default search action
Yacine Rebahi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Yacine Rebahi, Benjamin Hilliger, Patrick Lowin, Alberto Cardoso:
AI Based Predictive Maintenance as a Key Enabler for Circular Economy: The KYKLOS 4.0 Approach. DCOSS-IoT 2023: 367-372 - 2020
- [j13]Budankailu Sameer Kumar Subudhi, Faruk Catal, Nikolay Tcholtchev, Kin Tsun Chiu, Yacine Rebahi, Michell Boerger, Philipp Lämmel:
Performance Testing for VoIP Emergency Services: a Case Study of the EMYNOS Platform and a Reflection on potential Blockchain Utilisation for NG112 Emergency Communication. J. Ubiquitous Syst. Pervasive Networks 12(1): 1-8 (2020) - [c21]Yacine Rebahi, Faruk Catal, Nikolay Tcholtchev, Laurenz Maedje, Omar Alkhateeb, Vinoth Kumar Elangovan, Dimitris Apostolakis:
Towards Accelerating Intrusion Detection Operations at the Edge Network using FPGAs. FMEC 2020: 104-111 - [c20]Ramon Barakat, Faruk Catal, Nikolay Tcholtchev, Yacine Rebahi, Ina Schieferdecker:
Industrial Grade Methodology for Firewall Simulation and Requirements Verification. NOMS 2020: 1-7 - [c19]Ramon Barakat, Faruk Catal, Nikolay Tcholtchev, Yacine Rebahi:
TTCN-3 based NG112 Test System and Playground for Emergency Communication. QRS Companion 2020: 492-497
2010 – 2019
- 2019
- [c18]Budankailu Sameer Kumar Subudhi, Faruk Catal, Nikolay Tcholtchev, Kin Tsun Chiu, Yacine Rebahi:
Performance Testing for VoIP Emergency Services: a Case Study of the EMYNOS Platform. ANT/EDI40 2019: 287-294 - 2018
- [j12]Yacine Rebahi, Kin Tsun Chiu, Nikolay Tcholtchev, Simon Hohberg, Evangelos Pallis, Evangelos K. Markakis:
Towards a next generation 112 testbed: The EMYNOS ESInet. Int. J. Crit. Infrastructure Prot. 22: 39-50 (2018) - 2017
- [j11]Evangelos K. Markakis, Asimakis Lykourgiotis, Ilias Politis, Anastasios Dagiuklas, Yacine Rebahi, Evangelos Pallis:
EMYNOS: Next Generation Emergency Communication. IEEE Commun. Mag. 55(1): 139-145 (2017) - [j10]Evangelos K. Markakis, Ilias Politis, Asimakis Lykourgiotis, Yacine Rebahi, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis:
Efficient Next Generation Emergency Communications over Multi-Access Edge Computing. IEEE Commun. Mag. 55(11): 92-97 (2017) - 2016
- [j9]Yacine Rebahi, Mateusz Khalil, Simon Hohberg, Pascal Lorenz:
An Android based new German eID solution for policy making processes. Secur. Commun. Networks 9(11): 1271-1284 (2016) - 2015
- [c17]Foteini Andriopoulou, Ilias Politis, Asimakis Lykourgiotis, Tasos Dagiuklas, Dionisios Serras, Yacine Rebahi:
EMYNOS: A next generation emergency communication platform for people with disabilities. SKIMA 2015: 1-8 - 2014
- [c16]Gabriele Bavota, Alicja Ciemniewska, Ilknur Chulani, Antonio De Nigro, Massimiliano Di Penta, Davide Galletti, Roberto Galoppini, Thomas F. Gordon, Pawel Kedziora, Ilaria Lener, Francesco Torelli, Roberto Pratola, Juliusz Pukacki, Yacine Rebahi, Sergio García Villalonga:
The market for open source: An intelligent virtual open source marketplace. CSMR-WCRE 2014: 399-402 - [c15]Georgios Xilouris, Eleni Trouva, Felicia Lobillo, João M. Soares, Jorge Carapinha, Michael J. McGrath, George Gardikis, Pietro Paglierani, Evangelos Pallis, Letterio Zuccaro, Yacine Rebahi, Anastasios Kourtis:
T-NOVA: A marketplace for virtualized network functions. EuCNC 2014: 1-5 - [c14]Dirk Hoffstadt, Erwin P. Rathgeb, Matthias Liebig, Ralf Meister, Yacine Rebahi, Tran Quang Thanh:
A comprehensive framework for detecting and preventing VoIP fraud and misuse. ICNC 2014: 807-813 - [c13]Tran Quang Thanh, Yacine Rebahi, Thomas Magedanz:
A DIAMETER based security framework for mobile networks. TEMU 2014: 7-12 - 2012
- [c12]Tran Quang Thanh, Yacine Rebahi, Thomas Magedanz:
An open testbed for diameter networks. SoftCOM 2012: 1-5 - [c11]Aggeliki Tsohou, Habin Lee, Yacine Rebahi, Mateusz Khalil, Simon Hohberg:
Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations. TrustBus 2012: 236-237 - 2011
- [j8]Yacine Rebahi, Tran Quang Thanh, Mao Tong, Fernando López Aguilar, José Manuel López López, Luis A. Teixeira, Nelson Blanco:
An IP based platform for emergency calls and reporting. Int. J. Crit. Infrastructure Prot. 4(3-4): 137-153 (2011) - [j7]Yacine Rebahi, Mohamed Nassar, Thomas Magedanz, Olivier Festor:
A survey on fraud and service misuse in voice over IP (VoIP) networks. Inf. Secur. Tech. Rep. 16(1): 12-19 (2011) - [j6]Ge Zhang, Yacine Rebahi:
Side effects of identity management in SIP VoIP environment. Inf. Secur. Tech. Rep. 16(1): 29-35 (2011) - [j5]Dimitris Gritzalis, Giannis F. Marias, Yacine Rebahi, Yannis Soupionis, Sven Ehlert:
SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT). J. Comput. Secur. 19(5): 835-867 (2011) - [c10]Yacine Rebahi, Nikolay Tcholtchev, Ranganai Chaparadza, Vasilis N. Merekoulias:
Addressing security issues in the autonomic Future Internet. CCNC 2011: 517-518 - 2010
- [c9]Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simone Fischer-Hübner:
SIP Proxies: New Reflectors in the Internet. Communications and Multimedia Security 2010: 142-153 - [c8]Andreea Ancuta Onofrei, Yacine Rebahi, Thomas Magedanz, Fernando López Aguilar, José Manuel López López:
Emergency Services in IMS. TRIDENTCOM 2010: 643-652 - [i1]Andreea Ancuta Onofrei, Yacine Rebahi, Thomas Magedanz:
Preventing Distributed Denial-of-Service Attacks on the IMS Emergency Services Support through Adaptive Firewall Pinholing. CoRR abs/1003.5429 (2010)
2000 – 2009
- 2009
- [j4]Sven Ehlert, Yacine Rebahi, Thomas Magedanz:
Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks. Int. J. Secur. Networks 4(3): 189-200 (2009) - [j3]Fabricio Carvalho de Gouveia, Yacine Rebahi, Joaquim Ruiz Planella, Thomas Magedanz:
Emergency Services Control Model for Next Generation Networks. Netw. Protoc. Algorithms 1(2): 99-112 (2009) - 2008
- [c7]Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguyen, Sven Ehlert, Gergely Kovacs, Dorgham Sisalem:
Performance analysis of identity management in the Session Initiation Protocol (SIP). AICCSA 2008: 711-717 - [c6]Yacine Rebahi, Muhammad Sher, Thomas Magedanz:
Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks. AICCSA 2008: 848-851 - [c5]Dorgham Sisalem, Mikkel Liisberg, Yacine Rebahi:
A Theoretical Model of the Effects of Losses and Delays on the Performance of SIP. GLOBECOM 2008: 1497-1502 - [c4]Yacine Rebahi, C. S. Farres:
Spam over Internet telephony: Prototype implementation. ICT 2008: 1-6 - [c3]Christos Politis, Tasos Dagiuklas, Yacine Rebahi:
IMS to Support Emergency Services and Applications. MobiMedia 2008 - [c2]Yacine Rebahi, Sven Ehlert, Andreas Bergmann:
A SPIT Detection Mechanism Based on Audio Analysis. MobiMedia 2008 - 2007
- [j2]Tasos Dagiuklas, Christos Politis, Fadi-Sotiris Salloum, Dimitris Theofilatos, Sara Grilli Colombo, Yacine Rebahi, Dorgham Sisalem, Rahim Tafazolli:
Seamless multimedia sessions and real-time measurements in hybrid 3G and WLAN networks. Int. J. Wirel. Mob. Comput. 2(2/3): 159-172 (2007) - 2006
- [j1]Károly Farkas, Oliver Wellnitz, Matthias Dick, X. Gu, Marcel Busse, Wolfgang Effelsberg, Yacine Rebahi, Dorgham Sisalem, Dan Grigoras, Kyriakos Stefanidis, Dimitrios N. Serpanos:
Real-time service provisioning for mobile and wireless networks. Comput. Commun. 29(5): 540-550 (2006) - 2005
- [c1]Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisalem:
A Reputation-Based Trust Mechanism for Ad Hoc Networks. ISCC 2005: 37-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint