default search action
11th IAS 2015: Marrakech, Morocco
- Ajith Abraham, Adel M. Alimi, Abdelkrim Haqiq, Dijiang Huang, Dong Seong Kim, Hannan Xiao, Nizar Rokbani, Mohamed Ben Halima, Azah Kamilah Muda, Kun Ma:
11th International Conference on Information Assurance and Security, IAS 2015, Marrakech, Morocco, December 14-16, 2015. IEEE 2015, ISBN 978-1-4673-8715-6 - Sye Loong Keoh, Yi Han Ang, Zhaohui Tang:
A lightweight privacy-preserved spatial and temporal aggregation of energy data. 1-6 - Sarra Jebri, Mohamed Abid, Ammar Bouallegue:
An efficient scheme for anonymous communication in IoT. 7-12 - Nesrine Charfi, Hanêne Trichili, Adel M. Alimi, Basel Solaiman:
Personal recognition system using hand modality based on local features. 13-18 - Mahamadou Issoufou Tiado, Idrissa Abdou, Djibo Karimou:
Persistent timeout policy of SCTP associated with AODV by using cross-layer mechanism. 19-25 - Meryeme Ayache, Mohammed Erradi, Bernd Freisleben:
Access control policies enforcement in a cloud environment: Openstack. 26-31 - Salim Elbouanani, My Ahmed El Kiram, Omar Achbarou:
Introduction to the Internet of Things security: Standardization and research challenges. 32-37 - Doaa Hassan:
Mining intrusion detection alerts for predicting severity of detected attacks. 38-43 - Samih Souissi:
Toward a novel rule-based attack description and response language. 44-49 - Khaled Salhi, Adel M. Alimi, Mohamed Moncef Ben Khelifa, Philippe Gorce:
Improved secure navigation of wheelchairs using multi-robot system and cloud computing technologies. 50-54 - Emna Guermazi, Hanêne Ben-Abdallah, Mounir Ben Ayed:
Modeling a secure cloud data warehouse with SoaML. 55-60 - Zaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment. 61-66 - Mayssa Jemel, Mounira Msahli, Ahmed Serhrouchni:
Digital safe: Secure synchronization of shared files. 67-72 - Zaid Alaa Hussien, Hai Jin, Zaid Ameen Abduljabbar, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext. 73-78 - Jaouad Benabbou, Khalid Elbaamrani, Noureddine Idboufker, Raja Elassali:
Software-defined networks, security aspects analysis. 79-84 - Noura Ouerdi, Ilhame El Farissi, Abdelmalek Azizi, Mostafa Azizi:
Artificial neural network-based methodology for vulnerabilities detection in EMV cards. 85-90 - Nedra Benletaief, Houria Rezig, Ammar Bouallègue:
Experimental study of continuous variable quantum key distribution. 91-96 - Oussama Mjihil, Dong Seong Kim, Abdelkrim Haqiq:
MASAT: Model-based automated security assessment tool for cloud computing. 97-103 - Mohammed Amine Kasmi, Mostafa Azizi, Jean-Louis Lanet:
Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code. 104-110 - Iman El Mir, Dong Seong Kim, Abdelkrim Haqiq:
Security modeling and analysis of a self-cleansing intrusion tolerance technique. 111-117 - Khalid Chougdali, Zyad Elkhadir, Mohammed Benattou:
Network intrusion detection system using L1-norm PCA. 118-122 - Mohamed el Boujnouni, Mohamed Jedra, Noureddine Zahid:
New malware detection framework based on N-grams and Support Vector Domain Description. 123-128 - Mohamed Amine Madani, Mohammed Erradi, Yahya Benkaouz:
Access control in a collaborative session in multi tenant environment. 129-134 - Sanae El Mimouni, Mohamed Bouhdadi:
An incremental refinement approach to a development of TMN protocol. 135-139 - Ali Azougaghe, Mustapha Hedabou, Mostafa Belkasmi:
An electronic voting system based on homomorphic encryption and prime numbers. 140-145 - Fatma Ayari, Chokri Ben Amar:
Image de-noising of a metal matrix composite microstructure using Sure-let wavelet and weighted bilateral filter. 146-151 - Fatma Ayari, Chokri Ben Amar:
Image processing of a metal matrix composite microstructure Using recent bilateral filtering approaches. 152-157
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.