SAMOVAR - SAMOVAR
Telecom SudParis
9 rue Charles Fourier
91011 EVRY CEDEX

Fax : +33 (0) 1 60 76 20 80

Badis Hammi

Maître de Conférences
SCN

Article dans une revue

2023

ref_biblio
Badis Hammi, Sherali Zeadally, Alfredo Perez. Non fungible tokens : a review. IEEE Internet of Things Magazine, 2023, 6 (1), pp.46-50. ⟨10.1109/IOTM.001.2200244⟩. ⟨hal-04401093⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04401093/file/Non_Fungible_Tokens_A_review.pdf BibTex
ref_biblio
Badis Hammi, Sherali Zeadally. Software supply-chain security: issues and countermeasures. Computer, 2023, 56 (7), pp.54-66. ⟨10.1109/MC.2023.3273491⟩. ⟨hal-04400976⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400976/file/main.pdf BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Jamel Nebhen. Security threats, countermeasures, and challenges of digital supply chains. ACM Computing Surveys, 2023, 55 (14s), pp.1-40. ⟨10.1145/3588999⟩. ⟨hal-04401069⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04401069/file/Security_threats_countermeasures_and_challenges_of_digital_supply_chains.pdf BibTex

2022

ref_biblio
Badis Hammi, Jean-Philippe Monteuuis, Jonathan Petit. PKIs in C-ITS: Security functions, architectures and projects: A survey. Vehicular Communications, 2022, 38, pp.100531. ⟨10.1016/j.vehcom.2022.100531⟩. ⟨hal-04400865⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400865/file/PKIs_in_C_ITS_security_functions_architectures_and_projects_a_survey.pdf BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Survey on smart homes: Vulnerabilities, risks, and countermeasures. Computers & Security, 2022, 117, pp.102677. ⟨10.1016/j.cose.2022.102677⟩. ⟨hal-03860307⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Yves Christian Elloh Adja, Manlio Del Giudice, Jamel Nebhen. Blockchain-Based Solution for Detecting and Preventing Fake Check Scams. IEEE Transactions on Engineering Management, 2022, 69 (6), pp.3710-3725. ⟨10.1109/TEM.2021.3087112⟩. ⟨hal-04400815⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400815/file/Blockchain%20Based%20Solution%20For%20Detecting_and_Preventing_Fake_Check_Scams.pdf BibTex
ref_biblio
Badis Hammi, Yacine Mohamed Idir, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Transactions on Intelligent Transportation Systems, 2022, 23 (10), pp.18273-18287. ⟨10.1109/TITS.2022.3165513⟩. ⟨hal-03860322⟩
Accès au bibtex
BibTex

2021

ref_biblio
Elloh Yves Christian Adja, Badis Hammi, Ahmed Serhrouchni, Sherali Zeadally. A blockchain-based certificate revocation management and status verification system. Computers & Security, 2021, 104, pp.102209. ⟨10.1016/j.cose.2021.102209⟩. ⟨hal-03295357⟩
Accès au bibtex
BibTex

2020

ref_biblio
Badis Hammi, Achraf Fayad, Rida Khatoun, Sherali Zeadally. A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Systems Journal, 2020, ⟨10.1109/JSYST.2020.2970167⟩. ⟨hal-02491845⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Houda Labiod, Rida Khatoun, Youcef Begriche, et al.. A Secure Multipath Reactive Protocol for Routing in IoT and HANETs. Ad Hoc Networks, 2020, pp.102118. ⟨10.1016/j.adhoc.2020.102118⟩. ⟨hal-02491851⟩
Accès au bibtex
BibTex

2018

ref_biblio
Rémi Cogranne, Guillaume Doyen, Nisrine Ghadban, Badis Hammi. Detecting Botclouds at Large Scale: A Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments. IEEE Transactions on Network and Service Management, 2018, 15 (1), pp.68-82. ⟨10.1109/tnsm.2017.2785628⟩. ⟨hal-02407678⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02407678/file/RC_TNSM_2018_Botcloud_detection_vPub.pdf BibTex
ref_biblio
Mohamed T. Hammi, Badis Hammi, Patrick Bellot, Ahmed Serhrouchni. Bubbles of Trust: a decentralized Blockchain-based authentication system for IoT. Computers & Security, Elsevier, 2018, pp.15. ⟨hal-02287885⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi. IoT technologies for smart cities. IET Networks, 2018, 7 (1), pp.1-13. ⟨10.1049/iet-net.2017.0163⟩. ⟨hal-02273965⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Rida Khatoun. An empirical investigation of botnet as a service for cyberattacks. Transactions on emerging telecommunications technologies, 2018, 30 (3), pp.e3537. ⟨10.1002/ett.3537⟩. ⟨hal-02364360⟩
Accès au bibtex
BibTex

2017

ref_biblio
Badis Hammi, Houda Labiod, Gérard Segarra, Alain Servel, Jean-Philippe Monteuuis. CAM-Infrastructure: a novel solution for service advertise- ment in Cooperative Intelligent Transportation Systems. Advances in Science, Technology and Engineering Systems Journal, 2017, 2 (3), pp.1422-1431. ⟨10.25046/aj0203178⟩. ⟨hal-02287687⟩
Accès au bibtex
BibTex

Communication dans un congrès

2024

ref_biblio
Nour El Madhoun, Badis Hammi. Blockchain technology in the healthcare sector: overview and security analysis. 2024 IEEE 14th annual computing and communication workshop and conference (CCWC), Jan 2024, Las vegas, NV (US), United States. ⟨10.1109/CCWC60891.2024.10427731⟩. ⟨hal-04402381⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04402381/file/Version%20Auteur%20IEEE%20CCWC%202024.pdf BibTex
ref_biblio
Nour El Madhoun, Badis Hammi, Saad El Jaouhari, Djamel Mesbah, Elsi Ahmadieh. Addressing security challenges in copyright management applications : the blockchain perspective. Barolli, L. (eds) Advanced Information Networking and Applications (AINA), Apr 2024, Kitakyushu, Japan. pp.169-182, ⟨10.1007/978-3-031-57942-4_18⟩. ⟨hal-04690838⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04690838/file/main.pdf BibTex
ref_biblio
Badis Hammi, Joel Hachem, Ali Rachini, Rida Khatoun. Malware detection through windows system call analysis. 9th International Conference On Mobile And Secure Services (MOBISECSERV), Nov 2024, Miami, United States. pp.7. ⟨hal-04739413⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04739413/file/main.pdf BibTex
ref_biblio
Badis Hammi, Tristan Billot, Danyil Bazain, Nicolas Binand, Maxime Jaen, et al.. An end-to-end approach for the detection of phishing attacks. Advanced Information Networking and Applications (AINA), Apr 2024, Kitakyushu, Japan. pp.314-325, ⟨10.1007/978-3-031-57916-5_27⟩. ⟨hal-04580467⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04580467/file/hammi.24.aina.pdf BibTex
ref_biblio
Mathias Kautz, Badis Hammi, Joaquin Garcia-Alfaro. Platelet : pioneering security and privacy compliant simulation for intelligent transportation systems and V2X. The 22nd IEEE International Symposium on Network Computing and Applications (NCA 2024), Oct 2024, CEUB, Bertinoro (FC), Italy. pp.7. ⟨hal-04739382⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04739382/file/Main.pdf BibTex

2022

ref_biblio
Tristan Bilot, Grégoire Geis, Badis Hammi. PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks. 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, France. pp.428-435, ⟨10.5220/0011328600003283⟩. ⟨hal-04401167⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04401167/file/PhishGNN_A_Phishing_Website_Detection_Framework_using_Graph_Neural_Networks.pdf BibTex
ref_biblio
Badis Hammi, Mohamed Yacine Idir, Rida Khatoun. A machine learning based approach for the detection of sybil attacks in C-ITS. 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Sep 2022, Takamatsu, Japan. pp.1-4, ⟨10.23919/APNOMS56106.2022.9919991⟩. ⟨hal-03860326⟩
Accès au bibtex
BibTex

2019

ref_biblio
Achraf Fayad, Rida Khatoun, Badis Hammi, Ahmed Serhrouchni. A Blockchain-based Lightweight Authentication Solution for IoT. Cyber Security in Networking, Oct 2019, Quito, Ecuador. ⟨hal-02364380⟩
Accès au bibtex
BibTex

2018

ref_biblio
Elloh Yves Christian Adja, Badis Hammi, Ahmed Serhrouchni, Houda Labiod. Total Eclipse: How To Completely Isolate a Bitcoin Peer. 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), Oct 2018, Shanghai, China. pp.1-7, ⟨10.1109/SSIC.2018.8556790⟩. ⟨hal-03295356⟩
Accès au bibtex
BibTex
ref_biblio
Achraf Fayad, Badis Hammi, Rida Khatoun. An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach. 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), Oct 2018, Shanghai, China. pp.1-7, ⟨10.1109/SSIC.2018.8556668⟩. ⟨hal-04401199⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04401199/file/An_adaptive_authentication_and_authorization_scheme_for_IoT_s_gateways_a_blockchain_based_approach.pdf BibTex

2017

ref_biblio
Badis Hammi, Jean-Philippe Monteuuis, Houda Labiod, Rida Khatoun, Ahmed Serhrouchni. Using Butterfly Keys: a Performance Study of Pseudonym Certificates Requests in C-ITS. 1st Cyber Security in Networking Conference, Oct 2017, Rio de Janeiro, Brazil. ⟨hal-02287689⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Jean Philippe Monteuuis, Eduardo Salles Daniel, Houda Labiod. ASN.1 Specification for ETSI Certificates and Encoding Performance Study. 2017 18th IEEE International Conference on Mobile Data Management (MDM), May 2017, Daejeon, South Korea. pp.291-298, ⟨10.1109/MDM.2017.47⟩. ⟨hal-04401213⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04401213/file/ASN1_specification_for_ETSI_certificates_and_encoding_performance_study.pdf BibTex
ref_biblio
Houda Labiod, Alain Servel, Gérard Segarra, Badis Hammi, Jean-Philippe Monteuuis. Proposal of new solution for service advertisement for ETSI ITS environments: CAM-Infrastructure. the 8th IFIP International Conference on New Technologies, Mobility and Security, 2017, Larnaca, Cyprus. pp.1-4. ⟨hal-02287542⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Philippe Monteuuis, Badis Hammi, Eduardo Salles Daniel, Houda Labiod, Rémi Blancher, et al.. Securing PKI Requests for C-ITS systems. 3rd International Workshop on Vehicular Networking and Intelligent Transportation Systems. Held within the 26th International Conference on Computer Communications and Networks (ICCCN 2017), Aug 2017, Vancouver, Canada. ⟨hal-02287688⟩
Accès au bibtex
BibTex

2016

ref_biblio
Badis Hammi, M-C Rahal, R. Khatoun. Clustering methods comparison: application to source based detection of botclouds. The second International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC'2016), Aug 2016, Paris, France. ⟨hal-02287423⟩
Accès au bibtex
BibTex

2015

ref_biblio
Hammi Badis, Guillaume Doyen, Rida Khatoun. A collaborative approach for a source based detection of botclouds. 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), May 2015, Ottawa, France. pp.906-909, ⟨10.1109/INM.2015.7140406⟩. ⟨hal-02342672⟩
Accès au bibtex
BibTex

2014

ref_biblio
Hammi Badis, Guillaume Doyen, Rida Khatoun. Toward a Source Detection of Botclouds: A PCA-Based Approach. 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.105-117, ⟨10.1007/978-3-662-43862-6_13⟩. ⟨hal-01401295⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-01401295/file/978-3-662-43862-6_13_Chapter.pdf BibTex
ref_biblio
Hammi Badis, Guillaume Doyen, Rida Khatoun. Understanding botclouds from a system perspective: A principal component analysis. NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium, May 2014, Krakow, France. pp.1-9, ⟨10.1109/NOMS.2014.6838310⟩. ⟨hal-02342695⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Rida Khatoun, Guillaume Doyen. A Factorial Space for a System-Based Detection of Botcloud Activity. 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), Mar 2014, Dubai, France. pp.1-5, ⟨10.1109/NTMS.2014.6813996⟩. ⟨hal-02342696⟩
Accès au bibtex
BibTex

2013

ref_biblio
Hammi Badis, Rida Khatoun, Guillaume Doyen. Caractérisation des attaques DDoS générées par un Botcloud. 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR SSI), Sep 2013, Mont de Marsan, France. ⟨hal-02611041⟩
Accès au bibtex
BibTex

Thèse

2015

ref_biblio
Badis Hammi. Vers une détection à la source des activités malveillantes dans les clouds publics : application aux attaques de déni de service. Cryptographie et sécurité [cs.CR]. Université de Technologie de Troyes, 2015. Français. ⟨NNT : 2015TROY0023⟩. ⟨tel-03361064⟩
Accès au texte intégral et bibtex
https://theses.hal.science/tel-03361064/file/Badis_Hammi_2015TROY0023.pdf BibTex