Malek Ben Salem
According to our database1, Malek Ben Salem authored at least 31 papers between 2008 and 2019.
Legend:Book In proceedings Article PhD thesis Other
SIAM/ASA J. Uncertain. Quantification, 2019
(m, k)-firm constraints and derived data management for the QoS enhancement in distributed real-time DBMS.
Int. Arab J. Inf. Technol., 2019
Active authentication using file system decoys and user behavior modeling: results of a large scale study.
Comput. Secur., 2019
Int. J. Comput. Intell. Syst., 2018
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
A Novel Architecture for Automatic Document Classification for Effective Security in Edge Computing Environments.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018
Proceedings of the IEEE International Conference on Big Data, 2018
SIAM/ASA J. Uncertain. Quantification, 2017
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016
Proceedings of the IEEE International Conference on Communication, 2016
Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology.
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015
Multi-versions data and epsilon-serializability for QoS enhancement in distributed RTDBMS.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015
Applicability of the Imprecise Computation Approach for the QoS Enhancement in Distributed RTDBMS.
Proceedings of the IEEE 13th International Symposium on Parallel and Distributed Computing, 2014
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
Applicability of the (m, k)-firm Approach for the QoS Enhancement in Distributed RTDBMS.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013
Management of the real-time derived data in a Distributed Real-Time DBMS using the semi-total replication data.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection.
Security and Communication Networks, 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
Proceedings of the Insider Threats in Cyber Security, 2010
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
IEEE Secur. Priv., 2009
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008