Nihel Ben Youssef
  According to our database1,
  Nihel Ben Youssef
  authored at least 17 papers
  between 2009 and 2023.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2023
Threat Modeling with Mitre ATT&CK Framework Mapping for SD-IOT Security Assessment and Mitigations.
    
  
    Proceedings of the IEEE Symposium on Computers and Communications, 2023
    
  
  2019
    Proceedings of the 2019 International Conference on Software, 2019
    
  
  2018
Automated and Optimized Formal Approach to Verify SDN Access-Control Misconfigurations.
    
  
    Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communications, 2018
    
  
  2017
    Proceedings of the SCSS 2017, 2017
    
  
    Proceedings of the Information Systems, 2017
    
  
  2016
An Accurate FDD-Based Approach for Discovering Distributed Firewalls Misconfigurations.
    
  
    Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
    
  
  2015
    Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015
    
  
    Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
    
  
  2014
    Proceedings of the IEEE 8th International Conference on Research Challenges in Information Science, 2014
    
  
  2012
    Proceedings of the 11th IEEE International Conference on Trust, 2012
    
  
  2011
Systematic Deployment of Network Security Policy in Centralized and Distributed Firewalls.
    
  
    Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
    
  
    Proceedings of the Digital Information and Communication Technology and Its Applications, 2011
    
  
    Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011
    
  
  2010
Automatic Conformance Verification of Distributed Firewalls to Security Requirements.
    
  
    Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
    
  
  2009
Automatic verification of conformance of firewall configurations to security policies.
    
  
    Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009