Nesrine Kaaniche

1.7k total citations · 1 hit paper
31 papers, 917 citations indexed

About

Nesrine Kaaniche is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Nesrine Kaaniche has authored 31 papers receiving a total of 917 indexed citations (citations by other indexed papers that have themselves been cited), including 26 papers in Artificial Intelligence, 14 papers in Information Systems and 8 papers in Computer Networks and Communications. Recurrent topics in Nesrine Kaaniche's work include Cryptography and Data Security (19 papers), Privacy-Preserving Technologies in Data (18 papers) and Cloud Data Security Solutions (11 papers). Nesrine Kaaniche is often cited by papers focused on Cryptography and Data Security (19 papers), Privacy-Preserving Technologies in Data (18 papers) and Cloud Data Security Solutions (11 papers). Nesrine Kaaniche collaborates with scholars based in France, United Kingdom and United States. Nesrine Kaaniche's co-authors include Maryline Laurent, Sana Belguith, Ola Salman, Hassan Noura, Ali Chehab, Jean-Paul A. Yaacoub, Abderrazak Jemai, Rabah Attia, Mohammad Hammoudeh and Giovanni Russello and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Vehicular Technology and Future Generation Computer Systems.

In The Last Decade

Nesrine Kaaniche

29 papers receiving 884 citations

Hit Papers

Cyber-physical systems security: Limitations, issues and ... 2020 2026 2022 2024 2020 50 100 150 200 250

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Nesrine Kaaniche France 13 502 472 322 134 114 31 917
Luigi Romano Italy 18 393 0.8× 523 1.1× 445 1.4× 78 0.6× 121 1.1× 87 915
Péter Bertök Australia 17 564 1.1× 348 0.7× 429 1.3× 44 0.3× 178 1.6× 63 1.1k
Sana Belguith United Kingdom 13 424 0.8× 372 0.8× 302 0.9× 31 0.2× 130 1.1× 28 803
Yuhao Wu China 13 439 0.9× 226 0.5× 350 1.1× 145 1.1× 178 1.6× 25 778
Zhaofeng Ma China 15 354 0.7× 684 1.4× 324 1.0× 56 0.4× 64 0.6× 67 1.0k
Mohamed Nazih Omri Tunisia 15 332 0.7× 337 0.7× 294 0.9× 25 0.2× 65 0.6× 103 798
Guangdong Bai Australia 17 444 0.9× 470 1.0× 305 0.9× 200 1.5× 312 2.7× 103 1.0k
Ryusuke Masuoka United States 10 406 0.8× 599 1.3× 390 1.2× 47 0.4× 74 0.6× 21 945
Rainer Unland Germany 17 644 1.3× 568 1.2× 475 1.5× 45 0.3× 86 0.8× 96 1.1k

Countries citing papers authored by Nesrine Kaaniche

Since Specialization
Citations

This map shows the geographic impact of Nesrine Kaaniche's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Nesrine Kaaniche with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Nesrine Kaaniche more than expected).

Fields of papers citing papers by Nesrine Kaaniche

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Nesrine Kaaniche. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Nesrine Kaaniche. The network helps show where Nesrine Kaaniche may publish in the future.

Co-authorship network of co-authors of Nesrine Kaaniche

This figure shows the co-authorship network connecting the top 25 collaborators of Nesrine Kaaniche. A scholar is included among the top collaborators of Nesrine Kaaniche based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Nesrine Kaaniche. Nesrine Kaaniche is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kaaniche, Nesrine, et al.. (2025). AI-Based Anomaly Detection and Classification of Traffic Using Netflow. SPIRE - Sciences Po Institutional REpository. 644–649.
2.
Sedjelmaci, Hichem, Nesrine Kaaniche, & Kamel Tourki. (2024). Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture. Journal of Network and Systems Management. 32(2). 5 indexed citations
3.
Boudguiga, Aymen, et al.. (2023). SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation. Cryptography. 7(4). 52–52.
4.
Sedjelmaci, Hichem, Nesrine Kaaniche, Aymen Boudguiga, & Nirwan Ansari. (2023). Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles. IEEE Transactions on Vehicular Technology. 73(2). 2633–2642. 22 indexed citations
5.
Laurent, Maryline, et al.. (2022). PIMA: A Privacy-preserving Identity management system based on an unlinkable MAlleable signature. Journal of Network and Computer Applications. 208. 103517–103517. 2 indexed citations
6.
Laurent, Maryline, et al.. (2021). An Efficient User-Centric Consent Management Design for Multiservices Platforms. Security and Communication Networks. 2021. 1–19. 3 indexed citations
7.
Yaacoub, Jean-Paul A., et al.. (2020). Cyber-physical systems security: Limitations, issues and future trends. Microprocessors and Microsystems. 77. 103201–103201. 261 indexed citations breakdown →
8.
Kaaniche, Nesrine, et al.. (2020). ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments. SHILAP Revista de lepidopterología. 3. 4 indexed citations
9.
Kaaniche, Nesrine, Maryline Laurent, & Sana Belguith. (2020). Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. Journal of Network and Computer Applications. 171. 102807–102807. 80 indexed citations
10.
Laurent, Maryline, et al.. (2020). An Identity-matching Process to Strengthen Trust in Federated-identity Architectures. HAL (Le Centre pour la Communication Scientifique Directe). 142–154. 1 indexed citations
11.
Belguith, Sana, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, & Rabah Attia. (2019). Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing. 135. 1–20. 30 indexed citations
12.
Belguith, Sana, Nesrine Kaaniche, Mohammad Hammoudeh, & Tooska Dargahi. (2019). PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications. Future Generation Computer Systems. 111. 899–918. 58 indexed citations
13.
Belguith, Sana, Nesrine Kaaniche, & Giovanni Russello. (2019). CUPS: Secure opportunistic cloud of things framework based on attribute‐based encryption scheme supporting access policy update. Security and Privacy. 3(4). 6 indexed citations
14.
Belguith, Sana, Nesrine Kaaniche, & Mohammad Hammoudeh. (2019). Analysis of attribute‐based cryptographic techniques and their application to protect cloud services. Transactions on Emerging Telecommunications Technologies. 33(3). 37 indexed citations
15.
Belguith, Sana, Nesrine Kaaniche, Mohamed Mohamed, & Giovanni Russello. (2018). C-ABSC: Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications. Explore Bristol Research. 245–248. 14 indexed citations
16.
Kaaniche, Nesrine, Maryline Laurent, & Sébastien Canard. (2018). Cooperative Set Homomorphic Proofs for Data Possession Checking in Clouds. IEEE Transactions on Cloud Computing. 9(1). 102–117. 1 indexed citations
17.
Laurent, Maryline, et al.. (2018). A Blockchain based Access Control Scheme. HAL (Le Centre pour la Communication Scientifique Directe). 168–176. 12 indexed citations
18.
Belguith, Sana, Nesrine Kaaniche, & Giovanni Russello. (2018). Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT. Bristol Research (University of Bristol). 135–146. 12 indexed citations
19.
Kaaniche, Nesrine, Eunjin Jung, & Ashish Gehani. (2018). Efficiently Validating Aggregated IoT Data Integrity. SPIRE - Sciences Po Institutional REpository. 260–265. 3 indexed citations
20.
Kaaniche, Nesrine & Maryline Laurent. (2017). Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications. 111. 120–141. 139 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026