Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Nawal Ait Aali"'
Autor:
Nawal Ait Aali, Amine Baina
Publikováno v:
Advances in Information Security ISBN: 9783031255052
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cfa1774b104c640394551782a5ef0528
https://doi.org/10.1007/978-3-031-25506-9_4
https://doi.org/10.1007/978-3-031-25506-9_4
Currently, smart grids have changed the world, given the great benefits of these critical infrastructures regarding the customers' satisfaction by offering them the electrical energy that they need for their business. Also, the smart grid aims to sol
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cfb0425897e4e30b225391317aa24a5b
https://doi.org/10.4018/978-1-6684-3666-0.ch059
https://doi.org/10.4018/978-1-6684-3666-0.ch059
Publikováno v:
Journal of Mobile Multimedia. 15:51-70
Publikováno v:
International Journal of Networking and Virtual Organisations
International Journal of Networking and Virtual Organisations, 2020, 22 (1), pp.75-100. ⟨10.1504/IJNVO.2020.104979⟩
International Journal of Networking and Virtual Organisations, Inderscience Enterprise, 2020, 22 (1), pp.75-100. ⟨10.1504/IJNVO.2020.104979⟩
International Journal of Networking and Virtual Organisations, 2020, 22 (1), pp.75-100. ⟨10.1504/IJNVO.2020.104979⟩
International Journal of Networking and Virtual Organisations, Inderscience Enterprise, 2020, 22 (1), pp.75-100. ⟨10.1504/IJNVO.2020.104979⟩
International audience; Due to physical and logical vulnerabilities, a critical infrastructure (CI) can encounter failures of various degrees of severity, and since there are many interdependencies between CIs, simple failures can have dramatic conse
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3c05800d20c1534275863b5bd437293b
https://inria.hal.science/hal-03126794
https://inria.hal.science/hal-03126794
Comparative analysis of fuzzy logic and AHP method for QoS management in LTE network: IMS case study
Publikováno v:
International Journal of Wireless and Mobile Computing. 19:213
In recent years, increasing demand for IP Multimedia Subsystem (IMS) services raised several problems and challenges concerning the Quality of Service (QoS) management. Thus, each operator has to make its network more efficient for ensuring an accept
Publikováno v:
Security and Communication Networks, Vol 2018 (2018)
Due to the necessity of Critical Infrastructure (CI) Protection against different threats, several security policies must be applied among the organizations of CI. Based on our conducted study about the different constraints and requirements of the c
Publikováno v:
CIST
In the collaborative systems, in order to establish successful and protected collaboration, the trust management is first established between the participating entities and the trust score of each entity is calculated. This score is obtained based on
Publikováno v:
2016 International Conference on Information Technology for Organizations Development (IT4OD).
The success of collaborative systems has become necessary due to the important role of these systems as they ensure the continuity of Critical Infrastructures. Among the aspects, enabling the success of collaborative systems is their security against
Publikováno v:
2015 5th World Congress on Information and Communication Technologies (WICT).
In last decades, the notion of collaborative systems is presented as the new concept in Critical Infrastructures. It regroups different organizations collaborating in order to ensure the continuity of these infrastructures. However, some malicious be
Publikováno v:
SITA
Critical Infrastructures protection becomes increasingly important in recent decades. Particularly, those organizations should collaborate to share resources, services and exchange information and data, in order to ensure their continuity and success