Nouria Harbi

According to our database1, Nouria Harbi authored at least 33 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Rumor Classification through a Multimodal Fusion Framework and Ensemble Learning.
Inf. Syst. Frontiers, October, 2023

DAT@Z21: A Comprehensive Multimodal Dataset for Rumor Classification in Microblogs.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2023

2022
Data labeling for data security in data lifecycle: A state of the art and issues.
Proceedings of the Business Intelligence & Big Data, 2022

2021
Calling to CNN-LSTM for Rumor Detection: A Deep Multi-channel Model for Message Veracity Classification in Microblogs.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

MONITOR: A Multimodal Fusion Framework to Assess Message Veracity in Social Networks.
Proceedings of the Advances in Databases and Information Systems, 2021

2020
Including Images into Message Veracity Assessment in Social Media.
CoRR, 2020

2019
Vers une analyse des rumeurs dans les réseaux sociaux basée sur la véracité des images : état de l'art.
Proceedings of the Business Intelligence & Big Data, 2019

2018
Preventive inference control between user profiles in data warehouse.
Int. J. Next Gener. Comput., 2018

User Profile Management to protect sensitive data in Warehouses.
Int. J. Next Gener. Comput., 2018

Les Systèmes Multi Agents au Service de la Sécurité des Données Entreposées dans le Cloud.
Proceedings of the Business Intelligence & Big Data, 2018

2017
Secret sharing for cloud data security: a survey.
VLDB J., 2017

Secret Sharing for Cloud Data Security.
CoRR, 2017

Innovative Approaches for efficiently Warehousing Complex Data from the Web.
CoRR, 2017

Alteration Agent for Cloud Data Security.
Proceedings of the 9th International Conference on Management of Digital EcoSystems, 2017

Data Alteration: A Better Approach to Securing Cloud Data with Encryption.
Proceedings of the Actes des 13èmes journées francophones sur les Entrepôts de Données et l'Analyse en Ligne, 2017

2016
Dynamic management of data warehouse security levels based on user profiles.
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

Intelligent multi agent system based solution for data protection in the cloud.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud.
Int. J. Data Warehous. Min., 2015

D113 : une plateforme open-source dédiée à l'analyse des flux et à la détection des intrusions.
Proceedings of the 15èmes Journées Francophones Extraction et Gestion des Connaissances, 2015

Analyse visuelle pour la détection des intrusions.
Proceedings of the 15èmes Journées Francophones Extraction et Gestion des Connaissances, 2015

2014
fVSS: A New Secure and Cost-Efficient Scheme for Cloud Data Warehouses.
Proceedings of the 17th International Workshop on Data Warehousing and OLAP, 2014

2013
Real detection intrusion using supervised and unsupervised learning.
Proceedings of the 2013 International Conference on Soft Computing and Pattern Recognition, 2013

Sharing-based Privacy and Availability of Cloud Data Warehouses.
Proceedings of the Actes des 9èmes journées francophones sur les Entrepôts de Données et l'Analyse en ligne, 2013

2012
Verification of Security Coherence in Data Warehouse Designs.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Confidentialité et disponibilité des données entreposées dans les nuages.
Proceedings of the Extraction et gestion des connaissances (EGC'2012), Actes, janvier 31, 2012

2011
Sécurisation des entrepôts de données contre les inférences précises et partielles.
Ingénierie des Systèmes d Inf., 2011

Securing Data Warehouses: A Semi-automatic Approach for Inference Prevention at the Design Level.
Proceedings of the Model and Data Engineering - First International Conference, 2011

An efficient local region and clustering-based ensemble system for intrusion detection.
Proceedings of the 15th International Database Engineering and Applications Symposium (IDEAS 2011), September 21, 2011

Approach Based Ensemble Methods for Better and Faster Intrusion Detection.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

An Efficient Fuzzy Clustering-Based Approach for Intrusion Detection.
Proceedings of the ADBIS 2011, 2011

2010
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
CoRR, 2010

Modeling Conflict of Interest in the Design of Secure Data Warehouses.
Proceedings of the KEOD 2010, 2010

Sécurisation des entrepôts de données contre les inférences en utilisant les réseaux Bayésiens.
Proceedings of the Actes des 6èmes journées francophones sur les Entrepôts de Données et l'Analyse en ligne, 2010


  Loading...