| 2015 | 11th International Conference on Information Assurance and Security, IAS 2015, Marrakech, Morocco, December 14-16, 2015 Ajith Abraham, Adel M. Alimi, Abdelkrim Haqiq, Dijiang Huang, Dong Seong Kim, Hannan Xiao, Nizar Rokbani, Mohamed Ben Halima, Azah Kamilah Muda, Kun Ma |
| 2015 | A lightweight privacy-preserved spatial and temporal aggregation of energy data. Sye Loong Keoh, Yi Han Ang, ZhaoHui Tang |
| 2015 | Access control in a collaborative session in multi tenant environment. Mohamed Amine Madani, Mohammed Erradi, Yahya Benkaouz |
| 2015 | Access control policies enforcement in a cloud environment: Openstack. Meryeme Ayache, Mohammed Erradi, Bernd Freisleben |
| 2015 | An efficient scheme for anonymous communication in IoT. Sarra Jebri, Mohamed Abid, Ammar Bouallegue |
| 2015 | An electronic voting system based on homomorphic encryption and prime numbers. Ali Azougaghe, Mustapha Hedabou, Mostafa Belkasmi |
| 2015 | An incremental refinement approach to a development of TMN protocol. Sanae El Mimouni, Mohamed Bouhdadi |
| 2015 | Artificial neural network-based methodology for vulnerabilities detection in EMV cards. Noura Ouerdi, Ilhame El Farissi, Abdelmalek Azizi, Mostafa Azizi |
| 2015 | Digital safe: Secure synchronization of shared files. Mayssa Jemel, Mounira Msahli, Ahmed Serhrouchni |
| 2015 | Experimental study of continuous variable quantum key distribution. Nedra Benletaief, Houria Rezig, Ammar Bouallègue |
| 2015 | Image de-noising of a metal matrix composite microstructure using Sure-let wavelet and weighted bilateral filter. Fatma Ayari, Chokri Ben Amar |
| 2015 | Image processing of a metal matrix composite microstructure Using recent bilateral filtering approaches. Fatma Ayari, Chokri Ben Amar |
| 2015 | Improved secure navigation of wheelchairs using multi-robot system and cloud computing technologies. Khaled Salhi, Adel M. Alimi, Mohamed Moncef Ben Khelifa, Philippe Gorce |
| 2015 | Introduction to the Internet of Things security: Standardization and research challenges. Salim Elbouanani, My Ahmed El Kiram, Omar Achbarou |
| 2015 | MASAT: Model-based automated security assessment tool for cloud computing. Oussama Mjihil, Dong Seong Kim, Abdelkrim Haqiq |
| 2015 | Mining intrusion detection alerts for predicting severity of detected attacks. Doaa Hassan |
| 2015 | Modeling a secure cloud data warehouse with SoaML. Emna Guermazi, Hanêne Ben-Abdallah, Mounir Ben Ayed |
| 2015 | Network intrusion detection system using L1-norm PCA. Khalid Chougdali, Zyad Elkhadir, Mohammed Benattou |
| 2015 | New malware detection framework based on N-grams and Support Vector Domain Description. Mohamed el Boujnouni, Mohamed Jedra, Noureddine Zahid |
| 2015 | Persistent timeout policy of SCTP associated with AODV by using cross-layer mechanism. Mahamadou Issoufou Tiado, Idrissa Abdou, Djibo Karimou |
| 2015 | Personal recognition system using hand modality based on local features. Nesrine Charfi, Hanêne Trichili, Adel M. Alimi, Basel Solaiman |
| 2015 | Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext. Zaid Alaa Hussien, Hai Jin, Zaid Ameen Abduljabbar, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou |
| 2015 | Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment. Zaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou |
| 2015 | Security modeling and analysis of a self-cleansing intrusion tolerance technique. Iman El Mir, Dong Seong Kim, Abdelkrim Haqiq |
| 2015 | Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code. Mohammed Amine Kasmi, Mostafa Azizi, Jean-Louis Lanet |
| 2015 | Software-defined networks, security aspects analysis. Jaouad Benabbou, Khalid Elbaamrani, Noureddine Idboufker, Raja Elassali |
| 2015 | Toward a novel rule-based attack description and response language. Samih Souissi |