Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Nassira Ghoualmi"'
Autor:
Othmane Friha, Mohamed Amine Ferrag, Burak Kantarci, Burak Cakmak, Arda Ozgun, Nassira Ghoualmi-Zine
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 5, Pp 5799-5856 (2024)
The integration of Large Language Models (LLMs) and Edge Intelligence (EI) introduces a groundbreaking paradigm for intelligent edge devices. With their capacity for human-like language processing and generation, LLMs empower edge computing with a po
Externí odkaz:
https://doaj.org/article/31b1f13a7ab9447eae0a2511ed8411af
Publikováno v:
Cluster Computing. 26:1877-1889
Publikováno v:
2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS).
Publikováno v:
International Journal of Information Security and Privacy. 15:99-116
Access control mechanisms are the way to guarantee secure access to grid resources. Recent research works were focused on how to improve the representation of the resources' security policies for faster decisions making. PCM, HCM, GAG, and WGAG are a
Publikováno v:
International Journal of Information Technology and Web Engineering. 15:34-60
Currently, advanced technological hardware can offer mobile devices which fits in the hand with a capacity to consult documents at anytime and anywhere. Multiple user context constraints as well as mobile device capabilities may involve the adaptatio
Currently, advanced technological hardware can offer mobile devices which fits in the hand with a capacity to consult documents at anytime and anywhere. Multiple user context constraints as well as mobile device capabilities may involve the adaptatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2e0b27b86938644624a6ed26f24b58b9
https://doi.org/10.4018/978-1-6684-3542-7.ch010
https://doi.org/10.4018/978-1-6684-3542-7.ch010
Autor:
Nassira Ghoualmi, Sarra Namane
Publikováno v:
International Journal of Embedded and Real-Time Communication Systems. 9:50-65
Despite the various attractive features that grid computing has to offer, it has many great security challenges, such as access control. With the expansion of the network scale, a large number of authorization requests have to be treated; on the othe
Publikováno v:
International Journal of Multimedia Data Engineering and Management. 8:55-96
Nowadays, multimedia documents are omnipresent at any time from and to any devices. However, mobile devices heterogeneity and the various contexts of the user require their adaptation. In this context, the existing systems transform contents to compl
This chapter deals with a challenging issue in intrusion detection research field, which is IDS adaptability. First, it introduces the intrusion detection concepts, then presents with details the two existing generations of IDSs and addresses their m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2eed9662087e9f5929cdd7eab1cdb103
https://doi.org/10.4018/978-1-4666-9562-7.ch108
https://doi.org/10.4018/978-1-4666-9562-7.ch108
Autor:
Nassira Ghoualmi-Zine, Araar, A.
Publikováno v:
Web of Science
In this article we propose to model Net-banking system by game theory. We adopt extensive game to model our web application. We present the model in term of players and strategy. We present UML diagram related the protocol game.
{"references":["
{"references":["
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e04abe60289d11c185d5334cfbb2341a