A comprehensive study of security and cyber-security risk management within e-Health systems: Synthesis, analysis and a novel quantified approach S Ksibi, F Jaidi, A Bouhoula Mobile Networks and Applications 28 (1), 107-127, 2023 | 22 | 2023 |
A methodology and toolkit for deploying reliable security policies in critical infrastructures F Jaïdi, F Labbene Ayachi, A Bouhoula Security and Communication Networks 2018 (1), 7142170, 2018 | 11 | 2018 |
A systematic approach for IoT cyber-attacks detection in smart cities using machine learning techniques M Houichi, F Jaidi, A Bouhoula International Conference on Advanced Information Networking and Applications …, 2021 | 10 | 2021 |
An approach to formally validate and verify the compliance of low level access control policies F Jaidi, FL Ayachi 2014 IEEE 17th International Conference on Computational Science and …, 2014 | 10 | 2014 |
Cyber-risk management within IoMT: a context-aware agent-based framework for a reliable e-health system S Ksibi, F Jaidi, A Bouhoula The 23rd International Conference on Information Integration and Web …, 2021 | 9 | 2021 |
Advanced techniques for deploying reliable and efficient access control: Application to E-healthcare F Jaïdi, F Labbene-Ayachi, A Bouhoula Journal of medical systems 40, 1-9, 2016 | 9 | 2016 |
The problem of integrity in RBAC-based policies within relational databases: synthesis and problem study F Jaidi, FL Ayachi Proceedings of the 9th International Conference on Ubiquitous Information …, 2015 | 9 | 2015 |
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems S Ksibi, F Jaïdi, A Bouhoula 17th International Conference on Security and Cryptography - SECRYPT 2020 …, 2020 | 7 | 2020 |
A risk awareness approach for monitoring the compliance of RBAC-based policies F Jaidi, FL Ayachi 2015 12th International Joint Conference on e-Business and …, 2015 | 7 | 2015 |
To summarize the problem of non-conformity in concrete rbac-based policies: synthesis, system proposal and future directives F Jaidi, F Labbene Ayachi NNGT International Journal of Information Security 2, 1-12, 2015 | 7 | 2015 |
A formal approach based on verification and validation techniques for enhancing the integrity of concrete role based access control policies F Jaidi, FL Ayachi International Joint Conference: CISIS’15 and ICEUTE’15, 53-64, 2015 | 7 | 2015 |
Fairness and access control for mobile P2P auctions over MANETs HKB Ayed, F Jaïdi, I Doghri Journal of theoretical and applied electronic commerce research 7 (3), 11-27, 2012 | 7 | 2012 |
A formal system for detecting anomalies of non-conformity in concrete rbac-based policies F Jaidi, FL Ayachi International Conference on Computer Information Systems WCCAIS-2015-ICCIS, 2015 | 5 | 2015 |
Machine Learning Algorithms for Enhancing Intrusion Detection Within SDN/NFV A Sahbi, F Jaidi, A Bouhoula 2023 International Wireless Communications and Mobile Computing (IWCMC), 602-607, 2023 | 4 | 2023 |
Advanced Analysis of the Integrity of Access Control Policies: the Specific Case of Databases F Jaidi, F Ayachi, A Bouhoula The International Arab Journal of Information Technology 17 (5), 808-815, 2020 | 4 | 2020 |
Enforcing a risk assessment approach in access control policies management: analysis, correlation study and model enhancement PA Evina, FL Ayachi, F Jaïdi, A Bouhoula 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 4 | 2019 |
A Quantified Trust-Risk Assessment Approach for Enhancing Firewalls-Filtering Services F JAIDI Journal of Information Assurance and Security 14 (2), 030-039, 2019 | 4 | 2019 |
Anomalies Correlation for Risk-Aware Access Control Enhancement. PA Evina, FL Ayachi, F Jaidi, A Bouhoula ENASE, 299-304, 2018 | 4 | 2018 |
Advances in security in computing and communications J Sen BoD–Books on Demand, 2017 | 4 | 2017 |
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment. F Jaidi, FL Ayachi, A Bouhoula SCSS, 120-132, 2017 | 4 | 2017 |