IAS C

27 papers

YearTitle / Authors
201511th International Conference on Information Assurance and Security, IAS 2015, Marrakech, Morocco, December 14-16, 2015
Ajith Abraham, Adel M. Alimi, Abdelkrim Haqiq, Dijiang Huang, Dong Seong Kim, Hannan Xiao, Nizar Rokbani, Mohamed Ben Halima, Azah Kamilah Muda, Kun Ma
2015A lightweight privacy-preserved spatial and temporal aggregation of energy data.
Sye Loong Keoh, Yi Han Ang, ZhaoHui Tang
2015Access control in a collaborative session in multi tenant environment.
Mohamed Amine Madani, Mohammed Erradi, Yahya Benkaouz
2015Access control policies enforcement in a cloud environment: Openstack.
Meryeme Ayache, Mohammed Erradi, Bernd Freisleben
2015An efficient scheme for anonymous communication in IoT.
Sarra Jebri, Mohamed Abid, Ammar Bouallegue
2015An electronic voting system based on homomorphic encryption and prime numbers.
Ali Azougaghe, Mustapha Hedabou, Mostafa Belkasmi
2015An incremental refinement approach to a development of TMN protocol.
Sanae El Mimouni, Mohamed Bouhdadi
2015Artificial neural network-based methodology for vulnerabilities detection in EMV cards.
Noura Ouerdi, Ilhame El Farissi, Abdelmalek Azizi, Mostafa Azizi
2015Digital safe: Secure synchronization of shared files.
Mayssa Jemel, Mounira Msahli, Ahmed Serhrouchni
2015Experimental study of continuous variable quantum key distribution.
Nedra Benletaief, Houria Rezig, Ammar Bouallègue
2015Image de-noising of a metal matrix composite microstructure using Sure-let wavelet and weighted bilateral filter.
Fatma Ayari, Chokri Ben Amar
2015Image processing of a metal matrix composite microstructure Using recent bilateral filtering approaches.
Fatma Ayari, Chokri Ben Amar
2015Improved secure navigation of wheelchairs using multi-robot system and cloud computing technologies.
Khaled Salhi, Adel M. Alimi, Mohamed Moncef Ben Khelifa, Philippe Gorce
2015Introduction to the Internet of Things security: Standardization and research challenges.
Salim Elbouanani, My Ahmed El Kiram, Omar Achbarou
2015MASAT: Model-based automated security assessment tool for cloud computing.
Oussama Mjihil, Dong Seong Kim, Abdelkrim Haqiq
2015Mining intrusion detection alerts for predicting severity of detected attacks.
Doaa Hassan
2015Modeling a secure cloud data warehouse with SoaML.
Emna Guermazi, Hanêne Ben-Abdallah, Mounir Ben Ayed
2015Network intrusion detection system using L1-norm PCA.
Khalid Chougdali, Zyad Elkhadir, Mohammed Benattou
2015New malware detection framework based on N-grams and Support Vector Domain Description.
Mohamed el Boujnouni, Mohamed Jedra, Noureddine Zahid
2015Persistent timeout policy of SCTP associated with AODV by using cross-layer mechanism.
Mahamadou Issoufou Tiado, Idrissa Abdou, Djibo Karimou
2015Personal recognition system using hand modality based on local features.
Nesrine Charfi, Hanêne Trichili, Adel M. Alimi, Basel Solaiman
2015Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext.
Zaid Alaa Hussien, Hai Jin, Zaid Ameen Abduljabbar, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou
2015Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment.
Zaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou
2015Security modeling and analysis of a self-cleansing intrusion tolerance technique.
Iman El Mir, Dong Seong Kim, Abdelkrim Haqiq
2015Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code.
Mohammed Amine Kasmi, Mostafa Azizi, Jean-Louis Lanet
2015Software-defined networks, security aspects analysis.
Jaouad Benabbou, Khalid Elbaamrani, Noureddine Idboufker, Raja Elassali
2015Toward a novel rule-based attack description and response language.
Samih Souissi