


default search action
11th IAS 2015: Marrakech, Morocco
- Ajith Abraham, Adel M. Alimi, Abdelkrim Haqiq, Dijiang Huang, Dong Seong Kim, Hannan Xiao, Nizar Rokbani, Mohamed Ben Halima, Azah Kamilah Muda, Kun Ma:

11th International Conference on Information Assurance and Security, IAS 2015, Marrakech, Morocco, December 14-16, 2015. IEEE 2015, ISBN 978-1-4673-8715-6 - Sye Loong Keoh, Yi Han Ang, Zhaohui Tang:

A lightweight privacy-preserved spatial and temporal aggregation of energy data. 1-6 - Sarra Jebri

, Mohamed Abid
, Ammar Bouallegue:
An efficient scheme for anonymous communication in IoT. 7-12 - Nesrine Charfi, Hanêne Trichili

, Adel M. Alimi, Basel Solaiman:
Personal recognition system using hand modality based on local features. 13-18 - Mahamadou Issoufou Tiado, Idrissa Abdou, Djibo Karimou:

Persistent timeout policy of SCTP associated with AODV by using cross-layer mechanism. 19-25 - Meryeme Ayache, Mohammed Erradi, Bernd Freisleben

:
Access control policies enforcement in a cloud environment: Openstack. 26-31 - Salim Elbouanani, My Ahmed El Kiram, Omar Achbarou

:
Introduction to the Internet of Things security: Standardization and research challenges. 32-37 - Doaa Hassan:

Mining intrusion detection alerts for predicting severity of detected attacks. 38-43 - Samih Souissi:

Toward a novel rule-based attack description and response language. 44-49 - Khaled Salhi, Adel M. Alimi, Mohamed Moncef Ben Khelifa, Philippe Gorce

:
Improved secure navigation of wheelchairs using multi-robot system and cloud computing technologies. 50-54 - Emna Guermazi

, Hanêne Ben-Abdallah
, Mounir Ben Ayed:
Modeling a secure cloud data warehouse with SoaML. 55-60 - Zaid Ameen Abduljabbar

, Hai Jin, Zaid Alaa Hussien
, Ali A. Yassin
, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment. 61-66 - Mayssa Jemel, Mounira Msahli, Ahmed Serhrouchni:

Digital safe: Secure synchronization of shared files. 67-72 - Zaid Alaa Hussien

, Hai Jin, Zaid Ameen Abduljabbar
, Ali A. Yassin
, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext. 73-78 - Jaouad Benabbou, Khalid Elbaamrani

, Noureddine Idboufker, Raja Elassali:
Software-defined networks, security aspects analysis. 79-84 - Noura Ouerdi

, Ilhame El Farissi
, Abdelmalek Azizi
, Mostafa Azizi:
Artificial neural network-based methodology for vulnerabilities detection in EMV cards. 85-90 - Nedra Benletaief, Houria Rezig, Ammar Bouallègue:

Experimental study of continuous variable quantum key distribution. 91-96 - Oussama Mjihil, Dong Seong Kim

, Abdelkrim Haqiq
:
MASAT: Model-based automated security assessment tool for cloud computing. 97-103 - Mohammed Amine Kasmi, Mostafa Azizi, Jean-Louis Lanet:

Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code. 104-110 - Iman El Mir, Dong Seong Kim

, Abdelkrim Haqiq
:
Security modeling and analysis of a self-cleansing intrusion tolerance technique. 111-117 - Khalid Chougdali

, Zyad Elkhadir, Mohammed Benattou
:
Network intrusion detection system using L1-norm PCA. 118-122 - Mohamed el Boujnouni

, Mohamed Jedra, Noureddine Zahid:
New malware detection framework based on N-grams and Support Vector Domain Description. 123-128 - Mohamed Amine Madani, Mohammed Erradi, Yahya Benkaouz:

Access control in a collaborative session in multi tenant environment. 129-134 - Sanae El Mimouni

, Mohamed Bouhdadi:
An incremental refinement approach to a development of TMN protocol. 135-139 - Ali Azougaghe

, Mustapha Hedabou, Mostafa Belkasmi
:
An electronic voting system based on homomorphic encryption and prime numbers. 140-145 - Fatma Ayari, Chokri Ben Amar:

Image de-noising of a metal matrix composite microstructure using Sure-let wavelet and weighted bilateral filter. 146-151 - Fatma Ayari, Chokri Ben Amar:

Image processing of a metal matrix composite microstructure Using recent bilateral filtering approaches. 152-157

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














