Wael Kanoun

According to our database1, Wael Kanoun authored at least 17 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
BAD: A Blockchain Anomaly Detection Solution.
IEEE Access, 2020

2018
BAD: Blockchain Anomaly Detection.
CoRR, 2018

ADvISE: Anomaly Detection tool for blockchaIn SystEms.
Proceedings of the 2018 IEEE World Congress on Services, 2018

2017
Connectivity graph reconstruction for networking cloud infrastructures.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Connectivity extraction in cloud infrastructures.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2015
Elementary Risks: Bridging Operational and Strategic Security Realms.
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015

On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks.
Bell Labs Tech. J., 2012

Towards a Temporal Response Taxonomy.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2010
Risk-Aware Framework for Activating and Deactivating Policy-Based Response.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Intelligent response system to mitigate the success likelihood of ongoing attacks.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Expression and Deployment of Reaction Policies.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Automated reaction based on risk analysis and attackers skills in intrusion detection systems.
Proceedings of the CRiSIS '08, 2008

2007
Advanced Reaction Using Risk Assessment in Intrusion Detection Systems.
Proceedings of the Critical Information Infrastructures Security, 2007


  Loading...