Follow
Hassan N. Noura
Hassan N. Noura
Verified email at univ-fcomte.fr
Title
Cited by
Cited by
Year
Security analysis of drones systems: Attacks, limitations, and recommendations
JP Yaacoub, H Noura, O Salman, A Chehab
Internet of Things 11 (2542-6605), 100218, 2020
5292020
Cyber-physical systems security: Limitations, issues and future trends
JPA Yaacoub, O Salman, HN Noura, N Kaaniche, A Chehab, M Malli
Microprocessors and microsystems 77, 103201, 2020
3792020
Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures
E Ben Hamida, H Noura, W Znaidi
Electronics 4 (3), 380-423, 2015
2622015
Securing internet of medical things systems: Limitations, issues and recommendations
JPA Yaacoub, M Noura, HN Noura, O Salman, E Yaacoub, R Couturier, ...
Future Generation Computer Systems 105, 581-606, 2020
2192020
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
JPA Yaacoub, H Noura, O Salman, A Chehab
International Journal of Information Security, 1--44, 2021
1672021
A user-centric data protection method for cloud storage based on invertible DWT
H Qiu, H Noura, M Qiu, Z Ming, G Memmi
IEEE Transactions on Cloud Computing 9 (4), 1293-1304, 2019
1262019
One round cipher algorithm for multimedia IoT devices
H Noura, A Chehab, L Sleem, M Noura, R Couturier, MM Mansour
Multimedia tools and applications 77, 18383-18413, 2018
1152018
LoRaWAN security survey: Issues, threats and possible mitigation techniques
H Noura, T Hatoum, O Salman, JP Yaacoub, A Chehab
Internet of Things 12, 100303, 2020
1052020
An image encryption scheme based on irregularly decimated chaotic maps
M Ghebleh, A Kanso, H Noura
Signal Processing: Image Communication 29 (5), 618-627, 2014
1042014
Lightweight multi-factor mutual authentication protocol for IoT devices
R Melki, HN Noura, A Chehab
International Journal of Information Security 19 (6), 679-694, 2020
712020
A survey on OFDM physical layer security
R Melki, HN Noura, MM Mansour, A Chehab
Physical Communication 32, 1-30, 2019
692019
An efficient OFDM-based encryption scheme using a dynamic key approach
R Melki, HN Noura, MM Mansour, A Chehab
IEEE Internet of Things Journal 6 (1), 361-378, 2018
622018
DistLog: A distributed logging scheme for IoT forensics
HN Noura, O Salman, A Chehab, R Couturier
Ad Hoc Networks 98, 102061, 2020
482020
A new efficient lightweight and secure image cipher scheme
H Noura, L Sleem, M Noura, MM Mansour, A Chehab, R Couturier
Multimedia Tools and Applications 77, 15457-15484, 2018
462018
Preserving data security in distributed fog computing
H Noura, O Salman, A Chehab, R Couturier
Ad Hoc Networks 94, 101937, 2019
442019
Overview of Digital Forensics and Anti-Forensics Techniques
H Majed, H Noura, A Chehab
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 2020
432020
Design and analyses of efficient chaotic generators for crypto-systems
S El Assad, H Noura, I Taralova
Advances in Electrical and Electronics Engineering-IAENG Special Edition of …, 2008
432008
Lightweight stream cipher scheme for resource-constrained IoT devices
H Noura, R Couturier, C Pham, A Chehab
2019 International Conference on Wireless and Mobile Computing, Networking …, 2019
422019
Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications
K Hariss, H Noura, AE Samhat
Journal of Information Security and Applications 34, 233-242, 2017
402017
An efficient and secure cipher scheme for images confidentiality preservation
Z Fawaz, H Noura, A Mostefaoui
Signal Processing: Image Communication 42, 90-108, 2016
352016
The system can't perform the operation now. Try again later.
Articles 1–20