Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Meryem, Amar"'
Autor:
Meryem, Amar, Ouahidi, Bouabid EL
Publikováno v:
In Network Security May 2020 2020(5):8-19
Publikováno v:
In Procedia Computer Science 2017 110:230-235
Autor:
Meryem Amar, Bouabid El Ouahidi
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030611422
The usage of the internet and its opportunities bring not only resources availability, services and storage but puts also customer’s privacy at stake. Connected devices share the same pool and Service Level Agreement and are subject to several cybe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b68f3dc81521d87723de77d91ea6ce64
https://doi.org/10.1007/978-3-030-61143-9_14
https://doi.org/10.1007/978-3-030-61143-9_14
Publikováno v:
FNC/MobiSPC
The increasing volume of emails has led to the emergence of problems caused by unsolicited email, commonly referred to as Spam. One of the most commonly presentation used in Spam Filter is the BoW (Bag-of-words). However, this approach has a number o
Publikováno v:
2019 7th Mediterranean Congress of Telecommunications (CMT).
Taking care of the health of people is one of the challenging tasks in the world. Cardiovascular disease is one of the main factors that increase mortality. In order to detect this heart defect, it would be necessary to look for a system able to pred
Publikováno v:
Machine Learning for Networking ISBN: 9783030199449
MLN
MLN
Recently cloud computing has emerged the IT world. It eventually promoted the acquisition of resources and services as needed, but it has also instilled fear and user’s renunciations. However, Machine learning processing has proven high robustness
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d0b8b08f86de63b19a5d3084f64d1646
https://doi.org/10.1007/978-3-030-19945-6_6
https://doi.org/10.1007/978-3-030-19945-6_6
Publikováno v:
ANT/SEIT
Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in size and variety of formats. In this paper, we propose a binary-based approach for frequency mining correlated attacks in log data. This approach is con
Autor:
Bouabid El Ouahidi, Meryem Amar
Publikováno v:
International Journal of Data Mining, Modelling and Management. 12:308
The usage of cloud opportunities brings not only resources and storage availability, but puts also customer's privacy at stake. These services are carried out through web that generate log files. These files contain valuable information in tracking m
Publikováno v:
BDIOT
Phishing is referred as an attempt to obtain sensitive information, such as usernames, passwords, and credit card details (and, indirectly, money), for malicious reasons, by disguising as a trustworthy entity in an electronic communication [1]. Hacke
Publikováno v:
2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech).
The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of