Azzedine Benameur

According to our database1, Azzedine Benameur authored at least 15 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Confine: Automated System Call Policy Generation for Container Attack Surface Reduction.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2016
Insights into rooted and non-rooted Android mobile devices with behavior analytics.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
All your Root Checks are Belong to Us: The Sad State of Root Detection.
Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, 2015

2014
Large-Scale Evaluation of a Vulnerability Analysis Framework.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

2013
MINESTRONE: Testing the SOUP.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013

2012
The MEERKATS Cloud Security Architecture.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2010
A Decision Support System for Design for Privacy.
Proceedings of the Privacy and Identity Management for Life, 2010

Privacy, Security and Trust Issues Arising from Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Security and Dependability Solutions for Web Services and Workflows.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

SERENITY in e-Business and Smart Item Scenarios.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

A Pattern-Based General Security Framework: An eBusiness Case Study.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

2008
XML Rewriting Attacks: Existing Solutions and their Limitations
CoRR, 2008

A formal solution to rewriting attacks on SOAP messages.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Security views for outsourced business processes.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Security Rules Specification and Analysis Based on Passive Testing.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008


  Loading...