Search

Your search keyword '"Boulahia A"' showing total 462 results

Search Constraints

Start Over You searched for: Author "Boulahia A" Remove constraint Author: "Boulahia A" Publication Type eBooks Remove constraint Publication Type: eBooks
462 results on '"Boulahia A"'

Search Results

1. Matching Knowledge Graphs for Cybersecurity Countermeasures Selection

2. From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data

3. Cover Story

4. Multilevel Security Policies

5. Automated Attacker Behaviour Classification Using Threat Intelligence Insights

6. Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection

7. Enhancing Diabetic Retinopathy Identification Through Novel Image Representation and Hybrid CNN-Transformer Segmentation

8. Investigating Person Attribute Recognition in Challenging Environments

9. How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach

10. A Comparative Analysis of Eleven Augmentation Techniques for Enhanced Retinal Pathology Recognition

11. Optimal Automated Generation of Playbooks

12. The 18th March, 2021 Bejaia (North-East Algeria) Earthquake Mw: 5.9

13. Trust Management Framework for Containerized Workloads Applications to 5G Networks

14. A Multi-Agent Based Dynamic Network Slice Tarification Framework

15. Heterogenous Action Ensembling for Visual Recognition of Large-Scale Actions

16. AttR2U-Net: Deep Attention Based Approach for Melanoma Skin Cancer Image Segmentation

17. Attacker Attribution via Characteristics Inference Using Honeypot Data

18. Analysis of the Bejaia Seismic Sequence of 2012–2013, Northeastern, Algeria

19. Statistical Study of Earthquake Swarms in Northeastern Algeria with Special Reference to the Ain Azel Swarm; Hodna Chain, 2015

21. Extreme Subject Targeting for Deep Learning Based Action Recognition

23. A Priority-Based Domain Type Enforcement for Exception Management

24. A Posteriori Analysis of Policy Temporal Compliance

25. A Deeper Analysis of Adversarial Examples in Intrusion Detection

26. A Certificate-Less Key Exchange Protocol for IoT

27. A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems

28. Optimal Distribution of Privacy Budget in Differential Privacy

29. Accountability in the A Posteriori Access Control: A Requirement and a Mechanism

30. Network Functions Virtualization Access Control as a Service

31. Norms and Deontic Logic

32. Security Analysis of WirelessHART Communication Scheme

33. Multi-Criteria Recommender Approach for Supporting Intrusion Response System

34. Detection and Response to Data Exfiltration from Internet of Things Android Devices

35. Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes

36. Stratification Based Model for Security Policy with Exceptions and Contraries to Duty

37. Linking Differential Identifiability with Differential Privacy

38. USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework

39. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator

40. Detection of Side Channel Attacks Based on Data Tainting in Android Systems

41. Energy Management in the Smart Grids via Intelligent Storage Systems

42. wIDS: A Multilayer IDS for Wireless-Based SCADA Systems

43. DIscovery and REgistration Protocol : For Device and Person Identity Management in IoT

44. Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems

45. Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud

46. Security Issue of WirelessHART Based SCADA Systems

47. Context Aware Intrusion Response Based on Argumentation Logic

48. Security Mechanisms Planning to Enforce Security Policies

49. Building a Fair System Using Access Rights

50. Enabling Dynamic Security Policy in the Java Security Manager

Catalog

Books, media, physical & digital resources