During my research carrier, I have published a number of national as well as international scientific research papers, below is a list of them:
Peer-reviewed journals
25. Marwa A. A Elsayed, Michael Wrana, Ziad Mansour, Karim Lounis, H. H Ding, Steven, Mohammad Zulkernine. AdaptIDS: Adaptive Intrusion Detection for Mission-critical Aerospace Vehicles, IEEE Transactions on Intelligent Transportation Systems, 10 pages, IEEE, 2022.
24. K. Lounis, S. H. H. Ding, and M. Zulkernine. D2D-MAP: A Drone to Drone Authentication Protocol using Physical Unclonable Functions, IEEE Transactions on Vehicular Technology, 15 pages, IEEE, 2022.
23. Michael Wrana, Marwa A. A Elsayed, Karim Lounis, Ziad Mansour, H. H Ding, Steven, Mohammad Zulkernine. OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-Attack Simulation, ACM Transactions on Cyber-Physical Systems, 22 pages, ACM, 2022.
22. K. Lounis, Z Mansour, M Wrana, MA Elsayed, SHH Ding, M Zulkernine. A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus. IEEE Transactions on Aerospace and Electronic Systems, 19 pages, IEEE, 2022.
21. K. Lounis and M. Zulkernine. T2T-MAP: A PUF-based Thing-to-Thing Mutual Authentication Protocol for IoT. In IEEE Access, 22 pages, IEEE, 2021.
20. K. Lounis and M. Zulkernine. Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT. In ACM Digital Threats: Research and Practice, 33 pages, ACM, 2021.
19. K. Lounis and M. Zulkernine. Attacks and Defenses in Short-Range Wireless Technologies for IoT. In IEEE Access, vol. 8, pp. 88892 - 88932, IEEE, 2020.
18. C. Benzaid, K. Lounis, A. Al-Nemrat, N. Badache and M. Alazab. Fast Authentication in Wireless Sensor Networks. In Future Generation Computer Systems, vol. 55, pp. 362–375, Elsevier, 2016.
Peer-reviewed conference and workshop papers
17. K. Lounis. Cut It: Deauthentication Attack on Bluetooth. In the 14th International Conference on Security of Information and Networks, SIN’21, Edinburgh, Scotland, UK, December 15-17, 2021, pages 1-8, IEEE. 2021.
16. K. Lounis, S. H. H. Ding, and M. Zulkernine. Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3. In the 14th International Symposium on the Foundations of Security and Practices, FPS’21, Paris, France, December 7-10, 2021, 17 pages, Springer, 2021.
15. K. Lounis and M. Zulkernine. Exploiting Race-Condition for Wi-Fi Denial of Service Attacks. In the 13th International Conference on Security of Information and Networks, SIN’20, Istanbul, Turkey, November 4-7, 2020, pages 1-8, ACM. 2020.
14. K. Lounis and S. Ouchani. Modeling Attack-Defense Trees’ Countermeasures using Continuous Time Markov Chains. In the 2nd International Workshop on Automated and Verifiable Software System Development, ASYDE’19, Amsterdam, Netherlands, September 15th, volume 12524. pages 1-12, Springer, 2020.
13. K. Lounis and M. Zulkernine. Frequency Hopping Spread Sprectrum to Counter Relay Attacks on PKESs. In the 15th International Conference on Risks and Security of Internet and Systems, CRiSIS’20, Paris, France, November 4-6, 2020, volume 12528, pages 1-18, Springer, 2020 .
12. K. Lounis and M. Zulkernine. Bad-Token: Denial of Service Attacks on WPA3. In the 12th International Conference on Security of Information and Networks, SIN’19, Sochi, Russia, September 12-15, 2019, article 15, pages 1-8, ACM, 2019.
11. K. Lounis and M. Zulkernine. WPA3 Connection Deprivation Attacks. In the 14th International Conference on Risks and Security of Internet and Systems, CRiSIS’19, Hammamet, Tunisia, October 29-31, 2019, pages 164-176, Springer, 2019.
10. K. Lounis and M. Zulkernine. Bluetooth Low Energy Makes Just Works Not Work. In the 3rd Cyber Security and Networking Conference, CSNet’19, Quito, Ecuador, October 23-25, 2019, pages 99-106, IEEE, 2019.
9. J. Wang, K. Lounis, and M. Zulkernine. CSKES: A context-based Secure Keyless Entry System. In the 43rd IEEE Annual Computer Software and Applications Conference, COMPSAC’19, Milwaukee, Wisconsin, USA, July 15-19, 2019, pp. 817-822, IEEE, 2019.
8. J. Wang, K. Lounis, and M. Zulkernine. Identifying Security Features for Proximity Identification. In the 14th IEEE International Workshop on Security, Trust and Privacy for Software Applications, STPSA’19, Milwaukee, Wisconsin, USA, July 15-19, 2019, pp. 592-597, IEEE, 2019.
7. K. Lounis and M. Zulkernine. Connection Dumping Vulnerability Affecting Bluetooth Availability. In the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS’18, Arcachan, France, October 16-18, 2018, pages 188-204, Springer, 2018.
6. R. Jhawar, K. Lounis, S. Mauw, Y. Ramírez-Cruz. Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library. In the 14th International Workshop on Security and Trust Management, STM’19, Barcelona, Spain, September 6-7, 2018, Vol. 11091, pages 85-101, Springer, 2018.
5. K. Lounis. Stochastic-based Semantics Of Attack-Defense Trees For Security Assessment. In the 9th International Workshop on Practical Applications of Stochastic Modelling, PASM’17, Berlin, Germany, September 9th, 2017, vol. 337, pages 135-154, Elsevier, 2017.
4. R. Jhawar, K. Lounis, and S. Mauw. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. In the 12th International Workshop on Security and Trust Management, STM’16, Heraklion, Greece, September 26-27, 2016, volume 9871, pages. 138-153, Springer, 2016.
3. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.0. In the 13th International Conference on Quantitative Evaluation of Systems, QEST’16, Québec City, Québec, Canada, August 23-26, 2016, volume 9826, pp. 159-162, Springer, 2016.
5. K. Lounis. Stochastic-based Semantics Of Attack-Defense Trees For Security Assessment. In the 9th International Workshop on Practical Applications of Stochastic Modelling, PASM’17, Berlin, Germany, September 9th, 2017, vol. 337, pages 135-154, Elsevier, 2017.
4. R. Jhawar, K. Lounis, and S. Mauw. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. In the 12th International Workshop on Security and Trust Management, STM’16, Heraklion, Greece, September 26-27, 2016, volume 9871, pages. 138-153, Springer, 2016.
3. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.0. In the 13th International Conference on Quantitative Evaluation of Systems, QEST’16, Québec City, Québec, Canada, August 23-26, 2016, volume 9826, pp. 159-162, Springer, 2016.
Technical reports
2. K. Lounis, N. Taboudjemat, and A. Babakhouya. Setting up a Wireless Intrusion Detection Solution based on Kismet. Technical report CERIST-DTISI/RT–11-000000023–dz, 2011.
1. K. Lounis, N. Taboudjemat, and A. Babakhouya. Setting up Firmwares DD-WRT and Open WRT on Wireless Linksys WRT54GL Routers. Technical report CERIST-DTISI/RT–11-000000024–dz, 2011.
2. K. Lounis, N. Taboudjemat, and A. Babakhouya. Setting up a Wireless Intrusion Detection Solution based on Kismet. Technical report CERIST-DTISI/RT–11-000000023–dz, 2011.
1. K. Lounis, N. Taboudjemat, and A. Babakhouya. Setting up Firmwares DD-WRT and Open WRT on Wireless Linksys WRT54GL Routers. Technical report CERIST-DTISI/RT–11-000000024–dz, 2011.