Search

Your search keyword '"Lahmadi, Abdelkader"' showing total 143 results

Search Constraints

Start Over You searched for: Author "Lahmadi, Abdelkader" Remove constraint Author: "Lahmadi, Abdelkader"
143 results on '"Lahmadi, Abdelkader"'

Search Results

2. Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates

3. MitM Attack Detection in BLE Networks Using Reconstruction and Classification Machine Learning Techniques

6. HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment

7. Performance of Network and Service Monitoring Frameworks

8. SecSip: A Stateful Firewall for SIP-based Networks

13. Outsourcing Mobile Security in the Cloud

14. HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment

16. Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised Reward

17. Modeling and Performance Evaluation of the Network and Service Management Plane

18. On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case Study

19. On Delays in Management Frameworks: Metrics, Models and Analysis

20. Caractérisation et diagnostic des applications de cloud gaming sur réseaux mobiles

21. On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study

22. Computer-implemented method for testing the cybersecurity of a target environment

25. Automated mapping of CVE vulnerabilties to MITRE ATT&CK Framework

26. TANGLED: A Cooperative Anycast Testbed

27. HSL: a Cyber Security Research Facility for Sensitive Data Experiments

28. Practical security analysis of IoT devices

33. CONTAIN: Privacy-oriented Contact Tracing Protocols for Epidemics

42. Minimizing Range Rules for Packet Filtering Using a Double Mask Representation

43. Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks

44. Minimizing Range Rules for Packet Filtering Using Double Mask Representation

45. Automated Factorization of Security Chains in Software-Defined Networks

46. A Tool Suite for the Automated Synthesis of Security Function Chains

47. Verifying Security Requirements of an IoT device using SCUBA Tool Suite

48. Security Analysis of Internet of Things Devices: Hands-on lab

49. OMMA: open architecture for Operator-guided Monitoring of Multi-step Attacks

Catalog

Books, media, physical & digital resources