Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Kamal Amroun"'
Publikováno v:
Neural Computing and Applications. 34:17007-17036
Publikováno v:
2023 International Conference on Smart Computing and Application (ICSCA).
Publikováno v:
Applied Intelligence.
Publikováno v:
Multimedia Tools and Applications. 80:14807-14827
Nowadays, authentication is required for both physical access to buildings and internal access to computers and systems. Biometrics are one of the emerging technologies used to protect these highly sensitive structures. However, biometric systems bas
Autor:
Nadim Elsakaan, Kamal Amroun
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030959173
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e970317b7435173e03cc0989450d59cf
https://doi.org/10.1007/978-3-030-95918-0_3
https://doi.org/10.1007/978-3-030-95918-0_3
Autor:
Nadim Elsakaan, Kamal Amroun
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030959173
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1ee423366eb7e3b7cc476e2ae441d892
https://doi.org/10.1007/978-3-030-95918-0_13
https://doi.org/10.1007/978-3-030-95918-0_13
Publikováno v:
Journal of Supercomputing
Journal of Supercomputing, 2023, 79 (1), pp.650-676. ⟨10.1007/s11227-022-04667-1⟩
Journal of Supercomputing, 2023, 79 (1), pp.650-676. ⟨10.1007/s11227-022-04667-1⟩
International audience; Constraint Programming is a powerful paradigm to model and solve combinatorial problems. While there are many kinds of constraints, the table constraint is perhaps the most significant—being the most well-studied and has the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::179fbf5fa1758304006ae7ed9cd5f563
Publikováno v:
2021 International Conference on Computing, Computational Modelling and Applications (ICCMA).
The development of an anomaly-based Intrusion Detection System (IDS) is of primary importance in networks because it reinforces security. Unlike supervised methods, unsupervised methods are not widely used although they are fast and efficient. In thi
An efficient biometric-based continuous authentication scheme with HMM prehensile movements modeling
Publikováno v:
Journal of information security and applications
Journal of information security and applications, Elsevier, 2021, 57, pp.102739. ⟨10.1016/j.jisa.2020.102739⟩
Journal of information security and applications, Elsevier, 2021, 57, pp.102739. ⟨10.1016/j.jisa.2020.102739⟩
International audience; Biometric is an emerging technique for user authentication thanks to its efficiency compared to the traditional methods, such as passwords and access-cards. However, most existing biometric authentication systems require the c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::72c94d56f17088936d4ef54a72ee6cb7
https://hal.archives-ouvertes.fr/hal-03091925/document
https://hal.archives-ouvertes.fr/hal-03091925/document
Publikováno v:
Foundations and Practice of Security ISBN: 9783030708801
FPS
FPS
With advanced persistent and zero-days threats, the threat landscape is constantly evolving. Signature-based defense is ineffective against these new attacks. Anomaly-based intrusion detection systems rely on classification models, trained on specifi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8730a3b979456ac07282a003e17bba2e
https://doi.org/10.1007/978-3-030-70881-8_1
https://doi.org/10.1007/978-3-030-70881-8_1