{"id":6356,"date":"2023-10-11T17:04:04","date_gmt":"2023-10-11T15:04:04","guid":{"rendered":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/acmes-2\/badis-hammi-translated\/"},"modified":"2023-10-11T17:04:04","modified_gmt":"2023-10-11T15:04:04","slug":"badis-hammi-translated","status":"publish","type":"page","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/en\/acmes-2\/badis-hammi-translated\/","title":{"rendered":"Badis HAMMI (translated)"},"content":{"rendered":"<p><div class=\"bandeau-personnel MonLaboUser\"><img decoding=\"async\" src=\"https:\/\/samovar.telecom-sudparis.eu\/wp-content\/uploads\/2025\/02\/badis-150x150.jpg\" class=\"wp-image-6 alignleft img-arrondi wp-post-image\" height=\"150\" width=\"150\" alt=\" \" \/><div class=\"adresse\"><p>SAMOVAR - SAMOVAR<br \/>Telecom SudParis<br \/>\r\n9 rue Charles Fourier<br \/>\r\n91011 EVRY CEDEX<\/p><p>Fax : +33 (0) 1 60 76 20 80<\/p><\/div><div class=\"monlaboBlocTexte\"><h1>Badis <span class=\"MonLabo-lastname\">Hammi<\/span><\/h1><div class=\"coordonnees\"><em>Ma\u00eetre de Conf\u00e9rences<\/em><br \/><span class=\"team-description\"><a href=\"https:\/\/samovar.telecom-sudparis.eu\/?page_id=3997\" class=\"MonLaboLink\"><span class=\"MonLabo_team_name\">SCN<\/span><\/a><\/span><\/div><\/div><\/div>\n<div id=\"res_script\">\n<p class='Rubrique'>Article dans une revue<\/p>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Sherali Zeadally, Alfredo Perez. Non fungible tokens : a review. <i>IEEE Internet of Things Magazine<\/i>, 2023, 6 (1), pp.46-50. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/IOTM.001.2200244\">&#x27E8;10.1109\/IOTM.001.2200244&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04401093v1\">&#x27E8;hal-04401093&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04401093\/file\/Non_Fungible_Tokens_A_review.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04401093\/file\/Non_Fungible_Tokens_A_review.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04401093\/file\/Non_Fungible_Tokens_A_review.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04401093v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Sherali Zeadally. Software supply-chain security: issues and countermeasures. <i>Computer<\/i>, 2023, 56 (7), pp.54-66. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/MC.2023.3273491\">&#x27E8;10.1109\/MC.2023.3273491&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04400976v1\">&#x27E8;hal-04400976&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04400976\/file\/main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04400976\/file\/main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04400976\/file\/main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04400976v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Sherali Zeadally, Jamel Nebhen. Security threats, countermeasures, and challenges of digital supply chains. <i>ACM Computing Surveys<\/i>, 2023, 55 (14s), pp.1-40. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3588999\">&#x27E8;10.1145\/3588999&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04401069v1\">&#x27E8;hal-04401069&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04401069\/file\/Security_threats_countermeasures_and_challenges_of_digital_supply_chains.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04401069\/file\/Security_threats_countermeasures_and_challenges_of_digital_supply_chains.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04401069\/file\/Security_threats_countermeasures_and_challenges_of_digital_supply_chains.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04401069v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Survey on smart homes: Vulnerabilities, risks, and countermeasures. <i>Computers & Security<\/i>, 2022, 117, pp.102677. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2022.102677\">&#x27E8;10.1016\/j.cose.2022.102677&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03860307v1\">&#x27E8;hal-03860307&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03860307v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Jean-Philippe Monteuuis, Jonathan Petit. PKIs in C-ITS: Security functions, architectures and projects: A survey. <i>Vehicular Communications<\/i>, 2022, 38, pp.100531. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.vehcom.2022.100531\">&#x27E8;10.1016\/j.vehcom.2022.100531&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04400865v1\">&#x27E8;hal-04400865&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04400865\/file\/PKIs_in_C_ITS_security_functions_architectures_and_projects_a_survey.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04400865\/file\/PKIs_in_C_ITS_security_functions_architectures_and_projects_a_survey.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04400865\/file\/PKIs_in_C_ITS_security_functions_architectures_and_projects_a_survey.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04400865v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Sherali Zeadally, Yves Christian Elloh Adja, Manlio Del Giudice, Jamel Nebhen. Blockchain-Based Solution for Detecting and Preventing Fake Check Scams. <i>IEEE Transactions on Engineering Management<\/i>, 2022, 69 (6), pp.3710-3725. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TEM.2021.3087112\">&#x27E8;10.1109\/TEM.2021.3087112&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04400815v1\">&#x27E8;hal-04400815&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04400815\/file\/Blockchain%20Based%20Solution%20For%20Detecting_and_Preventing_Fake_Check_Scams.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04400815\/file\/Blockchain%20Based%20Solution%20For%20Detecting_and_Preventing_Fake_Check_Scams.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04400815\/file\/Blockchain%20Based%20Solution%20For%20Detecting_and_Preventing_Fake_Check_Scams.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04400815v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Yacine Mohamed Idir, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. <i>IEEE Transactions on Intelligent Transportation Systems<\/i>, 2022, 23 (10), pp.18273-18287. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TITS.2022.3165513\">&#x27E8;10.1109\/TITS.2022.3165513&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03860322v1\">&#x27E8;hal-03860322&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03860322v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Elloh Yves Christian Adja, Badis Hammi, Ahmed Serhrouchni, Sherali Zeadally. A blockchain-based certificate revocation management and status verification system. <i>Computers & Security<\/i>, 2021, 104, pp.102209. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2021.102209\">&#x27E8;10.1016\/j.cose.2021.102209&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-03295357v1\">&#x27E8;hal-03295357&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-03295357v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Achraf Fayad, Rida Khatoun, Sherali Zeadally. A lightweight ECC-based authentication scheme for Internet of Things (IoT). <i>IEEE Systems Journal<\/i>, 2020, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/JSYST.2020.2970167\">&#x27E8;10.1109\/JSYST.2020.2970167&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02491845v1\">&#x27E8;hal-02491845&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02491845v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Sherali Zeadally, Houda Labiod, Rida Khatoun, Youcef Begriche, et al.. A Secure Multipath Reactive Protocol for Routing in IoT and HANETs. <i>Ad Hoc Networks<\/i>, 2020, pp.102118. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.adhoc.2020.102118\">&#x27E8;10.1016\/j.adhoc.2020.102118&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02491851v1\">&#x27E8;hal-02491851&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02491851v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">R\u00e9mi Cogranne, Guillaume Doyen, Nisrine Ghadban, Badis Hammi. Detecting Botclouds at Large Scale: A Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments. <i>IEEE Transactions on Network and Service Management<\/i>, 2018, 15 (1), pp.68-82. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/tnsm.2017.2785628\">&#x27E8;10.1109\/tnsm.2017.2785628&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02407678v1\">&#x27E8;hal-02407678&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02407678\/file\/RC_TNSM_2018_Botcloud_detection_vPub.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02407678\/file\/RC_TNSM_2018_Botcloud_detection_vPub.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02407678\/file\/RC_TNSM_2018_Botcloud_detection_vPub.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02407678v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mohamed T. Hammi, Badis Hammi, Patrick Bellot, Ahmed Serhrouchni. Bubbles of Trust: a decentralized Blockchain-based authentication system for IoT. <i>Computers & Security, Elsevier<\/i>, 2018, pp.15. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02287885v1\">&#x27E8;hal-02287885&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02287885v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi. IoT technologies for smart cities. <i>IET Networks<\/i>, 2018, 7 (1), pp.1-13. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1049\/iet-net.2017.0163\">&#x27E8;10.1049\/iet-net.2017.0163&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/utt.hal.science\/hal-02273965v1\">&#x27E8;hal-02273965&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/utt.hal.science\/hal-02273965v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Sherali Zeadally, Rida Khatoun. An empirical investigation of botnet as a service for cyberattacks. <i>Transactions on emerging telecommunications technologies<\/i>, 2018, 30 (3), pp.e3537. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/ett.3537\">&#x27E8;10.1002\/ett.3537&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02364360v1\">&#x27E8;hal-02364360&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02364360v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Houda Labiod, G\u00e9rard Segarra, Alain Servel, Jean-Philippe Monteuuis. CAM-Infrastructure: a novel solution for service advertise- ment in Cooperative Intelligent Transportation Systems. <i>Advances in Science, Technology and Engineering Systems Journal<\/i>, 2017, 2 (3), pp.1422-1431. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.25046\/aj0203178\">&#x27E8;10.25046\/aj0203178&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02287687v1\">&#x27E8;hal-02287687&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02287687v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Communication dans un congr\u00e8s<\/p>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nour El Madhoun, Badis Hammi. Blockchain technology in the healthcare sector: overview and security analysis. <i>2024 IEEE 14th annual computing and communication workshop and conference (CCWC)<\/i>, Jan 2024, Las vegas, NV (US), United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCWC60891.2024.10427731\">&#x27E8;10.1109\/CCWC60891.2024.10427731&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04402381v1\">&#x27E8;hal-04402381&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04402381\/file\/Version%20Auteur%20IEEE%20CCWC%202024.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04402381\/file\/Version%20Auteur%20IEEE%20CCWC%202024.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04402381\/file\/Version%20Auteur%20IEEE%20CCWC%202024.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04402381v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nour El Madhoun, Badis Hammi, Saad El Jaouhari, Djamel Mesbah, Elsi Ahmadieh. Addressing security challenges in\u00a0copyright management applications : the blockchain perspective. <i>Advanced Information Networking and Applications (AINA)<\/i>, Apr 2024, Kitakyushu, Japan. pp.169-182, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-57942-4_18\">&#x27E8;10.1007\/978-3-031-57942-4_18&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04690838v1\">&#x27E8;hal-04690838&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04690838\/file\/main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04690838\/file\/main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04690838\/file\/main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04690838v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Joel Hachem, Ali Rachini, Rida Khatoun. Malware detection through windows system call analysis. <i>9th International Conference On Mobile And Secure Services (MOBISECSERV)<\/i>, Nov 2024, Miami, United States. pp.7. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04739413v1\">&#x27E8;hal-04739413&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04739413\/file\/main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04739413\/file\/main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04739413\/file\/main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04739413v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Joel Hachem, Ali Rachini, Rida Khatoun, Hassane Aissaoui. Malware detection through windows system call analysis. <i>2024 Ninth International Conference On Mobile And Secure Services (MobiSecServ)<\/i>, Nov 2024, Miami Beach, United States. pp.1-7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/MobiSecServ63327.2024.10759991\">&#x27E8;10.1109\/MobiSecServ63327.2024.10759991&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04811244v1\">&#x27E8;hal-04811244&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04811244v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Tristan Bilot, Danyil Bazain, Nicolas Binand, Maxime Jaen, et al.. An end-to-end approach for the detection of phishing attacks. <i>Advanced Information Networking and Applications (AINA)<\/i>, Apr 2024, Kitakyushu, Japan. pp.314-325, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-57916-5_27\">&#x27E8;10.1007\/978-3-031-57916-5_27&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04580467v1\">&#x27E8;hal-04580467&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04580467\/file\/hammi.24.aina.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04580467\/file\/hammi.24.aina.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04580467\/file\/hammi.24.aina.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04580467v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mathias Kautz, Badis Hammi, Joaquin Garcia-Alfaro. Platelet : pioneering security and privacy compliant simulation for intelligent transportation systems and V2X. <i>The 22nd IEEE International Symposium on Network Computing and Applications (NCA 2024)<\/i>, Oct 2024, CEUB, Bertinoro (FC), Italy. pp.7. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04739382v1\">&#x27E8;hal-04739382&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04739382\/file\/Main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04739382\/file\/Main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04739382\/file\/Main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04739382v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Tristan Bilot, Gr\u00e9goire Geis, Badis Hammi. PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks. <i>19th International Conference on Security and Cryptography<\/i>, Jul 2022, Lisbon, France. pp.428-435, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0011328600003283\">&#x27E8;10.5220\/0011328600003283&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04401167v1\">&#x27E8;hal-04401167&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04401167\/file\/PhishGNN_A_Phishing_Website_Detection_Framework_using_Graph_Neural_Networks.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04401167\/file\/PhishGNN_A_Phishing_Website_Detection_Framework_using_Graph_Neural_Networks.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04401167\/file\/PhishGNN_A_Phishing_Website_Detection_Framework_using_Graph_Neural_Networks.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04401167v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Mohamed Yacine Idir, Rida Khatoun. A machine learning based approach for the detection of sybil attacks in C-ITS. <i>2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS)<\/i>, Sep 2022, Takamatsu, Japan. pp.1-4, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.23919\/APNOMS56106.2022.9919991\">&#x27E8;10.23919\/APNOMS56106.2022.9919991&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03860326v1\">&#x27E8;hal-03860326&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03860326v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Achraf Fayad, Rida Khatoun, Badis Hammi, Ahmed Serhrouchni. A Blockchain-based Lightweight Authentication Solution for IoT. <i>Cyber Security in Networking<\/i>, Oct 2019, Quito, Ecuador. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02364380v1\">&#x27E8;hal-02364380&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02364380v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Elloh Yves Christian Adja, Badis Hammi, Ahmed Serhrouchni, Houda Labiod. Total Eclipse: How To Completely Isolate a Bitcoin Peer. <i>2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)<\/i>, Oct 2018, Shanghai, China. pp.1-7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SSIC.2018.8556790\">&#x27E8;10.1109\/SSIC.2018.8556790&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-03295356v1\">&#x27E8;hal-03295356&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-03295356v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Achraf Fayad, Badis Hammi, Rida Khatoun. An adaptive authentication and authorization scheme for IoT\u2019s gateways: a blockchain based approach. <i>2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)<\/i>, Oct 2018, Shanghai, China. pp.1-7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SSIC.2018.8556668\">&#x27E8;10.1109\/SSIC.2018.8556668&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04401199v1\">&#x27E8;hal-04401199&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04401199\/file\/An_adaptive_authentication_and_authorization_scheme_for_IoT_s_gateways_a_blockchain_based_approach.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04401199\/file\/An_adaptive_authentication_and_authorization_scheme_for_IoT_s_gateways_a_blockchain_based_approach.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04401199\/file\/An_adaptive_authentication_and_authorization_scheme_for_IoT_s_gateways_a_blockchain_based_approach.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04401199v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Jean-Philippe Monteuuis, Houda Labiod, Rida Khatoun, Ahmed Serhrouchni. Using Butterfly Keys: a Performance Study of Pseudonym Certificates Requests in C-ITS. <i>1st Cyber Security in Networking Conference<\/i>, Oct 2017, Rio de Janeiro, Brazil. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02287689v1\">&#x27E8;hal-02287689&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02287689v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Jean Philippe Monteuuis, Eduardo Salles Daniel, Houda Labiod. ASN.1 Specification for ETSI Certificates and Encoding Performance Study. <i>2017 18th IEEE International Conference on Mobile Data Management (MDM)<\/i>, May 2017, Daejeon, South Korea. pp.291-298, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/MDM.2017.47\">&#x27E8;10.1109\/MDM.2017.47&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04401213v1\">&#x27E8;hal-04401213&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04401213\/file\/ASN1_specification_for_ETSI_certificates_and_encoding_performance_study.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04401213\/file\/ASN1_specification_for_ETSI_certificates_and_encoding_performance_study.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04401213\/file\/ASN1_specification_for_ETSI_certificates_and_encoding_performance_study.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04401213v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Houda Labiod, Alain Servel, G\u00e9rard Segarra, Badis Hammi, Jean-Philippe Monteuuis. Proposal of new solution for service advertisement for ETSI ITS environments: CAM-Infrastructure. <i>the 8th IFIP International Conference on New Technologies, Mobility and Security<\/i>, 2017, Larnaca, Cyprus. pp.1-4. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02287542v1\">&#x27E8;hal-02287542&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02287542v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jean-Philippe Monteuuis, Badis Hammi, Eduardo Salles Daniel, Houda Labiod, R\u00e9mi Blancher, et al.. Securing PKI Requests for C-ITS systems. <i>3rd International Workshop on Vehicular Networking and Intelligent Transportation Systems. Held within the 26th International Conference on Computer Communications and Networks (ICCCN 2017)<\/i>, Aug 2017, Vancouver, Canada. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02287688v1\">&#x27E8;hal-02287688&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02287688v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, M-C Rahal, R. Khatoun. Clustering methods comparison: application to source based detection of botclouds. <i>The second International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC'2016)<\/i>, Aug 2016, Paris, France. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02287423v1\">&#x27E8;hal-02287423&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02287423v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hammi Badis, Guillaume Doyen, Rida Khatoun. A collaborative approach for a source based detection of botclouds. <i>2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)<\/i>, May 2015, Ottawa, France. pp.906-909, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/INM.2015.7140406\">&#x27E8;10.1109\/INM.2015.7140406&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02342672v1\">&#x27E8;hal-02342672&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02342672v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hammi Badis, Guillaume Doyen, Rida Khatoun. Toward a Source Detection of Botclouds: A PCA-Based Approach. <i>8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS)<\/i>, Jun 2014, Brno, Czech Republic. pp.105-117, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-662-43862-6_13\">&#x27E8;10.1007\/978-3-662-43862-6_13&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01401295v1\">&#x27E8;hal-01401295&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-01401295\/file\/978-3-662-43862-6_13_Chapter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01401295\/file\/978-3-662-43862-6_13_Chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01401295\/file\/978-3-662-43862-6_13_Chapter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01401295v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hammi Badis, Guillaume Doyen, Rida Khatoun. Understanding botclouds from a system perspective: A principal component analysis. <i>NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium<\/i>, May 2014, Krakow, France. pp.1-9, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS.2014.6838310\">&#x27E8;10.1109\/NOMS.2014.6838310&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02342695v1\">&#x27E8;hal-02342695&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02342695v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi, Rida Khatoun, Guillaume Doyen. A Factorial Space for a System-Based Detection of Botcloud Activity. <i>2014 6th International Conference on New Technologies, Mobility and Security (NTMS)<\/i>, Mar 2014, Dubai, France. pp.1-5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2014.6813996\">&#x27E8;10.1109\/NTMS.2014.6813996&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-02342696v1\">&#x27E8;hal-02342696&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-02342696v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hammi Badis, Rida Khatoun, Guillaume Doyen. Caract\u00e9risation des attaques DDoS g\u00e9n\u00e9r\u00e9es par un Botcloud. <i>8\u00e8me Conf\u00e9rence sur la S\u00e9curit\u00e9 des Architectures R\u00e9seaux et des Syst\u00e8mes d'Information (SAR SSI)<\/i>, Sep 2013, Mont de Marsan, France. <a target=\"_blank\" href=\"https:\/\/utt.hal.science\/hal-02611041v1\">&#x27E8;hal-02611041&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/utt.hal.science\/hal-02611041v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Th\u00e8se<\/p>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Badis Hammi. Vers une d\u00e9tection \u00e0 la source des activit\u00e9s malveillantes dans les clouds publics : application aux attaques de d\u00e9ni de service. Cryptographie et s\u00e9curit\u00e9 [cs.CR]. Universit\u00e9 de Technologie de Troyes, 2015. Fran\u00e7ais. <a target=\"_blank\" href=\"https:\/\/www.theses.fr\/2015TROY0023\">&#x27E8;NNT : 2015TROY0023&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/theses.hal.science\/tel-03361064v1\">&#x27E8;tel-03361064&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/theses.hal.science\/tel-03361064\/file\/Badis_Hammi_2015TROY0023.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/theses.hal.science\/tel-03361064\/file\/Badis_Hammi_2015TROY0023.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/theses.hal.science\/tel-03361064\/file\/Badis_Hammi_2015TROY0023.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/theses.hal.science\/tel-03361064v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Pr\u00e9-publication, Document de travail<\/p>\n<p class='SousRubrique'>2026<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khaoula Sghaier, Arslane Hamza-Cherif, Pierre Merdrignac, Ghada Gharbi, Chahrazed Ksouri, et al.. Dual-Path V2N\/V2V OTA Update Distribution for SDVs: Design and Experimental Evaluation. 2026. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05596727v1\">&#x27E8;hal-05596727&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05596727\/file\/SDV_OTA_HAL.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05596727\/file\/SDV_OTA_HAL.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05596727\/file\/SDV_OTA_HAL.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05596727v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khaoula Sghaier, Ghada Gharbi, Badis Hammi, Pierre Merdrignac, Pierre Parrend, et al.. Approche automatis\u00e9e pour l'\u00e9valuation des risques des mises \u00e0 jour OTA dans les v\u00e9hicules d\u00e9finis par logiciel. 2026. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05596796v1\">&#x27E8;hal-05596796&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05596796\/file\/ressi_HAL.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05596796\/file\/ressi_HAL.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05596796\/file\/ressi_HAL.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05596796v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":2438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-6356","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/6356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=6356"}],"version-history":[{"count":0,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/6356\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/2438"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=6356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}