default search action
Karima Boudaoud
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Letizia Jaccheri, Barbora Buhnova, Birgit Penzenstadler, Karima Boudaoud, Valentina Lenarduzzi:
European Network For Gender Balance in Informatics (EUGAIN): Activities and Results. CoRR abs/2407.16906 (2024) - 2021
- [j4]Adrian Reuter, Ahmed Abdelmaksoud, Karima Boudaoud, Marco Winckler:
Usability of End-to-End Encryption in E-Mail Communication. Frontiers Big Data 4: 568284 (2021) - [i1]Adrian Reuter, Karima Boudaoud, Marco Winckler, Ahmed Abdelmaksoud, Wadie Lemrazzeq:
Secure Email - A Usability Study. CoRR abs/2110.06019 (2021) - 2020
- [j3]Yoann Bertrand, Karima Boudaoud, Michel Riveill:
What Do You Think About Your Company's Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms. Frontiers Big Data 3: 568257 (2020) - [c32]Adrian Reuter, Karima Boudaoud, Marco Winckler, Ahmed Abdelmaksoud, Wadie Lemrazzeq:
Secure Email - A Usability Study. Financial Cryptography Workshops 2020: 36-46
2010 – 2019
- 2017
- [j2]Ahmed M. Elmisery, Seungmin Rho, Mirela Sertovic, Karima Boudaoud, Sanghyun Seo:
Privacy aware group based recommender system in multimedia services. Multim. Tools Appl. 76(24): 26103-26127 (2017) - 2016
- [c31]Amelie Gyrard, Christian Bonnet, Karima Boudaoud, Martin Serrano:
LOV4IoT: A Second Life for Ontology-Based Domain Knowledge to Build Semantic Web of Things Applications. FiCloud 2016: 254-261 - [c30]Amelie Gyrard, Ghislain Atemezing, Christian Bonnet, Karima Boudaoud, Martin Serrano:
Reusing and Unifying Background Knowledge for Internet of Things with LOV4IoT. FiCloud 2016: 262-269 - 2015
- [c29]Amelie Gyrard, Soumya Kanti Datta, Christian Bonnet, Karima Boudaoud:
Integrating machine-to-machine measurement framework into oneM2M architecture. APNOMS 2015: 364-367 - [c28]Amelie Gyrard, Christian Bonnet, Karima Boudaoud, Martin Serrano:
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web of Things Applications. DSDIS 2015: 659-666 - [c27]Amelie Gyrard, Soumya Kanti Datta, Christian Bonnet, Karima Boudaoud:
Cross-Domain Internet of Things Application Development: M3 Framework and Evaluation. FiCloud 2015: 9-16 - [c26]Soumya Kanti Datta, Amelie Gyrard, Christian Bonnet, Karima Boudaoud:
oneM2M Architecture Based User Centric IoT Application Development. FiCloud 2015: 100-107 - [c25]Amelie Gyrard, Soumya Kanti Datta, Christian Bonnet, Karima Boudaoud:
A Semantic Engine for Internet of Things: Cloud, Mobile Devices and Gateways. IMIS 2015: 336-341 - [c24]Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill:
Generation of Transmission Control Rules Compliant with Existing Access Control Policies. SecureComm 2015: 438-455 - [c23]Soumya Kanti Datta, Christian Bonnet, Amelie Gyrard, Rui Pedro Ferreira Da Costa, Karima Boudaoud:
Applying Internet of Things for personalized healthcare in smart homes. WOCC 2015: 164-169 - 2014
- [c22]Amelie Gyrard, Soumya Kanti Datta, Christian Bonnet, Karima Boudaoud:
Standardizing generic cross-domain applications in Internet of Things. GLOBECOM Workshops 2014: 589-594 - [c21]Amelie Gyrard, Christian Bonnet, Karima Boudaoud:
An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture. iThings/GreenCom/CPSCom 2014: 109-116 - [c20]Stassia Resondry, Karima Boudaoud, Michel Kamel, Yoann Bertrand, Michel Riveill:
An alternative version of HTTPS to provide non-repudiation security property. IWCMC 2014: 536-541 - [c19]Amelie Gyrard, Christian Bonnet, Karima Boudaoud:
Demo Paper: Helping IoT Application Developers with Sensor-based Linked Open Rules. TC/SSN@ISWC 2014: 105-108 - [c18]Amelie Gyrard, Christian Bonnet, Karima Boudaoud:
Enrich machine-to-machine data with semantic web technologies for cross-domain applications. WF-IoT 2014: 559-564 - 2013
- [c17]Florent Batard, Karima Boudaoud, Michel Riveill:
Securing Mobile Mashups with SCCM. TrustCom/ISPA/IUCC 2013: 180-187 - [c16]Amelie Gyrard, Christian Bonnet, Karima Boudaoud:
The STAC (security toolbox: attacks & countermeasures) ontology. WWW (Companion Volume) 2013: 165-166 - 2012
- [j1]Nicolas Nobelis, Karima Boudaoud, Christian Delettre, Michel Riveill:
Designing Security Properties-Centric Communication Protocols using a Component-Based Approach. Int. J. Distributed Syst. Technol. 3(1): 1-16 (2012) - 2011
- [c15]Nicolas Nobelis, Karima Boudaoud, Christian Delettre, Michel Riveill:
A Component-Based Approach to Security Protocol Design. AINA Workshops 2011: 279-284 - [c14]Michel Kamel, Karima Boudaoud, Stassia Resondry, Michel Riveill:
A low-energy consuming and user-centric security management architecture adapted to mobile environments. Integrated Network Management 2011: 722-725 - [c13]Christian Delettre, Karima Boudaoud, Michel Riveill:
Cloud computing, security and data concealment. ISCC 2011: 424-431 - [c12]C. Pita, Karima Boudaoud, Michel Riveill:
A security-property-based approach for lowering power consumption of secure mobile Web access. IWCMC 2011: 967-973 - [c11]Florent Batard, Karima Boudaoud, Michel Riveill:
A middleware for securing mobile mashups. WWW (Companion Volume) 2011: 9-10 - 2010
- [c10]Michel Kamel, Karima Boudaoud, Michel Riveill:
A Low-energy Consuming and Component-based Security Management Architecture for Mobile Devices. Security and Management 2010: 167-173 - [c9]Michel Kamel, Karima Boudaoud, Sylvain Lequeux, Michel Riveill:
Designing Security Protocols Adapted to the Constraints of Mobile Environments. EUC 2010: 624-629
2000 – 2009
- 2008
- [c8]Karima Boudaoud, F. LeBorgne:
Towards an efficient implementation of traceback mechanisms in autonomous systems. NOMS 2008: 1015-1018 - 2003
- [c7]Mireille Blay-Fornarino, Karima Boudaoud, Anne-Marie Pinna-Dery, Charles McCathieNevile:
A Flexible Approach to Semi-Automatic Accessibility Evaluation. ICWI 2003: 1083-1088 - 2002
- [c6]Karima Boudaoud, Charles McCathieNevile:
An Information Model for Network Security Management. CATA 2002: 398-401 - [c5]Karima Boudaoud, Charles McCathieNevile:
Policy-driven model for security management. Net-Con 2002: 419-424 - [c4]Karima Boudaoud, Charles McCathieNevile:
An intelligent agent-based model for security management. ISCC 2002: 877-882 - 2000
- [c3]Karima Boudaoud, Houda Labiod, Raouf Boutaba, Zahia Guessoum:
Network security management with intelligent agents. NOMS 2000: 579-592 - [c2]Karima Boudaoud, Zahia Guessoum:
A Multi-agents System for Network Security Management. SMARTNET 2000: 407-418
1990 – 1999
- 1999
- [c1]Karima Boudaoud, Nazim Agoulmine, José Neuman de Souza:
Distributed Network Security Management Using Intelligent Agents. LANOMS 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-20 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint