Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Aymen Akremi"'
Autor:
Aymen Akremi
Publikováno v:
PeerJ Computer Science, Vol 8, p e841 (2022)
Digital vision technologies emerged exponentially in all living areas to watch, play, control, or track events. Security checkpoints have benefited also from those technologies by integrating dedicated cameras in studied locations. The aim is to mana
Externí odkaz:
https://doaj.org/article/6923f84b619645d08d087fac811bd47e
Autor:
Ahlam Fakieh, Aymen Akremi
Publikováno v:
Applied Sciences, Vol 12, Iss 24, p 13020 (2022)
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper
Externí odkaz:
https://doaj.org/article/fc1cd14d2f32435f9d440e976b869b1d
Autor:
Aymen Akremi, Mohsen Rouached
Publikováno v:
The Journal of Supercomputing. 77:7956-7988
Although Cloud computing is gaining popularity by supporting data analysis in an outsourced and cost-effective way, it brings serious privacy issues when sending the original data to Cloud servers. Sensitive data have a significant value, and any inf
Publikováno v:
International Journal of Web Services Research. 17:17-42
Digital forensics is an emerging research field involving critical technologies for obtaining evidence in digital crime investigations. Several methodologies, tools, and techniques have been developed to deal with the acquisition, preservation, exami
Autor:
Aymen Akremi, Eng.Ahlam Fakieh
Publikováno v:
Applied Sciences; Volume 12; Issue 24; Pages: 13020
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper
Autor:
Aymen Akremi
Publikováno v:
The 23rd International Conference on Information Integration and Web Intelligence.
Publikováno v:
International Journal of Web Services Research. 16:70-92
The big data generated by today Web services makes very fastidious and time-consuming the investigators logs management and analysis tasks. This is due partly to the lack of an efficient web service dedicated log data representation. We introduce, in
Autor:
Aymen Akremi
Publikováno v:
International Journal of Advanced Computer Science and Applications. 12
The big data generated by today Web services makes very fastidious and time-consuming the investigators logs management and analysis tasks. This is due partly to the lack of an efficient web service dedicated log data representation. We introduce, in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7827bfc8588310aba279ad4baf250877
https://doi.org/10.4018/978-1-7998-3025-2.ch033
https://doi.org/10.4018/978-1-7998-3025-2.ch033
Investigators search usually for any kind of events related directly to an investigation case to both limit the search space and propose new hypotheses about the suspect. Intrusion detection system (IDS) provide relevant information to the forensics
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3c5fbd734800648f67585c8465ed6368
https://doi.org/10.4018/978-1-5225-5583-4.ch010
https://doi.org/10.4018/978-1-5225-5583-4.ch010