Zobrazeno 1 - 10
of 66
pro vyhledávání: '"Mohammed Erradi"'
Publikováno v:
PeerJ Computer Science, Vol 10, p e1876 (2024)
Multilingual sentiment analysis (MSA) involves the task of comprehending people’s opinions, sentiments, and emotions in multilingual written texts. This task has garnered considerable attention due to its importance in extracting insights for decis
Externí odkaz:
https://doaj.org/article/27638e2593b64bc7809e421287f976de
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 30, Iss 1, Pp 51-66 (2018)
A firewall is the core of a well defined network security policy. This paper presents an automata-based method to study firewall security policies. We first propose a procedure that synthesizes an automaton that describes a security policy given as a
Externí odkaz:
https://doaj.org/article/2afd0ac94a9844139340ae331953f9f5
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 5, Iss 16 (2018)
In big data environments with big number of users and high volume of data, we need to manage the corresponding huge number of security policies. Using Attribute-Based Access Control (ABAC) model to ensure access control might become complex and hard
Externí odkaz:
https://doaj.org/article/f80667d54bf74757abda85bdf46423be
Publikováno v:
Handbook of Research on Scripting, Media Coverage, and Implementation of E-Learning Training in LMS Platforms ISBN: 9781668476345
Instructional engineering consists of creating training devices from a thorough analysis of data. Indeed, there are many models of instructional engineering: SAT, ASSURE, ADDIE, SAM, etc. Through this chapter, the authors will focus on the most used
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::00daf3b3382d61ef06152278aef88942
https://doi.org/10.4018/978-1-6684-7634-5.ch003
https://doi.org/10.4018/978-1-6684-7634-5.ch003
Publikováno v:
Handbook of Research on Scripting, Media Coverage, and Implementation of E-Learning Training in LMS Platforms ISBN: 9781668476345
This chapter concerns the creation of a web application for the management of e-learning projects. The realization of this project goes through several stages. For the analysis, it is necessary to do studies on the existing products to understand the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f6126ea2013d2c45ad672ce76a27eb8f
https://doi.org/10.4018/978-1-6684-7634-5.ch005
https://doi.org/10.4018/978-1-6684-7634-5.ch005
Publikováno v:
Computing. 104:2181-2201
The CAP Theorem shows that (strong) Consistency, Availability, and Partition tolerance are impossible to be ensured together. Causal consistency is one of the weak consistency models that can be implemented to ensure availability and partition tolera
Publikováno v:
SECRYPT
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030736880
SoCPaR
SoCPaR
Typically, a security audit is conducted to detect and track inappropriate activities, such as security policy misconfigurations and attacks. Practically, an audit can be done through the analysis and assessment of data in logs registering traces of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f89b39a96105e6a7185994c3852edf97
https://doi.org/10.1007/978-3-030-73689-7_79
https://doi.org/10.1007/978-3-030-73689-7_79
Autor:
Rachid Zennou, Mohamed Faouzi Atig, Ahmed Bouajjani, Mohammed Erradi, Ranadeep Biswas, Constantin Enea
Publikováno v:
Automated Technology for Verification and Analysis ISBN: 9783030591519
ATVA
ATVA
We address the problem of checking that an execution of a shared memory concurrent program is sequentially consistent (SC). This problem is NP-hard due to the necessity of finding a total order between the write operations that induces an acyclic hap
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c0bb41cb1192fd7bf498229421978ab4
https://doi.org/10.1007/978-3-030-59152-6_20
https://doi.org/10.1007/978-3-030-59152-6_20
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 30, Iss 1, Pp 51-66 (2018)
A firewall is the core of a well defined network security policy. This paper presents an automata-based method to study firewall security policies. We first propose a procedure that synthesizes an automaton that describes a security policy given as a