Follow
Wiem Tounsi
Wiem Tounsi
PhD from Telecom Bretagne - Institut Mines-Telecom / Post-­Doctoral Research Fellow LIP6
Verified email at telecom-bretagne.eu - Homepage
Title
Cited by
Cited by
Year
A survey on technical threat intelligence in the age of sophisticated cyber attacks
W Tounsi, H Rais
Computers & Security, 2017
4412017
What is Cyber Threat intelligence and How is it Evolving?
W Tounsi
Cyber-Vigilance and Digital Trust: Cybersecurity in the Era of Cloud …, 2019
262019
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks.
W Tounsi, J Garcia-Alfaro, N Cuppens-Boulahia, F Cuppens
CNSR, 284-291, 2010
172010
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
W Tounsi, N Cuppens-Boulahia, J Garcia-Alfaro, Y Chevalier, F Cuppens
Journal of Network and Computer Applications 39, 152-166, 2014
122014
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform
W Tounsi, N Cuppens-Boulahia, F Cuppens, G Pujolle
World Wide Web Journal, 2015
112015
A survey on Mobile Agent Based Intrusion Detection System
S Shiv Shakti, G Nitin, C Saurabh, G Saugata
International Symposium on Devices MEMS, Intelligent Systems & Communication …, 2011
11*2011
Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
W Tounsi
John Wiley & Sons, 2019
82019
Fine-grained privacy control for the RFID middleware of EPCglobal networks
W Tounsi, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro
5th International Conference on Management of Emergent Digital EcoSystems, 60-67, 2013
82013
Formal verification of a key establishment protocol for EPC gen2 RFID systems: work in progress
W Tounsi, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro
Foundations and Practice of Security / http://dl.acm.org/citation.cfm?id …, 2011
62011
Privacy-enhanced filtering and collection middleware in epcglobal networks
W Tounsi, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro
2013 International Conference on Risks and Security of Internet and Systems …, 2013
52013
Cybervigilance et confiance numérique: La cybersécurité à ląère du Cloud et des objets connectés
W Tounsi
ISTE Group, 2019
42019
Cyber deception, the ultimate piece of a defensive strategy-proof of concept
W Tounsi
2022 6th Cyber Security in Networking Conference (CSNet), 1-5, 2022
32022
Security and privacy controls in rfid systems applied to EPCglobal networks
W Tounsi
Télécom Bretagne; Université de Rennes 1, 2014
32014
A distributed multi-level anomalies detection system using the mobile agent approach
F Ben Ftima, W Tounsi, K Karoui, H Ben Ghezala
Global Information Infrastructure Symposium, 2009. GIIS'09., 1-4, 2009
32009
Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm
W Tounsi, B Justus, NC Boulahia, F Cuppen, JG Alfaro
Software Security and Reliability-C (SERE-C), 2014 IEEE Eighth International …, 2014
22014
Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions
EM Garcia
Tech. Rep., Royal Holloway University of London, Egham, United Kingdom, 2015
12015
Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions
EM Garcia
Tech. Rep., Royal Holloway University of London, Egham, United Kingdom, 2015
12015
Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions
EM Garcia
technical Report, 2015
12015
Security and Privacy Controls in RFID Systems Applied to EPCglobal Networks
D de Telecom Bretagne
Université de Brest, 2014
2014
Objective privacy : understanding the privacy impact of information exchange
M Veeningen
Technische Universiteit Eindhoven, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20