Security analysis of drones systems: Attacks, limitations, and recommendations JP Yaacoub, H Noura, O Salman, A Chehab Internet of Things 11 (2542-6605), 100218, 2020 | 646 | 2020 |
Cyber-physical systems security: Limitations, issues and future trends JPA Yaacoub, O Salman, HN Noura, N Kaaniche, A Chehab, M Malli Microprocessors and microsystems 77, 103201, 2020 | 472 | 2020 |
Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures E Ben Hamida, H Noura, W Znaidi Electronics 4 (3), 380-423, 2015 | 280 | 2015 |
Securing internet of medical things systems: Limitations, issues and recommendations JPA Yaacoub, M Noura, HN Noura, O Salman, E Yaacoub, R Couturier, ... Future Generation Computer Systems 105, 581-606, 2020 | 276 | 2020 |
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations JPA Yaacoub, H Noura, O Salman, A Chehab International Journal of Information Security, 1--44, 2021 | 230 | 2021 |
A user-centric data protection method for cloud storage based on invertible DWT H Qiu, H Noura, M Qiu, Z Ming, G Memmi IEEE Transactions on Cloud Computing 9 (4), 1293-1304, 2019 | 132 | 2019 |
LoRaWAN security survey: Issues, threats and possible mitigation techniques H Noura, T Hatoum, O Salman, JP Yaacoub, A Chehab Internet of Things 12, 100303, 2020 | 121 | 2020 |
One round cipher algorithm for multimedia IoT devices H Noura, A Chehab, L Sleem, M Noura, R Couturier, MM Mansour Multimedia tools and applications 77, 18383-18413, 2018 | 121 | 2018 |
An image encryption scheme based on irregularly decimated chaotic maps M Ghebleh, A Kanso, H Noura Signal Processing: Image Communication 29 (5), 618-627, 2014 | 108 | 2014 |
Lightweight multi-factor mutual authentication protocol for IoT devices R Melki, HN Noura, A Chehab International Journal of Information Security 19 (6), 679-694, 2020 | 79 | 2020 |
A survey on OFDM physical layer security R Melki, HN Noura, MM Mansour, A Chehab Physical Communication 32, 1-30, 2019 | 74 | 2019 |
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab Internet of Things and Cyber-Physical Systems 3, 280-308, 2023 | 72 | 2023 |
An efficient OFDM-based encryption scheme using a dynamic key approach R Melki, HN Noura, MM Mansour, A Chehab IEEE Internet of Things Journal 6 (1), 361-378, 2018 | 63 | 2018 |
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab Internet of Things 19, 100544, 2022 | 52 | 2022 |
DistLog: A distributed logging scheme for IoT forensics HN Noura, O Salman, A Chehab, R Couturier Ad Hoc Networks 98, 102061, 2020 | 52 | 2020 |
Overview of Digital Forensics and Anti-Forensics Techniques H Majed, H Noura, A Chehab 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 2020 | 50 | 2020 |
Preserving data security in distributed fog computing H Noura, O Salman, A Chehab, R Couturier Ad Hoc Networks 94, 101937, 2019 | 49 | 2019 |
A new efficient lightweight and secure image cipher scheme H Noura, L Sleem, M Noura, MM Mansour, A Chehab, R Couturier Multimedia Tools and Applications 77, 15457-15484, 2018 | 47 | 2018 |
Security of Power Line Communication systems: Issues, limitations and existing solutions JPA Yaacoub, J Hernandez Fernandez, HN Noura, A Chehab Computer Science Review 39, 2021 | 45 | 2021 |
Lightweight stream cipher scheme for resource-constrained IoT devices H Noura, R Couturier, C Pham, A Chehab 2019 International Conference on Wireless and Mobile Computing, Networking …, 2019 | 45 | 2019 |