default search action
Mohamed-Lamine Messai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Atmane Ayoub Mansour Bahar, Kamel Soaïd Ferrahi, Mohamed-Lamine Messai, Hamida Seba, Karima Amrouche:
FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat Detection. ARES 2024: 119:1-119:10 - [c13]Ahmed Alioua, Mohamed Nadjib Zennir, Roumaissa Lallouche, Amine Bouderbella, Mohamed-Lamine Messai:
Autonomous Bio-inspired 3D Deployment of Aerial Base Stations for Optimal Wireless Coverage in 5G Networks. DCOSS-IoT 2024: 146-153 - [c12]Djameleddine Hamouche, Reda Kadri, Mohamed-Lamine Messai, Hamida Seba:
(POSTER) A Graph Dataset for Security Enforcement in IoT Networks : GRASEC-IoT. DCOSS-IoT 2024: 765-767 - 2023
- [j8]Sami Bettayeb, Mohamed-Lamine Messai, Sofiane Mounine Hemam:
A robust and efficient vector-based key management scheme for IoT networks. Ad Hoc Networks 149: 103250 (2023) - [j7]Thi Van Thao Doan, Mohamed-Lamine Messai, Gérald Gavin, Jérôme Darmont:
A survey on implementations of homomorphic encryption schemes. J. Supercomput. 79(13): 15098-15139 (2023) - [c11]Mohamed-Lamine Messai, Hamida Seba:
IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security. ARES 2023: 84:1-84:7 - [c10]Mohamed-Lamine Messai:
A Self-Healing Pairwise Key Pre-Distribution Scheme in IoT-based WSNs. IWCMC 2023: 904-909 - [c9]Sami Bettayeb, Mohamed-Lamine Messai, Sofiane Mounine Hemam:
BKRSC-IoT: Blockchain-Based Key Revocation Using Smart Contracts for IoT Networks. MEDES 2023: 331-344 - [c8]Floribert Katembo Vuseghesa, Mohamed-Lamine Messai:
Study on Poisoning Attacks: Application Through an IoT Temperature Dataset. WETICE 2023: 1-6 - [c7]Mohamed-Lamine Messai, Hamida Seba:
POSTER: Activity Graph Learning for Attack Detection in IoT Networks. WoWMoM 2023: 320-322 - 2022
- [j6]El Arbi Abdellaoui Alaoui, Mohamed-Lamine Messai, Anand Nayyar:
Using Machine Learning in WSNs for Performance Prediction MAC Layer. Int. J. Inf. Secur. Priv. 16(1): 1-18 (2022) - [j5]Mohammed Nafi, Mohamed-Lamine Messai, Samia Bouzefrane, Mawloud Omar:
IFKMS: Inverse Function-based Key Management Scheme for IoT networks. J. Inf. Secur. Appl. 71: 103370 (2022) - [c6]Tom Djaaleb, Mohamed-Lamine Messai:
Taxonomie des attaques sur les méthodes d'apprentissage automatique. EDA 2022: 15-28 - [c5]Fatma Zohra Khaoula Saadi, Abd Errahmane Kiouche, Karima Amrouche, Hamida Seba, Mohamed-Lamine Messai:
Détection d'anomalies dans les flux de graphes et attaques d'empoisonnement. EGC 2022: 273-280 - 2020
- [i2]Mohamed-Lamine Messai, Hamida Seba:
Short Paper: Privacy Comparison of Contact Tracing Mobile Applications for COVID-19. CoRR abs/2010.03232 (2020)
2010 – 2019
- 2019
- [c4]Sarra Messai, Mohamed-Lamine Messai, Hamida Seba, Zibouda Aliouat:
A Full-Healing Key Distribution Scheme for Resource-Constrained Devices. ICT-DM 2019: 1-6 - 2018
- [j4]Mohamed-Lamine Messai, Hamida Seba:
EAHKM+: energy-aware secure clustering scheme in wireless sensor networks. Int. J. High Perform. Comput. Netw. 11(2): 145-155 (2018) - 2017
- [c3]Mohamed-Lamine Messai, Hamida Seba:
A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless Sensor Networks. TrustCom/BigDataSE/ICESS 2017: 144-151 - 2016
- [j3]Mohamed-Lamine Messai, Hamida Seba:
A survey of key management schemes in multi-phase wireless sensor networks. Comput. Networks 105: 60-74 (2016) - [c2]Abdelkader Laouid, Mohamed-Lamine Messai, Ahcène Bounceur, Reinhardt Euler, Abdelnasser Dahmani, Abdelkamel Tari:
A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks. ICC 2016 2016: 70:1-70:6 - 2015
- [j2]Mohamed-Lamine Messai, Hamida Seba, Makhlouf Aliouat:
A lightweight key management scheme for wireless sensor networks. J. Supercomput. 71(12): 4400-4422 (2015) - [c1]Mohamed-Lamine Messai, Hamida Seba, Makhlouf Aliouat:
A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks. WWIC 2015: 411-424 - 2014
- [i1]Mohamed-Lamine Messai:
Classification of Attacks in Wireless Sensor Networks. CoRR abs/1406.4516 (2014) - 2010
- [j1]Mohamed-Lamine Messai, Makhlouf Aliouat, Hamida Seba:
Tree Based Protocol for Key Management in Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint