Follow
Badis Hammi
Badis Hammi
Institut Polytechnique de Paris, Télécom SudParis
Verified email at telecom-sudparis.eu
Title
Cited by
Cited by
Year
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
MT Hammi, B Hammi, P Bellot, A Serhrouchni
Computers & Security 78, 126-142, 2018
7432018
IoT technologies<? show [AQ ID= Q1]?> for smart cities
B Hammi, R Khatoun, S Zeadally, A Fayad, L Khoukhi
IET networks 7 (1), 1-13, 2018
3452018
A lightweight ECC-based authentication scheme for Internet of Things (IoT)
B Hammi, A Fayad, R Khatoun, S Zeadally, Y Begriche
IEEE Systems Journal 14 (3), 3440-3450, 2020
1202020
Survey on smart homes: Vulnerabilities, risks, and countermeasures
B Hammi, S Zeadally, R Khatoun, J Nebhen
Computers & Security 117, 102677, 2022
632022
A blockchain-based certificate revocation management and status verification system
EA Yves Christian, H Badis, S Ahmed, Z Sherali
Computers & Security 104, 102209, 2021
452021
Understanding botclouds from a system perspective: A principal component analysis
H Badis, G Doyen, R Khatoun
2014 IEEE Network Operations and Management Symposium (NOMS), 1-9, 2014
322014
A secure multipath reactive protocol for routing in IoT and HANETs
B Hammi, S Zeadally, H Labiod, R Khatoun, Y Begriche, L Khoukhi
Ad Hoc Networks 103, 102118, 2020
302020
An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach
A Fayad, B Hammi, R Khatoun
2018 Third International Conference on Security of Smart Cities, Industrial …, 2018
292018
Security threats, countermeasures, and challenges of digital supply chains
B Hammi, S Zeadally, J Nebhen
ACM Computing Surveys 55 (14s), 1-40, 2023
282023
Total eclipse: How to completely isolate a bitcoin peer
AE Yves-Christian, B Hammi, A Serhrouchni, H Labiod
2018 Third International Conference on Security of Smart Cities, Industrial …, 2018
232018
A collaborative approach for a source based detection of botclouds
H Badis, G Doyen, R Khatoun
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
222015
Non-fungible tokens: a review
B Hammi, S Zeadally, AJ Perez
IEEE Internet of Things Magazine 6 (1), 46-50, 2023
202023
Blockchain-based solution for detecting and preventing fake check scams
B Hammi, S Zeadally, YCE Adja, M Del Giudice, J Nebhen
IEEE Transactions on Engineering Management 69 (6), 3710-3725, 2021
192021
Securing pki requests for c-its systems
JP Monteuuis, B Hammi, E Salles, H Labiod, R Blancher, E Abalea, ...
2017 26th International Conference on Computer Communication and Networks …, 2017
172017
Is it really easy to detect sybil attacks in c-its environments: a position paper
B Hammi, YM Idir, S Zeadally, R Khatoun, J Nebhen
IEEE Transactions on Intelligent Transportation Systems 23 (10), 18273-18287, 2022
162022
Detecting botclouds at large scale: A decentralized and robust detection method for multi-tenant virtualized environments
R Cogranne, G Doyen, N Ghadban, B Hammi
IEEE Transactions on Network and Service Management 15 (1), 68-82, 2017
162017
Toward a source detection of botclouds: a pca-based approach
H Badis, G Doyen, R Khatoun
Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014
132014
An empirical investigation of botnet as a service for cyberattacks
B Hammi, S Zeadally, R Khatoun
Transactions on emerging telecommunications technologies 30 (3), e3537, 2019
112019
PKIs in C-ITS: Security functions, architectures and projects: A survey
B Hammi, JP Monteuuis, J Petit
Vehicular Communications 38, 100531, 2022
82022
A new service advertisement message for ETSI ITS environments: CAM-Infrastructure
H Labiod, A Servel, G Seggara, B Hammi, JP Monteuuis
2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016
82016
The system can't perform the operation now. Try again later.
Articles 1–20