Loading...
Last publications
-
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar. Adaptive policy-driven attack mitigation in SDN. XDOMO 2017: the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOMO), Apr 2017, Belgrade, Serbia. pp.1-6, ⟨10.1145/3071064.3071068⟩. ⟨hal-01649980⟩
-
Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. Prov-trust: towards a trustworthy SGX-based data provenance system. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩. ⟨hal-03991163⟩
-
-
-
-
Hajar Hammouch, Mounim El-Yacoubi, Huafeng Qin, Hassan Berbia, Mohamed Chikhaoui. Controlling the quality of GAN-based generated images for predictions tasks. CPRAI 2022: 3rd International Conference on Pattern Recognition and Artificial Intelligence, Jun 2022, Paris, France. pp.121-133, ⟨10.1007/978-3-031-09037-0_11⟩. ⟨hal-03944317⟩
-
-
Mwamsojo Nickson, Kamel Merghem, Mounim El Yacoubi, Yann Frignac, Badr-Eddine Benkelfat, et al.. Optoelectronic reservoir computer for early stage Alzheimer’s disease detection. CLEO: Applications and Technology (CLEO), CLEO US, May 2022, San Jose, United States. pp.ATh4I.5, ⟨10.1364/CLEO_AT.2022.ATh4I.5⟩. ⟨hal-04010199⟩
-
-
Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes De Oca, Ana R Cavalli. Digital twin for IoT environments: a testing and simulation tool. 15th International Conference Quality of Information and Communications Technology (QUATIC 2022), Sep 2022, Talavera de la Reina, Spain. pp.205-219, ⟨10.1007/978-3-031-14179-9_14⟩. ⟨hal-04008905⟩
Keywords
Cloud Computing
Ubiquitous computing
Web services
Hidden Markov chains
Performance analysis
Security
MPEG-4
Monitoring
SDN
Cloud computing
Reinforcement learning
VANET
Business process
Wireless networks
Software engineering
Energy consumption
P2P
Anomaly detection
Interoperability
Signal processing
Distributed systems
Artificial intelligence
Performance
Ontology
Formal methods
Modeling
Pervasive computing
Simulation
Energy efficiency
Trust
Indoor positioning
Data security
Semantics
Internet of Things
IoT
Reputation
Classification
Social networks
Virtualization
Wireless sensor networks
Clustering
Machine learning
Data mining
Event-B
Triplet Markov chains
Deep learning
Ontologies
MANETs
Routing
SVM
Augmented Reality
RFID
Scalability
Hidden Markov models
5G
Model checking
Social media
Internet des objets
Verification
QoE
Semantic web
LTE
IMS
Optimization
SIP
Optimisation
Sécurité
Context-awareness
Testing
MPEG
Wireless sensor network
Particle filtering
Resource allocation
Privacy
Biometrics
Internet of things
Access control
Compression
Indoor localization
Service composition
Formal verification
NFV
Network security
Mobility
Middleware
NGN
Performance evaluation
Context
Blockchain
Passive testing
Sensor networks
Cloud
Computer networks
QoS
Quality of service
Authentication
Conformance testing
Cryptography
WSN
Intrusion detection
Number of fulltext
1 773
Number of reference
4 577
COLLABORATIONS
Submissions evolution