Anis Ben Aissa

Orcid: 0000-0002-3254-8498

According to our database1, Anis Ben Aissa authored at least 13 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Development of a Secured Vehicle Spot Detection System Using GSM.
Int. J. Interact. Mob. Technol., 2021

2014
Modeling the propagation of security threats: An e-learning case study.
Proceedings of the Third International Conference on Cyber Security, 2014

Quantifying availability in SCADA environments using the cyber security metric MFC.
Proceedings of the Cyber and Information Security Research Conference, 2014

Quantifying the impact of unavailability in cyber-physical environments.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

Classification of Security Threats in Information Systems.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2013
A cybersecurity model in cloud computing environments.
J. King Saud Univ. Comput. Inf. Sci., 2013

Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study.
Int. J. Secur. Softw. Eng., 2013

2012
Defining and computing a value based cyber-security measure.
Inf. Syst. E Bus. Manag., 2012

An economic model of security threats for cloud computing systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2010
Quantifying security threats and their potential impacts: a case study.
Innov. Syst. Softw. Eng., 2010

Software requirements for a system to compute mean failure cost.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Modeling stakeholder/value dependency through mean failure cost.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Quantifying security threats and their impact.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009


  Loading...