SIN C

39 papers

YearTitle / Authors
202215th International Conference on Security of Information and Networks, SIN 2022, Sousse, Tunisia, November 11-13, 2022
2022A Betweenness Centrality Based Clustering in VANETs.
Mays Kareem Jabbar, Hafedh Trabelsi
2022A NLP-inspired method to predict multi-step cyberattacks.
Ouissem Ben Fredj
2022A Private Smart parking solution based on Blockchain and AI.
Mariem Turki, Bouthaina Damak, Rawya Mars
2022A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks.
Chidera Biringa, Gökhan Kul
2022A Study of Permission-based Malware Detection Using Machine Learning.
Ratun Rahman, Md. Rafid Islam, Akib Ahmed, Md. Kamrul Hasan, Hasan Mahmud
2022A Trust Based DNS System to Prevent Eclipse Attack on Blockchain Networks.
Ali Kerem Yildiz, Aykut Atmaca, Ali Özgür Solak, Yekta Can Tursun, Serif Bahtiyar
2022A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment.
Sondes Ksibi, Faouzi Jaïdi, Adel Bouhoula
2022Analysis of Smart Cities Security: Challenges and Advancements.
Mehdi Houichi, Faouzi Jaïdi, Adel Bouhoula
2022Approach to Physical Access Management, Control and Analytics Using Multimodal and Heterogeneous Data.
Dmitriy Levonevskiy, Anna I. Motienko, Mikhail Vinogradov
2022Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal.
Amina Sahbi, Faouzi Jaïdi, Adel Bouhoula
2022Blockchain Application for Parking Management.
Sabrine Bhiri, Kais Loukil, Faten Chaabane, Tarek Frikha
2022Blockchain for IoT-Based Healthcare using secure and privacy-preserving watermark.
Hedi Choura, Faten Chaabane, Mouna Baklouti, Tarek Frikha
2022Blockchain for the electronic voting system: case study: student representative vote in Tunisian institute.
Lotfi Ezzeddini, Jalel Ktari, Iheb Zouaoui, Amira Talha, Nizar Jarray, Tarek Frikha
2022Challenges on prioritizing software patching.
Thiago Figueiredo Costa, Mateus Tymburibá
2022Combined Modeling Techniques for Safety and Security in Industrial Automation: A Case Study.
Siegfried Hollerer, Marta Chabrová, Thilo Sauter, Wolfgang Kastner
2022Development and Testing of a Core System for Red and Blue Scenario in Cyber Security Incidents.
Amelia Chindrus, Constantin Florin Caruntu
2022Evolution of macro VBA obfuscation techniques.
Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian
2022Formal Methods for the Verification of Smart Contracts: A Review.
Moez Krichen, Mariam Lahami, Qasem Abu Al-Haija
2022Homomorphic operations on integers via operations on bits.
Liudmila Babenko, Ilya Rusalovsky
2022Improving detection of malicious samples by using state-of-the-art adversarial machine learning algorithms.
Ciprian-Alin Simion, Gheorghe Balan, Dragos Teodor Gavrilut
2022Intrusion Detection System for IoMT through Blockchain-based Federated Learning.
Bessem Zaabar, Omar Cheikhrouhou, Mohamed Abid
2022Intrusion Detection in Industrial IoT.
Omar Cheikhrouhou, Ouissem Ben Fredj, Nesrine Atitallah, Salem Hellal
2022Keynote Speaker 1: Random Neural Networks Optimise QoS, Security and Energy Consumption.
Erol Gelenbe
2022Keynote Speaker 2: Cybersecurity of connected Vehicules.
Mohamed Mosbah
2022Keynote Speaker 3: Scaling Blockchains.
Abdelhakim Senhaji Hafidh
2022Keynote Speaker 4: Introducing Homomorphic Encryption in Blockchain-enabled Applications.
Mohamed Hamdi
2022Keynote Speaker 5: Cyber Security Threat Landscape in the Context of Industry 4.0.
Haider Abbas
2022Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles.
Abdelouahid Derhab
2022Leveraging Edge Computing, Blockchain and IPFS for Addressing eHealth Records Challenges.
Hela Makina, Asma Ben Letaifa, Abderazek Rachedi
2022Multi-Phase Algorithmic Framework to Prevent SQL Injection Attacks using Improved Machine learning and Deep learning to Enhance Database security in Real-time.
Ahmed Abadulla Ashlam, Atta Badii, Frederic T. Stahl
2022Preface.
Omar Cheikhrouhou, Atilla Elçi
2022Review of Authentication with Privacy-preserving Schemes for 5G-enabled Vehicular Networks.
Mays A. Hamdan, Amel Meddeb-Makhlouf, Hassene Mnif
2022Robust grayscale image watermarking approach using DCT and DWT.
Abdelhamid Saighi, Salim Chitroub
2022SWAF: A Smart Web Application Firewall Based on Convolutional Neural Network.
Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi
2022Social Behaviour Identification relying on Device Fingerprint Analysis.
Elías Grande
2022Topology for Preserving Feature Correlation in Tabular Synthetic Data.
Murshedul Arifeen, Andrei Petrovski
2022Towards Comparative Evaluation of DDoS Defences.
Andikan Otung, Andrew P. Martin
2022Towards a Better Understanding of Impersonation Risks.
Anne Bumiller, Olivier Barais, Nicolas Aillery, Gaël Le Lan