Samia Bouzefrane

Orcid: 0000-0002-0979-1289

Affiliations:
  • CNAM-Laboratoire Cédric, Paris, France


According to our database1, Samia Bouzefrane authored at least 94 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking.
Comput. Networks, November, 2023

Exploring Homomorphic Encryption and Differential Privacy Techniques towards Secure Federated Learning Paradigm.
Future Internet, 2023

StrucTemp-GNN: An Intrusion Detection Framework in IoT Networks Using Dynamic Heterogeneous Graph Neural Networks.
Proceedings of the Mobile, Secure, and Programmable Networking, 2023

Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

TEVAC: Trusted Evacuation System based Fog Computing.
Proceedings of the International Conference on System Science and Engineering, 2023

Handling security issues by using homomorphic encryption in multi-cloud environment.
Proceedings of the 14th International Conference on Ambient Systems, 2023

Application of Homomorphic Encryption in Machine Learning.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
IFKMS: Inverse Function-based Key Management Scheme for IoT networks.
J. Inf. Secur. Appl., 2022

A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environment.
Int. J. Inf. Comput. Secur., 2022

An approach for unsupervised contextual anomaly detection and characterization.
Intell. Data Anal., 2022

Secure and Non-interactive k-NN Classifier Using Symmetric Fully Homomorphic Encryption.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022

TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

Robust approach for host-overload detection based on dynamic safety parameter.
Proceedings of the 9th International Conference on Future Internet of Things and Cloud, 2022

Vers une gestion d'identités auto-souveraine pour les dispositifs IoT (Towards Self-Sovereign Identity Management for IoT Devices).
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022

2021
Exploring the forecasting approach for road accidents: Analytical measures with hybrid machine learning.
Expert Syst. Appl., 2021

Security and trust in ubiquitous systems.
Ann. des Télécommunications, 2021

A modified LOF-based approach for outlier characterization in IoT.
Ann. des Télécommunications, 2021

Modeling and improving named data networking over IEEE 802.15.4.
Ann. des Télécommunications, 2021

IEEE Access Special Section Editorial: Edge Computing and Networking for Ubiquitous AI.
IEEE Access, 2021

A near-autonomous and incremental intrusion detection system through active learning of known and unknown attacks.
Proceedings of the 2021 International Conference on Security, 2021

Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks.
Proceedings of the 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks, 2021

Identity Management with Hybrid Blockchain Approach: A Deliberate Extension with Federated-Inverse-Reinforcement Learning.
Proceedings of the 22nd IEEE International Conference on High Performance Switching and Routing, 2021

Energy-Aware VM placement based on intra-balanced resource allocation in data centers.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

Energy-Aware Service Level Agreements in 5G NFV architecture.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

2020
A Realistic Deployment of Named Data Networking in the Internet of Things.
J. Cyber Secur. Mobil., 2020

IoT-Based Smart Home Process Management Using a Workflow Approach.
Int. J. Inf. Technol. Web Eng., 2020

Workflow scheduling with data transfer optimisation and enhancement of reliability in cloud data centres.
Int. J. Commun. Networks Distributed Syst., 2020

Modified reinforcement learning based- caching system for mobile edge computing.
Intell. Decis. Technol., 2020

An outlier ensemble for unsupervised anomaly detection in honeypots data.
Intell. Data Anal., 2020

Property-based token attestation in mobile computing.
Concurr. Comput. Pract. Exp., 2020

Matrix-based key management scheme for IoT networks.
Ad Hoc Networks, 2020

Budget-Aware Performance Optimization of Workflows in Multiple Data Center Clouds.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020

Efficient and Lightweight Polynomial-Based Key Management Scheme for Dynamic Networks.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020

Parallel Applications Mapping onto Heterogeneous MPSoCs Interconnected Using Network on Chip.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020

2019
Exploring Scope of Computational Intelligence in IoT Security Paradigm.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

A Lightweight Forwarding Strategy for Named Data Networking in Low-end IoT.
J. Netw. Comput. Appl., 2019

An efficient authentication and key agreement scheme for e-health applications in the context of internet of things.
Int. J. Inf. Comput. Secur., 2019

Parallel Applications Mapping onto Network on Chip Based on Heterogeneous MPSoCs Using Hybrid Algorithms.
Int. J. Distributed Syst. Technol., 2019

NDN-over-ZigBee: A ZigBee support for Named Data Networking.
Future Gener. Comput. Syst., 2019

Self-Organizing Maps Applied to Soil Conservation in Mediterranean Olive Groves.
Proceedings of the 8th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, 2019

Modeling and Improving Named Data Networking over IEEE 802.15.4.
Proceedings of the 8th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, 2019

Comparing different Machine-Learning techniques to predict Vehicles' Positions using the received Signal Strength of periodic messages.
Proceedings of the 12th IFIP Wireless and Mobile Networking Conference, 2019

New Caching System Under Uncertainty for Mobile Edge Computing.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

2018
Predicting transmission success with Support Vector Machine in VANETs.
Proceedings of the 2018 IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, 2018

Towards evaluating Named Data Networking for the IoT: A framework for OMNeT++.
Proceedings of the 5th International OMNeT++ Community Summit, 2018

Energy-Efficient Hardware Caching Decision Using Fuzzy Logic in Mobile Edge Computing.
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops, 2018

Energy-Efficient Algorithm for Load Balancing and VMs Reassignment in Data Centers.
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops, 2018

Predicting Vehicles' Positions Using Roadside Units: A Machine-Learning Approach.
Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking, 2018

2017
An Ultra-Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things.
Proceedings of the Mobile, Secure, and Programmable Networking, 2017

Mobility Prediction in Vehicular Networks: An Approach Through Hybrid Neural Networks Under Uncertainty.
Proceedings of the Mobile, Secure, and Programmable Networking, 2017

2016
Service architecture for multi-environment mobile cloud services.
Int. J. High Perform. Comput. Netw., 2016

Virtualization Techniques: Challenges and Opportunities.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

Energy Efficiency in Mobile Cloud Computing Architectures.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

A New Scalable and Energy Efficient Algorithm for VMs Reassignment in Cloud Data Centers.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

Towards a Secure RA2DL Based Approach.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2016

RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems.
Proceedings of the ENASE 2016, 2016

2015
Toward a Framework in Cloudlet-Based Architecture for a Real-Time Predictional Model.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

New Solutions for Useful Execution Models of Communicating Adaptive RA2DL.
Proceedings of the Intelligent Software Methodologies, Tools and Techniques, 2015

RA2DL: New Flexible Solution for Adaptive AADL-based Control Components.
Proceedings of the PECCS 2015, 2015

CBUPRE to Secure MANETs from DoS Attacks.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

A Hybrid Algorithm for DAG Application Scheduling on Computational Grids.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

Energy-Aware DPSO Algorithm for Workflow Scheduling on Computational Grids.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Middleware to Integrate Mobile Devices, Sensors and Cloud Computing.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
Cloudlets Authentication in NFC-Based Mobile Computing.
Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, 2014

Analysis and Detection of DoS Attacks in Cloud Computing by Using QSE Algorithm.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Trusted Platforms to Secure Mobile Cloud Computing.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
A cloud based dual-root trust model for secure mobile online transactions.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

MCC-OSGi: An OSGi-based mobile cloud service model.
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013

Towards a Modular and Lightweight Model for Android Development Platforms.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Towards a Secure Identity Management in Smartphone Environments.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Making offloading decisions resistant to network unavailability for mobile cloud collaboration.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2011
Anomaly detection in RFID systems.
Int. J. Radio Freq. Identif. Technol. Appl., 2011

Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS Environments.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
The embedded and mobile systems master at the CNAM of Paris.
Proceedings of the 2010 Workshop on Embedded Systems Education, 2010

2009
MESURE Tool to benchmark Java Card platforms
CoRR, 2009

Measurement Analysis When Benchmarking Java Card Platforms.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

2008
Gestion de la surcharge dans les systèmes de gestion de base de données temps réel.
Tech. Sci. Informatiques, 2008

Handling Overload and Data-Relaxation Control in Distributed Real-Time Database Systems.
Int. J. Comput. Their Appl., 2008

Evaluation of Java Card Performance.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Performance Evaluation of Java Card Bytecodes.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

A Typed Compositional Language for Real-Time Systems.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Applying the CBSE paradigm in the real time specification for Java.
Proceedings of the 4th international workshop on Java technologies for real-time and embedded systems, 2006

2005
Performing Real-Time Scheduling in an Interactive Audio-Streaming Application.
Proceedings of the ICEIS 2005, 2005

2004
A Java Platform to Control Real-Time Transactions Overload.
Proceedings of the 7th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2004), 2004

A Transactional Multimode Model to Handle Overload in Distributed RTDBSS.
Proceedings of the ICEIS 2004, 2004

2003
Distributed Overload Control for Real-Time Replicated Database Systems.
Proceedings of the ICEIS 2003, 2003

2002
RT-DIS-COM: a Protocol to Manage Distributed Real-Time Transaction Commit.
Sci. Ann. Cuza Univ., 2002

D-ANTICIP: A Protocol Suitable for Distributed Real-Time Transactions.
Proceedings of the ICEIS 2002, 2002

2001
A Causal-Phase Protocol to Order Soft Real-Time Transactions in a Distributed Database.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

Soft Real-Time Transactions Scheduling in a Wireless Environment.
Proceedings of the 4th International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2001), 2001

Disconnection tolerance in soft real-time mobile databases.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001

The Causal-Phase Ordering Protocol to Manage Soft Real-Time Distributed Transactions.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001

2000
Relaxing correctness criteria in real-time DBMSs.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1998
A tool for temporal analysis of distributed hard real-time applications.
Proceedings of the SIGMETRICS Symposium on Parallel and Distributed Tools, 1998


  Loading...