174 results on '"Kamoun, Faouzi"'
Search Results
2. Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications
3. A New Perspective on the Swiss Cheese Model Applied to Understanding the Anatomy of Healthcare Data Breaches
4. On the design and implementation of an on-board test bed system for V2V road hazard signaling
5. A smart dynamic crowd evacuation system for exhibition centers
6. An artificial intelligence based crowdsensing solution for on-demand accident scene monitoring
7. A geolocation-aware mobile crowdsourcing solution for the emergency supply of oxygen cylinders
8. Estimating ambient visibility in the presence of fog: a deep convolutional neural network approach
9. A location-based ubiquitous crowdsourcing approach for the emergency supply of oxygen cylinders
10. The COVCRAV project: Architecture and design of a cooperative V2V crash avoidance system
11. Knowledge, Attitude, and Perception Towards ChatGPT Among University Students and Faculty: A Preliminary Exploration
12. When ChatGPT goes rogue: exploring the potential cybersecurity threats of AI-powered conversational chatbots
13. A Survey of Approaches for Estimating Meteorological Visibility Distance Under Foggy Weather Conditions
14. Estimating meteorological visibility range under foggy weather conditions: A deep learning approach
15. Reconnecting with the past: a framework to better serve the information needs of older people on social networking sites
16. Investigation of the impact of a wireless Fog Warning System with respect to road traffic on a highway
17. IP/MPLS networks with hardened pipes: service concepts, traffic engineering and design considerations
18. A Neural network approach to visibility range estimation under foggy weather conditions
19. ConVeh: Driving Safely into a Connected Future
20. A New Perspective on the Swiss Cheese Model Applied to Understanding the Anatomy of Healthcare Data Breaches
21. Accessibility as an integral factor in e-government web site evaluation : The case of Dubai e-government
22. Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications
23. On the Design and Development of WEBSEE: A Web-Based Senior Exit Exam for Value-Added Assessment of a CIS Program
24. A Framework towards Assessing the Merits of Inviting IT Professionals to the Classroom
25. AKER: An open-source security platform integrating IDS and SIEM functions with encrypted traffic analytic capability
26. Towards a Typology of Business Models for NFC-Based Mobile Payment Services
27. Does Interface Design Influence Consumers' Security Perception?
28. Human and Organizational Factors of Healthcare Data Breaches
29. Statistical analysis of the traffic generated by the superposition of N independent interrupted poisson processes
30. Forensic Analysis of the Cisco WebEx Application
31. Performance analysis of a non-preemptive priority queuing system subjected to a correlated Markovian interruption process
32. Performance evaluation of a queuing system with correlated packet-trains and server interruption
33. The discrete-time queue with autoregressive inputs revisited
34. Performance analysis of a discrete-time queuing system with a correlated train arrival process
35. IP Address Management
36. AI and machine learning: A mixed blessing for cybersecurity
37. A location-based ubiquitous crowdsourcing approach for the emergency supply of oxygen cylinders
38. Blockchain-based chain of custody
39. The IASO Self-Reporting System
40. Towards a Better Understanding of Drone Forensics
41. Neural networks for shortest path computation and routing in computer networks
42. Blockchain-based chain of custody: towards real-time tamper-proof evidence management.
43. Statistical analysis of the traffic generated by the superposition of N independent interrupted poisson processes
44. Estimating ambient visibility in the presence of fog: a deep convolutional neural network approach
45. Analysis of WCAG 2.0 data accessibility success criterion of e-government websites
46. A secure fog‐based platform for SCADA‐based IoT critical infrastructure
47. Role assigning and taking in cloud computing
48. V2V and V2I Communications for Traffic Safety and CO2 Emission Reduction: A Performance Evaluation
49. Developing the IoT to Support the Health Sector: A Case Study from Kikwit, DR Congo
50. A secure fog‐based platform for SCADA‐based IoT critical infrastructure.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.