A survey on technical threat intelligence in the age of sophisticated cyber attacks W Tounsi, H Rais Computers & Security, 2017 | 517 | 2017 |
What is Cyber Threat intelligence and How is it Evolving? W Tounsi Cyber-Vigilance and Digital Trust: Cybersecurity in the Era of Cloud …, 2019 | 36 | 2019 |
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks. W Tounsi, J Garcia-Alfaro, N Cuppens-Boulahia, F Cuppens CNSR, 284-291, 2010 | 17 | 2010 |
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems W Tounsi, N Cuppens-Boulahia, J Garcia-Alfaro, Y Chevalier, F Cuppens Journal of Network and Computer Applications 39, 152-166, 2014 | 15 | 2014 |
A survey on Mobile Agent Based Intrusion Detection System S Shiv Shakti, G Nitin, C Saurabh, G Saugata International Symposium on Devices MEMS, Intelligent Systems & Communication …, 2011 | 12* | 2011 |
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform W Tounsi, N Cuppens-Boulahia, F Cuppens, G Pujolle World Wide Web Journal, 2015 | 11 | 2015 |
Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT W Tounsi John Wiley & Sons, 2019 | 10 | 2019 |
Fine-grained privacy control for the RFID middleware of EPCglobal networks W Tounsi, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro 5th International Conference on Management of Emergent Digital EcoSystems, 60-67, 2013 | 8 | 2013 |
Cyber deception, the ultimate piece of a defensive strategy-proof of concept W Tounsi 2022 6th Cyber Security in Networking Conference (CSNet), 1-5, 2022 | 7 | 2022 |
Formal verification of a key establishment protocol for EPC gen2 RFID systems: work in progress W Tounsi, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro Foundations and Practice of Security / http://dl.acm.org/citation.cfm?id …, 2011 | 6 | 2011 |
Privacy-enhanced filtering and collection middleware in epcglobal networks W Tounsi, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro 2013 International Conference on Risks and Security of Internet and Systems …, 2013 | 5 | 2013 |
Cybervigilance et confiance numérique: La cybersécurité à l’ère du Cloud et des objets connectés W Tounsi ISTE Group, 2019 | 4 | 2019 |
Security and privacy controls in rfid systems applied to EPCglobal networks W Tounsi Télécom Bretagne; Université de Rennes 1, 2014 | 3 | 2014 |
A distributed multi-level anomalies detection system using the mobile agent approach F Ben Ftima, W Tounsi, K Karoui, H Ben Ghezala Global Information Infrastructure Symposium, 2009. GIIS'09., 1-4, 2009 | 3 | 2009 |
Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm W Tounsi, B Justus, NC Boulahia, F Cuppen, JG Alfaro Software Security and Reliability-C (SERE-C), 2014 IEEE Eighth International …, 2014 | 2 | 2014 |
Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions EM Garcia Tech. Rep., Royal Holloway University of London, Egham, United Kingdom, 2015 | 1 | 2015 |
Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions EM Garcia Tech. Rep., Royal Holloway University of London, Egham, United Kingdom, 2015 | 1 | 2015 |
Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions EM Garcia technical Report, 2015 | 1 | 2015 |
Security and Privacy Controls in RFID Systems Applied to EPCglobal Networks D de Telecom Bretagne Université de Brest, 2014 | | 2014 |
Objective privacy : understanding the privacy impact of information exchange M Veeningen Technische Universiteit Eindhoven, 2014 | | 2014 |