Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Real-Time Mitigation of Trust-Related Attacks in Social IoT

    The social Internet of Things (Social IoT) introduces novel ways to enhance IoT networks and service discovery through social contexts. However, trust-related attacks raise significant challenges with regard t...

    Mariam Masmoudi, Ikram Amous, Corinne Amel Zayani in Model and Data Engineering (2024)

  2. No Access

    Book and Conference Proceedings

    Foundations and Practice of Security

    16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part II

    Mohamed Mosbah, Florence Sèdes in Lecture Notes in Computer Science (2024)

  3. No Access

    Book and Conference Proceedings

    Foundations and Practice of Security

    16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part I

    Mohamed Mosbah, Florence Sèdes in Lecture Notes in Computer Science (2024)

  4. No Access

    Book and Conference Proceedings

    Foundations and Practice of Security

    15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12–14, 2022, Revised Selected Papers

    Guy-Vincent Jourdan, Laurent Mounier in Lecture Notes in Computer Science (2023)

  5. No Access

    Chapter and Conference Paper

    Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms

    Among the issues the information system security community has to fix, the security of both data and algorithms is a concern. The security of algorithms is dependent on the reliability of the input data. This ...

    Olivier de Casanove, Florence Sèdes in Foundations and Practice of Security (2023)

  6. No Access

    Article

    Dynamic and scalable multi-level trust management model for Social Internet of Things

    The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by offering them the ability to connect to the Internet and communicate. Integrating the social component into IoT gave ris...

    Wafa Abdelghani, Ikram Amous, Corinne Amel Zayani in The Journal of Supercomputing (2022)

  7. No Access

    Chapter and Conference Paper

    Applying PDCA to Security, Education, Training and Awareness Programs

    Security standards help to create security policies, but they are often very descriptive, especially when it comes to security awareness. Information systems security awareness is vital to maintain a high leve...

    Olivier de Casanove, Nicolas Leleu in Human Aspects of Information Security and … (2022)

  8. No Access

    Chapter and Conference Paper

    Deep Learning for Trust-Related Attacks Detection in Social Internet of Things

    Social Internet of Things (SIoT) is a new paradigm where the Internet of Things (IoT) is merged with social networks, allowing objects to establish autonomous social relationships. However, face to this new pa...

    Mariam Masmoudi, Wafa Abdelghani in Advances in E-Business Engineering for Ubi… (2020)

  9. No Access

    Chapter and Conference Paper

    Audiovisual Annotation Procedure for Multi-view Field Recordings

    Audio and video parts of an audiovisual document interact to produce an audiovisual, or multi-modal, perception. Yet, automatic analysis on these documents are usually based on separate audio and video annotat...

    Patrice Guyot, Thierry Malon, Geoffrey Roman-Jimenez, Sylvie Chambon in MultiMedia Modeling (2019)

  10. No Access

    Chapter and Conference Paper

    Trust Evaluation Model for Attack Detection in Social Internet of Things

    Social Internet of Things (SIoT) is a paradigm in which the Internet of Things (IoT) concept is fused with Social Networks for allowing both people and objects to interact in order to offer a variety of attrac...

    Wafa Abdelghani, Corinne Amel Zayani in Risks and Security of Internet and Systems (2019)

  11. No Access

    Reference Work Entry In depth

    Time-Aware Egocentric Network-Based User Profiling

    Sirinya On-At, Marie-Françoise Canut in Encyclopedia of Social Network Analysis an… (2018)

  12. No Access

    Chapter and Conference Paper

    Using k-Means for Redundancy and Inconsistency Detection: Application to Industrial Requirements

    Requirements are usually “hand-written” and suffers from several problems like redundancy and inconsistency. These problems between requirements or sets of requirements impact negatively the success of final p...

    Manel Mezghani, Juyeon Kang, Florence Sèdes in Natural Language Processing and Informatio… (2018)

  13. No Access

    Chapter and Conference Paper

    Learner’s Profile Hierarchization in an Interoperable Education System

    In recent years, several education systems have been developed. Consequently, each learner can have different profiles which each one is related to a system. Each profile can be completed and enriched by the d...

    Leila Ghorbel, Corinne Amel Zayani in Intelligent Systems Design and Applications (2017)

  14. No Access

    Living Reference Work Entry In depth

    Time-Aware Egocentric Network-Based User Profiling

    Sirinya On-At, Marie-Françoise Canut in Encyclopedia of Social Network Analysis an…

  15. No Access

    Chapter

    A Parametric Study to Construct Time-Aware Social Profiles

    Online social networks provide valuable information sources to collect and identify user information and user interests. This work focuses on using information shared on users’ egocentric network to extract us...

    Sirinya On-at, Arnaud Quirin, André Péninou in Trends in Social Network Analysis (2017)

  16. Chapter and Conference Paper

    Trust Management in Social Internet of Things: A Survey

    Social Internet of Things is a new paradigm where Internet of Things merges with Social Networks, allowing people and devices to interact, facilitating information sharing and enabling a variety of at-tractiv...

    Wafa Abdelghani, Corinne Amel Zayani in Social Media: The Good, the Bad, and the U… (2016)

  17. No Access

    Article

    Detecting sociosemantic communities by applying social network analysis in tweets

    Virtual social networks have led to a new way of communication that is different from the oral one, where the restriction of time and space generates new linguistic practices. Twitter, a medium for political ...

    Rocío Abascal-Mena, Rose Lema, Florence Sèdes in Social Network Analysis and Mining (2015)

  18. No Access

    Chapter and Conference Paper

    ADMAN: An Alarm-Based Mobile Diabetes Management System for Mobile Geriatric Teams

    In this article, we introduce ADMAN an alarm-based diabetes management system for the disposal of Mobile Geriatric Teams MGT. The system aims at providing a form of remote monitoring in order to control the di...

    Dana Al Kukhun, Bouchra Soukkarieh in New Trends in Databases and Information Sy… (2015)

  19. No Access

    Article

    A community-based algorithm for deriving users’ profiles from egocentrics networks: experiment on Facebook and DBLP

    Nowadays, social networks are more and more widely used as a solution for enriching users’ profiles in systems such as recommender systems or personalized systems. For an unknown user’s interest, the user’s so...

    Dieudonné Tchuente, Marie-Francoise Canut in Social Network Analysis and Mining (2013)

  20. No Access

    Chapter

    From Simple Management of Defects to Knowledge Discovery to Optimize Maintenance

    To ensure the quality of a final product, processing and traceability of defects which occur during its industrial manufacturing process has become an essential activity. Indeed, management of information rela...

    Grégory Claude, Marc Boyer, Gaël Durand in Recent Trends in Information Reuse and Int… (2012)

previous disabled Page of 2