HAMDI Noureddine
Email : noureddine.hamdi@uit.ac.ma
Établissement : Faculté des Sciences Juridiques et Politiques
Laboratoire : Etudes et recherches en sciences Juridiques et Judiciaires
← Retour au laboratoire
📚 Publications Scopus — Total : 165
| Titre | Année | 🔗 Voir |
|---|---|---|
| AI and Adaptive Cybersecurity Strategies in Higher Education Institutions (HEIs): Towards a Secure Digital Infrastructure | 2025 | 🔗 Voir |
| SafetyRAG: Towards Safe Large Language Model-Based Application through Retrieval-Augmented Generation | 2025 | 🔗 Voir |
| Enhancing Control of Large Language Model-based AI Systems Through Declarative Memory | 2025 | 🔗 Voir |
| MalPID: Malicious Prompt Injection Detection Dataset for Large Language Model based Applications | 2024 | 🔗 Voir |
| Adaptive cloud-based mobile video streaming service using real-time QoE estimation | 2024 | 🔗 Voir |
| Enhancing Sentiment Analysis on Social Media with Novel Preprocessing Techniques | 2023 | 🔗 Voir |
| Safety Issues Investigation in Deep Learning Based Chatbots Answers to Medical Advice Requests | 2023 | 🔗 Voir |
| A Secure Emergency Framework in an IoT Based Patient Monitoring System | 2023 | 🔗 Voir |
| An Authentication Protocol for Healthcare Application: A Case Study of a Diabetic Patient | 2023 | 🔗 Voir |
| Statistical Analysis of COVID-19 Pandemic Lockdown on Rural Undergraduate Students | 2023 | 🔗 Voir |
| An efficient authentication scheme for smart grid communications | 2022 | 🔗 Voir |
| Privacy-preserving spatial and temporal data aggregation for smart metering | 2022 | 🔗 Voir |
| Privacy-Preserving approaches for smart metering: A survey | 2022 | 🔗 Voir |
| A novel energy-efficient encryption algorithm for secure data in WSNs | 2021 | 🔗 Voir |
| An Efficient and Privacy-Preserving Billing Protocol for Smart Metering | 2021 | 🔗 Voir |
| Context-aware access control and anonymous authentication in WBAN | 2020 | 🔗 Voir |
| Game-based adaptive anomaly detection in wireless body area networks | 2019 | 🔗 Voir |
| A new vehicular blackbox architecture based on searchable encryption | 2019 | 🔗 Voir |
| A novel approach for privacy-preserving data aggregation in smart grid | 2019 | 🔗 Voir |
| At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid | 2019 | 🔗 Voir |
| Context-Aware Adaptive Authentication and Authorization in Internet of Things | 2019 | 🔗 Voir |
| WCDMA Mean User Throughput Prediction Using Linear Regression Algorithm | 2019 | 🔗 Voir |
| LTE QoS Parameters Prediction Using Multivariate Linear Regression Algorithm | 2019 | 🔗 Voir |
| An identity-based cryptographic scheme for cloud storage applications | 2019 | 🔗 Voir |
| A new trust architecture for smart vehicular systems | 2019 | 🔗 Voir |
| Chaotic cryptosystems for multimedia transmission opportunities, challenge and limitations | 2018 | 🔗 Voir |
| Security of RFID based internet of things applications: Requirements and open issues | 2018 | 🔗 Voir |
| Privacy preserving profile matching protocol for human-centric social internet of things | 2018 | 🔗 Voir |
| A key management scheme for IoT-based video surveillance systems based on fingerprints | 2018 | 🔗 Voir |
| Secured distributed IoT based supply chain architecture | 2018 | 🔗 Voir |
| A fair resource allocation approach in cloud computing environments | 2018 | 🔗 Voir |
| Key Management Scheme for IoT Based Supply Chain | 2018 | 🔗 Voir |
| Biometric-based Per-Packet Authentication Techniques in Communication Networks | 2018 | 🔗 Voir |
| Game-Based Adaptive Risk Management in Wireless Body Area Networks | 2018 | 🔗 Voir |
| A Privacy-Preserving Scheme Using Chaos Theory for Wireless Body Area Network | 2018 | 🔗 Voir |
| Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks | 2018 | 🔗 Voir |
| Context-aware authorization and anonymous authentication in wireless body area networks | 2018 | 🔗 Voir |
| An infrastructurless vehicle blackbox system | 2018 | 🔗 Voir |
| IoT Based Tracking System for Supply Chain Management | 2018 | 🔗 Voir |
| A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system | 2018 | 🔗 Voir |
| A stochastic game for adaptive security in constrained wireless body area networks | 2018 | 🔗 Voir |
| Game-Based Adaptive Remote Access VPN for IoT: Application to e-Health | 2018 | 🔗 Voir |
| Video streaming strategy based on feedback control loop theory in cloud platform | 2017 | 🔗 Voir |
| A novel adaptive streaming approach for cloud-based mobile video games | 2017 | 🔗 Voir |
| A novel privacy technique for Augmented Reality cloud gaming based on image authentication | 2017 | 🔗 Voir |
| A new biometric-based security framework for cloud storage | 2017 | 🔗 Voir |
| A privacy-preserving homomorphic encryption scheme for the Internet of Things | 2017 | 🔗 Voir |
| Adaptive encryption for real time mobile multimedia services | 2017 | 🔗 Voir |
| Energy consumption comparison for mobile video streaming encryption algorithm | 2017 | 🔗 Voir |
| A secure data storage based on revocation game-theoretic approaches in cloud computing environments | 2017 | 🔗 Voir |
| Context aware middleware for RFID based pharmaceutical supply chain | 2017 | 🔗 Voir |
| Adaptive risk treatment for cloud computing based on Markovian game | 2017 | 🔗 Voir |
| A new architecture for supply-chain management | 2017 | 🔗 Voir |
| Enhanced fingerprint fuzzy vault based on distortion invariant minutiae structures | 2017 | 🔗 Voir |
| Adaptive risk management framework for cloud computing | 2017 | 🔗 Voir |
| On video stream encryption efficiency for mobile cloud system | 2017 | 🔗 Voir |
| PhD symposium chairs' welcome | 2017 | 🔗 Voir |
| Scenario-based vulnerability analysis in IoT-based patient monitoring system | 2017 | 🔗 Voir |
| Image compression with optimal traversal using wavelet and percolation theories | 2016 | 🔗 Voir |
| AIDF: An identity as a service framework for the cloud | 2016 | 🔗 Voir |
| Chaotic construction of cryptographic keys based on biometric data | 2016 | 🔗 Voir |
| A new authentication scheme for cloud-based storage applications | 2016 | 🔗 Voir |
| Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues | 2016 | 🔗 Voir |
| Real-time user experience evaluation for cloud-based mobile video | 2016 | 🔗 Voir |
| A new group Diffie-Hellman key generation proposal for secure VANET communications | 2016 | 🔗 Voir |
| A new security games based reaction algorithm against DOS attacks in VANETs | 2016 | 🔗 Voir |
| A novel algorithm for securing data aggregation in wireless sensor networks | 2016 | 🔗 Voir |
| Securing fingerprint fuzzy vault against cross-matching | 2016 | 🔗 Voir |
| A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks | 2015 | 🔗 Voir |
| Toward Quality of Experience models of cloud-based mobile services | 2015 | 🔗 Voir |
| Recent advances in cryptographic solutions for vehicular networks | 2015 | 🔗 Voir |
| Energy efficient key menagement scheme for clustered hierarchical wireless sensor networks | 2015 | 🔗 Voir |
| Extending advanced evasion techniques using combinatorial search | 2015 | 🔗 Voir |
| Requirements capture and comparative analysis of cloud security techniques | 2015 | 🔗 Voir |
| A revocation game model for secure cloud storage | 2014 | 🔗 Voir |
| A multi-attribute decision model for intrusion response system | 2014 | 🔗 Voir |
| A coalitional game-theoretic approach for QoS-Based and secure data storage in cloud environment | 2014 | 🔗 Voir |
| A novel approach for fair and secure resource allocation in storage cloud architectures based on DRF mechanism | 2014 | 🔗 Voir |
| A Comparative Study on Cloud Gaming Platforms | 2014 | 🔗 Voir |
| Game-based adaptive security in the Internet of Things for eHealth | 2014 | 🔗 Voir |
| Survey on VANET security challenges and possible cryptographic solutions | 2014 | 🔗 Voir |
| A Survey on Security Models, Techniques, and Tools for the Internet of Things | 2014 | 🔗 Voir |
| Fundamentals of identity-based cryptography | 2014 | 🔗 Voir |
| Quantitative Risk Management for Communication and Information Systems: State-of-the-Art and Challenges | 2014 | 🔗 Voir |
| Security of Cloud Computing | 2014 | 🔗 Voir |
| A Survey on Encryption Schemes in Wireless Sensor Networks | 2014 | 🔗 Voir |
| Forensic investigation in mobile cloud environment | 2014 | 🔗 Voir |
| International workshop on adaptive security & privacy management for the internet of things (ASPI 2013) | 2013 | 🔗 Voir |
| A comparative study on game theoretic approaches for resource allocation in cloud computing architectures | 2013 | 🔗 Voir |
| Secure cooperative physical-layer coding for the Internet of Things | 2013 | 🔗 Voir |
| A testbed for adaptive security for IoT in eHealth | 2013 | 🔗 Voir |
| Web services in multimedia communication | 2012 | 🔗 Voir |
| A dynamic distributed key tunneling protocol for heterogeneous wireless sensor networks | 2012 | 🔗 Voir |
| Security of cloud computing, storage, and networking | 2012 | 🔗 Voir |
| Network Attacks | 2012 | 🔗 Voir |
| Dynamic flow filtering for all-optical networks | 2011 | 🔗 Voir |
| Optical burst grooming, routing and wavelength assignment in OBS networks | 2011 | 🔗 Voir |
| An all optical configurable and secure OCDMA system implementation using loop based optical delay lines | 2011 | 🔗 Voir |
| Coverage assessment and target tracking in 3D domains | 2011 | 🔗 Voir |
| Game theory and iterated Voronoi diagrams for self-organized Wireless Sensor Networks | 2011 | 🔗 Voir |
