Peer-reviewed journal articles indexed in international databases

  1. Juliette Dromard, Lyes Khoukhi, Rida Khatoun, Yuoucef Beghriche,
    Towards combining Admission Control and Link Scheduling in Wireless Mesh Networks.
    Telecommunications Systems 66(1), 39–54.
    Springer, 2017.
  2. Mohamed Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaiti,
    A Stochastic Approach for Packet Dropping Attacks Detection in Mobile Ad hoc Networks.
    Computer Networks 121(5), 53–64.
    Elsevier, 2017.
  3. Youcef Begriche, Rida Khatoun, Lyes Khoukhi, ,
    A Statistical Detection Mechanism for Node Misbehaviors in Wireless Mesh Networks.
    International Journal of Ad Hoc and Ubiquitous Computing.
    Inderscience, 2016.
  4. Youcef Begrich, Rida Khatoun, Juliette Dromard, Lyes Khoukhi, Ahmed Serhrouchni,
    A Statistical Trust System in Wireless Mesh Networks.
    Annals of Telecommunications 70.
    Springer, 2015.
  5. Juliette Dromard, Lyes Khoukhi, Rida Khatoun,
    An Efficient Admission Control Model Based on Dynamic Link Scheduling in Wireless Mesh Network.
    EURASIP Journal on Wireless Communications and Networking 2013, 18.
    Eurasip, 2013.
  6. Rida Khatoun, Lyes Khoukhi, Ahmed Nabet, Dominique Gaïti, Juliette Dromard,
    ASRoP : Ad hoc Secure Routing Protocol.
    International Journal of Wireless & Mobile Networks, IJWMN. 4, 1–20.
    2012.
  7. Lyes Khoukhi, Soumaya Cherkaoui, Rida Khatoun, Dominique Gaïti,
    Management of Rescue and Relief Operations Using Wireless Mobile Ad Hoc Technology.
    International Journal of Next-Generation Networks 2(3), 119–132.
    2010.
  8. Rida Khatoun, Dominique Gaïti, Leïla Merghem-Boulahia, Ahmed Serhrouchni,
    Optimisation de la detection de Snort par le preprocesseur Global SPADE.
    REE. Revue de l'electricite et de l'electronique. 9(79), 88–93.
    Societe de l'Electricite, de l'Electronique et des Technologies de l'Information et de la Communication (SEE), 2008.
  9. Thomas Bullot, Rida Khatoun, Louis Hugues, Dominique Gaïti, Leïla Merghem-Boulahia,
    A situatedness-based Knowledge Plane for autonomic networking.
    Int. Journal of Network Management (IJNM) 18(2), 171–193.
    2008.
  10. Thomas Bullot, Rida Khatoun, Louis Hugues, Dominique Gaïti, Leïla Merghem-Boulahia,
    A situadness based knowledge plane for autonomic networking.
    International journal of network management 18(2), 171–193.
    2008.

Unindexed peer-reviewed journal articles

  1. Rida Khatoun, Lyes Khoukhi, Ahmed Nabet, Dominique Gaïti,
    ASRoP : Ad hoc Secure Routing Protocol.
    International Journal of Wireless & Mobile Networks, IJWMN. 4(5), 1–20.
    2012.
  2. Lyes Khoukhi, Soumaya Cherkaoui, Rida Khatoun, Dominique Gaïti,
    Management of Rescue and Relief Operations Using Wireless Mobile Ad Hoc Technology.
    International Journal of Next-Generation Networks (IJNGN) 2(3).
    2010.

Proceedings articles indexed in international databases

  1. Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaiti,
    Flooding attacks detection in MANETs.
    2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 1–6.
    IEEE, 2015.
  2. Youcef Begriche, Rida Khatoun, Lyes Khoukhi and Chen Xiuzhen, ,
    Bayesian-based model for a reputation system in vehicular networks.
    International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).
    2015.
  3. P Gut, Redouane Doulami, Lyes Khoukhi, Rida Khatoun, Ahmed Serhrouchni,
    A reputation system for detection of black hole attack in vehicular networking.
    International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).
    2015.
  4. Badis Hammi, Guillaume Doyen, Rida Khatoun,
    A collaborative approach for a source based detection of botclouds.
    In proceedings of the 14th International IEEE/IFIP Symposium on Integrated Network and Service Management - IM 2015, 4p.
    IEEE, 2015.
  5. Badis Hammi, Guillaume Doyen, Rida Khatoun,
    Understanding Botclouds from a System Perspective: a Principal Component Analysis.
    The IFIP/IEEE Network Operations and Management Symposium (NOMS 2014), 1–8.
    IEEE Communications Society, 2014.
  6. Ali El Attar, Rida Khatoun, Marc Lemercier,
    Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis.
    EUC 2014, The 12th IEEE International Conference on Embedded and Ubiquitous Computing, 26 – 28 août 2014, Milan, Italie..
    2014.
  7. Badis Hammi, Guillaume Doyen, Rida Khatoun,
    Toward a source detection of botclouds: a PCA-based approach.
    Proceedings of the 8th IFIP International Conference on Autonomous Infrastructure, Management and Security – AIMS’2014, 105–117.
    LNCS, 2014.
  8. Ali El Attar, Rida Khatoun, Babiga Birregah, Marc Lemercier,
    Robust Clustering Methods for Detecting Smartphone’s Abnormal Behavior.
    IEEE Wireless Communications and Networking Conference (WCNC), 6 avr. 2014 - 9 avr. 2014, Istanbul, Turkey..
    IEEE, 2014.
  9. Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaiti,
    Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers.
    2014 IEEE 21st Symposium on Communications and Vehicular Technology in the Benelux (SCVT), 7–12.
    IEEE, 2014.
  10. Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaiti,
    Denial of Service (DoS) attacks detection in MANETs through statistical models.
    Global Information Infrastructure and Networking Symposium (GIIS).
    IEEE, 2014.
  11. Ali El attar, Rida Khatoun, Marc Lemercier,
    Clustering-based Anomaly Detection for Smartphone Applications.
    the 6th IEEE/IFIP International Workshop on Management of the Future Internet, Krakow, Poland, May 5-9, 2014.
    IEEE, 2014.
  12. Ali El attar, Rida Khatoun, Marc Lemercier,
    Clustering-based Anomaly Detection for Smartphone Applications.
    6th IEEE/IFIP International Workshop on Management of the Future Internet.
    Krakow, Poland, May 5-9, 2014, 2014.
  13. Juliette Dromard, Rida Khatoun, Lyes Khoukhi,
    Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks.
    IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014).
    IFIP, 2014.
  14. Badis Hammi, Rida Khatoun, Guillaume Doyen,
    A factorial space for a system-based detection of botcloud activity.
    The sixth IFIP International Conference on New Technologies, Mobility and Security - NTMS'14, 1–5.
    2014.
  15. Ali El Attar, Rida Khatoun, Marc Lemercier,
    Diagnosing Smartphone's Abnormal Behavior through Robust Outlier Detection Methods.
    The 4th Global Information Infrastructure and Networking Symposium (GIIS 2013), Trento Italy , 28-31 October 2013, 3p.
    2013.
  16. Juliette Dromard, Lyes Khoukhi, Rida Khatoun,
    An Admission Control Scheme Based on Transmissions Scheduling for Wireless Mesh Networks.
    27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013, 75–81.
    IEEE Computer Society, 2013.
  17. Juliette Dromard, Rida Khatoun, Lyes Khoukhi,
    A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network.
    20th International Conference on Telecommunications (ICT), 6-8 May 2013, Casablanca, 2013, 1–5.
    IEEE, 2013.
  18. Juliette Dromard, Lyes Khoukhi, Rida Khatoun,
    An admission control scheme based on links' activity scheduling for wireless mesh networks.
    Proceedings of the 11th International Conference on Ad Hoc Networks and Wireless, 9-11 July 2012, Belgrade, Serbia, 399–412.
    Springer, 2012.
  19. Ahmed Nabet, Rida Khatoun, Lyes Khoukhi, Juliette Dromard, Dominique Gaiti, ,
    Towards Secure Route Discovery Protocol in MANETs.
    Global Information Infrastructure Symposium (GIIS).
    2011.
  20. Ahmed Nabet, Rida Khatoun, Lyes Khoukhi, Juliette Dromard, Dominique Gaïti,
    Towards secure route discovery protocol in MANET.
    Global Information Infrastructure Symposium (GIIS 2011) , 4-6 August 2011, Da Nang - Vietnam, 1–8.
    IEEE Conference Publications, 2011.
  21. Guillaume Montassier, Thibault Cholez, Guillaume Doyen, Rida Khatoun, Isabelle Chrisment, Olivier Festor,
    Content pollution quantification in large P2P networks : A measurement study on KAD.
    11th IEEE International Conference on Peer-to-Peer Computing 2011, short paper, 31 August-2 September 2011, Kyoto, Japan., 30–33.
    2011.
  22. Thibault Cholez, Christophe Henard, Isabelle Chrisment, Olivier Festor, Guillaume Doyen, Rida Khatoun,
    A First Approach to Detect Suspicious Peers in the KAD P2P Network.
    Conference on Network and Information Systems Security (SAR-SSI), 18-21 Mai 2011, La Rochelle - France, 1–8.
    IEEE Conference Publications, 2011.
  23. Ihsan Ullah, Guillaume Doyen, Rida Khatoun, Dominique Gaïti,
    A Decentralized Approach to Make Application Layer Multicast Systems Dynamics-aware.
    10èmes Journées Doctorales en Informatique et Réseaux, JDIR' 09, Belfort, February 2009, 6.
    2009.
  24. Guillaume Doyen, Alain Ploix, Marc Lemercier, Rida Khatoun,
    Towards a generic environment for the large-scale evaluation of peer-to-peer protocols.
    In Networking and Electronic Commerce Research Conference 2008, Riva Del Garda, Italy, September 2008, 10.
    2008.
  25. Rida Khatoun, Guillaume Doyen, Dominique Gaïti, Radwane Saad, Ahmed Serhrouchni,
    Decentralized Alerts Correlation Approach for DDoS Intrusion Detection.
    The second International Conference on New Technologies, Mobility and Security (NTMS) , 5-7 November, 2008, Tangier, Morocco., 1–5.
    IEEE Conference Publications, 2008.
  26. Rida Khatoun, Radwane Saad, Guillaume Doyen, Ahmed Serhrouchni, Dominique Gaïti, Leïla Merghem-Boulahia,
    A cooperative agent approach based on a peer-to-peer model for DDoS attacks detection and reaction.
    Networking and Electronic Commerce Research Conference (NAEC), Riva Del Garda, Italy, September 2008, 22.
    2008.

Unindexed proceedings articles

  1. Vincent Lemoine, Charles Perez, Marc Lemercier, Pierre Vitard, Virginie Bensoussan, Alain Corpel, Rida Khatoun, Babiga Birregah,
    Protection of IT infrastructures against cyber crime.
    Interdisciplinary Workshop on Global Security (WISG 2013), 22-23 January 2013, Troyes.
    2013.
  2. Vincent Lemoine, Charles Perez, Marc Lemercier, Pierre Vitard, Virginie Bensoussan, Alain Corpel, Rida Khatoun, Babiga Birregah,
    Protection des infrastructures informatiques des entreprises face à la cybercriminalité.
    Workshop Interdisciplinaire sur la Sécurité Globale (WISG 2013), Troyes, Janvier 2013, 12.
    2013.
  3. Thibault Cholez, Christopher Hénard, Isabelle Chrisment, Olivier Festor, Guillaume Doyen, Rida Khatoun,
    Détection de pairs suspects dans le réseau pair à pair KAD.
    SAR-SSI, La Rochelle - France, Mai 2011, 14.
    2011.
  4. Ihsan Ullah, Guillaume Doyen, Dominique Gaïti, Rida Khatoun,
    A decentralized approach to make ALM infrastructures scalables.
    Actes des 10ème journées des Doctorants en Informatique et Réseaux, JDIR’09, 43–48.
    2009.
  5. Rida Khatoun, Dominique Gaïti, Leïla Merghem-Boulahia, Ahmed Serhrouchni,
    Snort-OO: Improving Intrusion Detection Performance by Snort Cooperation.
    4th International Workshop on Management of Ubiquitous Communication and Services as part of the 10th IFIP/IEEE International Symposium on Integrated Network Management (IM 2007), May 2007, Munich, Germany, 49–63.
    2007.
  6. Rida Khatoun, Dominique Gaïti, Leïla Merghem-Boulahia, Ahmed Serhrouchni,
    Optimizing Intrusion Detection Using Global SPADE Preprocessor..
    International Conference on Risks and Security of Internet and Systems (CRiSIS 2007), 02-05 July 2007, Marrakech, Morocco, 23–28.
    2007.

Conference talks with no proceedings

  1. Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaiti, Chen Xiuzhen, ,
    Wormhole Attacks Detection in MANETs using Graph Theory.
    10th edition of the French Seminar for Networks Management and Services (GRES'14).
    2014.
  2. Rida Khatoun, Dominique Gaïti, Leïla Merghem-Boulahia, Ahmed Serhrouchni,
    Plate-forme autonomique pour la gestion de la sécurité.
    Les plates-formes autonomiques, Paris, Septembre 2009.
    2009.
  3. Rida Khatoun, Leïla Merghem-Boulahia, Dominique Gaïti,
    Autonomic platform for security management.
    The autonomic platform day, Paris, 29 September 2009.
    2009.
  4. Rida Khatoun, Dominique Gaïti, Leïla Merghem-Boulahia, Ahmed Serhrouchni,
    Une nouvelle arme contre les attaques de déni de service distribuées (DDoS).
    22ème Congrès DNAC : De Nouvelles Architectures pour les Communications, Paris, December 2008.
    2008.
  5. Rida Khatoun, Louis Hugues, Dominique Gaïti, Leïla Merghem-Boulahia, Gerard Nguengang,
    A Cooperative Detection Approach against Distributed Denial of Service Attack.
    JDIR'2007, Marne-la-Vallée, January 2007, 100.
    2007.

Conference posters

  1. Badis Hammi, Rida Khatoun, Guillaume Doyen,
    Caractérisation des attaques DDoS générées par un Botcloud.
    8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR SSI), Mont de Marsan - Landes, France, 16-18 septembre 2013.
    2013.
  2. Thibault Cholez, Guillaume Montassier, Guillaume Doyen, Rida Khatoun, Isabelle Chrisment, Olivier Festor,
    Détection d'attaques dans les réseaux pair à pair.
    4ème Workshop du Groupement d'Intérêt Scientifique «Surveillance, Sûreté, Sécurité des Grands Systèmes» (GIS-3SGS'11), 12-13 Octobre 2011, Valenciennes.
    2011.
  3. Rida Khatoun, Louis Hugues, Dominique Gaïti, Leïla Merghem-Boulahia, Gérard Nguengang,
    A Cooperative Detection Approach against Distributed Denial of Service Attack.
    JDIR'2007, 17-19 January 2007, Marne-la-Vallée..
    2007.

Scientific books (or chapters)

  1. Thibault Cholez, Guillaume Doyen, Isabelle Chrisment, Rida Khatoun, Olivier Festor,
    Faiblesses de l'identification dans les espaces numériques ouverts de partage de contenus : le cas des réseaux pair à pair.
    Enseignement, préservation et diffusion des identités numériques.
    Hermes-Lavoisier, 2014.

PhD theses

  1. Rida Khatoun,
    Système multi-agents et architecture pair à pair pour la détection d'attaques de déni de service distribuées.
    Université de technologie de Troyes, 2008.

Master theses

  1. Rida Khatoun,
    Distribution de données et de métadonnées médicales dans un environnement de grille.
    Université de technologie de Troyes.
    2004.

Other productions

  1. Marc lemercier, Babiga Birregah, Rida Khatoun, Alain Corpel,
    3ème rapport d'avancement du projet CPER CyNIC, janvier 2014.
    2014.
  2. Marc lemercier, Babiga Birregah, Rida Khatoun, Alain Corpel,
    Second rapport d'avancement du projet CPER CyNIC, janvier 2013.
    2013.
  3. Marc lemercier, Babiga Birregah, Rida Khatoun, Alain Corpel,
    1er rapport d'avancement du projet CPER CyNIC, janvier 2012.
    2012.