Alfalqi, K., & Bellaïche, M. (2025). An Automated Mapping Approach of Emergency Events and Locations Based on Object Detection and Social Networks. International Journal of Advanced Computer Science and Applications, 16(2), 20-35.
Directory of Experts
Bellaïche, Martine

Directory of Experts
Bellaïche, Martine
Directory of Experts
Publications by date
Journal article (22)
Conference paper (30)
Book
Book chapter
Patent
Report (1)
Thesis
Dataset
Teaching resource
Image
Audio recording
Video recording
Other
Martine Bellaïche (53)
- 2025 (1)
Journal article
- 2024 (3)
Conference paper Erfan, F., Yahyatabar Arabi, M. E., Bellaïche, M., & Halabi, T. (2024, December). Advanced Smart Contract Vulnerability Detection Using Large Language Models [Paper]. 8th Cyber Security in Networking Conference (CSNet 2024), Paris, France.Conference paper Toko, T. M. N. N., Bellaïche, M., & Halabi, T. (2024, May). A Game-theoretic Approach for DDoS Attack Mitigation in IIoT Deterministic Networking [Paper]. 2024 IEEE Network Operations and Management Symposium (NOMS 2024), Seoul, Republic of Korea (5 pages).Conference paper Erfan, F., Bellaïche, M., & Halabi, T. (2024, July). Efficient Detection of Selfish Mining Attacks on Large-Scale Blockchain Networks [Paper]. IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C), Cambridge, United Kingdom.
- 2023 (4)
Journal article Alghamdi, R., & Bellaïche, M. (2023). An ensemble deep learning based IDS for IoT using Lambda architecture. Cybersecurity, 6(1), 17 pages.Conference paper Seifi, S., Beaubrun, R., Bellaïche, M., & Halabi, T. A Study on the Efficiency of Intrusion Detection Systems in IoT Networks [Paper]. 2023 International Conference on Computer, Information and Telecommunication Systems (CITS 2023), Genoa, Italy (8 pages).Conference paper Erfan, F., Bellaïche, M., & Halabi, T. (2023, June). Community Detection Algorithm for Mitigating Eclipse Attacks on Blockchain-enabled Metaverse [Paper]. IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom 2023), Kyoto, Japan.Journal article Alfalqi, K., & Bellaïche, M. (2023). Emergency events detection based on integration of federated learning and active learning. International Journal of Information Technology, 15(6), 2863-2876.
- 2022 (5)
Journal article Alghamdi, R., & Bellaïche, M. (2022). A Cascaded Federated Deep Learning Based Framework For Detecting Wormhole Attacks in IoT Networks. Computers & Security, 125, 17 pages.Journal article Alfalqi, K., & Bellaïche, M. (2022). An Emergency Event Detection Ensemble Model Based on Big Data. Big Data and Cognitive Computing, 6(2), 18 pages.Journal article Alghamdi, R., & Bellaïche, M. (2022). Evaluation and Selection Models for Ensemble Intrusion Detection Systems in IoT. IoT, 3(2), 285-314.Conference paper Erfan, F., Bellaïche, M., & Halabi, T. (2022, August). Game-theoretic Designs for Blockchain-based IoT: Taxonomy and Research Directions [Paper]. IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS 2022), Newark, CA, USA.Conference paper Halabi, T., Bellaïche, M., & Fung, B. C. M. (2022, November). Towards Adaptive Cybersecurity for Green IoT [Paper]. IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS 2022), Bali, Indonesia.
- 2021 (4)
Conference paper Alghamdi, R., & Bellaïche, M. (2021, May). A Deep Intrusion Detection System in Lambda Architecture Based on Edge Cloud Computing for IoT [Paper]. 4th International Conference on Artificial Intelligence and Big Data (ICAIBD 2021), Chengdu, China.Conference paper Alfalqi, K., & Bellaïche, M. (2021, May). IoT-Based Disaster Detection Model Using Social Networks and Machine Learning [Paper]. 4th International Conference on Artificial Intelligence and Big Data (ICAIBD 2021), Chengdu, China.Conference paper Yassine, I., Halabi, T., & Bellaïche, M. (2021, December). Security risk assessment methodologies in the Internet of Things: Survey and taxonomy [Paper]. 21st IEEE International Conference on Software Quality, Reliability and Security (QRS-C 2021), Hainan, China.Journal article Abbasi, H., Ezzati-Jivan, N., Bellaïche, M., Talhi, C., & Dagenais, M. (2021). The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment. Journal of Hardware and Systems Security, 2021(3-4), 208-222.
- 2020 (2)
Conference paper Al Harbi, S., Halabi, T., & Bellaïche, M. (2020, December). Fog Computing Security Assessment for Device Authentication in the Internet of Things [Paper]. 22nd IEEE International Conference on High Performance Computing and Communications (HPCC 2020), 8th IEEE International Conference on Smart City (SmartCity 2020), and 6th IEEE International Conference on Data Science and Systems (DSSS 2020), Yanuca Island, Cuvu, Fiji.Journal article Halabi, T., & Bellaïche, M. (2020). Towards security-based formation of cloud federations: A game theoretical approach. IEEE Transactions on Cloud Computing, 8(3), 928-942.
- 2019 (7)
Conference paper Engoulou, R. G., Bellaïche, M., Halabi, T., & Pierre, S. (2019, February). A decentralized reputation management system for securing the internet of vehicles [Paper]. International Conference on Computing, Networking and Communications (ICNC 2019), Honolulu, HI, USA.Journal article Abusitta, A., Bellaïche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems-the International Journal of Escience, 98, 308-318.Journal article Benbrahim, S.-E., Quintero, A., & Bellaïche, M. (2019). Live Placement of Interdependent Virtual Machines to Optimize Cloud Service Profits and Penalties on SLAs. IEEE Transactions on Cloud Computing, 7(1), 237-249.Journal article Abbasi, H., Ezzati-Jivan, N., Bellaïche, M., Talhi, C., & Dagenais, M. (2019). Machine learning-based EDoS attack detection technique using execution trace analysis. Journal of Hardware and Systems Security, 3(2), 164-176.Journal article Abusitta, A., Bellaïche, M., & Dagenais, M. (2019). Multi-cloud cooperative intrusion detection system: trust and fairness assurance. Annals of Telecommunications, 74(9-10), 637-653.Conference paper Halabi, T., & Bellaïche, M. (2019, June). Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures [Paper]. IEEE Conference on Communications and Network Security (CNS 2019), Washington, D.C., USA (9 pages).Conference paper Halabi, T., Bellaïche, M., & Abusitta, A. (2019, February). Toward secure resource allocation in mobile cloud computing : a matching game [Paper]. International Conference on Computing, Networking and Communications (ICNC 2019), Honolulu, HI, USA.
- 2018 (7)
Journal article Halabi, T., & Bellaïche, M. (2018). A broker-based framework for standardization and management of cloud security-SLAs. Computers & Security, 75, 59-71.Conference paper Bellaïche, M., Abusitta, A., & Halabi, T. (2018, June). A cooperative game for online cloud federation formation based on security risk assessment [Paper]. 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2018) / 2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom 2018), Shanghai, China.Journal article Abusitta, A., Bellaïche, M., & Dagenais, M. (2018). An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment. Journal of Cloud Computing : Advances, Systems and Applications, 7(9), 9 (18 pages).Conference paper Abusitta, A., Bellaïche, M., & Dagenais, M. (2018, February). A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments [Paper]. 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN 2018), Paris, France (8 pages).Conference paper Halabi, T., Bellaïche, M., & Abusitta, A. (2018, June). Cloud security up for auction : a DSIC online mechanism for secure IaaS resource allocation [Paper]. Conference on Communications and Network Security (CSNET 2018), Paris, France (6 pages).Conference paper Halabi, T., Bellaïche, M., & Abusitta, A. (2018, August). Online allocation of cloud resources based on security satisfaction [Paper]. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering (Trustcom/BigDataSE 2018), New York, N.Y..Journal article Abusitta, A., Bellaïche, M., & Dagenais, M. (2018). On trustworthy federated clouds : a coalitional game approach. Computer Networks, 145, 52-63.
- 2017 (4)
Journal article Bonguet, A., & Bellaïche, M. (2017). A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing. Future Internet, 9(3).Conference paper Halabi, T., & Bellaïche, M. (2017, January). Evaluation and Selection of Cloud Security Services based on Multi-Criteria Analysis MCA [Paper]. International Conference on Computing, Networking and Communications (ICNC 2017), Silicon Valley, CA, USA.Conference paper Halabi, T., & Bellaïche, M. (2017, August). Service assignment in federated cloud environments based on multi-objective optimization of security [Paper]. 5th IEEE International Conference on Future Internet of Things and Cloud (FiCloud 2017), Prague, Czech Republic.Journal article Halabi, T., & Bellaïche, M. (2017). Towards quantification and evaluation of security of Cloud Service Providers. Journal of Information Security and Applications, 33, 55-65.
- 2016 (2)
Journal article Adegbindin, M., Hertz, A., & Bellaïche, M. (2016). A new efficient RLF-like algorithm for the vertex coloring problem. Yugoslav Journal of Operations Research, 26(4), 441-456.Journal article Halabi, T., & Bellaïche, M. (2016). How to evaluate the defense against DoS and DDoS attacks in cloud computing: A survey and taxonomy. International Journal of Computer Science and Information Security, 14(12), 30111650 (10 pages).
- 2014 (6)
Report Adegbindin, M., Hertz, A., & Bellaïche, M. (2014). A new efficient RLF-like algorithm for the vertex coloring problem. (Technical Report n° G-2014-24).Conference paper Benbrahim, S.-E., Quintero, A., & Bellaïche, M. (2014, September). New distributed approach for an autonomous dynamic management of interdependent virtual machines [Paper]. 8th Asia Modelling Symposium (AMS), Taipei, Taiwan.Conference paper Benbrahim, S.-E., Quintero, A., & Bellaïche, M. (2014, September). New Distributed Approach for an Autonomous Dynamic Management of Interdependent Virtual Machines [Paper]. 17th International Conference on Network-Based Information Systems (NBiS 2014), Salerno, Italy.Conference paper Benbrahim, S.-E., Quintero, A., & Bellaïche, M. (2014, September). On the design of large-sized cloud networks optimized for live migration using tabu search algorithms [Paper]. 8th Asia International Conference on Mathematical Modelling and Computer Simulation - Asia Modelling Symposium (AMS 2014), Kuala Lumpur, Malaysia.Conference paper Benbrahim, S.-E., Quintero, A., & Bellaïche, M. (2014, September). Real-time QoS issues in live migration of interdependent virtual machines [Paper]. 8th Asia International Conference on Mathematical Modelling and Computer Simulation - Asia Modelling Symposium (AMS 2014), Kuala Lumpur, Malaysia.Journal article Engoulou, R. G., Bellaïche, M., Pierre, S., & Quintero, A. (2014). VANET security surveys. Computer Communications, 44, 1-13.
- 2013 (1)
Journal article Bellaïche, M., & Grégoire, J.-C. (2013). SYN Flooding Attacks: Survey and Evaluation of Defences. Journal of Communications and Networking.
- 2012 (1)
Journal article Bellaïche, M., & Gregoire, J.-C. (2012). SYN flooding attack detection by TCP handshake anomalies. Security and Communication Networks, 5(7), 709-724.
- 2011 (2)
Conference paper Bellaïche, M., & Gregoire, J.-C. (2011, September). Avoiding DDoS with active management of backlog queues [Paper]. 5th International Conference on Network and System Security (NSS 2011), Milan, Italy.Conference paper Bellaïche, M., & Gregoire, J.-C. (2011, May). Stateful or stateless flooding attack detection [Paper]. 7th International Conference on Networking and Services, Venice, Italy.
- 2009 (2)
Conference paper Bellaïche, M., & Gregoire, J.-C. (2009, June). Source detection of SYN flooding attacks [Paper]. International Conference on Network and Service Security (N2S 2009), Paris, France (6 pages).Conference paper Bellaïche, M., & Grégoire, J.-C. (2009, November). SYN Flooding Attack Detection Based on Entropy Computing [Paper]. IEEE Global Telecommunications Conference (GLOBECOM 2009), Honolulu, HI (6 pages). Published in GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
- 2008 (1)
Conference paper Bellaïche, M., & Grégoire, J.-C. (2008, August). Measuring defense systems against flooding attacks [Paper]. International Wireless Communications and Mobile Computing Conference (IWCMC 2008), Crete Island, Greece.
- 2007 (1)
Conference paper Bellaïche, M., & Gregoire, J.-C. (2007, November). SYN flooding attack detection by TCP handshake behaviour observation [Paper]. 2nd IEEE Workshop on Monitoring, Attack Detection and Mitigation (MONAM 2007), Toulouse, France (6 pages).