BibTeX records: Tayeb Kenaza

download as .bib file

@article{DBLP:journals/compsec/DebichaCKDDM23,
  author       = {Islam Debicha and
                  Benjamin Cochez and
                  Tayeb Kenaza and
                  Thibault Debatty and
                  Jean{-}Michel Dricot and
                  Wim Mees},
  title        = {Adv-Bot: Realistic adversarial botnet attacks against network intrusion
                  detection systems},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103176},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103176},
  doi          = {10.1016/J.COSE.2023.103176},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DebichaCKDDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DebichaBDDKM23,
  author       = {Islam Debicha and
                  Richard Bauwens and
                  Thibault Debatty and
                  Jean{-}Michel Dricot and
                  Tayeb Kenaza and
                  Wim Mees},
  title        = {{TAD:} Transfer learning-based multi-adversarial detection of evasion
                  attacks against network intrusion detection systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {138},
  pages        = {185--197},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2022.08.011},
  doi          = {10.1016/J.FUTURE.2022.08.011},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/DebichaBDDKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/HamoudKCBO23,
  author       = {Othmane Nait Hamoud and
                  Tayeb Kenaza and
                  Yacine Challal and
                  Lina Ben{-}Abdelatif and
                  Maroua Ouaked},
  title        = {Implementing a secure remote patient monitoring system},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {32},
  number       = {1},
  pages        = {21--38},
  year         = {2023},
  url          = {https://doi.org/10.1080/19393555.2022.2047839},
  doi          = {10.1080/19393555.2022.2047839},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/HamoudKCBO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-06664,
  author       = {Islam Debicha and
                  Benjamin Cochez and
                  Tayeb Kenaza and
                  Thibault Debatty and
                  Jean{-}Michel Dricot and
                  Wim Mees},
  title        = {Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion
                  Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2303.06664},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.06664},
  doi          = {10.48550/ARXIV.2303.06664},
  eprinttype    = {arXiv},
  eprint       = {2303.06664},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-06664.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-07003,
  author       = {Islam Debicha and
                  Benjamin Cochez and
                  Tayeb Kenaza and
                  Thibault Debatty and
                  Jean{-}Michel Dricot and
                  Wim Mees},
  title        = {Review on the Feasibility of Adversarial Evasion Attacks and Defenses
                  for Network Intrusion Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2303.07003},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.07003},
  doi          = {10.48550/ARXIV.2303.07003},
  eprinttype    = {arXiv},
  eprint       = {2303.07003},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-07003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-15700,
  author       = {Islam Debicha and
                  Richard Bauwens and
                  Thibault Debatty and
                  Jean{-}Michel Dricot and
                  Tayeb Kenaza and
                  Wim Mees},
  title        = {{TAD:} Transfer Learning-based Multi-Adversarial Detection of Evasion
                  Attacks against Network Intrusion Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2210.15700},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.15700},
  doi          = {10.48550/ARXIV.2210.15700},
  eprinttype    = {arXiv},
  eprint       = {2210.15700},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-15700.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HamoudKC21,
  author       = {Othmane Nait Hamoud and
                  Tayeb Kenaza and
                  Yacine Challal},
  title        = {Certificateless Public Key Systems Aggregation: An enabling technique
                  for 5G multi-domain security management and delegation},
  journal      = {Comput. Networks},
  volume       = {199},
  pages        = {108443},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108443},
  doi          = {10.1016/J.COMNET.2021.108443},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HamoudKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdmmm/Kenaza21,
  author       = {Tayeb Kenaza},
  title        = {An ontology-based modelling and reasoning for alerts correlation},
  journal      = {Int. J. Data Min. Model. Manag.},
  volume       = {13},
  number       = {1/2},
  pages        = {65--80},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJDMMM.2021.112913},
  doi          = {10.1504/IJDMMM.2021.112913},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdmmm/Kenaza21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MerahK21,
  author       = {Yazid Merah and
                  Tayeb Kenaza},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {88:1--88:8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3470024},
  doi          = {10.1145/3465481.3470024},
  timestamp    = {Tue, 17 Aug 2021 14:54:34 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MerahK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-12095,
  author       = {Islam Debicha and
                  Thibault Debatty and
                  Jean{-}Michel Dricot and
                  Wim Mees and
                  Tayeb Kenaza},
  title        = {Detect {\&} Reject for Transferability of Black-box Adversarial
                  Attacks Against Network Intrusion Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2112.12095},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.12095},
  eprinttype    = {arXiv},
  eprint       = {2112.12095},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-12095.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/HamoudKC19,
  author       = {Othmane Nait Hamoud and
                  Tayeb Kenaza and
                  Yacine Challal},
  editor       = {Mohammad S. Obaidat and
                  Pierangela Samarati},
  title        = {A New Certificateless System Construction for Multiple Key Generator
                  Centers to Secure Device-to-Device Communications},
  booktitle    = {Proceedings of the 16th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
                  Czech Republic, July 26-28, 2019},
  pages        = {84--95},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007841500840095},
  doi          = {10.5220/0007841500840095},
  timestamp    = {Tue, 06 Jun 2023 14:58:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/HamoudKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/HamoudKC18,
  author       = {Othmane Nait Hamoud and
                  Tayeb Kenaza and
                  Yacine Challal},
  title        = {Security in device-to-device communications: a survey},
  journal      = {{IET} Networks},
  volume       = {7},
  number       = {1},
  pages        = {14--22},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-net.2017.0119},
  doi          = {10.1049/IET-NET.2017.0119},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-net/HamoudKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciia/KenazaMD18,
  author       = {Tayeb Kenaza and
                  Abdelkarim Machou and
                  Abdelghani Dekkiche},
  editor       = {Abdelmalek Amine and
                  Malek Mouhoub and
                  Otmane A{\"{\i}}t Mohamed and
                  Bachir Djebbar},
  title        = {Implementing a Semantic Approach for Events Correlation in {SIEM}
                  Systems},
  booktitle    = {Computational Intelligence and Its Applications - 6th {IFIP} {TC}
                  5 International Conference, {CIIA} 2018, Oran, Algeria, May 8-10,
                  2018, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {522},
  pages        = {648--659},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89743-1\_55},
  doi          = {10.1007/978-3-319-89743-1\_55},
  timestamp    = {Sat, 05 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciia/KenazaMD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/DjamaaKYK18,
  author       = {Badis Djamaa and
                  Mohamed Amine Kouda and
                  Ali Yachir and
                  Tayeb Kenaza},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {FetchIoT: Efficient Resource Fetching for the Internet of Things},
  booktitle    = {Proceedings of the 2018 Federated Conference on Computer Science and
                  Information Systems, FedCSIS 2018, Pozna{\'{n}}, Poland, September
                  9-12, 2018},
  series       = {Annals of Computer Science and Information Systems},
  volume       = {15},
  pages        = {637--643},
  year         = {2018},
  url          = {https://doi.org/10.15439/2018F278},
  doi          = {10.15439/2018F278},
  timestamp    = {Mon, 07 Aug 2023 11:27:04 +0200},
  biburl       = {https://dblp.org/rec/conf/fedcsis/DjamaaKYK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KenazaBL18,
  author       = {Tayeb Kenaza and
                  Khadidja Bennaceur and
                  Abdenour Labed},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {An efficient hybrid SVDD/clustering approach for anomaly-based intrusion
                  detection},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {435--443},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167180},
  doi          = {10.1145/3167132.3167180},
  timestamp    = {Wed, 25 Sep 2019 18:12:13 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/KenazaBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/AmaroucheZK18,
  author       = {Idir Amine Amarouche and
                  Dehbia Ahmed Zaid and
                  Tayeb Kenaza},
  editor       = {Vijay Gadepally and
                  Timothy G. Mattson and
                  Michael Stonebraker and
                  Fusheng Wang and
                  Gang Luo and
                  George Teodoro},
  title        = {Implementation of a Medical Coding Support System by Combining Approaches:
                  {NLP} and Machine Learning},
  booktitle    = {Heterogeneous Data Management, Polystores, and Analytics for Healthcare
                  - {VLDB} 2018 Workshops, Poly and DMAH, Rio de Janeiro, Brazil, August
                  31, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11470},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14177-6\_11},
  doi          = {10.1007/978-3-030-14177-6\_11},
  timestamp    = {Wed, 03 Aug 2022 16:11:56 +0200},
  biburl       = {https://dblp.org/rec/conf/vldb/AmaroucheZK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/AmaroucheRK17,
  author       = {Idir Amine Amarouche and
                  Lydia Rabia and
                  Tayeb Kenaza},
  editor       = {Djamal Benslimane and
                  Ernesto Damiani and
                  William I. Grosky and
                  Abdelkader Hameurlain and
                  Amit P. Sheth and
                  Roland R. Wagner},
  title        = {Combining Web-Service and Rule-Based Systems to Implement a Reliable
                  DRG-Solution},
  booktitle    = {Database and Expert Systems Applications - 28th International Conference,
                  {DEXA} 2017, Lyon, France, August 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10439},
  pages        = {45--53},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64471-4\_5},
  doi          = {10.1007/978-3-319-64471-4\_5},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexa/AmaroucheRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/KenazaA16,
  author       = {Tayeb Kenaza and
                  Mahdi Aiash},
  editor       = {Elhadi M. Shakshuki},
  title        = {Toward an Efficient Ontology-Based Event Correlation in {SIEM}},
  booktitle    = {The 7th International Conference on Ambient Systems, Networks and
                  Technologies {(ANT} 2016) / The 6th International Conference on Sustainable
                  Energy Information Technology {(SEIT-2016)} / Affiliated Workshops,
                  May 23-26, 2016, Madrid, Spain},
  series       = {Procedia Computer Science},
  volume       = {83},
  pages        = {139--146},
  publisher    = {Elsevier},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.procs.2016.04.109},
  doi          = {10.1016/J.PROCS.2016.04.109},
  timestamp    = {Thu, 08 Jul 2021 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/KenazaA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KenazaBLA16,
  author       = {Tayeb Kenaza and
                  Khadidja Bennaceur and
                  Abdenour Labed and
                  Mahdi Aiash},
  title        = {Enhancing the {SVDD} Accuracy in Intrusion Detection Systems by Removing
                  External Voids},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1765--1770},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0271},
  doi          = {10.1109/TRUSTCOM.2016.0271},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KenazaBLA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KenazaALLW16,
  author       = {Tayeb Kenaza and
                  Mahdi Aiash and
                  Jonathan Loo and
                  Aboubaker Lasebae and
                  Gill Whitney},
  title        = {A Progressive Approach to Design Authentication Protocols for Mobile
                  Heterogeneous Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1776--1781},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0273},
  doi          = {10.1109/TRUSTCOM.2016.0273},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KenazaALLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KenazaHN15,
  author       = {Tayeb Kenaza and
                  Othmane Nait Hamoud and
                  Nadia Nouali{-}Taboudjemat},
  title        = {Efficient centralized approach to prevent from replication attack
                  in wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {220--231},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.975},
  doi          = {10.1002/SEC.975},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KenazaHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KenazaLBS15,
  author       = {Tayeb Kenaza and
                  Abdenour Labed and
                  Yacine Boulahia and
                  Mohcen Sebehi},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion
                  Detection},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {405--412},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005573204050412},
  doi          = {10.5220/0005573204050412},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KenazaLBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/KenazaTB10,
  author       = {Tayeb Kenaza and
                  Karim Tabia and
                  Salem Benferhat},
  title        = {On the Use of Naive Bayesian Classifiers for Detecting Elementary
                  and Coordinated Attacks},
  journal      = {Fundam. Informaticae},
  volume       = {105},
  number       = {4},
  pages        = {435--466},
  year         = {2010},
  url          = {https://doi.org/10.3233/FI-2010-373},
  doi          = {10.3233/FI-2010-373},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/KenazaTB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictai/YahiBK10,
  author       = {Safa Yahi and
                  Salem Benferhat and
                  Tayeb Kenaza},
  title        = {Conflicts Handling in Cooperative Intrusion Detection: {A} Description
                  Logic Approach},
  booktitle    = {22nd {IEEE} International Conference on Tools with Artificial Intelligence,
                  {ICTAI} 2010, Arras, France, 27-29 October 2010 - Volume 2},
  pages        = {360--362},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICTAI.2010.128},
  doi          = {10.1109/ICTAI.2010.128},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictai/YahiBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZaidiAK10,
  author       = {Abdelhalim Zaidi and
                  Nazim Agoulmine and
                  Tayeb Kenaza},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Piecewise Classification of Attack Patterns for Efficient Network
                  Intrusion Detection},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {100--104},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZaidiAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/BenferhatKM08,
  author       = {Salem Benferhat and
                  Tayeb Kenaza and
                  A{\"{\i}}cha Mokhtari},
  title        = {A Naive Bayes Approach for Detecting Coordinated Attacks},
  booktitle    = {Proceedings of the 32nd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008,
                  Turku, Finland},
  pages        = {704--709},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/COMPSAC.2008.213},
  doi          = {10.1109/COMPSAC.2008.213},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/BenferhatKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics