Malek Ben Salem

According to our database1, Malek Ben Salem authored at least 34 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Are Smart Home Devices Abandoning IPV Victims?
Proceedings of the 19th IEEE International Conference on Trust, 2020

Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural Networks.
Proceedings of the Security and Privacy in Communication Networks, 2020

Gaussian Process-Based Dimension Reduction for Goal-Oriented Sequential Design.
SIAM/ASA J. Uncertain. Quantification, 2019

(m, k)-firm constraints and derived data management for the QoS enhancement in distributed real-time DBMS.
Int. Arab J. Inf. Technol., 2019

Active authentication using file system decoys and user behavior modeling: results of a large scale study.
Comput. Secur., 2019

Model selection and adaptive sampling in surrogate modeling: Kriging and beyond. (Sélection de modèle et échantillonnage séquentiel en métamodélisation : Krigeage et au-delà).
PhD thesis, 2018

A Validation Approach for Ontology-Based Real-time DBMS.
Int. J. Comput. Intell. Syst., 2018

Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

A Novel Architecture for Automatic Document Classification for Effective Security in Edge Computing Environments.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018

A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network.
Proceedings of the IEEE International Conference on Big Data, 2018

Universal Prediction Distribution for Surrogate Models.
SIAM/ASA J. Uncertain. Quantification, 2017

A feedback control scheduling architecture for real-time ontology.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

Orchestration of software-defined security services.
Proceedings of the IEEE International Conference on Communication, 2016

Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology.
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015

Multi-versions data and epsilon-serializability for QoS enhancement in distributed RTDBMS.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Applicability of the Imprecise Computation Approach for the QoS Enhancement in Distributed RTDBMS.
Proceedings of the IEEE 13th International Symposium on Parallel and Distributed Computing, 2014

System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Applicability of the (m, k)-firm Approach for the QoS Enhancement in Distributed RTDBMS.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

Management of the real-time derived data in a Distributed Real-Time DBMS using the semi-total replication data.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection.
Secur. Commun. Networks, 2012

Combining Baiting and User Search Profiling Techniques for Masquerade Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Insider Threat Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Cloud Computing.
J. Internet Serv. Inf. Secur., 2011

On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Modeling User Search Behavior for Masquerade Detection.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Decoy Document Deployment for Effective Masquerade Attack Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

Monitoring Technologies for Mitigating Insider Threats.
Proceedings of the Insider Threats in Cyber Security, 2010

Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Designing Host and Network Sensors to Mitigate the Insider Threat.
IEEE Secur. Priv., 2009

A Survey of Insider Attack Detection Research.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008