default search action
Abdelaziz Amara Korba
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Abdelaziz Amara Korba, Abdelwahab Boualouache, Yacine Ghamri-Doudane:
Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV. IEEE Trans. Veh. Technol. 73(9): 12399-12414 (2024) - [c9]Alaeddine Diaf, Abdelaziz Amara Korba, Nour El Islem Karabadji, Yacine Ghamri-Doudane:
Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks. DCOSS-IoT 2024: 117-123 - [c8]Amine Tellache, Amdjed Mokhtari, Abdelaziz Amara Korba, Yacine Ghamri-Doudane:
Multi-agent Reinforcement Learning-based Network Intrusion Detection System. NOMS 2024: 1-9 - [i8]Abdelaziz Amara Korba, Abdelwahab Boualouache, Yacine Ghamri-Doudane:
Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV. CoRR abs/2407.02969 (2024) - [i7]Abdelaziz Amara Korba, Abdelwahab Boualouache, Bouziane Brik, Rabah Rahal, Yacine Ghamri-Doudane, Sidi Mohammed Senouci:
Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks. CoRR abs/2407.03070 (2024) - [i6]Abdelaziz Amara Korba, Nouredine Tamani, Yacine Ghamri-Doudane, Nour El Islem Karabadji:
Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI. CoRR abs/2407.03264 (2024) - [i5]Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine, Yacine Challal, Yacine Ghamri-Doudane:
AntibotV: A Multilevel Behaviour-based Framework for Botnets Detection in Vehicular Networks. CoRR abs/2407.03506 (2024) - [i4]Amine Tellache, Amdjed Mokhtari, Abdelaziz Amara Korba, Yacine Ghamri-Doudane:
Multi-agent Reinforcement Learning-based Network Intrusion Detection System. CoRR abs/2407.05766 (2024) - [i3]Abdelaziz Amara Korba, Aleddine Diaf, Yacine Ghamri-Doudane:
AI-Driven Fast and Early Detection of IoT Botnet Threats: A Comprehensive Network Traffic Analysis Approach. CoRR abs/2407.15688 (2024) - [i2]Abdelaziz Amara Korba, Souad Sebaa, Malik Mabrouki, Yacine Ghamri-Doudane, Karima Benatchba:
A Life-long Learning Intrusion Detection System for 6G-Enabled IoV. CoRR abs/2407.15700 (2024) - [i1]Alaeddine Diaf, Abdelaziz Amara Korba, Nour El Islem Karabadji, Yacine Ghamri-Doudane:
Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks. CoRR abs/2408.14045 (2024) - 2023
- [j9]Nour El Islem Karabadji, Abdelaziz Amara Korba, Ali Assi, Hassina Seridi, Sabeur Aridhi, Wajdi Dhifli:
Accuracy and diversity-aware multi-objective approach for random forest construction. Expert Syst. Appl. 225: 120138 (2023) - [j8]Abdelwahab Boualouache, Bouziane Brik, Qiang Tang, Abdelaziz Amara Korba, Sylvain Cherrier, Sidi-Mohammed Senouci, Enric Pardo, Yacine Ghamri-Doudane, Rami Langar, Thomas Engel:
5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities. IEEE Internet Things Mag. 6(1): 114-119 (2023) - [c7]Abdelwahab Boualouache, Abdelaziz Amara Korba, Sidi-Mohammed Senouci, Yacine Ghamri-Doudane, Thomas Engel:
Reinforcement Learning-Based Security Orchestration for 5G-V2X Network Slicing at Cross-Borders. GLOBECOM 2023: 2949-2954 - [c6]Abdelaziz Amara Korba, Abdelwahab Boualouache, Bouziane Brik, Rabah Rahal, Yacine Ghamri-Doudane, Sidi Mohammed Senouci:
Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks. ICC 2023: 1137-1142 - 2022
- [j7]Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine, Yacine Challal, Yacine Ghamri-Doudane:
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks. J. Netw. Syst. Manag. 30(1): 15 (2022) - [j6]Yasmine Labiod, Abdelaziz Amara Korba, Nassira Ghoualmi:
Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks. Wirel. Pers. Commun. 125(1): 231-259 (2022) - 2021
- [j5]Yasmine Labiod, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine:
Detecting DDoS Attacks in IoT Environment. Int. J. Inf. Secur. Priv. 15(2): 145-180 (2021) - 2020
- [j4]Abdelaziz Amara Korba, Nouredine Tamani, Yacine Ghamri-Doudane, Nour El Islem Karabadji:
Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI. Comput. Secur. 96: 101896 (2020) - [j3]Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine:
Towards the Development of Realistic DoS Dataset for Intelligent Transportation Systems. Wirel. Pers. Commun. 115(2): 1415-1444 (2020)
2010 – 2019
- 2018
- [c5]Abdelaziz Amara Korba:
Energy Fraud Detection in Advanced Metering Infrastructure AMI. ICSENT 2018: 27:1-27:6 - [c4]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Abdelaziz Amara Korba:
Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices. PAIS 2018: 1-8 - 2016
- [j2]Abdelaziz Amara Korba, Mehdi Nafaa, Salim Ghanemi:
Hybrid Intrusion Detection Framework for Ad hoc networks. Int. J. Inf. Secur. Priv. 10(4): 1-32 (2016) - [j1]Abdelaziz Amara Korba, Mehdi Nafaa, Salim Ghanemi:
An efficient intrusion detection and prevention framework for ad hoc networks. Inf. Comput. Secur. 24(4): 298-325 (2016) - [c3]Abdelaziz Amara Korba, Mehdi Nafaa, Yacine Ghamri-Doudane:
Anomaly-based intrusion detection system for ad hoc networks. NOF 2016: 1-3 - 2014
- [c2]Abdelaziz Amara Korba, Mehdi Nafaa, Salim Ghanemi:
Analysis of security attacks in AODV. ICMCS 2014: 752-756 - 2013
- [c1]Abdelaziz Amara Korba, Mehdi Nafa, Salim Ghanemi:
Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks. UKSim 2013: 693-698
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint