Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/IEEEias/IEEEias2015.bht:"
@inproceedings{DBLP:conf/IEEEias/AbduljabbarJHYH15, author = {Zaid Ameen Abduljabbar and Hai Jin and Zaid Alaa Hussien and Ali A. Yassin and Mohammed Abdulridha Hussain and Salah H. Abbdal and Deqing Zou}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {61--66}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492746}, doi = {10.1109/ISIAS.2015.7492746}, timestamp = {Thu, 22 Feb 2024 09:42:25 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AbduljabbarJHYH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AyacheEF15, author = {Meryeme Ayache and Mohammed Erradi and Bernd Freisleben}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Access control policies enforcement in a cloud environment: Openstack}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {26--31}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492740}, doi = {10.1109/ISIAS.2015.7492740}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AyacheEF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AyariA15, author = {Fatma Ayari and Chokri Ben Amar}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Image de-noising of a metal matrix composite microstructure using Sure-let wavelet and weighted bilateral filter}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {146--151}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492760}, doi = {10.1109/ISIAS.2015.7492760}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AyariA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AyariA15a, author = {Fatma Ayari and Chokri Ben Amar}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Image processing of a metal matrix composite microstructure Using recent bilateral filtering approaches}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {152--157}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492761}, doi = {10.1109/ISIAS.2015.7492761}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AyariA15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AzougagheHB15, author = {Ali Azougaghe and Mustapha Hedabou and Mostafa Belkasmi}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {An electronic voting system based on homomorphic encryption and prime numbers}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {140--145}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492759}, doi = {10.1109/ISIAS.2015.7492759}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AzougagheHB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BenabbouEIE15, author = {Jaouad Benabbou and Khalid Elbaamrani and Noureddine Idboufker and Raja Elassali}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Software-defined networks, security aspects analysis}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {79--84}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492749}, doi = {10.1109/ISIAS.2015.7492749}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/BenabbouEIE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BenletaiefRB15, author = {Nedra Benletaief and Houria Rezig and Ammar Bouall{\`{e}}gue}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Experimental study of continuous variable quantum key distribution}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {91--96}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492751}, doi = {10.1109/ISIAS.2015.7492751}, timestamp = {Fri, 14 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/BenletaiefRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BoujnouniJZ15, author = {Mohamed el Boujnouni and Mohamed Jedra and Noureddine Zahid}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {New malware detection framework based on N-grams and Support Vector Domain Description}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {123--128}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492756}, doi = {10.1109/ISIAS.2015.7492756}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/BoujnouniJZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/CharfiTAS15, author = {Nesrine Charfi and Han{\^{e}}ne Trichili and Adel M. Alimi and Basel Solaiman}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Personal recognition system using hand modality based on local features}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {13--18}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492764}, doi = {10.1109/ISIAS.2015.7492764}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/CharfiTAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ElbouananiKA15, author = {Salim Elbouanani and My Ahmed El Kiram and Omar Achbarou}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Introduction to the Internet of Things security: Standardization and research challenges}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {32--37}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492741}, doi = {10.1109/ISIAS.2015.7492741}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ElbouananiKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/GuermaziBA15, author = {Emna Guermazi and Han{\^{e}}ne Ben{-}Abdallah and Mounir Ben Ayed}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Modeling a secure cloud data warehouse with SoaML}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {55--60}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492745}, doi = {10.1109/ISIAS.2015.7492745}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/GuermaziBA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Hassan15, author = {Doaa Hassan}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Mining intrusion detection alerts for predicting severity of detected attacks}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {38--43}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492742}, doi = {10.1109/ISIAS.2015.7492742}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/Hassan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HussienJAYHAZ15, author = {Zaid Alaa Hussien and Hai Jin and Zaid Ameen Abduljabbar and Ali A. Yassin and Mohammed Abdulridha Hussain and Salah H. Abbdal and Deqing Zou}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {73--78}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492748}, doi = {10.1109/ISIAS.2015.7492748}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/HussienJAYHAZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/JebriAB15, author = {Sarra Jebri and Mohamed Abid and Ammar Bouallegue}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {An efficient scheme for anonymous communication in IoT}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {7--12}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492763}, doi = {10.1109/ISIAS.2015.7492763}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/JebriAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/JemelMS15, author = {Mayssa Jemel and Mounira Msahli and Ahmed Serhrouchni}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Digital safe: Secure synchronization of shared files}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {67--72}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492747}, doi = {10.1109/ISIAS.2015.7492747}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/JemelMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KasmiAL15, author = {Mohammed Amine Kasmi and Mostafa Azizi and Jean{-}Louis Lanet}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {104--110}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492753}, doi = {10.1109/ISIAS.2015.7492753}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/KasmiAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KeohAT15, author = {Sye Loong Keoh and Yi Han Ang and Zhaohui Tang}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {A lightweight privacy-preserved spatial and temporal aggregation of energy data}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492762}, doi = {10.1109/ISIAS.2015.7492762}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/KeohAT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KhalidZM15, author = {Khalid Chougdali and Zyad Elkhadir and Mohammed Benattou}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Network intrusion detection system using L1-norm {PCA}}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {118--122}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492755}, doi = {10.1109/ISIAS.2015.7492755}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/KhalidZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MadaniEB15, author = {Mohamed Amine Madani and Mohammed Erradi and Yahya Benkaouz}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Access control in a collaborative session in multi tenant environment}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {129--134}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492757}, doi = {10.1109/ISIAS.2015.7492757}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MadaniEB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MimouniB15, author = {Sanae El Mimouni and Mohamed Bouhdadi}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {An incremental refinement approach to a development of {TMN} protocol}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {135--139}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492758}, doi = {10.1109/ISIAS.2015.7492758}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MimouniB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MirKH15, author = {Iman El Mir and Dong Seong Kim and Abdelkrim Haqiq}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Security modeling and analysis of a self-cleansing intrusion tolerance technique}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {111--117}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492754}, doi = {10.1109/ISIAS.2015.7492754}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/MirKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MjihilKH15, author = {Oussama Mjihil and Dong Seong Kim and Abdelkrim Haqiq}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {{MASAT:} Model-based automated security assessment tool for cloud computing}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {97--103}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492752}, doi = {10.1109/ISIAS.2015.7492752}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/MjihilKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/OuerdiEAA15, author = {Noura Ouerdi and Ilhame El Farissi and Abdelmalek Azizi and Mostafa Azizi}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Artificial neural network-based methodology for vulnerabilities detection in {EMV} cards}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {85--90}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492750}, doi = {10.1109/ISIAS.2015.7492750}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/OuerdiEAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SalhiAKG15, author = {Khaled Salhi and Adel M. Alimi and Mohamed Moncef Ben Khelifa and Philippe Gorce}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Improved secure navigation of wheelchairs using multi-robot system and cloud computing technologies}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {50--54}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492744}, doi = {10.1109/ISIAS.2015.7492744}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/SalhiAKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Souissi15, author = {Samih Souissi}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Toward a novel rule-based attack description and response language}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {44--49}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492743}, doi = {10.1109/ISIAS.2015.7492743}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/Souissi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/TiadoAK15, author = {Mahamadou Issoufou Tiado and Idrissa Abdou and Djibo Karimou}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Persistent timeout policy of {SCTP} associated with {AODV} by using cross-layer mechanism}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {19--25}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492739}, doi = {10.1109/ISIAS.2015.7492739}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/TiadoAK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEias/2015, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7484378/proceeding}, isbn = {978-1-4673-8715-6}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.