


default search action
Nour El Madhoun
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Daniel Alejandro Maldonado-Ruiz
, Alan Pulval-Dady, Yulin Shi, Zhe Wang, Nour El Madhoun, Jenny Torres:
NestedChain: "Blockchain-inside-a-Blockchain" new generation prototype. Ann. des Télécommunications 79(11-12): 881-899 (2024) - [j7]Tristan Bilot
, Nour El Madhoun
, Khaldoun Al Agha
, Anis Zouaoui
:
A Survey on Malware Detection with Graph Representation Learning. ACM Comput. Surv. 56(11): 278:1-278:36 (2024) - [c23]Nour El Madhoun, Badis Hammi, Saad El Jaouhari, Djamel Mesbah, Elsi Ahmadieh:
Addressing Security Challenges in Copyright Management Applications: The Blockchain Perspective. AINA (6) 2024: 169-182 - [c22]Badis Hammi, Tristan Bilot, Danyil Bazain, Nicolas Binand, Maxime Jaen, Chems Mitta, Nour El Madhoun:
An End-to-End Approach for the Detection of Phishing Attacks. AINA (4) 2024: 314-325 - [c21]Elsi Ahmadieh, Nour El Madhoun:
Comparative E-Voting Security Evaluation: Multi-Modal Authentication Approaches. BCCA 2024: 250-254 - [c20]Nour El Madhoun, Badis Hammi:
Blockchain Technology in the Healthcare Sector: Overview and Security Analysis. CCWC 2024: 439-446 - [c19]Tristan Bilot
, Nour El Madhoun
, Khaldoun Al Agha
, Anis Zouaoui
:
Few Edges are Enough: Few-Shot Network Attack Detection with Graph Neural Networks. IWSEC 2024: 257-276 - [c18]Hussein Kazem, Nour El Madhoun, Samia Bouzefrane, Pierrick Conord:
Security Challenges and Countermeasures in Blockchain's Peer-to-Peer Architecture. WISTP 2024: 111-127 - 2023
- [j6]Tristan Bilot
, Nour El Madhoun
, Khaldoun Al Agha, Anis Zouaoui:
Graph Neural Networks for Intrusion Detection: A Survey. IEEE Access 11: 49114-49139 (2023) - [j5]Parvez Faruki, Rati Bhan
, Vinesh Jain, Sajal Bhatia
, Nour El Madhoun
, Rajendra Pamula:
A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks. Inf. 14(7): 374 (2023) - [c17]Elsi Ahmadieh, Nour El Madhoun:
Artwork NFTs for Online Trading and Transaction Cancellation. BCCA 2023: 235-239 - [c16]Elsi Ahmadieh, Nour El Madhoun:
NFTs for Online Trading of Artworks. ICBC 2023: 1-2 - [e1]Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun:
Emerging Trends in Cybersecurity Applications. Springer International Publishing 2023, ISBN 978-3-031-09639-6 [contents] - [i1]Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui:
A Survey on Malware Detection with Graph Representation Learning. CoRR abs/2303.16004 (2023) - 2022
- [j4]Daniel Alejandro Maldonado-Ruiz
, Jenny Torres
, Nour El Madhoun
, Mohamad Badra
:
Current Trends in Blockchain Implementations on the Paradigm of Public Key Infrastructure: A Survey. IEEE Access 10: 17641-17655 (2022) - [j3]Ali Benabdallah, Antoine Audras, Louis Coudert
, Nour El Madhoun
, Mohamad Badra
:
Analysis of Blockchain Solutions for E-Voting: A Systematic Literature Review. IEEE Access 10: 70746-70759 (2022) - [c15]Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, Guy Pujolle:
New Security Protocols for Offline Point-of-Sale Machines. AINA (2) 2022: 446-467 - [c14]Samir Chabbi, Nour El Madhoun, Lazhar Khamer:
Security of NFC Banking Transactions: Overview on Attacks and Solutions. CSNet 2022: 1-5 - [c13]Samir Chabbi, Nour El Madhoun:
A New Security Solution Enhancing the Dynamic Array PIN Protocol. IWCMC 2022: 991-996 - 2021
- [j2]Nour El Madhoun
, Julien Hatin, Emmanuel Bertin:
A decision tree for building IT applications. Ann. des Télécommunications 76(3-4): 131-144 (2021) - [j1]Nour El Madhoun
, Emmanuel Bertin, Mohamad Badra, Guy Pujolle:
Towards more secure EMV purchase transactions. Ann. des Télécommunications 76(3-4): 203-222 (2021) - [c12]Darine Al-Mohtar, Amani Ramzi Daou, Nour El Madhoun, Rachad Maallawi:
A secure blockchain-based architecture for the COVID-19 data network. CSNet 2021: 1-5 - [c11]Daniel Alejandro Maldonado-Ruiz
, Jenny Torres, Nour El Madhoun, Mohamad Badra:
An Innovative and Decentralized Identity Framework Based on Blockchain Technology. NTMS 2021: 1-8 - 2020
- [c10]Daniel Alejandro Maldonado-Ruiz
, Jenny Torres, Nour El Madhoun:
3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography. BRAINS 2020: 45-46 - [c9]Daniel Alejandro Maldonado-Ruiz
, Mohamad Badra, Nour El Madhoun, Jenny Torres:
Secure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users. MSPN 2020: 15-30 - [c8]Julien Hatin, Emmanuel Bertin, Baptiste Hemery
, Nour El Madhoun:
Welcome to the Jungle: A Reference Model for Blockchain, DLT and Smart-Contracts (Short Paper). Tokenomics 2020: 13:1-13:5
2010 – 2019
- 2019
- [c7]Nour El Madhoun, Julien Hatin, Emmanuel Bertin:
Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications? CSNet 2019: 21-27 - [c6]Nour El Madhoun, Emmanuel Bertin, Guy Pujolle:
The EMV Payment System: Is It Reliable? CSNet 2019: 80-85 - 2018
- [c5]Nour El Madhoun, Emmanuel Bertin, Guy Pujolle:
For Small Merchants: A Secure Smartphone-Based Architecture to Process and Accept NFC Payments. TrustCom/BigDataSE 2018: 403-411 - 2017
- [c4]Nour El Madhoun, Emmanuel Bertin:
Magic always comes with a price: Utility versus security for bank cards. CSNet 2017: 1-7 - 2016
- [c3]Nour El Madhoun, Guy Pujolle:
Security Enhancements in EMV Protocol for NFC Mobile Payment. Trustcom/BigDataSE/ISPA 2016: 1889-1895 - 2015
- [c2]Nour El Madhoun, Fouad Amine Guenane, Guy Pujolle:
A cloud-based secure authentication protocol for contactless-NFC payment. CloudNet 2015: 328-330 - 2014
- [c1]Nour El Madhoun, Fouad Amine Guenane:
An innovative cloud-based RFID traceability architecture and service. NOF 2014: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-21 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint