A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data
Sye Loong Keoh, Yi Han Ang and Zhaohui Tang
An Efficient Scheme for Anonymous Communication in IoT
Sara Jebri, Mohamed Abid and Ammar Bouallegue
Personal Recognition System using Hand Modality based on Local Features
Nesrine Charfi, Hanene Trichili, Adel M. Alimi and Basel Solaiman
Persistent Timeout Policy of SCTP associated with AODV by using Cross-Layer Mechanism
Issoufou Tiado Mahamadou, Idrissa Abdou and Djibo Karimou
Access Control Policies Enforcement in a Cloud Environment: Openstack
Meryeme Ayache, Mohammed Erradi and Bernd Freisleben
Introduction to The Internet Of Things Security : standardization and research challenges
Salim Elbouanani, Ahmed El Kiram and Omar Achbarou
Mining Intrusion Detection Alerts for Predicting Severity of Detected Attacks
Doaa Hassan
Toward a Novel Rule-based Attack Description and Response Language
Samih Souissi
Improved secure navigation of wheelchairs using multi-robot system and cloud computing technologies
Khaled Salhi, Mohamed Moncef Ben Khelifa, Adel Alimi and Philippe Gorce
Modeling a Secure Cloud Data Warehouse with SoaML
Emna Guermazi, Mounir Ben Ayed and HanĂȘne Ben-Abdallah
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment
Zaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal and Deqing Zou
Digital Safe: Secure synchronization of shared files
Mayssa Jemel, Mounira Msahli and Ahmed Serhrouchni
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext
Zaid Alaa Hussien, Hai Jin, Zaid Ameen Abduljabbar, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal and Deqing Zou
Software-Defined Networks, Security Aspects Analysis
Jaouad Benabbou, Khalid Elbaamrani, Noureddine Idboufker and Raja Elassali
Artificial Neural Network-based Methodology for Vulnerabilities Detection in EMV
Ouerdi Noura, Elfarissi Ilhame, Azizi Mostafa and Azizi Abdelmalek
Experimental study of continuous variable quantum key distribution
Nedra Benletaief, Houria Rezig and Ammar Bouallegue
MASAT: Model-based Automated Security Assessment Tool for Cloud Computing
Oussama Mjihil, Dong Seong Kim and Abdelkrim Haqiq
Side channel analysis techniques towards a methodology for reverse engineering of JavaCard byte-code
Mohammed Amine Kasmi, Mostafa Azizi and Jean-Louis Lanet
Security Modeling and Analysis of a Self-Cleansing Intrusion Tolerance Technique
Iman EL MIR, Dong Seong Kim, Abdelkrim HAQIQ
Network Intrusion Detection System Using L1-norm PCA
Khalid Chougdali, Zyad Elkhadir and Mohammed Benattou
New malware detection framework based on N-grams and Support Vector Domain Description
Mohamed El Boujnouni, Mohammed Jedra and Noureddine Zahid
Access Control in a Collaborative Session in Multi Tenant Environment
Mohamed Amine Madani, Mohammed Erradi and Yahya Benkaouz
An Incremental Refinement Approach to a Development of TMN Protocol
Sanae El Mimouni and Mohamed Bouhdadi
An electronic voting system based on homomorphic encryption and prime numbers
Ali AZOUGAGHE, Mustapha HEDABOU, Mostafa BELKASMI
Image de-noising of a metal matrix composite microstructure Using Sure-let wavelet and Weighted Bilateral Filter
Ayari Fatma and Ben Amar Chokri
Image processing of a metal matrix composite microstructure Using recent bilateral filtering approaches
Ayari Fatma and Ben Amar Chokri