default search action
Samiha Ayed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati:
A novel and efficient framework for in-vehicle security enforcement. Ad Hoc Networks 158: 103481 (2024) - [j14]Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati:
Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS). Comput. Secur. 142: 103878 (2024) - [j13]Ahlem Hamdi, Lamia Fourati, Samiha Ayed:
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures. Int. J. Inf. Sec. 23(2): 713-757 (2024) - [j12]Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati:
Advancing UAV security with artificial intelligence: A comprehensive survey of techniques and future directions. Internet Things 27: 101281 (2024) - [j11]Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati, Leïla Merghem-Boulahia:
Investigation of Security Threat Datasets for Intra- and Inter-Vehicular Environments. Sensors 24(11): 3431 (2024) - [j10]Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati:
IoV security and privacy survey: issues, countermeasures, and challenges. J. Supercomput. 80(15): 23018-23082 (2024) - 2023
- [j9]Samiha Ayed, Amal Hbaieb, Lamia Chaari:
Blockchain and trust-based clustering scheme for the IoV. Ad Hoc Networks 142: 103093 (2023) - [j8]Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati:
A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection. IEEE Trans. Serv. Comput. 16(6): 4128-4139 (2023) - [c29]Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati:
Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI. ARES 2023: 120:1-120:10 - [c28]Aymen Mudheher Badr, Lamia Chaari Fourati, Samiha Ayed:
Investigation on the Integrated Cloud and BlockChain (ICBC)Technologies to Secure Healthcare Data Management Systems. DeSE 2023: 19-26 - [c27]Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati:
A Transfer Learning Based Intrusion Detection System for Internet of Vehicles. DeSE 2023: 533-539 - [c26]Aymen Mudheher Badr, Lamia Chaari Fourati, Samiha Ayed:
An Improved GIFT Lightweight Encryption Algorithm to Protect Medical Data In IoT. ISCC 2023: 1-7 - [c25]Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati:
Intra-Vehicular Network Security Datasets Evaluation. SIMULTECH 2023: 401-408 - 2022
- [j7]Fadhila Tlili, Lamia Chaari Fourati, Samiha Ayed, Bassem Ouni:
Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures. Ad Hoc Networks 129: 102805 (2022) - [j6]Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati:
Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey. Comput. Electr. Eng. 104(Part): 108460 (2022) - [j5]Amal Hbaieb, Samiha Ayed, Lamia Chaari:
A survey of trust management in the Internet of Vehicles. Comput. Networks 203: 108558 (2022) - [c24]Amal Hbaieb, Samiha Ayed, Lamia Chaari:
Federated learning based IDS approach for the IoV. ARES 2022: 123:1-123:6 - [c23]Fadhila Tlili, Samiha Ayed, Lamia Chaari, Bassem Ouni:
Artificial Intelligence Based Approach for Fault and Anomaly Detection Within UAVs. AINA (1) 2022: 297-308 - [c22]Achref Haddaji, Samiha Ayed, Lamia Chaari:
Federated Learning with Blockchain Approach for Trust Management in IoV. AINA (1) 2022: 411-423 - 2021
- [j4]Lamia Chaari Fourati, Samiha Ayed, Mohamed Ali Ben Rejeb:
ICN clustering-based approach for VANETs. Ann. des Télécommunications 76(9-10): 745-757 (2021) - [c21]Amal Hbaieb, Samiha Ayed, Lamia Chaari:
Blockchain-Based Trust Management Approach for IoV. AINA (1) 2021: 483-493 - [c20]Lamia Chaari Fourati, Samiha Ayed:
Federated Learning toward Data Preprocessing: COVID-19 Context. ICC Workshops 2021: 1-6 - [c19]Amira Kchaou, Ryma Abassi, Samiha Ayed, Sihem Guemara El Fatmi:
A Distributed Resource Management for VANET using Smart Contract. IWCMC 2021: 1448-1453 - [c18]Samiha Ayed, Lamia Chaari Fourati, Hakim Ghazzai:
Cluster-based Trust Management Approach to Mitigate Attacks in WBAN. IWCMC 2021: 1896-1901 - [c17]Lamia Chaari Fourati, Slim Rekhis, Samiha Ayed, Mohamed Jmaiel:
Connected Medical Kiosks to Counter COVID-19: Needs, Architecture & Design Guidelines. IWCMC 2021: 2032-2037 - [c16]Insaf Achour, Hanen Idoudi, Samiha Ayed:
Automatic Generation of Access Control for Permissionless Blockchains: Ethereum Use Case. WETICE 2021: 45-50 - 2020
- [j3]Samiha Ayed, Lamia Chaari, Amina Fares:
A Survey on Trust Management for WBAN: Investigations and Future Directions. Sensors 20(21): 6041 (2020) - [c15]Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati:
Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular Networks. BigDataSE 2020: 155-163 - [c14]Samira Chouikhi, Lyes Khoukhi, Samiha Ayed, Marc Lemercier:
An Efficient Reputation Management Model based on Game Theory for Vehicular Networks. LCN 2020: 413-416 - [c13]Lamia Chaari Fourati, Mohamed Ali Ben Rejeb, Samiha Ayed:
New ICN based Clustering Mechanism for Vehicular Networks. NCA 2020: 1-4 - [c12]Amira Kchaou, Samiha Ayed, Ryma Abassi, Sihem Guemara El Fatmi:
Smart Contract-Based Access Control for the Vehicular Networks. SoftCOM 2020: 1-6 - [c11]Chaima Khalfaoui, Samiha Ayed, Moez Esseghir:
A Stochastic Approach for an Enhanced Trust Management in a Decentralized Healthcare Environment. WiMob 2020: 26-31
2010 – 2019
- 2018
- [j2]Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens, Frédéric Cuppens:
Achieving dynamicity in security policies enforcement using aspects. Int. J. Inf. Sec. 17(1): 83-103 (2018) - 2015
- [c10]Aida Ben Chehida Douss, Samiha Ayed, Ryma Abassi, Nora Cuppens, Sihem Guemara El Fatmi:
Trust Negotiation Based Approach to Enforce MANET Routing Security. ARES 2015: 360-366 - [c9]Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens:
Dynamic deployment of access and usage control policies using aspects. CFIP/NOTERE 2015: 1-6 - [c8]Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Dynamic Security Policies Enforcement and Adaptation Using Aspects. TrustCom/BigDataSE/ISPA (1) 2015: 1374-1379 - 2014
- [c7]Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Car2X Communication - Putting Security Negotiation into Practice. VTC Fall 2014: 1-5 - 2013
- [c6]Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens, Mónica Pinto, Lidia Fuentes:
Security Aspects: A Framework for Enforcement of Security Policies Using AOP. SITIS 2013: 301-308
2000 – 2009
- 2009
- [c5]Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Deploying Security Policy in Intra and Inter Workflow Management Systems. ARES 2009: 58-65 - 2008
- [j1]Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Deploying Access and Flow Control in Distributed Workflows. J. Res. Pract. Inf. Technol. 40(4): 231-254 (2008) - [c4]Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Managing access and flow control requirements in distributed workflows. AICCSA 2008: 702-710 - [c3]Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Deploying Access Control in Distributed Workflow. AISC 2008: 9-17 - 2007
- [c2]Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
An Integrated Model for Access Control and Information Flow Requirements. ASIAN 2007: 111-125 - 2006
- [c1]Samiha Ayed, Ana Minaburo, Laurent Toutain:
Enhancing Robust Header Compression over IEEE 802 networks. WiMob 2006: 380-385
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint