462 results on '"Boulahia A"'
Search Results
2. From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data
3. Cover Story
4. Multilevel Security Policies
5. Automated Attacker Behaviour Classification Using Threat Intelligence Insights
6. Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection
7. Enhancing Diabetic Retinopathy Identification Through Novel Image Representation and Hybrid CNN-Transformer Segmentation
8. Investigating Person Attribute Recognition in Challenging Environments
9. How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach
10. A Comparative Analysis of Eleven Augmentation Techniques for Enhanced Retinal Pathology Recognition
11. Optimal Automated Generation of Playbooks
12. The 18th March, 2021 Bejaia (North-East Algeria) Earthquake Mw: 5.9
13. Trust Management Framework for Containerized Workloads Applications to 5G Networks
14. A Multi-Agent Based Dynamic Network Slice Tarification Framework
15. Heterogenous Action Ensembling for Visual Recognition of Large-Scale Actions
16. AttR2U-Net: Deep Attention Based Approach for Melanoma Skin Cancer Image Segmentation
17. Attacker Attribution via Characteristics Inference Using Honeypot Data
18. Analysis of the Bejaia Seismic Sequence of 2012–2013, Northeastern, Algeria
19. Statistical Study of Earthquake Swarms in Northeastern Algeria with Special Reference to the Ain Azel Swarm; Hodna Chain, 2015
20. Applying IoT and Data Analytics to Thermal Comfort: A Review
21. Extreme Subject Targeting for Deep Learning Based Action Recognition
22. A Posteriori Access Control with an Administrative Policy
23. A Priority-Based Domain Type Enforcement for Exception Management
24. A Posteriori Analysis of Policy Temporal Compliance
25. A Deeper Analysis of Adversarial Examples in Intrusion Detection
26. A Certificate-Less Key Exchange Protocol for IoT
27. A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems
28. Optimal Distribution of Privacy Budget in Differential Privacy
29. Accountability in the A Posteriori Access Control: A Requirement and a Mechanism
30. Network Functions Virtualization Access Control as a Service
31. Norms and Deontic Logic
32. Security Analysis of WirelessHART Communication Scheme
33. Multi-Criteria Recommender Approach for Supporting Intrusion Response System
34. Detection and Response to Data Exfiltration from Internet of Things Android Devices
35. Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes
36. Stratification Based Model for Security Policy with Exceptions and Contraries to Duty
37. Linking Differential Identifiability with Differential Privacy
38. USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework
39. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator
40. Detection of Side Channel Attacks Based on Data Tainting in Android Systems
41. Energy Management in the Smart Grids via Intelligent Storage Systems
42. wIDS: A Multilayer IDS for Wireless-Based SCADA Systems
43. DIscovery and REgistration Protocol : For Device and Person Identity Management in IoT
44. Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems
45. Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
46. Security Issue of WirelessHART Based SCADA Systems
47. Context Aware Intrusion Response Based on Argumentation Logic
48. Security Mechanisms Planning to Enforce Security Policies
49. Building a Fair System Using Access Rights
50. Enabling Dynamic Security Policy in the Java Security Manager
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.