Alghamdi, R., & Bellaïche, M. (2023). An ensemble deep learning based IDS for IoT using Lambda architecture. Cybersecurity, 6(1), 17 pages.
Répertoire des expertises
Bellaïche, Martine

Répertoire des expertises
Bellaïche, Martine
Répertoire des expertises
Publications par type
Article de revue (21)
Communication de conférence (29)
Livre
Chapitre de livre
Brevet
Rapport
Thèse
Ensemble de données
Ressource pédagogique
Image
Enregistrement audio
Enregistrement vidéo
Autre
Martine Bellaïche (50)
- Articles de revue (21)
- 2023
Article de revue Article de revue Alfalqi, K., & Bellaïche, M. (2023). Emergency events detection based on integration of federated learning and active learning. International Journal of Information Technology, 15(6), 2863-2876.
- 2022
Article de revue Alghamdi, R., & Bellaïche, M. (2022). A Cascaded Federated Deep Learning Based Framework For Detecting Wormhole Attacks in IoT Networks. Computers & Security, 125, 17 pages.Article de revue Alfalqi, K., & Bellaïche, M. (2022). An Emergency Event Detection Ensemble Model Based on Big Data. Big Data and Cognitive Computing, 6(2), 18 pages.Article de revue Alghamdi, R., & Bellaïche, M. (2022). Evaluation and Selection Models for Ensemble Intrusion Detection Systems in IoT. IoT, 3(2), 285-314.
- 2021
Article de revue Abbasi, H., Ezzati-Jivan, N., Bellaïche, M., Talhi, C., & Dagenais, M. (2021). The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment. Journal of Hardware and Systems Security, 2021(3-4), 208-222.
- 2020
Article de revue Halabi, T., & Bellaïche, M. (2020). Towards security-based formation of cloud federations: A game theoretical approach. IEEE Transactions on Cloud Computing, 8(3), 928-942.
- 2019
Article de revue Abusitta, A., Bellaïche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems-the International Journal of Escience, 98, 308-318.Article de revue Benbrahim, S.-E., Quintero, A., & Bellaïche, M. (2019). Live Placement of Interdependent Virtual Machines to Optimize Cloud Service Profits and Penalties on SLAs. IEEE Transactions on Cloud Computing, 7(1), 237-249.Article de revue Abbasi, H., Ezzati-Jivan, N., Bellaïche, M., Talhi, C., & Dagenais, M. (2019). Machine learning-based EDoS attack detection technique using execution trace analysis. Journal of Hardware and Systems Security, 3(2), 164-176.Article de revue Abusitta, A., Bellaïche, M., & Dagenais, M. (2019). Multi-cloud cooperative intrusion detection system: trust and fairness assurance. Annals of Telecommunications, 74(9-10), 637-653.
- 2018
Article de revue Halabi, T., & Bellaïche, M. (2018). A broker-based framework for standardization and management of cloud security-SLAs. Computers & Security, 75, 59-71.Article de revue Abusitta, A., Bellaïche, M., & Dagenais, M. (2018). An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment. Journal of Cloud Computing : Advances, Systems and Applications, 7(9), 9 (18 pages).Article de revue Abusitta, A., Bellaïche, M., & Dagenais, M. (2018). On trustworthy federated clouds : a coalitional game approach. Computer Networks, 145, 52-63.
- 2017
Article de revue Bonguet, A., & Bellaïche, M. (2017). A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing. Future Internet, 9(3).Article de revue Halabi, T., & Bellaïche, M. (2017). Towards quantification and evaluation of security of Cloud Service Providers. Journal of Information Security and Applications, 33, 55-65.
- 2016
Article de revue Adegbindin, M., Hertz, A., & Bellaïche, M. (2016). A new efficient RLF-like algorithm for the vertex coloring problem. Yugoslav Journal of Operations Research, 26(4), 441-456.Article de revue Halabi, T., & Bellaïche, M. (2016). How to evaluate the defense against DoS and DDoS attacks in cloud computing: A survey and taxonomy. International Journal of Computer Science and Information Security, 14(12), 30111650 (10 pages).
- 2014
Article de revue Engoulou, R. G., Bellaïche, M., Pierre, S., & Quintero, A. (2014). VANET security surveys. Computer Communications, 44, 1-13.
- 2013
Article de revue Bellaïche, M., & Grégoire, J.-C. (2013). SYN Flooding Attacks: Survey and Evaluation of Defences. Journal of Communications and Networking.
- 2012
Article de revue Bellaïche, M., & Gregoire, J.-C. (2012). SYN flooding attack detection by TCP handshake anomalies. Security and Communication Networks, 5(7), 709-724.
- 2023
- Communications de conférence (29)
- 2024
Communication de conférence Toko, T. M. N. N., Bellaïche, M., & Halabi, T. (mai 2024). A Game-theoretic Approach for DDoS Attack Mitigation in IIoT Deterministic Networking [Communication écrite]. 2024 IEEE Network Operations and Management Symposium (NOMS 2024), Seoul, Republic of Korea (5 pages).Communication de conférence Erfan, F., Bellaïche, M., & Halabi, T. (juillet 2024). Efficient Detection of Selfish Mining Attacks on Large-Scale Blockchain Networks [Communication écrite]. IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C), Cambridge, United Kingdom.
- 2023
Communication de conférence Seifi, S., Beaubrun, R., Bellaïche, M., & Halabi, T. A Study on the Efficiency of Intrusion Detection Systems in IoT Networks [Communication écrite]. 2023 International Conference on Computer, Information and Telecommunication Systems (CITS 2023), Genoa, Italy (8 pages).Communication de conférence Erfan, F., Bellaïche, M., & Halabi, T. (juin 2023). Community Detection Algorithm for Mitigating Eclipse Attacks on Blockchain-enabled Metaverse [Communication écrite]. IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom 2023), Kyoto, Japan.
- 2022
Communication de conférence Erfan, F., Bellaïche, M., & Halabi, T. (août 2022). Game-theoretic Designs for Blockchain-based IoT: Taxonomy and Research Directions [Communication écrite]. IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS 2022), Newark, CA, USA.Communication de conférence Halabi, T., Bellaïche, M., & Fung, B. C. M. (novembre 2022). Towards Adaptive Cybersecurity for Green IoT [Communication écrite]. IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS 2022), Bali, Indonesia.
- 2021
Communication de conférence Alghamdi, R., & Bellaïche, M. (mai 2021). A Deep Intrusion Detection System in Lambda Architecture Based on Edge Cloud Computing for IoT [Communication écrite]. 4th International Conference on Artificial Intelligence and Big Data (ICAIBD 2021), Chengdu, China.Communication de conférence Alfalqi, K., & Bellaïche, M. (mai 2021). IoT-Based Disaster Detection Model Using Social Networks and Machine Learning [Communication écrite]. 4th International Conference on Artificial Intelligence and Big Data (ICAIBD 2021), Chengdu, China.Communication de conférence Yassine, I., Halabi, T., & Bellaïche, M. (décembre 2021). Security risk assessment methodologies in the Internet of Things: Survey and taxonomy [Communication écrite]. 21st IEEE International Conference on Software Quality, Reliability and Security (QRS-C 2021), Hainan, China.
- 2020
Communication de conférence Al Harbi, S., Halabi, T., & Bellaïche, M. (décembre 2020). Fog Computing Security Assessment for Device Authentication in the Internet of Things [Communication écrite]. 22nd IEEE International Conference on High Performance Computing and Communications (HPCC 2020), 8th IEEE International Conference on Smart City (SmartCity 2020), and 6th IEEE International Conference on Data Science and Systems (DSSS 2020), Yanuca Island, Cuvu, Fiji.
- 2019
Communication de conférence Engoulou, R. G., Bellaïche, M., Halabi, T., & Pierre, S. (février 2019). A decentralized reputation management system for securing the internet of vehicles [Communication écrite]. International Conference on Computing, Networking and Communications (ICNC 2019), Honolulu, HI, USA.Communication de conférence Halabi, T., & Bellaïche, M. (juin 2019). Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures [Communication écrite]. IEEE Conference on Communications and Network Security (CNS 2019), Washington, D.C., USA (9 pages).Communication de conférence Halabi, T., Bellaïche, M., & Abusitta, A. (février 2019). Toward secure resource allocation in mobile cloud computing : a matching game [Communication écrite]. International Conference on Computing, Networking and Communications (ICNC 2019), Honolulu, HI, USA.
- 2018
Communication de conférence Bellaïche, M., Abusitta, A., & Halabi, T. (juin 2018). A cooperative game for online cloud federation formation based on security risk assessment [Communication écrite]. 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2018) / 2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom 2018), Shanghai, China.Communication de conférence Abusitta, A., Bellaïche, M., & Dagenais, M. (février 2018). A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments [Communication écrite]. 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN 2018), Paris, France (8 pages).Communication de conférence Halabi, T., Bellaïche, M., & Abusitta, A. (juin 2018). Cloud security up for auction : a DSIC online mechanism for secure IaaS resource allocation [Communication écrite]. Conference on Communications and Network Security (CSNET 2018), Paris, France (6 pages).Communication de conférence Halabi, T., Bellaïche, M., & Abusitta, A. (août 2018). Online allocation of cloud resources based on security satisfaction [Communication écrite]. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering (Trustcom/BigDataSE 2018), New York, N.Y..
- 2017
Communication de conférence Halabi, T., & Bellaïche, M. (janvier 2017). Evaluation and Selection of Cloud Security Services based on Multi-Criteria Analysis MCA [Communication écrite]. International Conference on Computing, Networking and Communications (ICNC 2017), Silicon Valley, CA, USA.Communication de conférence Halabi, T., & Bellaïche, M. (août 2017). Service assignment in federated cloud environments based on multi-objective optimization of security [Communication écrite]. 5th IEEE International Conference on Future Internet of Things and Cloud (FiCloud 2017), Prague, Czech Republic.
- 2014
Communication de conférence Benbrahim, S.-E., Quintero, A., & Bellaïche, M. (septembre 2014). New distributed approach for an autonomous dynamic management of interdependent virtual machines [Communication écrite]. 8th Asia Modelling Symposium (AMS), Taipei, Taiwan.Communication de conférence Benbrahim, S.-E., Quintero, A., & Bellaïche, M. (septembre 2014). New Distributed Approach for an Autonomous Dynamic Management of Interdependent Virtual Machines [Communication écrite]. 17th International Conference on Network-Based Information Systems (NBiS 2014), Salerno, Italy.Communication de conférence Benbrahim, S.-E., Quintero, A., & Bellaïche, M. (septembre 2014). On the design of large-sized cloud networks optimized for live migration using tabu search algorithms [Communication écrite]. 8th Asia International Conference on Mathematical Modelling and Computer Simulation - Asia Modelling Symposium (AMS 2014), Kuala Lumpur, Malaysia.Communication de conférence Benbrahim, S.-E., Quintero, A., & Bellaïche, M. (septembre 2014). Real-time QoS issues in live migration of interdependent virtual machines [Communication écrite]. 8th Asia International Conference on Mathematical Modelling and Computer Simulation - Asia Modelling Symposium (AMS 2014), Kuala Lumpur, Malaysia.
- 2011
Communication de conférence Bellaïche, M., & Gregoire, J.-C. (septembre 2011). Avoiding DDoS with active management of backlog queues [Communication écrite]. 5th International Conference on Network and System Security (NSS 2011), Milan, Italy.Communication de conférence Bellaïche, M., & Gregoire, J.-C. (mai 2011). Stateful or stateless flooding attack detection [Communication écrite]. 7th International Conference on Networking and Services, Venice, Italy.
- 2009
Communication de conférence Bellaïche, M., & Gregoire, J.-C. (juin 2009). Source detection of SYN flooding attacks [Communication écrite]. International Conference on Network and Service Security (N2S 2009), Paris, France (6 pages).Communication de conférence Bellaïche, M., & Grégoire, J.-C. (novembre 2009). SYN Flooding Attack Detection Based on Entropy Computing [Communication écrite]. IEEE Global Telecommunications Conference (GLOBECOM 2009), Honolulu, HI (6 pages). Publié dans GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
- 2008
Communication de conférence Bellaïche, M., & Grégoire, J.-C. (août 2008). Measuring defense systems against flooding attacks [Communication écrite]. International Wireless Communications and Mobile Computing Conference (IWCMC 2008), Crete Island, Greece.
- 2007
Communication de conférence Bellaïche, M., & Gregoire, J.-C. (novembre 2007). SYN flooding attack detection by TCP handshake behaviour observation [Communication écrite]. 2nd IEEE Workshop on Monitoring, Attack Detection and Mitigation (MONAM 2007), Toulouse, France (6 pages).
- 2024