Blockchain technologies for the internet of things: Research issues and challenges MA Ferrag, M Derdour, M Mukherjee, A Derhab, L Maglaras, H Janicke IEEE Internet of Things Journal 6 (2), 2188-2204, 2019 | 808 | 2019 |
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues A Aldweesh, A Derhab, AZ Emam Knowledge-Based Systems 189, 105124, 2020 | 576 | 2020 |
MalDozer: Automatic framework for android malware detection using deep learning EMB Karbab, M Debbabi, A Derhab, D Mouheb Digital investigation 24, S48-S59, 2018 | 435 | 2018 |
Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges MA Ferrag, L Shu, X Yang, A Derhab, L Maglaras IEEE access 8, 32031-32053, 2020 | 420 | 2020 |
A novel two-stage deep learning model for efficient network intrusion detection FA Khan, A Gumaei, A Derhab, A Hussain Ieee Access 7, 30373-30385, 2019 | 387 | 2019 |
A review of privacy-preserving techniques for deep learning A Boulemtafes, A Derhab, Y Challal Neurocomputing 384, 21-45, 2020 | 214 | 2020 |
Privacy preservation in e-healthcare environments: State of the art and future directions MA Sahi, H Abbas, K Saleem, X Yang, A Derhab, MA Orgun, W Iqbal, ... Ieee Access 6, 464-478, 2017 | 180 | 2017 |
Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security A Derhab, M Guerroumi, A Gumaei, L Maglaras, MA Ferrag, M Mukherjee, ... Sensors 19 (14), 3119, 2019 | 161 | 2019 |
Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques A Mihoub, OB Fredj, O Cheikhrouhou, A Derhab, M Krichen Computers & Electrical Engineering 98, 107716, 2022 | 157 | 2022 |
Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering A Derhab, A Aldweesh, AZ Emam, FA Khan Wireless Communications and Mobile Computing 2020 (1), 6689134, 2020 | 114 | 2020 |
Trust models of internet of smart things: A survey, open issues, and future directions A Altaf, H Abbas, F Iqbal, A Derhab Journal of Network and Computer Applications 137, 93-111, 2019 | 109 | 2019 |
Data replication protocols for mobile ad-hoc networks: a survey and taxonomy A Derhab, N Badache IEEE communications surveys & tutorials 11 (2), 33-51, 2009 | 107 | 2009 |
Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges M Bagaa, Y Challal, A Ksentini, A Derhab, N Badache Communications Surveys & Tutorials, IEEE 16 (3), 1339-1368, 2014 | 106 | 2014 |
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges S Aoufi, A Derhab, M Guerroumi Journal of Information Security and Applications 54, 102518, 2020 | 104 | 2020 |
Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends MA Ferrag, L Maglaras, A Derhab Security and communication networks 2019 (1), 5452870, 2019 | 92 | 2019 |
A novel hybrid load forecasting framework with intelligent feature engineering and optimization algorithm in smart grid G Hafeez, I Khan, S Jan, IA Shah, FA Khan, A Derhab Applied Energy 299, 117178, 2021 | 91 | 2021 |
A self-stabilizing leader election algorithm in highly dynamic ad hoc mobile networks A Derhab, N Badache IEEE Transactions on Parallel and Distributed Systems 19 (7), 926-939, 2008 | 87 | 2008 |
Detection and prediction of diabetes using data mining: a comprehensive review FA Khan, K Zeb, M Al-Rakhami, A Derhab, SAC Bukhari IEEE Access 9, 43711-43735, 2021 | 84 | 2021 |
CyberSecurity attack prediction: a deep learning approach O Ben Fredj, A Mihoub, M Krichen, O Cheikhrouhou, A Derhab 13th international conference on security of information and networks, 1-6, 2020 | 84 | 2020 |
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues MA Ferrag, L Maglaras, A Derhab, H Janicke Telecommunication Systems, 2019 | 84 | 2019 |