Mohamed Guerroumi
Mohamed Guerroumi
PHD, Computer science at USTHB University
Verified email at
Cited by
Cited by
Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security
A Derhab, M Guerroumi, A Gumaei, L Maglaras, MA Ferrag, M Mukherjee, ...
Sensors 19 (14), 3119, 2019
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges
S Aoufi, A Derhab, M Guerroumi
Journal of Information Security and Applications 54, 102518, 2020
Semi-supervised statistical approach for network anomaly detection
NB Aissa, M Guerroumi
Procedia Computer Science 83, 1090-1095, 2016
Data replication in mobile ad hoc networks
S Moussaoui, M Guerroumi, N Badache
Mobile Ad-hoc and Sensor Networks: Second International Conference, MSN 2006 …, 2006
BMC-SDN: Blockchain-based multicontroller architecture for secure software-defined networks
A Derhab, M Guerroumi, M Belaoued, O Cheikhrouhou
Wireless Communications and Mobile Computing 2021, 1-12, 2021
Intrusion detection system against sink hole attack in wireless sensor networks with mobile sink
M Guerroumi, A Derhab, K Saleem
2015 12th International Conference on Information Technology-New Generations …, 2015
Two-factor mutual authentication offloading for mobile cloud computing
A Derhab, M Belaoued, M Guerroumi, FA Khan
IEEE Access 8, 28956-28969, 2020
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset
N Belhadj aissa, M Guerroumi, A Derhab
Neural Computing and Applications 32 (8), 3475-3501, 2020
BCFR: Blockchain-based controller against false flow rule injection in SDN
S Boukria, M Guerroumi, I Romdhani
2019 IEEE Symposium on Computers and Communications (ISCC), 1034-1039, 2019
A genetic clustering technique for Anomaly-based Intrusion Detection Systems
NB Aissa, M Guerroumi
2015 IEEE/ACIS 16th International Conference on Software Engineering …, 2015
Intrusion detection system for SDN network using deep learning approach
2019 International Conference on Theoretical and Applicative Aspects of …, 2019
Mobile sink and power management for efficient data dissemination in wireless sensor networks
M Guerroumi, N Badache, S Moussaoui
Telecommunication Systems 58, 279-292, 2015
On the medium access control protocols suitable for wireless sensor networks-a survey
M Guerroumi, ASK Pathan, N Badache, S Moussaoui
International Journal of Communication Networks and Information Security 6 …, 2014
Hybrid data dissemination protocol (HDDP) for wireless sensor networks
M Guerroumi, ASK Pathan
Wireless Networks 24 (5), 1739-1754, 2018
Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks
M Guerroumi, ASK Pathan, N Badache, S Moussaoui
International Journal of Communication Networks and Information Security 5 …, 2013
MMSMAC: A multi-mode medium access control protocol for wireless sensor networks with latency and energy-awareness
M Guerroumi, ASK Pathan, A Derhab, N Badache, S Moussaoui
Wireless Personal Communications 96, 4973-5010, 2017
Internet of Things for smart living
ASK Pathan, ZM Fadlullah, S Choudhury, M Guerroumi
Wireless Networks 27, 4293-4295, 2021
A comparative study of perceptual hashing algorithms: Application on fingerprint images
M Hamadouche, K Zebbiche, M Guerroumi, H Tebbi, Y Zafoune
The 2nd International Conference on Computer Science’s Complex Systems and …, 2021
Local density estimation for vanets
N Haouari, S Moussaoui, M Guerroumi, SM Senouci
2016 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2016
Two phase replication approach for MANETs
S Moussaoui, M Guerroumi, N Badache
International Journal of Ad Hoc and Ubiquitous Computing 4 (5), 292-303, 2009
The system can't perform the operation now. Try again later.
Articles 1–20