Folgen
Faouzi JAIDI
Faouzi JAIDI
University of Carthage - (1) ENICarthage | (2) Sup'Com
Bestätigte E-Mail-Adresse bei supcom.tn
Titel
Zitiert von
Zitiert von
Jahr
A comprehensive study of security and cyber-security risk management within e-Health systems: Synthesis, analysis and a novel quantified approach
S Ksibi, F Jaidi, A Bouhoula
Mobile Networks and Applications 28 (1), 107-127, 2023
432023
A methodology and toolkit for deploying reliable security policies in critical infrastructures
F Jaïdi, F Labbene Ayachi, A Bouhoula
Security and Communication Networks 2018 (1), 7142170, 2018
142018
A systematic approach for IoT cyber-attacks detection in smart cities using machine learning techniques
M Houichi, F Jaidi, A Bouhoula
International Conference on Advanced Information Networking and Applications …, 2021
132021
Advanced techniques for deploying reliable and efficient access control: Application to E-healthcare
F Jaïdi, F Labbene-Ayachi, A Bouhoula
Journal of medical systems 40, 1-9, 2016
112016
An approach to formally validate and verify the compliance of low level access control policies
F Jaidi, FL Ayachi
2014 IEEE 17th International Conference on Computational Science and …, 2014
112014
The problem of integrity in RBAC-based policies within relational databases: Synthesis and problem study
F Jaidi, FL Ayachi
Proceedings of the 9th International Conference on Ubiquitous Information …, 2015
102015
Cyber-risk management within IOMT: A context-aware agent-based framework for a reliable e-health system
S Ksibi, F Jaidi, A Bouhoula
The 23rd International Conference on Information Integration and Web …, 2021
92021
A risk awareness approach for monitoring the compliance of RBAC-based policies
F Jaidi, FL Ayachi
2015 12th International Joint Conference on e-Business and …, 2015
92015
Analysis of smart cities security: Challenges and advancements
M Houichi, F Jaidi, A Bouhoula
2022 15th International Conference on Security of Information and Networks …, 2022
82022
To summarize the problem of non-conformity in concrete rbac-based policies: synthesis, system proposal and future directives
F Jaidi, F Labbene Ayachi
NNGT International Journal of Information Security 2, 1-12, 2015
82015
IoMT security model based on machine learning and risk assessment techniques
S Ksibi, F Jaidi, A Bouhoula
2023 International Wireless Communications and Mobile Computing (IWCMC), 614-619, 2023
72023
Machine learning algorithms for enhancing intrusion detection within SDN/NFV
A Sahbi, F Jaidi, A Bouhoula
2023 International Wireless Communications and Mobile Computing (IWCMC), 602-607, 2023
72023
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems
S Ksibi, F Jaïdi, A Bouhoula
17th International Conference on Security and Cryptography - SECRYPT 2020 …, 2020
72020
A formal approach based on verification and validation techniques for enhancing the integrity of concrete role based access control policies
F Jaidi, FL Ayachi
International Joint Conference: CISIS’15 and ICEUTE’15, 53-64, 2015
72015
Fairness and access control for mobile P2P auctions over MANETs
HK Ben Ayed, F JaVdi, I Doghri
Journal of theoretical and applied electronic commerce research 7 (3), 11-27, 2012
72012
Advanced Analysis of the Integrity of Access Control Policies: the Specific Case of Databases
F Jaidi, F Ayachi, A Bouhoula
The International Arab Journal of Information Technology 17 (5), 808-815, 2020
62020
A User-Centric Fuzzy AHP-based method for medical devices security assessment
S Ksibi, F Jaidi, A Bouhoula
2022 15th International Conference on Security of Information and Networks …, 2022
52022
A Reverse Engineering and Model Transformation Approach for RBAC-Administered Databases
F Jaidi, F Labbene Ayachi
2015 International Conference on High Performance Computing & Simulation …, 2015
52015
A formal system for detecting anomalies of non-conformity in concrete rbac-based policies
F Jaidi, FL Ayachi
International Conference on Computer Information Systems WCCAIS-2015-ICCIS, 2015
52015
Enforcing a risk assessment approach in access control policies management: analysis, correlation study and model enhancement
PA Evina, FL Ayachi, F Jaïdi, A Bouhoula
2019 15th International Wireless Communications & Mobile Computing …, 2019
42019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20