<?xml version="1.0"?>
<dblpperson name="Yasmine Labiod" pid="298/5621" n="2">
<person key="homepages/298/5621" mdate="2021-08-04">
<author pid="298/5621">Yasmine Labiod</author>
</person>
<r><article key="journals/wpc/LabiodKG22" mdate="2023-03-21">
<author orcid="0000-0001-7340-0425" pid="298/5621">Yasmine Labiod</author>
<author pid="130/8830">Abdelaziz Amara Korba</author>
<author orcid="0000-0001-5271-5970" pid="01/7583">Nassira Ghoualmi</author>
<title>Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks.</title>
<pages>231-259</pages>
<year>2022</year>
<volume>125</volume>
<journal>Wirel. Pers. Commun.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11277-022-09548-7</ee>
<url>db/journals/wpc/wpc125.html#LabiodKG22</url>
</article>
</r>
<r><article key="journals/ijisp/LabiodKG21" mdate="2021-09-20">
<author pid="298/5621">Yasmine Labiod</author>
<author pid="130/8830">Abdelaziz Amara Korba</author>
<author orcid="0000-0001-5271-5970" pid="01/7583">Nacira Ghoualmi-Zine</author>
<title>Detecting DDoS Attacks in IoT Environment.</title>
<pages>145-180</pages>
<year>2021</year>
<volume>15</volume>
<journal>Int. J. Inf. Secur. Priv.</journal>
<number>2</number>
<ee>https://doi.org/10.4018/IJISP.2021040108</ee>
<url>db/journals/ijisp/ijisp15.html#LabiodKG21</url>
</article>
</r>
<coauthors n="2" nc="1">
<co c="0" n="3"><na f="g/Ghoualmi=Zine:Nassira" pid="01/7583">Nassira Ghoualmi-Zine</na><na>Nacira Ghoualmi-Zine</na><na>Nassira Ghoualmi</na></co>
<co c="0"><na f="k/Korba:Abdelaziz_Amara" pid="130/8830">Abdelaziz Amara Korba</na></co>
</coauthors>
</dblpperson>

