Security analysis of drones systems: Attacks, limitations, and recommendations JP Yaacoub, H Noura, O Salman, A Chehab Internet of Things 11 (2542-6605), 100218, 2020 | 554 | 2020 |
Cyber-physical systems security: Limitations, issues and future trends JPA Yaacoub, O Salman, HN Noura, N Kaaniche, A Chehab, M Malli Microprocessors and microsystems 77, 103201, 2020 | 389 | 2020 |
Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures E Ben Hamida, H Noura, W Znaidi Electronics 4 (3), 380-423, 2015 | 263 | 2015 |
Securing internet of medical things systems: Limitations, issues and recommendations JPA Yaacoub, M Noura, HN Noura, O Salman, E Yaacoub, R Couturier, ... Future Generation Computer Systems 105, 581-606, 2020 | 233 | 2020 |
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations JPA Yaacoub, H Noura, O Salman, A Chehab International Journal of Information Security, 1--44, 2021 | 182 | 2021 |
A user-centric data protection method for cloud storage based on invertible DWT H Qiu, H Noura, M Qiu, Z Ming, G Memmi IEEE Transactions on Cloud Computing 9 (4), 1293-1304, 2019 | 126 | 2019 |
One round cipher algorithm for multimedia IoT devices H Noura, A Chehab, L Sleem, M Noura, R Couturier, MM Mansour Multimedia tools and applications 77, 18383-18413, 2018 | 115 | 2018 |
LoRaWAN security survey: Issues, threats and possible mitigation techniques H Noura, T Hatoum, O Salman, JP Yaacoub, A Chehab Internet of Things 12, 100303, 2020 | 106 | 2020 |
An image encryption scheme based on irregularly decimated chaotic maps M Ghebleh, A Kanso, H Noura Signal Processing: Image Communication 29 (5), 618-627, 2014 | 104 | 2014 |
Lightweight multi-factor mutual authentication protocol for IoT devices R Melki, HN Noura, A Chehab International Journal of Information Security 19 (6), 679-694, 2020 | 73 | 2020 |
A survey on OFDM physical layer security R Melki, HN Noura, MM Mansour, A Chehab Physical Communication 32, 1-30, 2019 | 70 | 2019 |
An efficient OFDM-based encryption scheme using a dynamic key approach R Melki, HN Noura, MM Mansour, A Chehab IEEE Internet of Things Journal 6 (1), 361-378, 2018 | 62 | 2018 |
DistLog: A distributed logging scheme for IoT forensics HN Noura, O Salman, A Chehab, R Couturier Ad Hoc Networks 98, 102061, 2020 | 48 | 2020 |
A new efficient lightweight and secure image cipher scheme H Noura, L Sleem, M Noura, MM Mansour, A Chehab, R Couturier Multimedia Tools and Applications 77, 15457-15484, 2018 | 46 | 2018 |
Preserving data security in distributed fog computing H Noura, O Salman, A Chehab, R Couturier Ad Hoc Networks 94, 101937, 2019 | 44 | 2019 |
Overview of Digital Forensics and Anti-Forensics Techniques H Majed, H Noura, A Chehab 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 2020 | 43 | 2020 |
Lightweight stream cipher scheme for resource-constrained IoT devices H Noura, R Couturier, C Pham, A Chehab 2019 International Conference on Wireless and Mobile Computing, Networking …, 2019 | 43 | 2019 |
Design and analyses of efficient chaotic generators for crypto-systems S El Assad, H Noura, I Taralova Advances in Electrical and Electronics Engineering-IAENG Special Edition of …, 2008 | 43 | 2008 |
Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications K Hariss, H Noura, AE Samhat Journal of Information Security and Applications 34, 233-242, 2017 | 40 | 2017 |
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab Internet of Things 19, 100544, 2022 | 36 | 2022 |