Malek Ben Salem
According to our database1, Malek Ben Salem authored at least 28 papers between 2008 and 2019.
Legend:Book In proceedings Article PhD thesis Other
(m, k)-firm constraints and derived data management for the QoS enhancement in distributed real-time DBMS.
Int. Arab J. Inf. Technol., 2019
Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
A Novel Architecture for Automatic Document Classification for Effective Security in Edge Computing Environments.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018
A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network.
Proceedings of the IEEE International Conference on Big Data, 2018
Universal Prediction Distribution for Surrogate Models.
SIAM/ASA J. Uncertain. Quantification, 2017
A feedback control scheduling architecture for real-time ontology.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016
Orchestration of software-defined security services.
Proceedings of the IEEE International Conference on Communication, 2016
Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology.
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015
Multi-versions data and epsilon-serializability for QoS enhancement in distributed RTDBMS.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015
Applicability of the Imprecise Computation Approach for the QoS Enhancement in Distributed RTDBMS.
Proceedings of the IEEE 13th International Symposium on Parallel and Distributed Computing, 2014
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
Applicability of the (m, k)-firm Approach for the QoS Enhancement in Distributed RTDBMS.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013
Management of the real-time derived data in a Distributed Real-Time DBMS using the semi-total replication data.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection.
Security and Communication Networks, 2012
Combining Baiting and User Search Profiling Techniques for Masquerade Detection.
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Insider Threat Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
J. Internet Serv. Inf. Secur., 2011
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Modeling User Search Behavior for Masquerade Detection.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Decoy Document Deployment for Effective Masquerade Attack Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
Monitoring Technologies for Mitigating Insider Threats.
Proceedings of the Insider Threats in Cyber Security, 2010
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.
Designing Host and Network Sensors to Mitigate the Insider Threat.
IEEE Security & Privacy, 2009
A Survey of Insider Attack Detection Research.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008