Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Lamia Hamza"'
Autor:
Lamia Hamza
Publikováno v:
International Journal of Interactive Mobile Technologies (iJIM); Vol. 17 No. 06 (2023); pp. 81-97
The fast progress of mobile devices and the popularity of mobile applications in the market requires complex software to be run on mobile devices without issues. Mobile devices are known as handhelds and they have different characteristics such as si
Robust multimedia spam filtering based on visual, textual, and audio deep features and random forest
Autor:
Marouane Kihal, Lamia Hamza
Publikováno v:
Multimedia Tools and Applications.
Autor:
Lamia Hamza
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
2021 24th International Conference on Computer and Information Technology (ICCIT).
Autor:
Riyadh Bouddou, Atef Bentahar, Desmond Bala Bisandu, Ahmed Yassine Boumedine, EMAD KAMIL HUSSEIN, Abdessalam Hattab, Lamia Hamza, Somaya Abd El-Mottaleb, Faical Khennoufa, Menouar BOULIF, Mariya Ouaissa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::67256c317adfb637a9154d39dca96843
https://doi.org/10.26713/978-81-954166-0-8
https://doi.org/10.26713/978-81-954166-0-8
Autor:
Lamia Hamza, Khedoudja Bouafia
Publikováno v:
International Journal of Information and Computer Security. 19:305
Publikováno v:
Computers & Security. 73:156-171
This paper proposes a formal framework for automatic security policy enforcement in computer systems. In this approach, systems and their interactions are formally modeled as process algebra expressions with a new dedicated calculus inspired from the
Publikováno v:
Lecture Notes in Business Information Processing ISBN: 9783319590400
MCETECH
MCETECH
This paper proposes an algebraic formalism and a dedicated logic for computer systems and security policies specifications. A tableau-based proof system is then developed for assessing whether policies are satisfied for a given model of a computer sy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::05c72bfb10e34e69e8fa99321f6a0dab
https://doi.org/10.1007/978-3-319-59041-7_6
https://doi.org/10.1007/978-3-319-59041-7_6
Autor:
Lamia Hamza
Publikováno v:
International Journal of Information and Computer Security. 11:1
In this paper, a new technique for automatic generation of complex intruder attacks is proposed. In this approach, the generation of attack scenarios is guided by an intruder strategy. Thus, only attack scenarios achieving the intruder objectives are
Autor:
Chahe Nerguizian, Lamia Hamza
Publikováno v:
2009 IEEE International Symposium on Intelligent Signal Processing.
In a harsh indoor environment, fingerprinting localization techniques perform better than the traditional ones, based on triangulation, because multipath is used as constructive information. However, this is generally true in static conditions as fin