Abstract is missing.
- A lightweight privacy-preserved spatial and temporal aggregation of energy dataSye Loong Keoh, Yi Han Ang, ZhaoHui Tang. 1-6 [doi]
- An efficient scheme for anonymous communication in IoTSarra Jebri, Mohamed Abid, Ammar Bouallegue. 7-12 [doi]
- Personal recognition system using hand modality based on local featuresNesrine Charfi, Hanêne Trichili, Adel M. Alimi, Basel Solaiman. 13-18 [doi]
- Persistent timeout policy of SCTP associated with AODV by using cross-layer mechanismMahamadou Issoufou Tiado, Idrissa Abdou, Djibo Karimou. 19-25 [doi]
- Access control policies enforcement in a cloud environment: OpenstackMeryeme Ayache, Mohammed Erradi, Bernd Freisleben. 26-31 [doi]
- Introduction to the Internet of Things security: Standardization and research challengesSalim Elbouanani, My Ahmed El Kiram, Omar Achbarou. 32-37 [doi]
- Mining intrusion detection alerts for predicting severity of detected attacksDoaa Hassan. 38-43 [doi]
- Toward a novel rule-based attack description and response languageSamih Souissi. 44-49 [doi]
- Improved secure navigation of wheelchairs using multi-robot system and cloud computing technologiesKhaled Salhi, Adel M. Alimi, Mohamed Moncef Ben Khelifa, Philippe Gorce. 50-54 [doi]
- Modeling a secure cloud data warehouse with SoaMLEmna Guermazi, Hanêne Ben-Abdallah, Mounir Ben Ayed. 55-60 [doi]
- Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environmentZaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou. 61-66 [doi]
- Digital safe: Secure synchronization of shared filesMayssa Jemel, Mounira Msahli, Ahmed Serhrouchni. 67-72 [doi]
- Public auditing for secure data storage in cloud through a third party auditor using modern ciphertextZaid Alaa Hussien, Hai Jin, Zaid Ameen Abduljabbar, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou. 73-78 [doi]
- Software-defined networks, security aspects analysisJaouad Benabbou, Khalid Elbaamrani, Noureddine Idboufker, Raja Elassali. 79-84 [doi]
- Artificial neural network-based methodology for vulnerabilities detection in EMV cardsNoura Ouerdi, Ilhame ElFarissi, Abdelmalek Azizi, Mostafa Azizi. 85-90 [doi]
- Experimental study of continuous variable quantum key distributionN. Benletaief, Houria Rezig, Ammar Bouallègue. 91-96 [doi]
- MASAT: Model-based automated security assessment tool for cloud computingOussama Mjihil, Dong Seong Kim, Abdelkrim Haqiq. 97-103 [doi]
- Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-codeMohammed Amine Kasmi, Mostafa Azizi, Jean-Louis Lanet. 104-110 [doi]
- Security modeling and analysis of a self-cleansing intrusion tolerance techniqueIman El Mir, Dong Seong Kim, Abdelkrim Haqiq. 111-117 [doi]
- Network intrusion detection system using L1-norm PCAChougdali Khalid, Elkhadir Zyad, Benattou Mohammed. 118-122 [doi]
- New malware detection framework based on N-grams and Support Vector Domain DescriptionMohamed el Boujnouni, Mohamed Jedra, Noureddine Zahid. 123-128 [doi]
- Access control in a collaborative session in multi tenant environmentMohamed Amine Madani, Mohammed Erradi, Yahya Benkaouz. 129-134 [doi]
- An incremental refinement approach to a development of TMN protocolSanae El Mimouni, Mohamed Bouhdadi. 135-139 [doi]
- An electronic voting system based on homomorphic encryption and prime numbersAli Azougaghe, Mustapha Hedabou, Mostafa Belkasmi. 140-145 [doi]
- Image de-noising of a metal matrix composite microstructure using Sure-let wavelet and weighted bilateral filterFatma Ayari, Chokri Ben Amar. 146-151 [doi]
- Image processing of a metal matrix composite microstructure Using recent bilateral filtering approachesFatma Ayari, Chokri Ben Amar. 152-157 [doi]