Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJune 2024
Combining Cryptography and Discrete-Event Systems to Study Sensor and Actuator Cyberattacks
Information Security Theory and PracticeFeb 2024, Pages 33–48https://doi.org/10.1007/978-3-031-60391-4_3AbstractWe consider cyber-physical systems equipped with sensors and actuators controlled or monitored by software and communication capabilities. Such use of communication makes sensors and actuators possibly vulnerable to cyberattacks (more briefly: ...
- ArticleOctober 2023
SlideGCN: Slightly Deep Graph Convolutional Network for Multilingual Sentiment Analysis
Advances in Computational IntelligenceJun 2023, Pages 91–103https://doi.org/10.1007/978-3-031-43078-7_8AbstractMultilingual sentiment analysis refers to the process of sentiment scoring while gathering insights from data in different languages. Many research studies have been conducted to perform multilingual sentiment analysis. However, most of these ...
- ArticleJuly 2023
- ArticleJuly 2023
A Peer to Peer Federated Graph Neural Network for Threat Intelligence
AbstractThreat intelligence is the process of collecting and analyzing information about potential cyber threats. Several approaches have been conducted for cyber threat detection based on the federated learning method. These approaches aim to establish a ...
- research-articleOctober 2022
Checking causal consistency of distributed databases
Computing (CMPT), Volume 104, Issue 10Oct 2022, Pages 2181–2201https://doi.org/10.1007/s00607-021-00911-3AbstractThe CAP Theorem shows that (strong) consistency, availability, and partition tolerance are impossible to be ensured together. Causal consistency is one of the weak consistency models that can be implemented to ensure availability and partition ...
-
- ArticleOctober 2020
Boosting Sequential Consistency Checking Using Saturation
Automated Technology for Verification and AnalysisOct 2020, Pages 360–376https://doi.org/10.1007/978-3-030-59152-6_20AbstractWe address the problem of checking that an execution of a shared memory concurrent program is sequentially consistent (SC). This problem is NP-hard due to the necessity of finding a total order between the write operations that induces an acyclic ...
- research-articleJanuary 2020
Design of an e-Learning project management system: Project needs
BDIoT '19: Proceedings of the 4th International Conference on Big Data and Internet of ThingsOctober 2019, Article No.: 40, Pages 1–5https://doi.org/10.1145/3372938.3372978In a computer project, it is imperative to rely on a structured approach that describes how it works. The choice of the project management is a decisive phase in the accomplishment of the project in good conditions, It is necessary to define a working ...
- editorialSeptember 2019
- ArticleJune 2019
Checking Causal Consistency of Distributed Databases
AbstractCausal consistency is one of the strongest models that can be implemented to ensure availability and partition tolerance in distributed systems. In this paper, we propose a tool to check automatically the conformance of distributed/concurrent ...
- ArticleJune 2019
Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis
AbstractLogs record the events and actions performed within an organization’s systems and networks. Usually, log data should conform with the security policy in use. However, access logs may show the occurrence of unauthorized accesses which may be due to ...
- research-articleOctober 2018
Towards a Smart Learning Management System (smart-LMS) to Improve Collaborative Learning in Higher Education
SCA '18: Proceedings of the 3rd International Conference on Smart City ApplicationsOctober 2018, Article No.: 7, Pages 1–9https://doi.org/10.1145/3286606.3286784With the increasing number of higher education students using e-learning technology, collaborative learning has been suggested as a solution to the lack of sufficient support to learners in e-learning environments, particularly LMS (Learning Management ...
- articleMarch 2018
Using cloud computing services in e-learning process: Benefits and challenges
Education and Information Technologies (KLU-EAIT), Volume 23, Issue 2March 2018, Pages 893–909https://doi.org/10.1007/s10639-017-9642-xDuring the recent years, Information and Communication Technologies (ICT) play a significant role in the field of education and e-learning has become a very popular trend of the education technology. However, with the huge growth of the number of users, ...
- research-articleDecember 2017
Model driven flexible design of a wireless body sensor network for health monitoring
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 129, Issue P2December 2017, Pages 548–571https://doi.org/10.1016/j.comnet.2017.06.014The Wireless Body Sensor Network (WBSN) is a wireless network that is designed to allow communication among sensor nodes that are attached to a human body to monitor the bodys vital parameters and environment. The design and development of such WBSN ...
- articleSeptember 2017
Enhancing collaborative learning in Web 2.0-based e-learning systems: A design framework for building collaborative e-learning contents
Education and Information Technologies (KLU-EAIT), Volume 22, Issue 5September 2017, Pages 2351–2364https://doi.org/10.1007/s10639-016-9545-2Today, the implication of Web 2.0 technologies in e-learning allows envisaging new teaching and learning forms, advocating an important place to the collaboration and social interaction. However, in e-learning systems, learn in a collaborative way is ...
- research-articleJanuary 2017
Coalition game for video content clustering in content delivery networks
- Nesrine Ben Hassine,
- Pascale Minet,
- Mohammed-Amine Koulali,
- Mohammed Erradi,
- Dana Marinca,
- Dominique Barth
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)Jan 2017, Pages 407–413https://doi.org/10.1109/CCNC.2017.7983144Game theory is a powerful tool that has recently been used in networks to improve the end users' quality of experience (e.g. decreased response time, higher delivery rate). In this paper, we propose to use game theory in the context of Content Delivery ...
- short-paperOctober 2016
Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments
CCSW '16: Proceedings of the 2016 ACM on Cloud Computing Security WorkshopOctober 2016, Pages 55–59https://doi.org/10.1145/2996429.2996431Cloud computing offers most of its services under multi-tenancy environments. To satisfy security requirements among collaborating tenants, each tenant may define a set of access control policies to secure access to shared data. Several cloud solutions ...
- research-articleMarch 2016
Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering
ABAC '16: Proceedings of the 2016 ACM International Workshop on Attribute Based Access ControlMarch 2016, Pages 72–75https://doi.org/10.1145/2875491.2875497In this paper, we present an approach based on the K-Nearest Neighbors algorithms for policies clustering that aims to reduce the ABAC policies dimensionality for high scale systems. Since ABAC considers a very large set of attributes for access ...
- articleSeptember 2015
A distributed protocol for privacy preserving aggregation with non-permanent participants
Computing (CMPT), Volume 97, Issue 9September 2015, Pages 893–912https://doi.org/10.1007/s00607-013-0373-6Recent advances in techniques that combine and analyze data collected from multiple partners led to many new promising distributed collaborative applications. Such collaborative computations could occur between trusted partners, between partially ...
- ArticleSeptember 2013
A Distributed Polling with Probabilistic Privacy
SRDS '13: Proceedings of the 2013 IEEE 32nd International Symposium on Reliable Distributed SystemsSeptember 2013, Pages 41–50https://doi.org/10.1109/SRDS.2013.13In this paper, we present PDP, a distributed polling protocol that enables a set of participants to gather their opinion on a common interest without revealing their point of view. PDP does not rely on any centralized authority or on heavyweight ...
- ArticleJune 2013
A Flexible Wireless Body Sensor Network System for Health Monitoring
WETICE '13: Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative EnterprisesJune 2013, Pages 44–49https://doi.org/10.1109/WETICE.2013.17The Wireless Body Sensor Network (WBSN) is a wireless network used for communication among sensor nodes operating on or inside the human body in order to monitor vital body parameters and movements. The design and the development of such systems for ...