Samir Ouchani

Orcid: 0000-0002-7997-8225

According to our database1, Samir Ouchani authored at least 77 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Resource-Constrained EXtended Reality Operated With Digital Twin in Industrial Internet of Things.
IEEE Open J. Commun. Soc., 2024

2023
T2S-MAKEP and T2T-MAKEP: A PUF-based Mutual Authentication and Key Exchange Protocol for IoT devices.
Internet Things, December, 2023

A systematic review of federated learning: Challenges, aggregation methods, and development tools.
J. Netw. Comput. Appl., November, 2023

Formal modelling and verification of scalable service composition in IoT environment.
Serv. Oriented Comput. Appl., September, 2023

A SPARQL-based framework to preserve privacy of sensitive data on the semantic web.
Serv. Oriented Comput. Appl., September, 2023

A framework for modeling and analyzing cyber-physical systems using statistical model checking.
Internet Things, July, 2023

Toward a context-driven deployment optimization for embedded systems: a product line approach.
J. Supercomput., 2023

PUF-based mutual authentication and session key establishment protocol for IoT devices.
J. Ambient Intell. Humaniz. Comput., 2023

Guaranteeing information integrity and access control in smart cities through blockchain.
J. Ambient Intell. Humaniz. Comput., 2023

DLSTM-SCM- A Dynamic LSTM-Based Framework for Smart Supply Chain Management.
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023

A Smart Mining Strategy for Blockchain-Enabled Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023

Predictive Maintenance Approaches in Industry 4.0: A Systematic Literature Review.
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023

An Enhanced Interface-Based Probabilistic Compositional Verification Approach.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2023

Hybrid Data-Driven and Knowledge-Based Predictive Maintenance Framework in the Context of Industry 4.0.
Proceedings of the Model and Data Engineering - 12th International Conference, 2023

Octa Pillars-based Approach to Select the Best Blockchain-based Solutions in Healthcare Information Exchange.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

FedGA-Meta: Federated Learning Framework using Genetic Algorithms and Meta-Learning for Aggregation in Industrial Cyber- Physical Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Predictive Maintenance for Smart Industrial Systems: A Roadmap.
Proceedings of the 14th International Conference on Ambient Systems, 2023

2022
A survey on silicon PUFs.
J. Syst. Archit., 2022

Generation and verification of learned stochastic automata using k-NN and statistical model checking.
Appl. Intell., 2022

An Adaptive Attack Prediction Framework in Cyber-Physical Systems.
Proceedings of the Ninth International Conference on Software Defined Systems, 2022

Aggregation using Genetic Algorithms for Federated Learning in Industrial Cyber-Physical Systems.
Proceedings of the International Conference on INnovations in Intelligent SysTems and Applications, 2022

Formal Modelling and Security Analysis of Inter-Operable Systems.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022

From Simulation to Digital Twins, the Case of Internet of Things Research and Tools.
Proceedings of the 6th International Conference on Future Networks & Distributed Systems, 2022

Enhancing the Aggregation of the Federated Learning for the Industrial Cyber Physical Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Genetic Algorithm Based Aggregation for Federated Learning in Industrial Cyber Physical Systems.
Proceedings of the International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022), 2022

Secure and Reliable Smart Cyber-Physical Systems.
, 2022

2021
Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems.
ACM Trans. Cyber Phys. Syst., 2021

A security policy hardening framework for Socio-Cyber-Physical Systems.
J. Syst. Archit., 2021

Reliability-driven Automotive Software Deployment based on a Parametrizable Probabilistic Model Checking.
Expert Syst. Appl., 2021

Towards a reliable smart city through formal verification and network analysis.
Comput. Commun., 2021

A Generation and Recovery Framework for Silicon PUFs Based Cryptographic Key.
Proceedings of the Advances in Model and Data Engineering in the Digitalization Era, 2021

A Low-Cost Authentication Protocol Using Arbiter-PUF.
Proceedings of the Model and Data Engineering - 10th International Conference, 2021

COVID-DETECT: A Deep Learning Based Approach to Accelerate COVID-19 Detection.
Proceedings of the Advances in Model and Data Engineering in the Digitalization Era, 2021

Guaranteeing Information Integrity Through Blockchains for Smart Cities.
Proceedings of the Model and Data Engineering - 10th International Conference, 2021

An IoT-based Framework for an Optimal Monitoring and Control of Cyber-Physical Systems: Application on Biogas Production System.
Proceedings of the IoT '21: 11th International Conference on the Internet of Things, St. Gallen, Switzerland, November 8, 2021

Towards a Foundation of a Mutual Authentication Protocol for a Robust and Resilient PUF-Based Communication Network.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021

Modeling the Greedy Behavior Attack and Analyzing its Impact on IoT Networks.
Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), 2021

2020
A Review on Cyber-Physical Systems: Models and Architectures.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Modeling Attack-Defense Trees' Countermeasures Using Continuous Time Markov Chains.
Proceedings of the Software Engineering and Formal Methods. SEFM 2020 Collocated Workshops, 2020

Towards a Security Reinforcement Mechanism for Social Cyber-Physical Systems.
Proceedings of the Smart Applications and Data Analysis - Third International Conference, 2020

A BIM-based framework for an Optimal WSN Deployment in Smart Building.
Proceedings of the 11th International Conference on Network of the Future, 2020

Quantifying Security and Performance of Physical Unclonable Functions.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

Performance Analysis of RPL Protocols in LLN Network Using Friedman's Test.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

Ensuring the Correctness and Well Modeling of Intelligent Healthcare Management Systems.
Proceedings of the Impact of Digital Technologies on Public Health in Developed and Developing Countries, 2020

Security Assessment and Hardening of Autonomous Vehicles.
Proceedings of the Risks and Security of Internet and Systems, 2020

Towards Enhancing Security and Resilience in CPS: A Coq-Maude based Approach.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

2019
Safety analysis of train control system based on model-driven design methodology.
Comput. Ind., 2019

Recommendations-based on semantic analysis of social networks in learning environments.
Comput. Hum. Behav., 2019

Towards a fractionation-based verification: application on SysML activity diagrams.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

A Smart Living Framework: Towards Analyzing Security in Smart Rooms.
Proceedings of the Model and Data Engineering - 9th International Conference, 2019

Towards a Call Behavior-Based Compositional Verification Framework for SysML Activity Diagrams.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31, 2019

Security Implementation and Verification in Smart Buildings.
Proceedings of the 1st International Conference on Innovative Trends in Computer Science, 2019

A Meta Language for Cyber-Physical Systems and Threats: Application on Autonomous Vehicle.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Ensuring the Functional Correctness of IoT through Formal Modeling and Verification.
Proceedings of the Model and Data Engineering - 8th International Conference, 2018

PLM Competencies Analysis Based on Industry Demand.
Proceedings of the Product Lifecycle Management to Support Industry 4.0, 2018

A Recursive K-means towards trade-off between PLM Competences, Positions, and Offers.
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018

2017
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

2016
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

2015
Generating attacks in SysML activity diagrams by detecting attack surfaces.
J. Ambient Intell. Humaniz. Comput., 2015

A quantitative verification framework of SysML activity diagrams under time constraints.
Expert Syst. Appl., 2015

Specification, verification, and quantification of security in model-based systems.
Computing, 2015

Security analysis of socio-technical physical systems.
Comput. Electr. Eng., 2015

On the Probabilistic Verification of Time Constrained SysML State Machines.
Proceedings of the Intelligent Software Methodologies, Tools and Techniques, 2015

2014
A property-based abstraction framework for SysML activity diagrams.
Knowl. Based Syst., 2014

A formal verification framework for SysML activity diagrams.
Expert Syst. Appl., 2014

Attacks Generation by Detecting Attack Surfaces.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2013
A Security Verification Framework for SysML Activity Diagrams. (Un cadre de vérification de la sécurité pour les diagrammes d'activité SysML).
PhD thesis, 2013

A Security Risk Assessment Framework for SysML Activity Diagrams.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

A probabilistic verification framework of SysML activity diagrams.
Proceedings of the IEEE 12th International Conference on Intelligent Software Methodologies, 2013

A formal verification framework for Bluespec System Verilog.
Proceedings of the 2013 Forum on specification and Design Languages, 2013

Symmetry Reduction of Time-Triggered Ethernet Protocol.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols.
J. Softw., 2012

Efficient Probabilistic Abstraction for SysML Activity Diagrams.
Proceedings of the Software Engineering and Formal Methods - 10th International Conference, 2012

2011
Model-based systems security quantification.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

2010
Verification of the Correctness in Composed UML Behavioural Diagrams.
Proceedings of the Software Engineering Research, 2010

2009
A Survey of Model-Driven Testing Techniques.
Proceedings of the Ninth International Conference on Quality Software, 2009

2008
Gene Selection for Cancer Classification Using DCA.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008


  Loading...