Photo

HAMDI Noureddine

Email : noureddine.hamdi@uit.ac.ma

Établissement : Faculté des Sciences Juridiques et Politiques

Laboratoire : Etudes et recherches en sciences Juridiques et Judiciaires

← Retour au laboratoire
📚 Publications Scopus — Total : 165
Titre Année 🔗 Voir
AI and Adaptive Cybersecurity Strategies in Higher Education Institutions (HEIs): Towards a Secure Digital Infrastructure 2025 🔗 Voir
SafetyRAG: Towards Safe Large Language Model-Based Application through Retrieval-Augmented Generation 2025 🔗 Voir
Enhancing Control of Large Language Model-based AI Systems Through Declarative Memory 2025 🔗 Voir
MalPID: Malicious Prompt Injection Detection Dataset for Large Language Model based Applications 2024 🔗 Voir
Adaptive cloud-based mobile video streaming service using real-time QoE estimation 2024 🔗 Voir
Enhancing Sentiment Analysis on Social Media with Novel Preprocessing Techniques 2023 🔗 Voir
Safety Issues Investigation in Deep Learning Based Chatbots Answers to Medical Advice Requests 2023 🔗 Voir
A Secure Emergency Framework in an IoT Based Patient Monitoring System 2023 🔗 Voir
An Authentication Protocol for Healthcare Application: A Case Study of a Diabetic Patient 2023 🔗 Voir
Statistical Analysis of COVID-19 Pandemic Lockdown on Rural Undergraduate Students 2023 🔗 Voir
An efficient authentication scheme for smart grid communications 2022 🔗 Voir
Privacy-preserving spatial and temporal data aggregation for smart metering 2022 🔗 Voir
Privacy-Preserving approaches for smart metering: A survey 2022 🔗 Voir
A novel energy-efficient encryption algorithm for secure data in WSNs 2021 🔗 Voir
An Efficient and Privacy-Preserving Billing Protocol for Smart Metering 2021 🔗 Voir
Context-aware access control and anonymous authentication in WBAN 2020 🔗 Voir
Game-based adaptive anomaly detection in wireless body area networks 2019 🔗 Voir
A new vehicular blackbox architecture based on searchable encryption 2019 🔗 Voir
A novel approach for privacy-preserving data aggregation in smart grid 2019 🔗 Voir
At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid 2019 🔗 Voir
Context-Aware Adaptive Authentication and Authorization in Internet of Things 2019 🔗 Voir
WCDMA Mean User Throughput Prediction Using Linear Regression Algorithm 2019 🔗 Voir
LTE QoS Parameters Prediction Using Multivariate Linear Regression Algorithm 2019 🔗 Voir
An identity-based cryptographic scheme for cloud storage applications 2019 🔗 Voir
A new trust architecture for smart vehicular systems 2019 🔗 Voir
Chaotic cryptosystems for multimedia transmission opportunities, challenge and limitations 2018 🔗 Voir
Security of RFID based internet of things applications: Requirements and open issues 2018 🔗 Voir
Privacy preserving profile matching protocol for human-centric social internet of things 2018 🔗 Voir
A key management scheme for IoT-based video surveillance systems based on fingerprints 2018 🔗 Voir
Secured distributed IoT based supply chain architecture 2018 🔗 Voir
A fair resource allocation approach in cloud computing environments 2018 🔗 Voir
Key Management Scheme for IoT Based Supply Chain 2018 🔗 Voir
Biometric-based Per-Packet Authentication Techniques in Communication Networks 2018 🔗 Voir
Game-Based Adaptive Risk Management in Wireless Body Area Networks 2018 🔗 Voir
A Privacy-Preserving Scheme Using Chaos Theory for Wireless Body Area Network 2018 🔗 Voir
Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks 2018 🔗 Voir
Context-aware authorization and anonymous authentication in wireless body area networks 2018 🔗 Voir
An infrastructurless vehicle blackbox system 2018 🔗 Voir
IoT Based Tracking System for Supply Chain Management 2018 🔗 Voir
A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system 2018 🔗 Voir
A stochastic game for adaptive security in constrained wireless body area networks 2018 🔗 Voir
Game-Based Adaptive Remote Access VPN for IoT: Application to e-Health 2018 🔗 Voir
Video streaming strategy based on feedback control loop theory in cloud platform 2017 🔗 Voir
A novel adaptive streaming approach for cloud-based mobile video games 2017 🔗 Voir
A novel privacy technique for Augmented Reality cloud gaming based on image authentication 2017 🔗 Voir
A new biometric-based security framework for cloud storage 2017 🔗 Voir
A privacy-preserving homomorphic encryption scheme for the Internet of Things 2017 🔗 Voir
Adaptive encryption for real time mobile multimedia services 2017 🔗 Voir
Energy consumption comparison for mobile video streaming encryption algorithm 2017 🔗 Voir
A secure data storage based on revocation game-theoretic approaches in cloud computing environments 2017 🔗 Voir
Context aware middleware for RFID based pharmaceutical supply chain 2017 🔗 Voir
Adaptive risk treatment for cloud computing based on Markovian game 2017 🔗 Voir
A new architecture for supply-chain management 2017 🔗 Voir
Enhanced fingerprint fuzzy vault based on distortion invariant minutiae structures 2017 🔗 Voir
Adaptive risk management framework for cloud computing 2017 🔗 Voir
On video stream encryption efficiency for mobile cloud system 2017 🔗 Voir
PhD symposium chairs' welcome 2017 🔗 Voir
Scenario-based vulnerability analysis in IoT-based patient monitoring system 2017 🔗 Voir
Image compression with optimal traversal using wavelet and percolation theories 2016 🔗 Voir
AIDF: An identity as a service framework for the cloud 2016 🔗 Voir
Chaotic construction of cryptographic keys based on biometric data 2016 🔗 Voir
A new authentication scheme for cloud-based storage applications 2016 🔗 Voir
Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues 2016 🔗 Voir
Real-time user experience evaluation for cloud-based mobile video 2016 🔗 Voir
A new group Diffie-Hellman key generation proposal for secure VANET communications 2016 🔗 Voir
A new security games based reaction algorithm against DOS attacks in VANETs 2016 🔗 Voir
A novel algorithm for securing data aggregation in wireless sensor networks 2016 🔗 Voir
Securing fingerprint fuzzy vault against cross-matching 2016 🔗 Voir
A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks 2015 🔗 Voir
Toward Quality of Experience models of cloud-based mobile services 2015 🔗 Voir
Recent advances in cryptographic solutions for vehicular networks 2015 🔗 Voir
Energy efficient key menagement scheme for clustered hierarchical wireless sensor networks 2015 🔗 Voir
Extending advanced evasion techniques using combinatorial search 2015 🔗 Voir
Requirements capture and comparative analysis of cloud security techniques 2015 🔗 Voir
A revocation game model for secure cloud storage 2014 🔗 Voir
A multi-attribute decision model for intrusion response system 2014 🔗 Voir
A coalitional game-theoretic approach for QoS-Based and secure data storage in cloud environment 2014 🔗 Voir
A novel approach for fair and secure resource allocation in storage cloud architectures based on DRF mechanism 2014 🔗 Voir
A Comparative Study on Cloud Gaming Platforms 2014 🔗 Voir
Game-based adaptive security in the Internet of Things for eHealth 2014 🔗 Voir
Survey on VANET security challenges and possible cryptographic solutions 2014 🔗 Voir
A Survey on Security Models, Techniques, and Tools for the Internet of Things 2014 🔗 Voir
Fundamentals of identity-based cryptography 2014 🔗 Voir
Quantitative Risk Management for Communication and Information Systems: State-of-the-Art and Challenges 2014 🔗 Voir
Security of Cloud Computing 2014 🔗 Voir
A Survey on Encryption Schemes in Wireless Sensor Networks 2014 🔗 Voir
Forensic investigation in mobile cloud environment 2014 🔗 Voir
International workshop on adaptive security & privacy management for the internet of things (ASPI 2013) 2013 🔗 Voir
A comparative study on game theoretic approaches for resource allocation in cloud computing architectures 2013 🔗 Voir
Secure cooperative physical-layer coding for the Internet of Things 2013 🔗 Voir
A testbed for adaptive security for IoT in eHealth 2013 🔗 Voir
Web services in multimedia communication 2012 🔗 Voir
A dynamic distributed key tunneling protocol for heterogeneous wireless sensor networks 2012 🔗 Voir
Security of cloud computing, storage, and networking 2012 🔗 Voir
Network Attacks 2012 🔗 Voir
Dynamic flow filtering for all-optical networks 2011 🔗 Voir
Optical burst grooming, routing and wavelength assignment in OBS networks 2011 🔗 Voir
An all optical configurable and secure OCDMA system implementation using loop based optical delay lines 2011 🔗 Voir
Coverage assessment and target tracking in 3D domains 2011 🔗 Voir
Game theory and iterated Voronoi diagrams for self-organized Wireless Sensor Networks 2011 🔗 Voir