default search action
Martine Bellaïche
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Thierry M. Ndimis Ndimis Toko, Martine Bellaïche, Talal Halabi:
A Game-theoretic Approach for DDoS Attack Mitigation in IIoT Deterministic Networking. NOMS 2024: 1-5 - 2023
- [j16]Rubayyi Alghamdi, Martine Bellaïche:
A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks. Comput. Secur. 125: 103014 (2023) - [j15]Rubayyi Alghamdi, Martine Bellaïche:
An ensemble deep learning based IDS for IoT using Lambda architecture. Cybersecur. 6(1): 5 (2023) - [c17]Shokoufeh Seifi, Ronald Beaubrun, Martine Bellaïche, Talal Halabi:
A Study on the Efficiency of Intrusion Detection Systems in IoT Networks. CITS 2023: 1-8 - [c16]Fatemeh Erfan, Martine Bellaïche, Talal Halabi:
Community Detection Algorithm for Mitigating Eclipse Attacks on Blockchain-enabled Metaverse. MetaCom 2023: 403-407 - 2022
- [j14]Khalid Alfalqi, Martine Bellaïche:
An Emergency Event Detection Ensemble Model Based on Big Data. Big Data Cogn. Comput. 6(2): 42 (2022) - [c15]Talal Halabi, Martine Bellaïche, Benjamin C. M. Fung:
Towards Adaptive Cybersecurity for Green IoT. IoTaIS 2022: 64-69 - 2021
- [j13]Hossein Abbasi, Naser Ezzati-Jivan, Martine Bellaïche, Chamseddine Talhi, Michel R. Dagenais:
The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment. J. Hardw. Syst. Secur. 5(3): 208-222 (2021) - [c14]Imad Yassine, Talal Halabi, Martine Bellaïche:
Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy. QRS Companion 2021: 668-675 - 2020
- [j12]Talal Halabi, Martine Bellaïche:
Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach. IEEE Trans. Cloud Comput. 8(3): 928-942 (2020) - [c13]Saud Al Harbi, Talal Halabi, Martine Bellaïche:
Fog Computing Security Assessment for Device Authentication in the Internet of Things. HPCC/DSS/SmartCity 2020: 1219-1224
2010 – 2019
- 2019
- [j11]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais:
Multi-cloud cooperative intrusion detection system: trust and fairness assurance. Ann. des Télécommunications 74(9-10): 637-653 (2019) - [j10]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais, Talal Halabi:
A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Gener. Comput. Syst. 98: 308-318 (2019) - [j9]Hossein Abbasi, Naser Ezzati-Jivan, Martine Bellaïche, Chamseddine Talhi, Michel R. Dagenais:
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis. J. Hardw. Syst. Secur. 3(2): 164-176 (2019) - [j8]Salah-Eddine Benbrahim, Alejandro Quintero, Martine Bellaïche:
Live Placement of Interdependent Virtual Machines to Optimize Cloud Service Profits and Penalties on SLAs. IEEE Trans. Cloud Comput. 7(1): 237-249 (2019) - [c12]Talal Halabi, Martine Bellaïche:
Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures. CNS 2019: 1-9 - [c11]Talal Halabi, Martine Bellaïche, Adel Abusitta:
Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game. ICNC 2019: 370-374 - [c10]Richard Gilles Engoulou, Martine Bellaïche, Talal Halabi, Samuel Pierre:
A Decentralized Reputation Management System for Securing the Internet of Vehicles. ICNC 2019: 900-904 - 2018
- [j7]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais:
On trustworthy federated clouds: A coalitional game approach. Comput. Networks 145: 52-63 (2018) - [j6]Talal Halabi, Martine Bellaïche:
A broker-based framework for standardization and management of Cloud Security-SLAs. Comput. Secur. 75: 59-71 (2018) - [j5]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais:
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment. J. Cloud Comput. 7: 9 (2018) - [c9]Talal Halabi, Martine Bellaïche, Adel Abusitta:
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment. CSCloud/EdgeCom 2018: 83-88 - [c8]Talal Halabi, Martine Bellaïche, Adel Abusitta:
Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation. CSNet 2018: 1-8 - [c7]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais:
A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments. ICIN 2018: 1-8 - [c6]Talal Halabi, Martine Bellaïche, Adel Abusitta:
Online Allocation of Cloud Resources Based on Security Satisfaction. TrustCom/BigDataSE 2018: 379-384 - 2017
- [j4]Adrien Bonguet, Martine Bellaïche:
A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing. Future Internet 9(3): 43 (2017) - [j3]Talal Halabi, Martine Bellaïche:
Towards quantification and evaluation of security of Cloud Service Providers. J. Inf. Secur. Appl. 33: 55-65 (2017) - [c5]Talal Halabi, Martine Bellaïche:
Service Assignment in Federated Cloud Environments Based on Multi-objective Optimization of Security. FiCloud 2017: 39-46 - [c4]Talal Halabi, Martine Bellaïche:
Evaluation and selection of Cloud security services based on Multi-Criteria Analysis MCA. ICNC 2017: 706-710 - 2014
- [j2]Richard Gilles Engoulou, Martine Bellaïche, Samuel Pierre, Alejandro Quintero:
VANET security surveys. Comput. Commun. 44: 1-13 (2014) - [c3]Salah-Eddine Benbrahim, Alejandro Quintero, Martine Bellaïche:
New Distributed Approach for an Autonomous Dynamic Management of Interdependent Virtual Machines. NBiS 2014: 531-534 - 2012
- [j1]Martine Bellaïche, Jean-Charles Grégoire:
SYN flooding attack detection by TCP handshake anomalies. Secur. Commun. Networks 5(7): 709-724 (2012) - 2011
- [c2]Martine Bellaïche, Jean-Charles Grégoire:
Avoiding DDoS with active management of backlog queues. NSS 2011: 310-315
2000 – 2009
- 2009
- [c1]Martine Bellaïche, Jean-Charles Grégoire:
SYN Flooding Attack Detection Based on Entropy Computing. GLOBECOM 2009: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint