<?xml version="1.0"?>
<dblpperson name="Nour El Madhoun" pid="171/5697" n="45">
<person key="homepages/171/5697" mdate="2015-11-25">
<author pid="171/5697">Nour El Madhoun</author>
</person>
<r><article key="journals/adt/MaldonadoRuizTVCCPTM26" mdate="2026-04-26">
<author orcid="0000-0002-2509-5929" pid="238/0485">Daniel Alejandro Maldonado-Ruiz</author>
<author pid="433/2720">C&#233;sar Tufi&#241;o</author>
<author pid="433/3836">Gabriel V&#225;sconez</author>
<author pid="433/2379">Elian Caizapanta</author>
<author pid="433/2965">Eddy Castro</author>
<author pid="433/4187">Thelman Pab&#243;n</author>
<author pid="59/10809">Jenny Torres 0001</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<title>Nested-C protocol: consensus protocol designed for NestedChain.</title>
<year>2026</year>
<month>April</month>
<pages>149-173</pages>
<volume>81</volume>
<journal>Ann. des T&#233;l&#233;communications</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s12243-025-01104-1</ee>
<url>db/journals/adt/adt81.html#MaldonadoRuizTVCCPTM26</url>
<stream>streams/journals/adt</stream>
</article>
</r>
<r><inproceedings key="conf/aina/Maldonado-RuizH25" mdate="2025-11-15">
<author orcid="0000-0002-2509-5929" pid="238/0485">Daniel Alejandro Maldonado-Ruiz</author>
<author pid="404/2737">Chan Yeong Hwang</author>
<author pid="404/2381">Elina Jankovskaja</author>
<author pid="404/1586">Karima Sadykova</author>
<author pid="404/1720">Messilva Mazari</author>
<author pid="59/10809">Jenny Torres 0001</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<title>Implementation of Two-Signature Security on an Identity Storage Smart Contract.</title>
<pages>81-94</pages>
<year>2025</year>
<booktitle>AINA (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-87766-7_8</ee>
<crossref>conf/aina/2025-2</crossref>
<url>db/conf/aina/aina2025-2.html#Maldonado-RuizH25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aina/MesbahMAC25" mdate="2025-08-05">
<author pid="373/0691">Djamel Mesbah</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="97/3431">Khaldoun Al Agha</author>
<author pid="400/3482">Hani Chalouati</author>
<title>Exploring NLP Techniques for Code Smell Detection: A Comparative Study.</title>
<pages>93-104</pages>
<year>2025</year>
<booktitle>AINA (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-87769-8_9</ee>
<crossref>conf/aina/2025-3</crossref>
<url>db/conf/aina/aina2025-3.html#MesbahMAC25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aina/JaouhariVSAM25" mdate="2025-08-05">
<author pid="197/6985">Saad El Jaouhari</author>
<author pid="404/2112">Andrei Vavilov</author>
<author pid="404/1941">Julia Soloveva</author>
<author pid="35/5343">Alexandru Archip</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<title>MIDPS: A Multi-agent Host Intrusion Detection and Prevention System.</title>
<pages>257-268</pages>
<year>2025</year>
<booktitle>AINA (4)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-87772-8_22</ee>
<crossref>conf/aina/2025-4</crossref>
<url>db/conf/aina/aina2025-4.html#JaouhariVSAM25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eidwt/MesbahMAC25" mdate="2025-05-27">
<author pid="373/0691">Djamel Mesbah</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="97/3431">Khaldoun Al Agha</author>
<author pid="400/3482">Hani Chalouati</author>
<title>Leveraging Prompt-Based Large Language Models for Code Smell Detection: A Comparative Study on the MLCQ Dataset.</title>
<pages>444-454</pages>
<year>2025</year>
<booktitle>EIDWT</booktitle>
<ee>https://doi.org/10.1007/978-3-031-86149-9_42</ee>
<crossref>conf/eidwt/2025</crossref>
<url>db/conf/eidwt/eidwt2025.html#MesbahMAC25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ntms/KazemBMC25" mdate="2025-08-03">
<author pid="378/8049">Hussein Kazem</author>
<author pid="93/521">Youakim Badr</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="378/7644">Pierrick Conord</author>
<title>Digital Signature Quantification in the Bitcoin Blockchain: A Statistical Approach.</title>
<pages>93-99</pages>
<year>2025</year>
<booktitle>NTMS</booktitle>
<ee>https://doi.org/10.1109/NTMS65597.2025.11076912</ee>
<crossref>conf/ntms/2025</crossref>
<url>db/conf/ntms/ntms2025.html#KazemBMC25</url>
<stream>streams/conf/ntms</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/soli/Madhoun25" mdate="2026-04-28">
<author pid="171/5697">Nour El Madhoun</author>
<title>Evolving Trust in Transactions: From Centralization to Decentralization.</title>
<pages>125-129</pages>
<year>2025</year>
<booktitle>SOLI</booktitle>
<ee>https://doi.org/10.1109/SOLI66289.2025.11396227</ee>
<crossref>conf/soli/2025</crossref>
<url>db/conf/soli/soli2025.html#Madhoun25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/JiangBMAZIHP25" mdate="2025-10-31">
<author pid="280/1210">Baoxiang Jiang</author>
<author pid="325/7908">Tristan Bilot</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="97/3431">Khaldoun Al Agha</author>
<author pid="166/4216">Anis Zouaoui</author>
<author pid="51/8816">Shahrear Iqbal</author>
<author pid="182/6753">Xueyuan Han</author>
<author pid="144/4204">Thomas Pasquier</author>
<title>ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems.</title>
<pages>7173-7192</pages>
<year>2025</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity25/presentation/jiang-baoxiang</ee>
<crossref>conf/uss/2025</crossref>
<url>db/conf/uss/uss2025.html#JiangBMAZIHP25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/BilotJLMAZP25" mdate="2025-10-31">
<author pid="325/7908">Tristan Bilot</author>
<author pid="280/1210">Baoxiang Jiang</author>
<author pid="189/8685">Zefeng Li</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="97/3431">Khaldoun Al Agha</author>
<author pid="166/4216">Anis Zouaoui</author>
<author pid="144/4204">Thomas Pasquier</author>
<title>Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems.</title>
<pages>7193-7212</pages>
<year>2025</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity25/presentation/bilot</ee>
<crossref>conf/uss/2025</crossref>
<url>db/conf/uss/uss2025.html#BilotJLMAZP25</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2501-16964" mdate="2025-02-26">
<author pid="325/7908">Tristan Bilot</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="97/3431">Khaldoun Al Agha</author>
<author pid="166/4216">Anis Zouaoui</author>
<title>Few Edges Are Enough: Few-Shot Network Attack Detection with Graph Neural Networks.</title>
<year>2025</year>
<month>January</month>
<volume>abs/2501.16964</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2501.16964</ee>
<url>db/journals/corr/corr2501.html#abs-2501-16964</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/adt/MaldonadoRuizPSWMT24" mdate="2025-08-05">
<author orcid="0000-0002-2509-5929" pid="238/0485">Daniel Alejandro Maldonado-Ruiz</author>
<author pid="392/7667">Alan Pulval-Dady</author>
<author pid="246/0828">Yulin Shi</author>
<author pid="75/3158">Zhe Wang</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="59/10809">Jenny Torres 0001</author>
<title>NestedChain: &#34;Blockchain-inside-a-Blockchain&#34; new generation prototype.</title>
<pages>881-899</pages>
<year>2024</year>
<month>December</month>
<volume>79</volume>
<journal>Ann. des T&#233;l&#233;communications</journal>
<number>11-12</number>
<ee>https://doi.org/10.1007/s12243-024-01030-8</ee>
<url>db/journals/adt/adt79.html#MaldonadoRuizPSWMT24</url>
<stream>streams/journals/adt</stream>
</article>
</r>
<r><article key="journals/csur/BilotMAZ24" mdate="2025-01-19">
<author orcid="0000-0003-4153-735X" pid="325/7908">Tristan Bilot</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author orcid="0000-0002-6595-5866" pid="97/3431">Khaldoun Al Agha</author>
<author orcid="0009-0001-0273-4601" pid="166/4216">Anis Zouaoui</author>
<title>A Survey on Malware Detection with Graph Representation Learning.</title>
<pages>278:1-278:36</pages>
<year>2024</year>
<month>November</month>
<volume>56</volume>
<journal>ACM Comput. Surv.</journal>
<number>11</number>
<ee>https://doi.org/10.1145/3664649</ee>
<ee>https://www.wikidata.org/entity/Q131115196</ee>
<url>db/journals/csur/csur56.html#BilotMAZ24</url>
<stream>streams/journals/csur</stream>
</article>
</r>
<r><inproceedings key="conf/aina/MadhounHJMA24" mdate="2025-08-05">
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="145/3079">Badis Hammi</author>
<author pid="197/6985">Saad El Jaouhari</author>
<author pid="373/0691">Djamel Mesbah</author>
<author pid="352/1966">Elsi Ahmadieh</author>
<title>Addressing Security Challenges in Copyright Management Applications: The Blockchain Perspective.</title>
<pages>169-182</pages>
<year>2024</year>
<booktitle>AINA (6)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-57942-4_18</ee>
<crossref>conf/aina/2024-6</crossref>
<url>db/conf/aina/aina2024-6.html#MadhounHJMA24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aina/HammiBBBJMM24" mdate="2025-08-05">
<author pid="145/3079">Badis Hammi</author>
<author pid="325/7908">Tristan Bilot</author>
<author pid="373/0438">Danyil Bazain</author>
<author pid="373/0450">Nicolas Binand</author>
<author pid="373/0923">Maxime Jaen</author>
<author pid="373/0177">Chems Mitta</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<title>An End-to-End Approach for the Detection of Phishing Attacks.</title>
<pages>314-325</pages>
<year>2024</year>
<booktitle>AINA (4)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-57916-5_27</ee>
<crossref>conf/aina/2024-4</crossref>
<url>db/conf/aina/aina2024-4.html#HammiBBBJMM24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/bcca/AhmadiehM24" mdate="2025-02-21">
<author pid="352/1966">Elsi Ahmadieh</author>
<author pid="171/5697">Nour El Madhoun</author>
<title>Comparative E-Voting Security Evaluation: Multi-Modal Authentication Approaches.</title>
<pages>250-254</pages>
<year>2024</year>
<booktitle>BCCA</booktitle>
<ee>https://doi.org/10.1109/BCCA62388.2024.10844450</ee>
<crossref>conf/bcca/2024</crossref>
<url>db/conf/bcca/bcca2024.html#AhmadiehM24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccwc/MadhounH24" mdate="2025-08-05">
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="145/3079">Badis Hammi</author>
<title>Blockchain Technology in the Healthcare Sector: Overview and Security Analysis.</title>
<pages>439-446</pages>
<year>2024</year>
<booktitle>CCWC</booktitle>
<ee>https://doi.org/10.1109/CCWC60891.2024.10427731</ee>
<crossref>conf/ccwc/2024</crossref>
<url>db/conf/ccwc/ccwc2024.html#MadhounH24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csnet/LaababEMK24" mdate="2025-02-21">
<author pid="397/7824">Ilham Laabab</author>
<author pid="13/7641">Abdellatif Ezzouhairi</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="155/3076">Muhammad Haris Khan</author>
<title>Blockchain and Biometric Systems Integration for IoMT Security.</title>
<pages>259-262</pages>
<year>2024</year>
<booktitle>CSNet</booktitle>
<ee>https://doi.org/10.1109/CSNet64211.2024.10851762</ee>
<crossref>conf/csnet/2024</crossref>
<url>db/conf/csnet/csnet2024.html#LaababEMK24</url>
<stream>streams/conf/csnet</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/iwsec/BilotMAZ24" mdate="2024-10-22">
<author orcid="0000-0003-4153-735X" pid="325/7908">Tristan Bilot</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author orcid="0000-0002-6595-5866" pid="97/3431">Khaldoun Al Agha</author>
<author orcid="0009-0001-0273-4601" pid="166/4216">Anis Zouaoui</author>
<title>Few Edges are Enough: Few-Shot Network Attack Detection with Graph Neural Networks.</title>
<pages>257-276</pages>
<year>2024</year>
<booktitle>IWSEC</booktitle>
<ee>https://doi.org/10.1007/978-981-97-7737-2_15</ee>
<crossref>conf/iwsec/2024</crossref>
<url>db/conf/iwsec/iwsec2024.html#BilotMAZ24</url>
<stream>streams/conf/iwsec</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/nbis/MesbahMAC24" mdate="2025-08-05">
<author pid="373/0691">Djamel Mesbah</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="97/3431">Khaldoun Al Agha</author>
<author pid="400/3482">Hani Chalouati</author>
<title>Beyond the Code: Unraveling the Applicability of Graph Neural Networks in Smell Detection.</title>
<pages>148-161</pages>
<year>2024</year>
<booktitle>NBiS</booktitle>
<ee>https://doi.org/10.1007/978-3-031-72325-4_15</ee>
<crossref>conf/nbis/2024</crossref>
<url>db/conf/nbis/nbis2024.html#MesbahMAC24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wistp/KazemMBC24" mdate="2025-08-05">
<author pid="378/8049">Hussein Kazem</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="b/SamiaBouzefrane">Samia Bouzefrane 0001</author>
<author pid="378/7644">Pierrick Conord</author>
<title>Security Challenges and Countermeasures in Blockchain's Peer-to-Peer Architecture.</title>
<pages>111-127</pages>
<year>2024</year>
<booktitle>WISTP</booktitle>
<ee>https://doi.org/10.1007/978-3-031-60391-4_8</ee>
<crossref>conf/wistp/2024</crossref>
<url>db/conf/wistp/wistp2024.html#KazemMBC24</url>
</inproceedings>
</r>
<r><article key="journals/access/BilotMAZ23" mdate="2023-06-02">
<author orcid="0000-0003-4153-735X" pid="325/7908">Tristan Bilot</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="97/3431">Khaldoun Al Agha</author>
<author pid="166/4216">Anis Zouaoui</author>
<title>Graph Neural Networks for Intrusion Detection: A Survey.</title>
<pages>49114-49139</pages>
<year>2023</year>
<volume>11</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2023.3275789</ee>
<url>db/journals/access/access11.html#BilotMAZ23</url>
</article>
</r>
<r><article key="journals/information/FarukiBJBMP23" mdate="2023-08-18">
<author pid="17/11140">Parvez Faruki</author>
<author orcid="0000-0001-5600-5386" pid="168/1156">Rati Bhan</author>
<author pid="142/1453">Vinesh Jain</author>
<author orcid="0000-0002-0380-0623" pid="98/2037">Sajal Bhatia</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="184/2100">Rajendra Pamula</author>
<title>A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks.</title>
<pages>374</pages>
<year>2023</year>
<volume>14</volume>
<journal>Inf.</journal>
<number>7</number>
<ee type="oa">https://doi.org/10.3390/info14070374</ee>
<url>db/journals/information/information14.html#FarukiBJBMP23</url>
</article>
</r>
<r><inproceedings key="conf/bcca/AhmadiehM23" mdate="2025-08-05">
<author pid="352/1966">Elsi Ahmadieh</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<title>Artwork NFTs for Online Trading and Transaction Cancellation.</title>
<pages>235-239</pages>
<year>2023</year>
<booktitle>BCCA</booktitle>
<ee>https://doi.org/10.1109/BCCA58897.2023.10338886</ee>
<crossref>conf/bcca/2023</crossref>
<url>db/conf/bcca/bcca2023.html#AhmadiehM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icbc2/AhmadiehM23" mdate="2023-07-21">
<author pid="352/1966">Elsi Ahmadieh</author>
<author pid="171/5697">Nour El Madhoun</author>
<title>NFTs for Online Trading of Artworks.</title>
<pages>1-2</pages>
<year>2023</year>
<booktitle>ICBC</booktitle>
<ee>https://doi.org/10.1109/ICBC56567.2023.10174931</ee>
<crossref>conf/icbc2/2023</crossref>
<url>db/conf/icbc2/icbc2023.html#AhmadiehM23</url>
</inproceedings>
</r>
<r><book key="books/sp/23/DAPM2023" mdate="2023-02-22">
<editor pid="03/2914">Kevin Daimi</editor>
<editor pid="160/8936">Abeer Alsadoon</editor>
<editor pid="11/5488">Cathryn Peoples</editor>
<editor pid="171/5697">Nour El Madhoun</editor>
<title>Emerging Trends in Cybersecurity Applications</title>
<publisher>Springer International Publishing</publisher>
<year>2023</year>
<isbn>978-3-031-09639-6</isbn>
<ee>https://doi.org/10.1007/978-3-031-09640-2</ee>
<url>db/books/collections/DAPM2023.html</url>
</book>
</r>
<r><article publtype="informal" key="journals/corr/abs-2303-16004" mdate="2023-04-14">
<author pid="325/7908">Tristan Bilot</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="97/3431">Khaldoun Al Agha</author>
<author pid="166/4216">Anis Zouaoui</author>
<title>A Survey on Malware Detection with Graph Representation Learning.</title>
<year>2023</year>
<volume>abs/2303.16004</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2303.16004</ee>
<url>db/journals/corr/corr2303.html#abs-2303-16004</url>
</article>
</r>
<r><article key="journals/access/Maldonado-RuizT22" mdate="2022-10-02">
<author orcid="0000-0002-2509-5929" pid="238/0485">Daniel Alejandro Maldonado-Ruiz</author>
<author orcid="0000-0002-8920-1225" pid="59/10809">Jenny Torres 0001</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author orcid="0000-0001-7051-5139" pid="01/2788">Mohamad Badra</author>
<title>Current Trends in Blockchain Implementations on the Paradigm of Public Key Infrastructure: A Survey.</title>
<pages>17641-17655</pages>
<year>2022</year>
<volume>10</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2022.3145156</ee>
<url>db/journals/access/access10.html#Maldonado-RuizT22</url>
</article>
</r>
<r><article key="journals/access/BenabdallahACMB22" mdate="2022-07-25">
<author pid="201/8958">Ali Benabdallah</author>
<author pid="324/6106">Antoine Audras</author>
<author orcid="0000-0003-1139-5370" pid="324/5811">Louis Coudert</author>
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author orcid="0000-0001-7051-5139" pid="01/2788">Mohamad Badra</author>
<title>Analysis of Blockchain Solutions for E-Voting: A Systematic Literature Review.</title>
<pages>70746-70759</pages>
<year>2022</year>
<volume>10</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2022.3187688</ee>
<url>db/journals/access/access10.html#BenabdallahACMB22</url>
</article>
</r>
<r><inproceedings key="conf/aina/MadhounBBP22" mdate="2025-08-05">
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="99/837">Emmanuel Bertin</author>
<author pid="01/2788">Mohamad Badra</author>
<author pid="33/592">Guy Pujolle</author>
<title>New Security Protocols for Offline Point-of-Sale Machines.</title>
<pages>446-467</pages>
<year>2022</year>
<booktitle>AINA (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-99587-4_38</ee>
<crossref>conf/aina/2022-2</crossref>
<url>db/conf/aina/aina2022-2.html#MadhounBBP22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csnet/ChabbiMK22" mdate="2022-12-07">
<author pid="268/1940">Samir Chabbi</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="285/2056">Lazhar Khamer</author>
<title>Security of NFC Banking Transactions: Overview on Attacks and Solutions.</title>
<pages>1-5</pages>
<year>2022</year>
<booktitle>CSNet</booktitle>
<ee>https://doi.org/10.1109/CSNet56116.2022.9955600</ee>
<crossref>conf/csnet/2022</crossref>
<url>db/conf/csnet/csnet2022.html#ChabbiMK22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iwcmc/ChabbiM22" mdate="2022-07-26">
<author pid="268/1940">Samir Chabbi</author>
<author pid="171/5697">Nour El Madhoun</author>
<title>A New Security Solution Enhancing the Dynamic Array PIN Protocol.</title>
<pages>991-996</pages>
<year>2022</year>
<booktitle>IWCMC</booktitle>
<ee>https://doi.org/10.1109/IWCMC55113.2022.9825252</ee>
<crossref>conf/iwcmc/2022</crossref>
<url>db/conf/iwcmc/iwcmc2022.html#ChabbiM22</url>
</inproceedings>
</r>
<r><article key="journals/adt/MadhounHB21" mdate="2021-04-29">
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="199/9685">Julien Hatin</author>
<author pid="99/837">Emmanuel Bertin</author>
<title>A decision tree for building IT applications.</title>
<pages>131-144</pages>
<year>2021</year>
<volume>76</volume>
<journal>Ann. des T&#233;l&#233;communications</journal>
<number>3-4</number>
<ee>https://doi.org/10.1007/s12243-020-00814-y</ee>
<url>db/journals/adt/adt76.html#MadhounHB21</url>
</article>
</r>
<r><article key="journals/adt/MadhounBBP21" mdate="2021-04-29">
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="99/837">Emmanuel Bertin</author>
<author pid="01/2788">Mohamad Badra</author>
<author pid="33/592">Guy Pujolle</author>
<title>Towards more secure EMV purchase transactions.</title>
<pages>203-222</pages>
<year>2021</year>
<volume>76</volume>
<journal>Ann. des T&#233;l&#233;communications</journal>
<number>3-4</number>
<ee>https://doi.org/10.1007/s12243-020-00784-1</ee>
<url>db/journals/adt/adt76.html#MadhounBBP21</url>
</article>
</r>
<r><inproceedings key="conf/csnet/Al-MohtarDMM21" mdate="2021-12-03">
<author pid="307/8980">Darine Al-Mohtar</author>
<author pid="307/8667">Amani Ramzi Daou</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="167/2220">Rachad Maallawi</author>
<title>A secure blockchain-based architecture for the COVID-19 data network.</title>
<pages>1-5</pages>
<year>2021</year>
<booktitle>CSNet</booktitle>
<ee>https://doi.org/10.1109/CSNet52717.2021.9614272</ee>
<crossref>conf/csnet/2021</crossref>
<url>db/conf/csnet/csnet2021.html#Al-MohtarDMM21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ntms/Maldonado-Ruiz021" mdate="2023-03-21">
<author orcid="0000-0002-2509-5929" pid="238/0485">Daniel Alejandro Maldonado-Ruiz</author>
<author pid="59/10809">Jenny Torres 0001</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="01/2788">Mohamad Badra</author>
<title>An Innovative and Decentralized Identity Framework Based on Blockchain Technology.</title>
<pages>1-8</pages>
<year>2021</year>
<booktitle>NTMS</booktitle>
<ee>https://doi.org/10.1109/NTMS49979.2021.9432656</ee>
<crossref>conf/ntms/2021</crossref>
<url>db/conf/ntms/ntms2021.html#Maldonado-Ruiz021</url>
</inproceedings>
</r>
<r><inproceedings key="conf/brains/Maldonado-RuizT20" mdate="2023-03-21">
<author orcid="0000-0002-2509-5929" pid="238/0485">Daniel Alejandro Maldonado-Ruiz</author>
<author pid="59/10809">Jenny Torres 0001</author>
<author pid="171/5697">Nour El Madhoun</author>
<title>3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography.</title>
<pages>45-46</pages>
<year>2020</year>
<booktitle>BRAINS</booktitle>
<ee>https://doi.org/10.1109/BRAINS49436.2020.9223300</ee>
<crossref>conf/brains/2020</crossref>
<url>db/conf/brains/brains2020.html#Maldonado-RuizT20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mspn/Maldonado-RuizB20" mdate="2023-03-21">
<author orcid="0000-0002-2509-5929" pid="238/0485">Daniel Alejandro Maldonado-Ruiz</author>
<author pid="01/2788">Mohamad Badra</author>
<author pid="171/5697">Nour El Madhoun</author>
<author pid="59/10809">Jenny Torres 0001</author>
<title>Secure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users.</title>
<pages>15-30</pages>
<year>2020</year>
<booktitle>MSPN</booktitle>
<ee>https://doi.org/10.1007/978-3-030-67550-9_2</ee>
<crossref>conf/mspn/2020</crossref>
<url>db/conf/mspn/mspn2020.html#Maldonado-RuizB20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tokenomics/HatinBHM20" mdate="2021-02-11">
<author pid="199/9685">Julien Hatin</author>
<author pid="99/837">Emmanuel Bertin</author>
<author orcid="0000-0003-3923-1829" pid="81/1375">Baptiste Hemery</author>
<author pid="171/5697">Nour El Madhoun</author>
<title>Welcome to the Jungle: A Reference Model for Blockchain, DLT and Smart-Contracts (Short Paper).</title>
<pages>13:1-13:5</pages>
<year>2020</year>
<booktitle>Tokenomics</booktitle>
<ee type="oa">https://doi.org/10.4230/OASIcs.Tokenomics.2020.13</ee>
<crossref>conf/tokenomics/2020</crossref>
<url>db/conf/tokenomics/tokenomics2020.html#HatinBHM20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csnet/MadhounHB19" mdate="2020-06-16">
<author pid="171/5697">Nour El Madhoun</author>
<author pid="199/9685">Julien Hatin</author>
<author pid="99/837">Emmanuel Bertin</author>
<title>Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications?</title>
<pages>21-27</pages>
<year>2019</year>
<booktitle>CSNet</booktitle>
<ee>https://doi.org/10.1109/CSNet47905.2019.9108966</ee>
<crossref>conf/csnet/2019</crossref>
<url>db/conf/csnet/csnet2019.html#MadhounHB19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csnet/MadhounBP19" mdate="2020-06-16">
<author pid="171/5697">Nour El Madhoun</author>
<author pid="99/837">Emmanuel Bertin</author>
<author pid="33/592">Guy Pujolle</author>
<title>The EMV Payment System: Is It Reliable?</title>
<pages>80-85</pages>
<year>2019</year>
<booktitle>CSNet</booktitle>
<ee>https://doi.org/10.1109/CSNet47905.2019.9108846</ee>
<crossref>conf/csnet/2019</crossref>
<url>db/conf/csnet/csnet2019.html#MadhounBP19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/MadhounBP18" mdate="2025-08-05">
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="99/837">Emmanuel Bertin</author>
<author pid="33/592">Guy Pujolle</author>
<title>For Small Merchants: A Secure Smartphone-Based Architecture to Process and Accept NFC Payments.</title>
<pages>403-411</pages>
<year>2018</year>
<booktitle>TrustCom/BigDataSE</booktitle>
<ee>https://doi.org/10.1109/TrustCom/BigDataSE.2018.00067</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/TrustCom/BigDataSE.2018.00067</ee>
<crossref>conf/trustcom/2018</crossref>
<url>db/conf/trustcom/trustcom2018.html#MadhounBP18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csnet/MadhounB17" mdate="2018-02-28">
<author pid="171/5697">Nour El Madhoun</author>
<author pid="99/837">Emmanuel Bertin</author>
<title>Magic always comes with a price: Utility versus security for bank cards.</title>
<pages>1-7</pages>
<year>2017</year>
<booktitle>CSNet</booktitle>
<ee>https://doi.org/10.1109/CSNET.2017.8241995</ee>
<crossref>conf/csnet/2017</crossref>
<url>db/conf/csnet/csnet2017.html#MadhounB17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/MadhounP16" mdate="2017-05-23">
<author pid="171/5697">Nour El Madhoun</author>
<author pid="33/592">Guy Pujolle</author>
<title>Security Enhancements in EMV Protocol for NFC Mobile Payment.</title>
<pages>1889-1895</pages>
<year>2016</year>
<booktitle>Trustcom/BigDataSE/ISPA</booktitle>
<ee>https://doi.org/10.1109/TrustCom.2016.0289</ee>
<crossref>conf/trustcom/2016</crossref>
<url>db/conf/trustcom/trustcom2016.html#MadhounP16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cloudnet/MadhounGP15" mdate="2025-08-05">
<author orcid="0000-0001-7742-7748" pid="171/5697">Nour El Madhoun</author>
<author pid="127/7139">Fouad Amine Guenane</author>
<author pid="33/592">Guy Pujolle</author>
<title>A cloud-based secure authentication protocol for contactless-NFC payment.</title>
<pages>328-330</pages>
<year>2015</year>
<booktitle>CloudNet</booktitle>
<ee>https://doi.org/10.1109/CloudNet.2015.7335332</ee>
<crossref>conf/cloudnet/2015</crossref>
<url>db/conf/cloudnet/cloudnet2015.html#MadhounGP15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nof/MadhounG14" mdate="2017-05-26">
<author pid="171/5697">Nour El Madhoun</author>
<author pid="127/7139">Fouad Amine Guenane</author>
<title>An innovative cloud-based RFID traceability architecture and service.</title>
<pages>1-5</pages>
<year>2014</year>
<booktitle>NOF</booktitle>
<ee>https://doi.org/10.1109/NOF.2014.7119772</ee>
<crossref>conf/nof/2014</crossref>
<url>db/conf/nof/nof2014.html#MadhounG14</url>
</inproceedings>
</r>
<coauthors n="63" nc="7">
<co c="0"><na f="a/Agha:Khaldoun_Al" pid="97/3431">Khaldoun Al Agha</na></co>
<co c="0"><na f="a/Ahmadieh:Elsi" pid="352/1966">Elsi Ahmadieh</na></co>
<co c="3"><na f="a/Al=Mohtar:Darine" pid="307/8980">Darine Al-Mohtar</na></co>
<co c="5"><na f="a/Alsadoon:Abeer" pid="160/8936">Abeer Alsadoon</na></co>
<co c="0"><na f="a/Archip:Alexandru" pid="35/5343">Alexandru Archip</na></co>
<co c="0"><na f="a/Audras:Antoine" pid="324/6106">Antoine Audras</na></co>
<co c="2"><na f="b/Badr:Youakim" pid="93/521">Youakim Badr</na></co>
<co c="0"><na f="b/Badra:Mohamad" pid="01/2788">Mohamad Badra</na></co>
<co c="0"><na f="b/Bazain:Danyil" pid="373/0438">Danyil Bazain</na></co>
<co c="0"><na f="b/Benabdallah:Ali" pid="201/8958">Ali Benabdallah</na></co>
<co c="0"><na f="b/Bertin:Emmanuel" pid="99/837">Emmanuel Bertin</na></co>
<co c="1"><na f="b/Bhan:Rati" pid="168/1156">Rati Bhan</na></co>
<co c="1"><na f="b/Bhatia:Sajal" pid="98/2037">Sajal Bhatia</na></co>
<co c="0"><na f="b/Bilot:Tristan" pid="325/7908">Tristan Bilot</na></co>
<co c="0"><na f="b/Binand:Nicolas" pid="373/0450">Nicolas Binand</na></co>
<co c="2"><na f="b/Bouzefrane_0001:Samia" pid="b/SamiaBouzefrane">Samia Bouzefrane 0001</na></co>
<co c="0"><na f="c/Caizapanta:Elian" pid="433/2379">Elian Caizapanta</na></co>
<co c="0"><na f="c/Castro:Eddy" pid="433/2965">Eddy Castro</na></co>
<co c="6"><na f="c/Chabbi:Samir" pid="268/1940">Samir Chabbi</na></co>
<co c="0"><na f="c/Chalouati:Hani" pid="400/3482">Hani Chalouati</na></co>
<co c="2"><na f="c/Conord:Pierrick" pid="378/7644">Pierrick Conord</na></co>
<co c="0"><na f="c/Coudert:Louis" pid="324/5811">Louis Coudert</na></co>
<co c="5"><na f="d/Daimi:Kevin" pid="03/2914">Kevin Daimi</na></co>
<co c="3"><na f="d/Daou:Amani_Ramzi" pid="307/8667">Amani Ramzi Daou</na></co>
<co c="4"><na f="e/Ezzouhairi:Abdellatif" pid="13/7641">Abdellatif Ezzouhairi</na></co>
<co c="1"><na f="f/Faruki:Parvez" pid="17/11140">Parvez Faruki</na></co>
<co c="0"><na f="g/Guenane:Fouad_Amine" pid="127/7139">Fouad Amine Guenane</na></co>
<co c="0"><na f="h/Hammi:Badis" pid="145/3079">Badis Hammi</na></co>
<co c="0"><na f="h/Han:Xueyuan" pid="182/6753">Xueyuan Han</na></co>
<co c="0"><na f="h/Hatin:Julien" pid="199/9685">Julien Hatin</na></co>
<co c="0"><na f="h/Hemery:Baptiste" pid="81/1375">Baptiste Hemery</na></co>
<co c="0"><na f="h/Hwang:Chan_Yeong" pid="404/2737">Chan Yeong Hwang</na></co>
<co c="0"><na f="i/Iqbal:Shahrear" pid="51/8816">Shahrear Iqbal</na></co>
<co c="0"><na f="j/Jaen:Maxime" pid="373/0923">Maxime Jaen</na></co>
<co c="1"><na f="j/Jain:Vinesh" pid="142/1453">Vinesh Jain</na></co>
<co c="0"><na f="j/Jankovskaja:Elina" pid="404/2381">Elina Jankovskaja</na></co>
<co c="0"><na f="j/Jaouhari:Saad_El" pid="197/6985">Saad El Jaouhari</na></co>
<co c="0"><na f="j/Jiang:Baoxiang" pid="280/1210">Baoxiang Jiang</na></co>
<co c="2"><na f="k/Kazem:Hussein" pid="378/8049">Hussein Kazem</na></co>
<co c="6"><na f="k/Khamer:Lazhar" pid="285/2056">Lazhar Khamer</na></co>
<co c="4"><na f="k/Khan:Muhammad_Haris" pid="155/3076">Muhammad Haris Khan</na></co>
<co c="4"><na f="l/Laabab:Ilham" pid="397/7824">Ilham Laabab</na></co>
<co c="0"><na f="l/Li:Zefeng" pid="189/8685">Zefeng Li</na></co>
<co c="3"><na f="m/Maallawi:Rachad" pid="167/2220">Rachad Maallawi</na></co>
<co c="0"><na f="m/Maldonado=Ruiz:Daniel_Alejandro" pid="238/0485">Daniel Alejandro Maldonado-Ruiz</na></co>
<co c="0"><na f="m/Mazari:Messilva" pid="404/1720">Messilva Mazari</na></co>
<co c="0"><na f="m/Mesbah:Djamel" pid="373/0691">Djamel Mesbah</na></co>
<co c="0"><na f="m/Mitta:Chems" pid="373/0177">Chems Mitta</na></co>
<co c="0"><na f="p/Pab=oacute=n:Thelman" pid="433/4187">Thelman Pab&#243;n</na></co>
<co c="1"><na f="p/Pamula:Rajendra" pid="184/2100">Rajendra Pamula</na></co>
<co c="0"><na f="p/Pasquier:Thomas" pid="144/4204">Thomas Pasquier</na></co>
<co c="5"><na f="p/Peoples:Cathryn" pid="11/5488">Cathryn Peoples</na></co>
<co c="0"><na f="p/Pujolle:Guy" pid="33/592">Guy Pujolle</na></co>
<co c="0"><na f="p/Pulval=Dady:Alan" pid="392/7667">Alan Pulval-Dady</na></co>
<co c="0"><na f="s/Sadykova:Karima" pid="404/1586">Karima Sadykova</na></co>
<co c="0"><na f="s/Shi:Yulin" pid="246/0828">Yulin Shi</na></co>
<co c="0"><na f="s/Soloveva:Julia" pid="404/1941">Julia Soloveva</na></co>
<co c="0"><na f="t/Torres_0001:Jenny" pid="59/10809">Jenny Torres 0001</na></co>
<co c="0"><na f="t/Tufi=ntilde=o:C=eacute=sar" pid="433/2720">C&#233;sar Tufi&#241;o</na></co>
<co c="0"><na f="v/V=aacute=sconez:Gabriel" pid="433/3836">Gabriel V&#225;sconez</na></co>
<co c="0"><na f="v/Vavilov:Andrei" pid="404/2112">Andrei Vavilov</na></co>
<co c="0"><na f="w/Wang:Zhe" pid="75/3158">Zhe Wang</na></co>
<co c="0"><na f="z/Zouaoui:Anis" pid="166/4216">Anis Zouaoui</na></co>
</coauthors>
</dblpperson>

