Photo

HAMDI Noureddine

Email : noureddine.hamdi@uit.ac.ma

Institution : Faculty of Law and Political Sciences

Laboratory : Studies and Research in Legal and Judicial Sciences

← Back to laboratory
📚 Scopus Publications — Total : 165
Title Year 🔗 View
AI and Adaptive Cybersecurity Strategies in Higher Education Institutions (HEIs): Towards a Secure Digital Infrastructure 2025 🔗 View
SafetyRAG: Towards Safe Large Language Model-Based Application through Retrieval-Augmented Generation 2025 🔗 View
Enhancing Control of Large Language Model-based AI Systems Through Declarative Memory 2025 🔗 View
MalPID: Malicious Prompt Injection Detection Dataset for Large Language Model based Applications 2024 🔗 View
Adaptive cloud-based mobile video streaming service using real-time QoE estimation 2024 🔗 View
An Authentication Protocol for Healthcare Application: A Case Study of a Diabetic Patient 2023 🔗 View
Enhancing Sentiment Analysis on Social Media with Novel Preprocessing Techniques 2023 🔗 View
Safety Issues Investigation in Deep Learning Based Chatbots Answers to Medical Advice Requests 2023 🔗 View
A Secure Emergency Framework in an IoT Based Patient Monitoring System 2023 🔗 View
Statistical Analysis of COVID-19 Pandemic Lockdown on Rural Undergraduate Students 2023 🔗 View
An efficient authentication scheme for smart grid communications 2022 🔗 View
Privacy-preserving spatial and temporal data aggregation for smart metering 2022 🔗 View
Privacy-Preserving approaches for smart metering: A survey 2022 🔗 View
A novel energy-efficient encryption algorithm for secure data in WSNs 2021 🔗 View
An Efficient and Privacy-Preserving Billing Protocol for Smart Metering 2021 🔗 View
Context-aware access control and anonymous authentication in WBAN 2020 🔗 View
Game-based adaptive anomaly detection in wireless body area networks 2019 🔗 View
A new vehicular blackbox architecture based on searchable encryption 2019 🔗 View
A novel approach for privacy-preserving data aggregation in smart grid 2019 🔗 View
At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid 2019 🔗 View
Context-Aware Adaptive Authentication and Authorization in Internet of Things 2019 🔗 View
WCDMA Mean User Throughput Prediction Using Linear Regression Algorithm 2019 🔗 View
LTE QoS Parameters Prediction Using Multivariate Linear Regression Algorithm 2019 🔗 View
An identity-based cryptographic scheme for cloud storage applications 2019 🔗 View
A new trust architecture for smart vehicular systems 2019 🔗 View
Chaotic cryptosystems for multimedia transmission opportunities, challenge and limitations 2018 🔗 View
Security of RFID based internet of things applications: Requirements and open issues 2018 🔗 View
Privacy preserving profile matching protocol for human-centric social internet of things 2018 🔗 View
A key management scheme for IoT-based video surveillance systems based on fingerprints 2018 🔗 View
Secured distributed IoT based supply chain architecture 2018 🔗 View
A fair resource allocation approach in cloud computing environments 2018 🔗 View
Key Management Scheme for IoT Based Supply Chain 2018 🔗 View
Biometric-based Per-Packet Authentication Techniques in Communication Networks 2018 🔗 View
Game-Based Adaptive Risk Management in Wireless Body Area Networks 2018 🔗 View
A Privacy-Preserving Scheme Using Chaos Theory for Wireless Body Area Network 2018 🔗 View
Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks 2018 🔗 View
Context-aware authorization and anonymous authentication in wireless body area networks 2018 🔗 View
An infrastructurless vehicle blackbox system 2018 🔗 View
IoT Based Tracking System for Supply Chain Management 2018 🔗 View
A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system 2018 🔗 View
A stochastic game for adaptive security in constrained wireless body area networks 2018 🔗 View
Game-Based Adaptive Remote Access VPN for IoT: Application to e-Health 2018 🔗 View
Video streaming strategy based on feedback control loop theory in cloud platform 2017 🔗 View
A novel adaptive streaming approach for cloud-based mobile video games 2017 🔗 View
A novel privacy technique for Augmented Reality cloud gaming based on image authentication 2017 🔗 View
A new biometric-based security framework for cloud storage 2017 🔗 View
A privacy-preserving homomorphic encryption scheme for the Internet of Things 2017 🔗 View
Adaptive encryption for real time mobile multimedia services 2017 🔗 View
Energy consumption comparison for mobile video streaming encryption algorithm 2017 🔗 View
A secure data storage based on revocation game-theoretic approaches in cloud computing environments 2017 🔗 View
Context aware middleware for RFID based pharmaceutical supply chain 2017 🔗 View
Adaptive risk treatment for cloud computing based on Markovian game 2017 🔗 View
A new architecture for supply-chain management 2017 🔗 View
Enhanced fingerprint fuzzy vault based on distortion invariant minutiae structures 2017 🔗 View
Adaptive risk management framework for cloud computing 2017 🔗 View
On video stream encryption efficiency for mobile cloud system 2017 🔗 View
PhD symposium chairs' welcome 2017 🔗 View
Scenario-based vulnerability analysis in IoT-based patient monitoring system 2017 🔗 View
Image compression with optimal traversal using wavelet and percolation theories 2016 🔗 View
AIDF: An identity as a service framework for the cloud 2016 🔗 View
Chaotic construction of cryptographic keys based on biometric data 2016 🔗 View
A new authentication scheme for cloud-based storage applications 2016 🔗 View
Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues 2016 🔗 View
Real-time user experience evaluation for cloud-based mobile video 2016 🔗 View
A new group Diffie-Hellman key generation proposal for secure VANET communications 2016 🔗 View
A new security games based reaction algorithm against DOS attacks in VANETs 2016 🔗 View
A novel algorithm for securing data aggregation in wireless sensor networks 2016 🔗 View
Securing fingerprint fuzzy vault against cross-matching 2016 🔗 View
A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks 2015 🔗 View
Toward Quality of Experience models of cloud-based mobile services 2015 🔗 View
Recent advances in cryptographic solutions for vehicular networks 2015 🔗 View
Energy efficient key menagement scheme for clustered hierarchical wireless sensor networks 2015 🔗 View
Extending advanced evasion techniques using combinatorial search 2015 🔗 View
Requirements capture and comparative analysis of cloud security techniques 2015 🔗 View
A revocation game model for secure cloud storage 2014 🔗 View
A multi-attribute decision model for intrusion response system 2014 🔗 View
A coalitional game-theoretic approach for QoS-Based and secure data storage in cloud environment 2014 🔗 View
A novel approach for fair and secure resource allocation in storage cloud architectures based on DRF mechanism 2014 🔗 View
A Comparative Study on Cloud Gaming Platforms 2014 🔗 View
Game-based adaptive security in the Internet of Things for eHealth 2014 🔗 View
A Survey on Security Models, Techniques, and Tools for the Internet of Things 2014 🔗 View
Survey on VANET security challenges and possible cryptographic solutions 2014 🔗 View
Fundamentals of identity-based cryptography 2014 🔗 View
Quantitative Risk Management for Communication and Information Systems: State-of-the-Art and Challenges 2014 🔗 View
Security of Cloud Computing 2014 🔗 View
A Survey on Encryption Schemes in Wireless Sensor Networks 2014 🔗 View
Forensic investigation in mobile cloud environment 2014 🔗 View
International workshop on adaptive security & privacy management for the internet of things (ASPI 2013) 2013 🔗 View
A comparative study on game theoretic approaches for resource allocation in cloud computing architectures 2013 🔗 View
Secure cooperative physical-layer coding for the Internet of Things 2013 🔗 View
A testbed for adaptive security for IoT in eHealth 2013 🔗 View
Web services in multimedia communication 2012 🔗 View
A dynamic distributed key tunneling protocol for heterogeneous wireless sensor networks 2012 🔗 View
Security of cloud computing, storage, and networking 2012 🔗 View
Network Attacks 2012 🔗 View
Dynamic flow filtering for all-optical networks 2011 🔗 View
Optical burst grooming, routing and wavelength assignment in OBS networks 2011 🔗 View
An all optical configurable and secure OCDMA system implementation using loop based optical delay lines 2011 🔗 View
Coverage assessment and target tracking in 3D domains 2011 🔗 View
Game theory and iterated Voronoi diagrams for self-organized Wireless Sensor Networks 2011 🔗 View