Yacine Djemaiel

According to our database1, Yacine Djemaiel authored at least 20 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer Graph.
Proceedings of the Advanced Information Networking and Applications, 2022

2019
Using Temporal Conceptual Graphs and Neural Networks for Big Data-Based Attack Scenarios Reconstruction.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

2018
A Novel Graph-Based Approach for the Management of Health Data on Cloud-Based WSANs.
J. Grid Comput., 2018

Secure Authentication Solution for Cloud-based Smart City Surveillance System.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Cloud-Based Global Monitoring System for Smart Cities.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Data Model for Cloud Computing Environment.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2018

2016
A Novel Sensor Cloud Based SCADA infrastructure for Monitoring and Attack prevention.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

A Dynamic Hybrid RBF/Elman Neural Networks for Credit Scoring Using Big Data.
Proceedings of the Business Information Systems - 19th International Conference, 2016

2015
A Mark Based-Temporal Conceptual Graphs for Enhancing Big Data Management and Attack Scenario Reconstruction.
Proceedings of the Business Information Systems - 18th International Conference, 2015

2014
Optimizing Big Data Management Using Conceptual Graphs: A Mark-Based Approach.
Proceedings of the Business Information Systems - 17th International Conference, 2014

Modeling and Assessing the Impact of Security Attacks on Enterprise Information Systems.
Proceedings of the Business Information Systems Workshops, 2014

2012
A mark association-based investigation of attack scenarios in communication networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
A Clustering Data Fusion Method for Intrusion Detection System.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2009
Intrusion detection and tolerance for transaction based applications in wireless environments.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

2008
Intrusion detection and tolerance: A global scheme.
Int. J. Commun. Syst., 2008

Using Object Metadata to Detect and Tolerate Attacks in Object Storage Devices.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Dynamic Detection and Tolerance of Attacks in Storage Area Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Global intrusion detection and tolerance in networked systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

A global marking scheme for tracing cyber attacks.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

2005
Cooperative Intrusion Detection and Tolerance System.
Proceedings of the 12th IEEE International Conference on Electronics, 2005


  Loading...