devices}, booktitle = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CRiSIS.2013.6766350}, doi = {10.1109/CRISIS.2013.6766350}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/JaballahCPMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/JaballahCMP13, author = {Wafa Ben Jaballah and Mauro Conti and Mohamed Mosbah and Claudio E. Palazzi}, title = {Secure Verification of Location Claims on a Vehicular Safety Application}, booktitle = {22nd International Conference on Computer Communication and Networks, {ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICCCN.2013.6614193}, doi = {10.1109/ICCCN.2013.6614193}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/JaballahCMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/JaballahMY13, author = {Wafa Ben Jaballah and Mohamed Mosbah and Habib Youssef}, title = {Performance evaluation of key disclosure delay-based schemes in wireless sensor networks}, booktitle = {2013 {IEEE} International Conference on Pervasive Computing and Communications Workshops, {PERCOM} 2013 Workshops, San Diego, CA, USA, March 18-22, 2013}, pages = {566--571}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PerComW.2013.6529560}, doi = {10.1109/PERCOMW.2013.6529560}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/JaballahMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/JaballahMY10, author = {Wafa Ben Jaballah and Aref Meddeb and Habib Youssef}, title = {An efficient source authentication scheme in wireless sensor networks}, booktitle = {The 8th {ACS/IEEE} International Conference on Computer Systems and Applications, {AICCSA} 2010, Hammamet, Tunisia, May 16-19, 2010}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/AICCSA.2010.5586993}, doi = {10.1109/AICCSA.2010.5586993}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/JaballahMY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.