Search dblp for Publications

export results for "toc:db/conf/IEEEias/IEEEias2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/IEEEias/AbduljabbarJHYH15,
  author       = {Zaid Ameen Abduljabbar and
                  Hai Jin and
                  Zaid Alaa Hussien and
                  Ali A. Yassin and
                  Mohammed Abdulridha Hussain and
                  Salah H. Abbdal and
                  Deqing Zou},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Robust image document authentication code with autonomous biometrie
                  key generation, selection, and updating in cloud environment},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492746},
  doi          = {10.1109/ISIAS.2015.7492746},
  timestamp    = {Thu, 22 Feb 2024 09:42:25 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AbduljabbarJHYH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AyacheEF15,
  author       = {Meryeme Ayache and
                  Mohammed Erradi and
                  Bernd Freisleben},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Access control policies enforcement in a cloud environment: Openstack},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {26--31},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492740},
  doi          = {10.1109/ISIAS.2015.7492740},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AyacheEF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AyariA15,
  author       = {Fatma Ayari and
                  Chokri Ben Amar},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Image de-noising of a metal matrix composite microstructure using
                  Sure-let wavelet and weighted bilateral filter},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {146--151},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492760},
  doi          = {10.1109/ISIAS.2015.7492760},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AyariA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AyariA15a,
  author       = {Fatma Ayari and
                  Chokri Ben Amar},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Image processing of a metal matrix composite microstructure Using
                  recent bilateral filtering approaches},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {152--157},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492761},
  doi          = {10.1109/ISIAS.2015.7492761},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AyariA15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AzougagheHB15,
  author       = {Ali Azougaghe and
                  Mustapha Hedabou and
                  Mostafa Belkasmi},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {An electronic voting system based on homomorphic encryption and prime
                  numbers},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {140--145},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492759},
  doi          = {10.1109/ISIAS.2015.7492759},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AzougagheHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BenabbouEIE15,
  author       = {Jaouad Benabbou and
                  Khalid Elbaamrani and
                  Noureddine Idboufker and
                  Raja Elassali},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Software-defined networks, security aspects analysis},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {79--84},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492749},
  doi          = {10.1109/ISIAS.2015.7492749},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BenabbouEIE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BenletaiefRB15,
  author       = {Nedra Benletaief and
                  Houria Rezig and
                  Ammar Bouall{\`{e}}gue},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Experimental study of continuous variable quantum key distribution},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {91--96},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492751},
  doi          = {10.1109/ISIAS.2015.7492751},
  timestamp    = {Fri, 14 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BenletaiefRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BoujnouniJZ15,
  author       = {Mohamed el Boujnouni and
                  Mohamed Jedra and
                  Noureddine Zahid},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {New malware detection framework based on N-grams and Support Vector
                  Domain Description},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {123--128},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492756},
  doi          = {10.1109/ISIAS.2015.7492756},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BoujnouniJZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/CharfiTAS15,
  author       = {Nesrine Charfi and
                  Han{\^{e}}ne Trichili and
                  Adel M. Alimi and
                  Basel Solaiman},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Personal recognition system using hand modality based on local features},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492764},
  doi          = {10.1109/ISIAS.2015.7492764},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/CharfiTAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ElbouananiKA15,
  author       = {Salim Elbouanani and
                  My Ahmed El Kiram and
                  Omar Achbarou},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Introduction to the Internet of Things security: Standardization and
                  research challenges},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {32--37},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492741},
  doi          = {10.1109/ISIAS.2015.7492741},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ElbouananiKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/GuermaziBA15,
  author       = {Emna Guermazi and
                  Han{\^{e}}ne Ben{-}Abdallah and
                  Mounir Ben Ayed},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Modeling a secure cloud data warehouse with SoaML},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492745},
  doi          = {10.1109/ISIAS.2015.7492745},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/GuermaziBA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Hassan15,
  author       = {Doaa Hassan},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Mining intrusion detection alerts for predicting severity of detected
                  attacks},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {38--43},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492742},
  doi          = {10.1109/ISIAS.2015.7492742},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Hassan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HussienJAYHAZ15,
  author       = {Zaid Alaa Hussien and
                  Hai Jin and
                  Zaid Ameen Abduljabbar and
                  Ali A. Yassin and
                  Mohammed Abdulridha Hussain and
                  Salah H. Abbdal and
                  Deqing Zou},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Public auditing for secure data storage in cloud through a third party
                  auditor using modern ciphertext},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {73--78},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492748},
  doi          = {10.1109/ISIAS.2015.7492748},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HussienJAYHAZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JebriAB15,
  author       = {Sarra Jebri and
                  Mohamed Abid and
                  Ammar Bouallegue},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {An efficient scheme for anonymous communication in IoT},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492763},
  doi          = {10.1109/ISIAS.2015.7492763},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JebriAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JemelMS15,
  author       = {Mayssa Jemel and
                  Mounira Msahli and
                  Ahmed Serhrouchni},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Digital safe: Secure synchronization of shared files},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492747},
  doi          = {10.1109/ISIAS.2015.7492747},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JemelMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KasmiAL15,
  author       = {Mohammed Amine Kasmi and
                  Mostafa Azizi and
                  Jean{-}Louis Lanet},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Side channel analysis techniques towards a methodology for reverse
                  engineering of Java Card byte-code},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {104--110},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492753},
  doi          = {10.1109/ISIAS.2015.7492753},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KasmiAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KeohAT15,
  author       = {Sye Loong Keoh and
                  Yi Han Ang and
                  Zhaohui Tang},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {A lightweight privacy-preserved spatial and temporal aggregation of
                  energy data},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492762},
  doi          = {10.1109/ISIAS.2015.7492762},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KeohAT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KhalidZM15,
  author       = {Khalid Chougdali and
                  Zyad Elkhadir and
                  Mohammed Benattou},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Network intrusion detection system using L1-norm {PCA}},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {118--122},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492755},
  doi          = {10.1109/ISIAS.2015.7492755},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KhalidZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MadaniEB15,
  author       = {Mohamed Amine Madani and
                  Mohammed Erradi and
                  Yahya Benkaouz},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Access control in a collaborative session in multi tenant environment},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {129--134},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492757},
  doi          = {10.1109/ISIAS.2015.7492757},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MadaniEB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MimouniB15,
  author       = {Sanae El Mimouni and
                  Mohamed Bouhdadi},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {An incremental refinement approach to a development of {TMN} protocol},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {135--139},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492758},
  doi          = {10.1109/ISIAS.2015.7492758},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MimouniB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MirKH15,
  author       = {Iman El Mir and
                  Dong Seong Kim and
                  Abdelkrim Haqiq},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Security modeling and analysis of a self-cleansing intrusion tolerance
                  technique},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {111--117},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492754},
  doi          = {10.1109/ISIAS.2015.7492754},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MirKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MjihilKH15,
  author       = {Oussama Mjihil and
                  Dong Seong Kim and
                  Abdelkrim Haqiq},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {{MASAT:} Model-based automated security assessment tool for cloud
                  computing},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {97--103},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492752},
  doi          = {10.1109/ISIAS.2015.7492752},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MjihilKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/OuerdiEAA15,
  author       = {Noura Ouerdi and
                  Ilhame El Farissi and
                  Abdelmalek Azizi and
                  Mostafa Azizi},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Artificial neural network-based methodology for vulnerabilities detection
                  in {EMV} cards},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492750},
  doi          = {10.1109/ISIAS.2015.7492750},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/OuerdiEAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SalhiAKG15,
  author       = {Khaled Salhi and
                  Adel M. Alimi and
                  Mohamed Moncef Ben Khelifa and
                  Philippe Gorce},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Improved secure navigation of wheelchairs using multi-robot system
                  and cloud computing technologies},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {50--54},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492744},
  doi          = {10.1109/ISIAS.2015.7492744},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SalhiAKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Souissi15,
  author       = {Samih Souissi},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Toward a novel rule-based attack description and response language},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {44--49},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492743},
  doi          = {10.1109/ISIAS.2015.7492743},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Souissi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TiadoAK15,
  author       = {Mahamadou Issoufou Tiado and
                  Idrissa Abdou and
                  Djibo Karimou},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Persistent timeout policy of {SCTP} associated with {AODV} by using
                  cross-layer mechanism},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {19--25},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492739},
  doi          = {10.1109/ISIAS.2015.7492739},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TiadoAK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEias/2015,
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7484378/proceeding},
  isbn         = {978-1-4673-8715-6},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics