Abdelhamid Belmekki

According to our database1, Abdelhamid Belmekki authored at least 13 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Intelligent Systems for XSS attack detection: A brief survey.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

2022
A Privacy by Design Methodology Application in Telecom Domain.
Int. J. Commun. Networks Inf. Secur., April, 2022

2020
A Methodology for Assuring Privacy by Design in Information Systems.
Int. J. Commun. Networks Inf. Secur., 2020

Inadequacy of IT Approaches to Manage Cyber Security in ICS Context.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

A Qualitative-Driven Study of Irreversible Data Anonymizing Techniques in Databases.
Proceedings of the SITA'20: Theories and Applications, 2020

2019
Cyber Security challenges and Issues of Industrial Control Systems-Some Security Recommendations.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

2018
Privacy Enhancement of Telecom Processes Interacting with Charging Data Records.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Privacy increase on telecommunication processes.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018

2017
Risk analysis in Internet of Things using EBIOS.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

2016
Privacy Preservation in the Internet of Things.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

2014
Secure SIP signalling service in IMS network.
Proceedings of the 9th International Conference on Intelligent Systems: Theories and Applications, 2014

2012
A new architecture for detecting DDoS/brute forcing attack and destroying the botnet behind.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2005
Using Active Agent for Intrusion Detection and Management.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005


  Loading...