Ilyas Benkhaddra

ORCID: 0000-0002-7266-5226
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Network Security and Intrusion Detection
  • Chaos control and synchronization
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Cellular Automata and Applications
  • Complexity and Algorithms in Graphs
  • Blockchain Technology Applications and Security
  • Software-Defined Networks and 5G
  • Cryptographic Implementations and Security
  • IoT and Edge/Fog Computing
  • Brain Tumor Detection and Classification
  • Mathematical Dynamics and Fractals
  • Robotic Path Planning Algorithms
  • Advanced Numerical Analysis Techniques
  • Autonomous Vehicle Technology and Safety
  • Cloud Data Security Solutions
  • Robotics and Sensor-Based Localization
  • Advanced Steganography and Watermarking Techniques
  • Coding theory and cryptography
  • Biometric Identification and Security
  • Digital and Cyber Forensics
  • Internet Traffic Analysis and Secure E-voting

University of Electronic Science and Technology of China
2019-2024

Université de Lorraine
2017

Polytechnic School of Algiers
2014

Abstract The attack named Distributed Denial of Service (DDoS) that takes place in the large blockchain network requires an efficient and robust detection prevention mechanism for authenticated access. Blockchain is a distributed which attacker tries to hack by utilizing all resources with application enormous requests. Several methods like Rival Technique, filter modular approach so on, were developed detect prevent DDoS blockchain; still, accuracy challenging task. Hence, this research...

10.1002/ett.4729 article EN Transactions on Emerging Telecommunications Technologies 2023-01-25

The ultimate focus of this paper is to provide a hyperchaos-based reconfigurable platform for the real-time securing communicating embedded systems interconnected in networks according Internet Things (IoT) standards. proposed platform’s Register Transfer Level (RTL) architecture entirely developed and designed from scratch using VHSIC Hardware Description Language (VHDL). original idea consists exploiting nonlinearity discretized optimized 4D Lorenz hyperchaotic system as an encryption...

10.1109/access.2022.3173338 article EN cc-by IEEE Access 2022-01-01

Our paper presents a static obstacles avoidance and path planning method for Unmanned Aerial Vehicle (UAV) in outdoor three-dimension (3D) environment. We propose rectified rapidly exploring random tree (RRT*) algorithm where is proposed smoothing rectifying the final generated by RRT* order to reduce energy consumption during flight. also introduce an obstacle which allows efficient free-path collision generation complex 3D operating state space. This ensures that environment modeling very...

10.1109/cyber46603.2019.9066691 article EN 2019-07-01

SNOW-3G is a stream cipher used by the 3GPP standards as core part of confidentiality and integrity algorithms for UMTS LTE networks. This paper proposes an enhancement regular ciphering algorithm based on HC-PRNG. The proposed scheme hyperchaotic generator which additional layer to architecture improve randomness its output keystream. objective this work achieve high security strength while maintaining standardized properties. originality new that it provides good trade-off between...

10.1155/2017/5746976 article EN cc-by Security and Communication Networks 2017-01-01

Distributed Denial of Service (DDoS) attacks are one the most significant challenges in network security, especially Software-Defined Network (SDN) environment, due to centralized management provided by Control Plane. Considering insufficiency traditional detection approaches because growth and sophistication DDoS attacks, exploiting Machine Learning (ML) techniques is high demand. For this, feature modeling essential obtain an effective ML-based system, pre-processing phase. In this paper,...

10.1109/iccwamtip56608.2022.10016507 article EN 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2022-12-16

SNOW-3G is a stream cipher used by the 3GPP standards as core part of confidentiality and integrity algorithms for UMTS LTE standards. This paper proposes to combine hyperchaotic pseudo-random number generator with enhance its security level improve randomness output keystream. The new proposed approach combines perturbation technique nonlinear four-dimensional continuous chaotic system. originality this scheme that it provides good tradeoff between high security, performance hardware...

10.1109/codit.2017.8102758 article EN 2022 8th International Conference on Control, Decision and Information Technologies (CoDIT) 2017-04-01

The use of rapid prototyping tools such as MATLAB Simulink and Xilinx System Generator becomes increasingly important because time-to-market constraints. In this paper, we consider for software simulation real time implementation on FPGA circuit a pseudo-random number generator (PRNG) based unified hyperchaotic system. For purpose, propose new PRNG with good randomness characteristics novel conception where parameter perturbation control to the input special function output are used in order...

10.1109/icm.2014.7071791 article EN 2014-12-01

The proliferation and increasing sophistication of malicious programs other security risks have been identified as the most significant problem modern cybersecurity age. Malicious software, named malware, carries out harmful operations, causing abnormal functioning, data leakage, crippling financial effects. Therefore, door is widely open for one crucial realms, so-called deep learning-based malware classification techniques, to thwart attacks. Malware's structure evolves significantly over...

10.1109/iccwamtip56608.2022.10016605 article EN 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2022-12-16
Coming Soon ...