Malek Ben Salem

According to our database1, Malek Ben Salem authored at least 28 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
(m, k)-firm constraints and derived data management for the QoS enhancement in distributed real-time DBMS.
Int. Arab J. Inf. Technol., 2019

2018
Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

A Novel Architecture for Automatic Document Classification for Effective Security in Edge Computing Environments.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018

A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
Universal Prediction Distribution for Surrogate Models.
SIAM/ASA J. Uncertain. Quantification, 2017

A feedback control scheduling architecture for real-time ontology.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

2016
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

Orchestration of software-defined security services.
Proceedings of the IEEE International Conference on Communication, 2016

2015
Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology.
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015

Multi-versions data and epsilon-serializability for QoS enhancement in distributed RTDBMS.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
Applicability of the Imprecise Computation Approach for the QoS Enhancement in Distributed RTDBMS.
Proceedings of the IEEE 13th International Symposium on Parallel and Distributed Computing, 2014

2013
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Applicability of the (m, k)-firm Approach for the QoS Enhancement in Distributed RTDBMS.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

Management of the real-time derived data in a Distributed Real-Time DBMS using the semi-total replication data.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

2012
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection.
Security and Communication Networks, 2012

Combining Baiting and User Search Profiling Techniques for Masquerade Detection.
JoWUA, 2012

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

2011
Insider Threat Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Cloud Computing.
J. Internet Serv. Inf. Secur., 2011

On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Modeling User Search Behavior for Masquerade Detection.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Decoy Document Deployment for Effective Masquerade Attack Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
Monitoring Technologies for Mitigating Insider Threats.
Proceedings of the Insider Threats in Cyber Security, 2010

Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.
JoWUA, 2010

2009
Designing Host and Network Sensors to Mitigate the Insider Threat.
IEEE Security & Privacy, 2009

2008
A Survey of Insider Attack Detection Research.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008


  Loading...