Policy representations and mechanisms for the control of software A Karmouch, T Gray, S Mankovskii, M Guennoun US Patent 7,240,015, 2007 | 208 | 2007 |
Big data analytics: Security and privacy challenges Y Gahi, M Guennoun, HT Mouftah 2016 IEEE Symposium on Computers and Communication (ISCC), 952-957, 2016 | 182 | 2016 |
A survey of beacon-enabled IEEE 802.15. 4 MAC protocols in wireless sensor networks M Khanafer, M Guennoun, HT Mouftah IEEE Communications Surveys & Tutorials 16 (2), 856-876, 2013 | 164 | 2013 |
Biometric identification system based on electrocardiogram data Y Gahi, M Lamrani, A Zoglat, M Guennoun, B Kapralos, K El-Khatib 2008 New Technologies, Mobility and Security, 1-5, 2008 | 87 | 2008 |
A secure database system using homomorphic encryption schemes Y Gahi, M Guennoun, K El-Khatib arXiv preprint arXiv:1512.03498, 2015 | 73 | 2015 |
BGP prefix origin validation P Mohapatra, J Scudder, D Ward, R Bush, R Austein | 68 | 2013 |
WSN architectures for intelligent transportation systems M Khanafer, M Guennoun, HT Mouftah New Technologies, Mobility and Security (NTMS), 2009 3rd International …, 2009 | 65 | 2009 |
Continuous authentication by electrocardiogram data M Guennoun, N Abbad, J Talom, SMM Rahman, K El-Khatib 2009 IEEE Toronto International Conference Science and Technology for …, 2009 | 61 | 2009 |
Network appliance for enhanced television services SS Maurice, M Hui, M Guennoun, D Gaboury US Patent App. 09/956,181, 2002 | 41 | 2002 |
On the use of biometrics to secure wireless biosensor networks M Guennoun, M Zandi, K El-Khatib 2008 3rd International conference on information and communication …, 2008 | 34 | 2008 |
Adaptive sleeping periods in IEEE 802.15. 4 for efficient energy savings: markov-based theoretical analysis M Khanafer, M Guennoun, HT Mouftah Communications (ICC), 2011 IEEE International Conference on, 1-6, 2011 | 31 | 2011 |
Privacy preserving scheme for location-based services Y Gahi, M Guennoun, Z Guennoun, K El-Khatib Journal of Information Security 3 (02), 105, 2012 | 25 | 2012 |
Priority-based CCA periods for efficient and reliable communications in wireless sensor networks K Mounib, G Mouhcine, M Hussein T Wireless Sensor Network 2012, 2012 | 23 | 2012 |
Intrusion detection system for WSN-based intelligent transportation systems M Khanafer, M Guennoun, HT Mouftah 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 22 | 2010 |
Modeling of variable clear channel assessment MAC protocol for wireless sensor networks M Guennoun, M Khanafer, HT Mouftah Computer Communications 59, 67-83, 2015 | 18 | 2015 |
Securing medical data in smart homes M Guennoun, K El-Khatib 2009 IEEE International Workshop on Medical Measurements and Applications …, 2009 | 18 | 2009 |
Selecting the best set of features for efficient intrusion detection in 802.11 networks M Guennoun, A Lbekkouri, K El-Khatib Information and Communication Technologies: From Theory to Applications …, 2008 | 17 | 2008 |
Encrypted processes for oblivious data retrieval Y Gahi, M Guennoun, Z Guennoun, K El-Khatib Internet Technology and Secured Transactions (ICITST), 2011 International …, 2011 | 16 | 2011 |
Mitigating IP spoofing by validating BGP routes updates J Israr, M Guennoun, HT Mouftah IJCSNS International Journal of Computer Science and Network Security 9 (5 …, 2009 | 15 | 2009 |
Wireless sensor network architectures for intelligent vehicular systems HT Mouftah, M Khanafer, M Guennoun Symposium International for Telecommunication Techniques, 2010 | 14 | 2010 |