Follow
Yasmine Harbi
Yasmine Harbi
Université Ferhat Abbas Sétif1 (Associate professor)
Verified email at univ-setif.dz
Title
Cited by
Cited by
Year
A review of security in internet of things
Y Harbi, Z Aliouat, S Harous, A Bentaleb, A Refoufi
Wireless Personal Communications 108, 325-344, 2019
912019
Enhanced authentication and key management scheme for securing data transmission in the internet of things
Y Harbi, Z Aliouat, A Refoufi, S Harous, A Bentaleb
Ad Hoc Networks 94, 101948, 2019
832019
Recent security trends in internet of things: A comprehensive survey
Y Harbi, Z Aliouat, A Refoufi, S Harous
IEEE Access 9, 113292-113314, 2021
822021
Hybrid deep learning-based intrusion detection system for industrial internet of things
A Khacha, R Saadouni, Y Harbi, Z Aliouat
2022 5th International Symposium on Informatics and its Applications (ISIA), 1-6, 2022
332022
A systematic literature review of blockchain technology for Internet of Drones security
Y Harbi, K Medani, C Gherbi, O Senouci, Z Aliouat, S Harous
Arabian Journal for Science and Engineering 48 (2), 1053-1074, 2023
192023
Secure data transmission scheme based on elliptic curve cryptography for internet of things
Y Harbi, Z Aliouat, S Harous, A Bentaleb
Modelling and Implementation of Complex Systems: Proceedings of the 5th …, 2019
182019
Blockchain for internet of vehicles security
A Herbadji, H Goumidi, Y Harbi, K Medani, Z Aliouat
Blockchain for cybersecurity and privacy, 159-197, 2020
142020
Improved bio-inspired security scheme for privacy-preserving in the internet of things
Y Harbi, A Refoufi, Z Aliouat, S Harous
Peer-to-Peer Networking and Applications 15 (6), 2488-2502, 2022
122022
Machine learning‐based clustering protocols for Internet of Things networks: An overview
M Merah, Z Aliouat, Y Harbi, MS Batta
International Journal of Communication Systems 36 (10), e5487, 2023
112023
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
R Saadouni, C Gherbi, Z Aliouat, Y Harbi, A Khacha
Cluster Computing, 1-27, 2024
102024
A systematic literature review of machine learning applications in IoT
C Gherbi, O Senouci, Y Harbi, K Medani, Z Aliouat
International Journal of Communication Systems 36 (11), e5500, 2023
102023
Efficient end-to-end security scheme for privacy-preserving in iot
Y Harbi, Z Aliouat, A Refoufi, S Harous
2019 International Conference on Networking and Advanced Systems (ICNAS), 1-6, 2019
82019
Enhancement of iot applications dependability using bayesian networks
Y Harbi, Z Aliouat, S Hammoudi
Computational Intelligence and Its Applications: 6th IFIP TC 5 International …, 2018
62018
Robust Intrusion Detection for IoT Networks: an Integrated CNN-LSTM-GRU Approach
A Khacha, R Saadouni, Y Harbi, C Gherbi, S Harous, Z Aliouat
2023 International Conference on Networking and Advanced Systems (ICNAS), 1-6, 2023
52023
Secure IIoT networks with hybrid CNN-GRU model using Edge-IIoTset
R Saadouni, A Khacha, Y Harbi, C Gherbi, S Harous, Z Aliouat
2023 15th International Conference on Innovations in Information Technology …, 2023
42023
Security in internet of things
Y Harbi
42021
Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment
Y Harbi, Z Aliouat, S Harous, AM Gueroui
Computer Communications 221, 90-105, 2024
22024
Fog computing security and privacy for internet of things (iot) and industrial internet of things (iiot) applications: State of the art
Y Harbi, Z Aliouat, S Harous
Security Issues in Fog Computing from 5G to 6G: Architectures, Applications …, 2022
22022
Securing smart agriculture networks using bio-inspired feature selection and transfer learning for effective image-based intrusion detection
R Saadouni, C Gherbi, Z Aliouat, Y Harbi, A Khacha, H Mabed
Internet of Things 29, 101422, 2025
2025
Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review
A Khacha, Z Aliouat, Y Harbi, C Gherbi, R Saadouni, S Harous
Computers and Electrical Engineering 120, 109725, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20