Zobrazeno 1 - 10
of 532
pro vyhledávání: '"Mallouli, A."'
Publikováno v:
ARES 2021: The 16th International Conference on Availability, Reliability and Security, Aug 2021, Vienna, Austria. pp.1-8
The fifth generation of mobile broadband is more than just an evolution to provide more mobile bandwidth, massive machine-type communications, and ultra-reliable and low-latency communications. It relies on a complex, dynamic and heterogeneous enviro
Externí odkaz:
http://arxiv.org/abs/2304.05719
Autor:
Bozorgchenani, Arash, Zarakovitis, Charilaos C., Chien, Su Fong, Ni, Qiang, Gouglidis, Antonios, Mallouli, Wissam, Lim, Heng Siong
Network connectivity exposes the network infrastructure and assets to vulnerabilities that attackers can exploit. Protecting network assets against attacks requires the application of security countermeasures. Nevertheless, employing countermeasures
Externí odkaz:
http://arxiv.org/abs/2303.08544
Autor:
Chahnez Charfi Triki, Salma Zouari Mallouli, Marwa Ben Jdila, Mariem Ben Said, Fatma Kamoun Feki, Sarah Weckhuysen, Sabeur Masmoudi, Faiza Fakhfakh
Publikováno v:
Epilepsia Open, Vol 9, Iss 3, Pp 906-917 (2024)
Abstract Objective Mutations in the cyclin‐dependent kinase‐like 5 gene (CDKL5) are associated with a wide spectrum of clinical presentations. Early‐onset epileptic encephalopathy (EOEE) is the most recognized phenotype. Here we describe phenot
Externí odkaz:
https://doaj.org/article/c640a6965bed4f77a3a6d07f66909886
Autor:
Apruzzese, Giovanni, Laskov, Pavel, de Oca, Edgardo Montes, Mallouli, Wissam, Rapa, Luis Burdalo, Grammatopoulos, Athanasios Vasileios, Di Franco, Fabio
Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant
Externí odkaz:
http://arxiv.org/abs/2206.09707
Autor:
Mohamed Ayoub Tlili, Wiem Aouicha, Nikoloz Gambashidze, Asma Ben Cheikh, Jihene Sahli, Matthias Weigl, Ali Mtiraoui, Souad Chelbi, Houyem Said Laatiri, Manel Mallouli
Publikováno v:
BMC Health Services Research, Vol 24, Iss 1, Pp 1-10 (2024)
Abstract Introduction Adverse events (AEs) that occur in hospitals remain a challenge worldwide, and especially in intensive care units (ICUs) where they are more likely to occur. Monitoring of AEs can provide insight into the status and advances of
Externí odkaz:
https://doaj.org/article/ae21e3bc83344391815d44a9546105e5
Autor:
Bozorgchenani, Arash, Zarakovitis, Charilaos C., Chien, Su Fong, Ting, Tiew On, Ni, Qiang, Mallouli, Wissam
Publikováno v:
In Computer Networks December 2023 237
Publikováno v:
IEEE Access, Vol 11, Pp 129788-129804 (2023)
Fifth-generation technology standard for broadband cellular networks, 5G, delivers a significant increase in data speeds and capacity, as well as new capabilities such as higher energy efficiency, lower latency, and the ability to connect a large num
Externí odkaz:
https://doaj.org/article/a262b60cb1c14253a53b80d45e46d9b2
Autor:
Zujany Salazar, Fatiha Zaidi, Huu-Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes De Oca
Publikováno v:
IEEE Access, Vol 11, Pp 43925-43944 (2023)
This paper presents an ontology based on mutation techniques for the modelling of cybersecurity attacks and its application to 5G networks. Main concepts of network protocols, mutation operators, flow of network packets and network traffic are introd
Externí odkaz:
https://doaj.org/article/6419c5961a5c4791907ca196882ef631