Kamel Karoui

Orcid: 0000-0003-2507-9571

According to our database1, Kamel Karoui authored at least 20 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Risk based intrusion detection system in software defined networking.
Concurr. Comput. Pract. Exp., 2024

2022
An Intelligent ML-Based IDS Framework for DDoS Detection in the SDN Environment.
Proceedings of the Advances in Mobile Computing and Multimedia Intelligence, 2022

Machine Learning Method for DDoS Detection and Mitigation in a Multi-controller SDN Environment Using Cloud Computing.
Proceedings of the Intelligent Systems Design and Applications - 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022, 2022

A Survey of Machine Learning Methods for DDoS Threats Detection Against SDN.
Proceedings of the Distributed Computing for Emerging Smart Networks, 2022

2021
New Engineering Method for the Risk Assessment: Case Study Signal Jamming of the M-Health Networks.
Mob. Networks Appl., 2021

2017
A Formal Approach for Network Security Policy Relevancy Checking.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
A framework for firewalls policy representativeness testing based on classification and reversible metrics.
Int. J. Secur. Networks, 2016

Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E-commerce web server.
Int. J. Netw. Manag., 2016

Cloud Security Quantitative Assessment Based on Mobile Agent and Web Service Interaction.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

2014
Firewalls anomalies severity evaluation and classification.
Int. J. Secur. Networks, 2014

A Secure Cloud Computing Architecture Design.
Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, 2014

2013
Distributed firewalls and IDS interoperability checking based on a formal approach.
CoRR, 2013

2009
Misconfigurations discovery between distributed security components using the mobile agent approach.
Proceedings of the iiWAS'2009, 2009

A Multi-Agent Framework for Anomalies Detection on Distributed Firewalls Using Data Mining Techniques.
Proceedings of the Data Mining and Multi-agent Integration, 2009

2008
A secure mobile agents approach for anomalies detection on firewalls.
Proceedings of the iiWAS'2008, 2008

Firewalls anomalies' detection system based on web services / mobile agents interactions.
Proceedings of the CRiSIS '08, 2008

2002
New efficient algorithm for recognizing handwritten Hindi digits.
Proceedings of the Document Recognition and Retrieval IX, 2002

1999
Communications software design for testability: specification transformations and testability measures.
Inf. Softw. Technol., 1999

A Study of Some Influencing Factors in Testability and Diagnostics Based on FSMs.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

1997
Design for testability of communication protocols based on SDL language.
Proceedings of the SDL '97 Time for Testing, 1997


  Loading...