Slim Trabelsi

According to our database1, Slim Trabelsi authored at least 41 papers between 2005 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
BlindSpot: Watermarking Through Fairness.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

2021
Preventing Watermark Forging Attacks in a MLaaS Environment.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

An Asynchronous Federated Learning Approach for a Security Source Code Scanner.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Sociocultural Influences for Password Definition: An AI-based Study.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Yes We can: Watermarking Machine Learning Models beyond Classification.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2019
Monitoring Leaked Confidential Data.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

2018
Dissuading Stolen Password Reuse.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

Towards Personal Data Identification and Anonymization Using Machine Learning Techniques.
Proceedings of the New Trends in Databases and Information Systems, 2018

2016
Predictive Model for Exploit Kit based Attacks.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Enhancing Access Control Trees for Cloud Computing.
Proceedings of the Current Trends in Web Engineering, 2016

2015
Security Certification for Service-Based Business Ecosystems.
Comput. J., 2015

Monitoring Software Vulnerabilities through Social Networks Analysis.
Proceedings of the SECRYPT 2015, 2015

Mining social networks for software vulnerabilities monitoring.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

A Privacy Preserving Framework for Mobile and Cloud.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015

Sharing Data through Confidential Clouds: An Architectural Perspective.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

PPL v2.0: Uniform Data Access and Usage Control on Cloud and Mobile.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

2014
Obligation Based Access Control.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

Re-Identification Risk Based Security Controls.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

Optimizing Access Control Performance for the Cloud.
Proceedings of the CLOSER 2014, 2014

2013
Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks.
Proceedings of the SECRYPT 2013, 2013

Sticky policies for mobile devices.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
Sticky policies for data control in the cloud.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Towards a Trustworthy Service Marketplace for the Future Internet.
Proceedings of the Future Internet, 2012

Transversal Policy Conflict Detection.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

2011
Deriving business processes with service level agreements from early requirements.
J. Syst. Softw., 2011

FI-WARE Security: Future Internet Security Core - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

PPL: PrimeLife Privacy Policy Engine.
Proceedings of the POLICY 2011, 2011

Data Usage Control in the Future Internet Cloud.
Proceedings of the Future Internet, 2011

Policy Implementation in XACML.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
A Flexible Architecture for Privacy-Aware Trust Management.
J. Theor. Appl. Electron. Commer. Res., 2010

Privacy-aware policy matching.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2009
Sharing Data for Public Security.
Proceedings of the Privacy and Identity Management for Life, 2009

Data disclosure risk evaluation.
Proceedings of the CRiSIS 2009, 2009

2008
On the Impact of DoS Attacks on Secure Service Discovery.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Secure Service Publishing with Untrusted Registries - Securing Service Discovery.
Proceedings of the SECRYPT 2007, 2007

Context-Aware Security Policy for the Service Discovery.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Enabling Secure Discovery in a Pervasive Environment.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing.
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006

2005
Extended Erlang-B law for performance evaluation of radio resources sharing in GSM/(E)GPRS networks.
Proceedings of the IEEE 16th International Symposium on Personal, 2005


  Loading...