Faouzi Jaïdi

Orcid: 0000-0001-5893-5296

According to our database1, Faouzi Jaïdi authored at least 30 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach.
Mob. Networks Appl., February, 2023

Towards a Reliable and Smart Approach for Detecting and Resolving Security Violations within SDWN.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Machine Learning Algorithms for Enhancing Intrusion Detection Within SDN/NFV.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

IoMT Security Model based on Machine Learning and Risk Assessment Techniques.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

A Comprehensive Study of Intrusion Detection within Internet of Things-based Smart Cities: Synthesis, Analysis and a Novel Approach.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

2022
Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Analysis of Smart Cities Security: Challenges and Advancements.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

2021
Cyber-Risk Management within IoMT: a Context-aware Agent-based Framework for a Reliable e-Health System.
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021

Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database Application.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021

A Systematic Approach for IoT Cyber-Attacks Detection in Smart Cities Using Machine Learning Techniques.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Advanced analysis of the integrity of access control policies: the specific case of databases.
Int. Arab J. Inf. Technol., 2020

Enforcing Risk-Awareness in Access Control Systems: Synthesis, Discussion and Guidelines.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

A Comprehensive Solution for the Analysis, Validation and Optimization of SDN Data-Plane Configurations.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
FW-TR: Towards a Novel Generation of Firewalls Based on Trust-Risk Assessment of Filtering Rules and Policies.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures.
Secur. Commun. Networks, 2018

A Novel Concept of Firewall-Filtering Service Based on Rules Trust-Risk Assessment.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Anomalies Correlation for Risk-Aware Access Control Enhancement.
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018

2017
Advances in Security in Computing and Communications.
CoRR, 2017

A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment.
Proceedings of the SCSS 2017, 2017

Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems.
Proceedings of the SCSS 2017, 2017

Risk Management in Access Control Policies.
Proceedings of the Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.
J. Medical Syst., 2016

2015
A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies.
Proceedings of the SECRYPT 2015, 2015

The problem of integrity in RBAC-based policies within relational databases: synthesis and problem study.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

A Formal Approach Based on Verification and Validation Techniques for Enhancing the Integrity of Concrete Role Based Access Control Policies.
Proceedings of the International Joint Conference, 2015

2014
An Approach to Formally Validate and Verify the Compliance of Low Level Access Control Policies.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2012
Fairness and Access Control for Mobile P2P Auctions over MANETs.
J. Theor. Appl. Electron. Commer. Res., 2012


  Loading...