|
Cybersecurity Collaboratory
2013-2018
Cyberspace Threat Identification, Analysis and Proactive Response
|
|
2017
- Mokhtar Sellami, Mohand-Said Hacid, Mohamed Mohsen Gammoudi: An Incremental Approach to Data Integration in Presence of Access Control Policies. FAS*W@SASO/ICCAC 2017 187-190
- Sara Makki, Rafiqul Haque, Yehia Taher, Zainab Assaghir, Gregory Ditzler, Mohand-Said Hacid, Hassan Zeineddine: Fraud Analysis Approaches in the Age of Big Data - A Review of State of the Art. FAS*W@SASO/ICCAC 2017243-250
- Manash Sarkar, Soumya Banerjee, Youakim Badr, Arun Kumar Sangaiah: Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence. IJACI 8(3). 1-21 (2017)
- Xiaoyang Zhu, Youakim Badr, Jesus Pacheco, Salim Hariri: Autonomic Identity Framework for the Internet of Things. ICCAC 2017.69-79
- Jesus Pacheco, Xiaoyang Zhu, Youakim Badr, Salim Hariri: Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System FAS*W@SASO/ICCAC 2017.324-328
- Salim Hariri, Cihan Tunc, Youakim Badr: Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview. FAS*W@SASO/ICCAC 2017 352-356
- Mohammed Lalou, Hamamache Kheddouci, Salim Hariri: Identifying the Cyber Attack Origin with Partial Observation: A Linear Regression Based Approach. FAS*W@SASO/ICCAC 2017329-333
- Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Lionel Brunie, Osama Younes, Mohiy M. Hadhoud: A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applications. CCNC 2017 829-834
- Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie: Self-reported Verifiable Reputation with Rater Privacy. IFIPTM 2017 180-195
- Manuel Barbosa, Sonia Ben Mokhtar, Pascal Felber, Francisco Maia, Miguel Matos, Rui Oliveira, Etienne Riviere, Valerio Schiavoni, Spyros Voulgaris:
SAFETHINGS: Data Security by Design in the IoT. EDCC 2017 17-120
- Sophie Cerf, Vincent Primault, Antoine Boutet, Sonia Ben Mokhtar, Robert Birke, Sara Bouchenak, Lydia Y. Chen, Nicolas Marchand, Bogdan Robu
PULP: Achieving Privacy and Utility Trade-Off in User Mobility Data. SRDS 2017 164-173
- Esmaili, Ehsan, Ali Akoglu, Gregory Ditzler, Salim Hariri, Talal Moukabary, and Jeno Szep: Autonomic Management of 3D Cardiac Simulations. In Cloud and Autonomic Computing (ICCAC), 2017 International Conference on, pp. 1-9 IEEE, 2017
- Almoualem, Firas, Pratik Satam, Jang-Geun Ki, and Salim Hariri: SDR-Based Resilient Wireless Communications. In Cloud and Autonomic Computing (ICCAC), 2017 International Conference on, pp. 114-119. IEEE, 2017
- Satam, Pratik, Jesus Pacheco, Salim Hariri, and Mohommad Horani: Autoinfotainment Security Development Framework (ASDF) for Smart Cars. In Cloud and Autonomic Computing (ICCAC), 2017 International Conference on, pp. 153-159. IEEE, 2017.
- Tunc, Cihan, Farah Fargo, Youssif Al-Nashif, and Salim Hariri: Autonomic Cross-Layer Management of Cloud Systems. In Foundations and Applications of Self* Systems (FAS* W), 2017 IEEE 2nd International Workshops on, pp. 160-165. IEEE, 2017.
- Ozdemir, Ahmet Turan, Cihan Tunc, and Salim Hariri: Autonomic Fall Detection System. In Foundations and Applications of Self* Systems (FAS* W), 2017 IEEE 2nd International Workshops on, pp. 166-170. IEEE, 2017.
- Shao, Sicong, Cihan Tunc, Pratik Satam, and Salim Hariri: Real-Time IRC Threat Detection Framework. In Foundations and Applications of Self* Systems (FAS* W), 2017 IEEE 2nd International Workshops on, pp. 318-323. IEEE, 2017.
- Satam, Pratik, Jesus Pacheco, Salim Hariri, and Mohommad Horani: Autoinfotainment Security Development Framework (ASDF) for Smart Cars. In Cloud and Autonomic Computing (ICCAC), 2017 International Conference on, pp. 153-159. IEEE, 2017.
|
2016
- Hassina Meziane, Salima Benbernou, Mohand-Said Hacid, Zaki Malik, Mike P. Papazoglou: A view-based monitoring for usage control in web services. Distributed and Parallel Databases 34(2): 145-178 (2016)
- Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid: Access Control Enforcement for Selective Disclosure of Linked Data. STM 2016: 47-63
- Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar, Lionel Brunie, Ammar Hasan: 4PR: Privacy preserving routing in mobile delay tolerant networks. Computer Networks 111: 17-28 (2016)
- Albin Petit, Thomas Cerqueus, Antoine Boutet, Sonia Ben Mokhtar, David Coquil, Lionel Brunie, Harald Kosch: SimAttack: private web search under fire. J. Internet Services and Applications 7(1): 2:1-2:17 (2016)
- Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie: A Trustless Privacy-Preserving Reputation System. SEC 2016: 398-411
- Vincent Primault, Antoine Boutet, Sonia Ben Mokhtar, Lionel Brunie: Adaptive Location Privacy with ALP. SRDS 2016: 269-278
- Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie: A trustless privacy-preserving reputation system. IACR Cryptology ePrint Archive 2016: 16 (2016)
- Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie: A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval. IACR Cryptology ePrint Archive 2016: 416 (2016)
- Antoine Boutet, Albin Petit, Sonia Ben Mokhtar, Léa Laporte: Leveraging Query Sensitivity for Practical Private Web Search. Middleware Posters and Demos 2016: 5-6
- Sophie Cerf, Bogdan Robu, Nicolas Marchand, Antoine Boutet, Vincent Primault, Sonia Ben Mokhtar, Sara Bouchenak: Toward an Easy Configuration of Location Privacy Protection Mechanisms. Middleware Posters and Demos 2016: 11-12
- Pan, Zhiwen, Jesus Pacheco, and Salim Hariri: Anomaly behavior analysis for building automation systems. In Computer Systems and Applications (AICCSA), 2016 IEEE/ACS 13th International Conference of, pp. 1-8. IEEE, 2016.
- Kumbhare, Nirmal, Cihan Tunc, Salim Hariri, Ivan Djordjevic, Ali Akoglu, and Howard Jay Siegel: Just In Time Architecture (JITA) for dynamically composable data centers. In Computer Systems and Applications (AICCSA), 2016 IEEE/ACS 13th International Conference of, pp. 1-8. IEEE, 2016.
- Jesus Pacheco, Cihan Tunc, Pratik Satam, Salim Hariri: Secure and Resilient Cloud Services for Enhanced Living Environments. IEEE Cloud Computing 3(6): 44-52 (2016)
- Gu, Shuqing, Likai Yao, Cihan Tunc, Ali Akoglu, Salim Hariri, and Elizabeth Ritchie: An Autonomic Workflow Performance Manager for Weather Research and Forecast Workflows. In Cloud and Autonomic Computing (ICCAC), 2016 International Conference on, pp. 111-114. IEEE, 2016.
- Tunc, Cihan, Nirmal Kumbhare, Ali Akoglu, Salim Hariri, Dylan Machovec, and Howard Jay Siegel: Value of service based task scheduling for cloud computing systems. In Cloud and Autonomic Computing (ICCAC), 2016 International Conference on, pp. 1-11. IEEE, 2016.
- Yu, Jiakai, Cihan Tunc, and Salim Hariri: Automated Framework for Scalable Collection and Intelligent Analytics of Hacker IRC Information. In Cloud and Autonomic Computing (ICCAC), 2016 International Conference on, pp. 33-39. IEEE, 2016.
- Pacheco, Jesus, Cihan Tunc, and Salim Hariri: Design and evaluation of resilient infrastructures systems for smart cities. In Smart Cities Conference (ISC2), 2016 IEEE International, pp. 1-6. IEEE, 2016.
- Pacheco, Jesus, Shalaka Satam, Salim Hariri, Clarisa Grijalva, and Helena Berkenbrock: IoT Security Development Framework for building trustworthy Smart car services. In Intelligence and Security Informatics (ISI), 2016 IEEE Conference on, pp. 237-242. IEEE, 2016.
- Pacheco, Jesus, and Salim Hariri: IoT security framework for smart cyber infrastructures. In Foundations and Applications of Self* Systems, IEEE International Workshops on, pp. 242-247. IEEE, 2016.
- Pacheco, Jesus, Cihan Tunc, and Salim Hariri: Design and evaluation of resilient infrastructures systems for smart cities. In Smart Cities Conference (ISC2), 2016 IEEE International, pp. 1-6. IEEE, 2016.
- Tunc, Cihan, Nirmal Kumbhare, Ali Akoglu, Salim Hariri, Dylan Machovec, and Howard Jay Siegel: Value of service based task scheduling for cloud computing systems. In Cloud and Autonomic Computing (ICCAC), 2016 International Conference on, pp. 1-11. IEEE, 2016.
|
2015
- Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid: Inference Leakage Detection for Authorization Policies over RDF Data. DBSec 2015: 346-361
- Mokhtar Sellami, Mohand-Said Hacid, Mohamed Mohsen Gammoudi: Inference Control in Data Integration Systems. OTM Conferences 2015: 285-302
- Youakim Badr, Salim Hariri, Youssif B. Al-Nashif, Erik Blasch: Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments. ICCS 2015: 2623-2637
- Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Osama Younes, Mohey M. Hadhoud, Lionel Brunie: Trust management and reputation systems in mobile participatory sensing applications: A survey. Computer Networks 90: 49-73 (2015)
- Heidi Dikow, Omar Hasan, Harald Kosch, Lionel Brunie, Renaud Sornin: Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction. Computing 97(1): 29-49 (2015)
- Vincent Primault, Sonia Ben Mokhtar, Lionel Brunie: Privacy-Preserving Publication of Mobility Data with High Utility. ICDCS 2015: 802-803
- Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie: Time Distortion Anonymization for the Publication of Mobility Data with High Utility. TrustCom/BigDataSE/ISPA (1) 2015: 539-546
- Albin Petit, Thomas Cerqueus, Sonia Ben Mokhtar, Lionel Brunie, Harald Kosch: PEAS: Private, Efficient and Accurate Web Search. TrustCom/BigDataSE/ISPA (1) 2015: 571-580
- Vincent Primault, Sonia Ben Mokhtar, Lionel Brunie: Privacy-preserving Publication of Mobility Data with High Utility. CoRR abs/1506.09074 (2015)
- Al Baalbaki, Bilal, Jesus Pacheco, Cihan Tunc, Salim Hariri, and Youssif Al-Nashif: Anomaly behavior analysis system for ZigBee in smart buildings. In Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Conference of, pp. 1-4. IEEE, 2015.
- Satam, Pratik, Hamid Alipour, Youssif B. Al-Nashif, and Salim Hariri: Anomaly Behavior Analysis of DNS Protocol. J. Internet Serv. Inf. Secur. 5, no. 4 (2015): 85-97.
- Al Baalbaki, Bilal, Jesus Pacheco, Cihan Tunc, Salim Hariri, and Youssif Al-Nashif: Anomaly behavior analysis system for ZigBee in smart buildings. In Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Conference of, pp. 1-4. IEEE, 2015.
- Tunc, Cihan, and Salim Hariri: CLaaS: Cybersecurity Lab as a Service. J. Internet Serv. Inf. Secur. 5, no. 4 (2015): 41-59.
|
2014
- Mehdi Haddad, Jovan Stevovic, Annamaria Chiasera, Yannis Velegrakis, Mohand-Said Hacid: Access Control for Data Integration in Presence of Data Dependencies. DASFAA (2) 2014: 203-217
- Mokhtar Sellami, Mohamed Mohsen Gammoudi, Mohand-Said Hacid: Secure Data Integration: A Formal Concept Analysis Based Approach. DEXA (2) 2014: 326-333
- Albin Petit, Sonia Ben Mokhtar, Lionel Brunie, Harald Kosch: Towards efficient and accurate privacy preserving web search. MW4NG@Middleware 2014: 1:1-1:6
- Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie: Differentially Private Location Privacy in Practice. CoRR abs/1410.7744 (2014)
- Nicolas Haderer, Vincent Primault, Patrice Raveneau, Christophe Ribeiro, Romain Rouvoy, Sonia Ben Mokhtar: Towards a practical deployment of privacy-preserving crowd-sensing tasks. Middleware (Posters & Demos) 2014: 43-44
|