


default search action
15th SIN 2022: Sousse, Tunisia
- 15th International Conference on Security of Information and Networks, SIN 2022, Sousse, Tunisia, November 11-13, 2022. IEEE 2022, ISBN 978-1-6654-5465-0

- Abdelouahid Derhab:

Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles. 1 - Mohamed Mosbah:

Keynote Speaker 2: Cybersecurity of connected Vehicules. 1 - Hedi Choura

, Faten Chaabane
, Mouna Baklouti
, Tarek Frikha
:
Blockchain for IoT-Based Healthcare using secure and privacy-preserving watermark. 1-4 - Abdelhamid Saighi, Salim Chitroub:

Robust grayscale image watermarking approach using DCT and DWT. 1-6 - Mehdi Houichi

, Faouzi Jaïdi
, Adel Bouhoula
:
Analysis of Smart Cities Security: Challenges and Advancements. 1-5 - Hela Makina

, Asma Ben Letaifa, Abderazek Rachedi:
Leveraging Edge Computing, Blockchain and IPFS for Addressing eHealth Records Challenges. 1-4 - Dmitriy Levonevskiy, Anna I. Motienko, Mikhail Vinogradov:

Approach to Physical Access Management, Control and Analytics Using Multimodal and Heterogeneous Data. 1-4 - Chidera Biringa, Gökhan Kul:

A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks. 1-4 - Omar Cheikhrouhou, Atilla Elçi:

Preface. 1-2 - Amina Sahbi

, Faouzi Jaïdi
, Adel Bouhoula
:
Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal. 1-7 - Liudmila Babenko, Ilya Rusalovsky:

Homomorphic operations on integers via operations on bits. 1-4 - Haider Abbas:

Keynote Speaker 5: Cyber Security Threat Landscape in the Context of Industry 4.0. 1 - Ahmed Abadulla Ashlam, Atta Badii, Frederic T. Stahl

:
Multi-Phase Algorithmic Framework to Prevent SQL Injection Attacks using Improved Machine learning and Deep learning to Enhance Database security in Real-time. 1-4 - Murshedul Arifeen, Andrei Petrovski:

Topology for Preserving Feature Correlation in Tabular Synthetic Data. 1-6 - Andikan Otung

, Andrew P. Martin:
Towards Comparative Evaluation of DDoS Defences. 1-10 - Ratun Rahman, Md. Rafid Islam, Akib Ahmed, Md. Kamrul Hasan, Hasan Mahmud:

A Study of Permission-based Malware Detection Using Machine Learning. 1-6 - Abdelhakim Senhaji Hafidh:

Keynote Speaker 3: Scaling Blockchains. 1 - Sondes Ksibi, Faouzi Jaïdi

, Adel Bouhoula
:
A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment. 1-7 - Mohamed Hamdi:

Keynote Speaker 4: Introducing Homomorphic Encryption in Blockchain-enabled Applications. 1 - Ali Kerem Yildiz, Aykut Atmaca, Ali Özgür Solak, Yekta Can Tursun, Serif Bahtiyar

:
A Trust Based DNS System to Prevent Eclipse Attack on Blockchain Networks. 1-8 - Moez Krichen, Mariam Lahami

, Qasem Abu Al-Haija
:
Formal Methods for the Verification of Smart Contracts: A Review. 1-8 - Omar Cheikhrouhou, Ouissem Ben Fredj, Nesrine Atitallah

, Salem Hellal:
Intrusion Detection in Industrial IoT. 1-4 - Bessem Zaabar, Omar Cheikhrouhou, Mohamed Abid:

Intrusion Detection System for IoMT through Blockchain-based Federated Learning. 1-8 - Thiago Figueiredo Costa, Mateus Tymburibá:

Challenges on prioritizing software patching. 1-8 - Ciprian-Alin Simion, Gheorghe Balan

, Dragos Teodor Gavrilut:
Improving detection of malicious samples by using state-of-the-art adversarial machine learning algorithms. 1-8 - Anne Bumiller, Olivier Barais, Nicolas Aillery, Gaël Le Lan:

Towards a Better Understanding of Impersonation Risks. 1-8 - Siegfried Hollerer

, Marta Chabrová, Thilo Sauter
, Wolfgang Kastner
:
Combined Modeling Techniques for Safety and Security in Industrial Automation: A Case Study. 1-4 - Sabrine Bhiri, Kais Loukil, Faten Chaabane, Tarek Frikha:

Blockchain Application for Parking Management. 1-5 - Lotfi Ezzeddini

, Jalel Ktari, Iheb Zouaoui, Amira Talha, Nizar Jarray, Tarek Frikha:
Blockchain for the electronic voting system: case study: student representative vote in Tunisian institute. 1-7 - Elías Grande:

Social Behaviour Identification relying on Device Fingerprint Analysis. 1-8 - Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi:

SWAF: A Smart Web Application Firewall Based on Convolutional Neural Network. 1-6 - Amelia Chindrus, Constantin Florin Caruntu:

Development and Testing of a Core System for Red and Blue Scenario in Cyber Security Incidents. 1-7 - Mariem Turki, Bouthaina Damak, Rawya Mars:

A Private Smart parking solution based on Blockchain and AI. 1-7 - Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian:

Evolution of macro VBA obfuscation techniques. 1-8 - Ouissem Ben Fredj

:
A NLP-inspired method to predict multi-step cyberattacks. 1-6 - Erol Gelenbe:

Keynote Speaker 1: Random Neural Networks Optimise QoS, Security and Energy Consumption. 1 - Mays Kareem Jabbar

, Hafedh Trabelsi
:
A Betweenness Centrality Based Clustering in VANETs. 1-4 - Mays A. Hamdan, Amel Meddeb-Makhlouf, Hassène Mnif

:
Review of Authentication with Privacy-preserving Schemes for 5G-enabled Vehicular Networks. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














