Layth Sliman

According to our database1, Layth Sliman authored at least 48 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Computing Resource Allocation Scheme for DAG-Based IOTA Nodes.
Sensors, 2021

Towards an ultra lightweight block ciphers for Internet of Things.
J. Inf. Secur. Appl., 2021

A Rank Based ACO Approach for Optimal Resource Allocation and Scheduling in FMS Modeled with Labelled Petri Net.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Smart Contract Based Solution for Secure Distributed SDN.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

2020
An MDE-Based Tool for Early Analysis of UML2.0/PSM Atomic and Composite Components.
IEEE Syst. J., 2020

Verification of smart contracts: A survey.
Pervasive Mob. Comput., 2020

Genetic-Based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets.
IEEE Access, 2020

Toward a Mixed Tangle-Blockchain Architecture.
Proceedings of the Knowledge Innovation Through Intelligent Software Methodologies, Tools and Techniques, 2020

On the Verification of Smart Contracts: A Systematic Review.
Proceedings of the Blockchain - ICBC 2020, 2020

2019
On semantic detection of cloud API (anti)patterns.
Inf. Softw. Technol., 2019

Minimum Initial Marking Estimation in Labeled Petri Nets Using Simulated Annealing.
Proceedings of the Advancing Technology Industrialization Through Intelligent Software Methodologies, Tools and Techniques, 2019

GRASP-Based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets.
Proceedings of the 15th International Conference on Semantics, Knowledge and Grids, 2019

Study of Score Fusion and Quality Weighting in the Bio-Secure DS2 Database.
Proceedings of the Soft Computing in Data Science - 5th International Conference, 2019

On the Verification of Data Encryption Requirements in Internet of Things Using Event-B.
Proceedings of the Digital Economy. Emerging Technologies and Business Innovation, 2019

Tangle the Blockchain: Toward IOTA and Blockchain Integration for IoT Environment.
Proceedings of the Hybrid Intelligent Systems, 2019

A New Lightweight Encryption Approach for Correlated Content Exchange in Internet of Things.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

2018
Ontology Matching Techniques: A Gold Standard Model.
CoRR, 2018

Security, Safety and Confidentiality in IoT for Collaborative Business Technologies (SSCIoT Track of WETICE 2018).
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

A Generic Approach for the Verification of Static and Dynamic Behavioral Properties of SCDL/WS-BPEL Service-Component Architectures.
Proceedings of the Parallel and Distributed Computing, 2018

Chaff-Points Generation Method Based on Adaptive Genetic Algorithms and Non-Fixed Size Squares Boundaries for Resource Constrained Devices.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Lightweight Cryptography for Resource-Constrained Devices: A Comparative Study and Rectangle Cryptanalysis.
Proceedings of the Digital Economy. Emerging Technologies and Business Innovation, 2018

Trustless Blockchain-based Access Control in Dynamic Collaboration.
Proceedings of the 1st International Conference on Big Data and Cyber-Security Intelligence, 2018

2017
Behavioral Verification of Service Component Architecture.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Towards a Formal Verification Approach for Service Component Architecture.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017

Towards a Formal Verification Approach for Cloud Software Architecture.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017

A Formal Approach for Correct Elastic Package-Based Free and Open Source Software Composition in Cloud.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2017 Conferences, 2017

UML2ADA for Early Verification of Concurrency Inside the UML2.0 Atomic Components.
Proceedings of the Intelligent Systems Design and Applications, 2017

Towards a formal approach for the verification of SCA/BPEL software architectures.
Proceedings of the 8th International Conference on Information, 2017

2016
Towards an Ultra-lightweight Cryptosystem for IoT.
Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition, 2016

Security Incident Response: Towards a Novel Decision-Making System.
Proceedings of the Intelligent Systems Design and Applications, 2016

Multibiometrics Enhancement Using Quality Measurement in Score Level Fusion.
Proceedings of the Intelligent Systems Design and Applications, 2016

Detecting Cloud (Anti)Patterns: OCCI Perspective.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016

Chaff-Points Generation Using Knapsack Problem Resolution in Fingerprint Fuzzy Vault.
Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), 2016

Semantic Web Technologies in Cloud Computing: A Systematic Literature Review.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Configuration assistée des processus métier. Conception et expérimentation.
Ingénierie des Systèmes d Inf., 2015

Fingerprint fuzzy vault chaff point generation by squares method.
Proceedings of the 7th International Conference of Soft Computing and Pattern Recognition, 2015

Compose: A Domain Specific Language for scientific code computation.
Proceedings of the International Conference on Protocol Engineering, 2015

A Critical Comparison of Fingerprint Fuzzy Vault Techniques.
Proceedings of the Advances in Visual Informatics, 2015

Score Level Fusion Scheme in Hybrid Multibiometric System.
Proceedings of the Advances in Visual Informatics, 2015

A Novel Security Architecture Based on Multi-level Rule Expression Language.
Proceedings of the Hybrid Intelligent Systems, 2015

2014
Towards an effective e-government framework: Tasks and instruments for design and evaluation of public sector websites.
Proceedings of the 14th International Conference on Intelligent Systems Design and Applications, 2014

Model of Bayesian Tangent Eye Shape for eye capture.
Proceedings of the 14th International Conference on Intelligent Systems Design and Applications, 2014

Distributed Framework for Big Data Processing: a Goal Driven Approach.
Proceedings of the Smart Digital Futures 2014, 2014

2013
A New Collaborative and Cloud Based Simulation as a Service Platform: Towards a Multidisciplinary Research Simulation Support.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013

2012
RunMyCode: An innovative platform for social production and evaluation of scientific research.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2009
A security policy framework for context-aware and user preferences in e-services.
J. Syst. Archit., 2009

Collaborative Business and Enterprise Urbanization: Towards a Production-Oriented Urbanization Strategy.
Int. J. Enterp. Inf. Syst., 2009

2008
Towards Secured and Interoperable Business Services.
Proceedings of the Enterprise Interoperability III, 2008


  Loading...