Wiem Tounsi
Wiem Tounsi
PhD from Telecom Bretagne - Institut Mines-Telecom / Post-­Doctoral Research Fellow LIP6
Verified email at telecom-bretagne.eu - Homepage
Title
Cited by
Cited by
Year
A survey on technical threat intelligence in the age of sophisticated cyber attacks
W Tounsi, H Rais
Computers & Security, 2017
1812017
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks.
W Tounsi, J Garcia-Alfaro, N Cuppens-Boulahia, F Cuppens
CNSR, 284-291, 2010
172010
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
W Tounsi, N Cuppens-Boulahia, J Garcia-Alfaro, Y Chevalier, F Cuppens
Journal of Network and Computer Applications 39, 152-166, 2014
122014
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform
W Tounsi, N Cuppens-Boulahia, F Cuppens, G Pujolle
World Wide Web Journal, 2015
112015
A survey on Mobile Agent Based Intrusion Detection System
S Shiv Shakti, G Nitin, C Saurabh, G Saugata
International Symposium on Devices MEMS, Intelligent Systems & Communication …, 2011
10*2011
Fine-grained privacy control for the RFID middleware of EPCglobal networks
W Tounsi, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro
5th International Conference on Management of Emergent Digital EcoSystems, 60-67, 2013
82013
What is Cyber Threat intelligence and How is it Evolving?
W Tounsi
Cyber-Vigilance and Digital Trust: Cybersecurity in the Era of Cloud …, 2019
52019
Privacy-enhanced filtering and collection middleware in epcglobal networks
W Tounsi, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro
2013 International Conference on Risks and Security of Internet and Systems …, 2013
52013
Formal verification of a key establishment protocol for EPC gen2 RFID systems: work in progress
W Tounsi, N Cuppens-Boulahia, F Cuppens, J Garcia-Alfaro
Foundations and Practice of Security / http://dl.acm.org/citation.cfm?id …, 2011
52011
Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
W Tounsi
John Wiley & Sons, 2019
42019
Security and privacy controls in rfid systems applied to EPCglobal networks
W Tounsi
Télécom Bretagne; Université de Rennes 1, 2014
32014
Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions
EM Garcia
Tech. Rep., Royal Holloway University of London, Egham, United Kingdom, 2015
12015
Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions
EM Garcia
Tech. Rep., Royal Holloway University of London, Egham, United Kingdom, 2015
12015
Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions
EM Garcia
technical Report, 2015
12015
Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm
W Tounsi, B Justus, NC Boulahia, F Cuppen, JG Alfaro
Software Security and Reliability-C (SERE-C), 2014 IEEE Eighth International …, 2014
12014
A distributed multi-level anomalies detection system using the mobile agent approach
F Ben Ftima, W Tounsi, K Karoui, H Ben Ghezala
Global Information Infrastructure Symposium, 2009. GIIS'09., 1-4, 2009
12009
Cybervigilance et confiance numérique: La cybersécurité à l’ère du Cloud et des objets connectés
W Tounsi
ISTE Group, 2019
2019
Security and Privacy Controls in RFID Systems Applied to EPCglobal Networks
D de Telecom Bretagne, W TOUNSI
Université de Brest, 2014
2014
Objective privacy : understanding the privacy impact of information exchange
M Veeningen
Technische Universiteit Eindhoven, 2014
2014
Security in Wireless Networks
W TOUNSI
2012
The system can't perform the operation now. Try again later.
Articles 1–20