


default search action
15th SIN 2022: Sousse, Tunisia
- 15th International Conference on Security of Information and Networks, SIN 2022, Sousse, Tunisia, November 11-13, 2022. IEEE 2022, ISBN 978-1-6654-5465-0
- Abdelouahid Derhab:
Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles. 1 - Mohamed Mosbah:
Keynote Speaker 2: Cybersecurity of connected Vehicules. 1 - Hedi Choura
, Faten Chaabane
, Mouna Baklouti
, Tarek Frikha
:
Blockchain for IoT-Based Healthcare using secure and privacy-preserving watermark. 1-4 - Abdelhamid Saighi, Salim Chitroub:
Robust grayscale image watermarking approach using DCT and DWT. 1-6 - Mehdi Houichi, Faouzi Jaïdi
, Adel Bouhoula:
Analysis of Smart Cities Security: Challenges and Advancements. 1-5 - Hela Makina
, Asma Ben Letaifa, Abderazek Rachedi:
Leveraging Edge Computing, Blockchain and IPFS for Addressing eHealth Records Challenges. 1-4 - Dmitriy Levonevskiy, Anna I. Motienko, Mikhail Vinogradov:
Approach to Physical Access Management, Control and Analytics Using Multimodal and Heterogeneous Data. 1-4 - Chidera Biringa, Gökhan Kul:
A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks. 1-4 - Omar Cheikhrouhou, Atilla Elçi:
Preface. 1-2 - Amina Sahbi, Faouzi Jaïdi
, Adel Bouhoula:
Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal. 1-7 - Liudmila Babenko, Ilya Rusalovsky:
Homomorphic operations on integers via operations on bits. 1-4 - Haider Abbas:
Keynote Speaker 5: Cyber Security Threat Landscape in the Context of Industry 4.0. 1 - Ahmed Abadulla Ashlam, Atta Badii, Frederic T. Stahl
:
Multi-Phase Algorithmic Framework to Prevent SQL Injection Attacks using Improved Machine learning and Deep learning to Enhance Database security in Real-time. 1-4 - Murshedul Arifeen, Andrei Petrovski:
Topology for Preserving Feature Correlation in Tabular Synthetic Data. 1-6 - Andikan Otung
, Andrew P. Martin:
Towards Comparative Evaluation of DDoS Defences. 1-10 - Ratun Rahman, Md. Rafid Islam, Akib Ahmed, Md. Kamrul Hasan, Hasan Mahmud:
A Study of Permission-based Malware Detection Using Machine Learning. 1-6 - Abdelhakim Senhaji Hafidh:
Keynote Speaker 3: Scaling Blockchains. 1 - Sondes Ksibi, Faouzi Jaïdi
, Adel Bouhoula:
A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment. 1-7 - Mohamed Hamdi:
Keynote Speaker 4: Introducing Homomorphic Encryption in Blockchain-enabled Applications. 1 - Ali Kerem Yildiz, Aykut Atmaca, Ali Özgür Solak, Yekta Can Tursun, Serif Bahtiyar
:
A Trust Based DNS System to Prevent Eclipse Attack on Blockchain Networks. 1-8 - Moez Krichen, Mariam Lahami
, Qasem Abu Al-Haija
:
Formal Methods for the Verification of Smart Contracts: A Review. 1-8 - Omar Cheikhrouhou, Ouissem Ben Fredj, Nesrine Atitallah
, Salem Hellal:
Intrusion Detection in Industrial IoT. 1-4 - Bessem Zaabar, Omar Cheikhrouhou, Mohamed Abid:
Intrusion Detection System for IoMT through Blockchain-based Federated Learning. 1-8 - Thiago Figueiredo Costa, Mateus Tymburibá:
Challenges on prioritizing software patching. 1-8 - Ciprian-Alin Simion, Gheorghe Balan
, Dragos Teodor Gavrilut:
Improving detection of malicious samples by using state-of-the-art adversarial machine learning algorithms. 1-8 - Anne Bumiller, Olivier Barais, Nicolas Aillery, Gaël Le Lan:
Towards a Better Understanding of Impersonation Risks. 1-8 - Siegfried Hollerer
, Marta Chabrová, Thilo Sauter
, Wolfgang Kastner
:
Combined Modeling Techniques for Safety and Security in Industrial Automation: A Case Study. 1-4 - Sabrine Bhiri, Kais Loukil, Faten Chaabane, Tarek Frikha:
Blockchain Application for Parking Management. 1-5 - Lotfi Ezzeddini
, Jalel Ktari, Iheb Zouaoui, Amira Talha, Nizar Jarray, Tarek Frikha:
Blockchain for the electronic voting system: case study: student representative vote in Tunisian institute. 1-7 - Elías Grande:
Social Behaviour Identification relying on Device Fingerprint Analysis. 1-8 - Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi:
SWAF: A Smart Web Application Firewall Based on Convolutional Neural Network. 1-6 - Amelia Chindrus, Constantin Florin Caruntu:
Development and Testing of a Core System for Red and Blue Scenario in Cyber Security Incidents. 1-7 - Mariem Turki, Bouthaina Damak, Rawya Mars:
A Private Smart parking solution based on Blockchain and AI. 1-7 - Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian:
Evolution of macro VBA obfuscation techniques. 1-8 - Ouissem Ben Fredj
:
A NLP-inspired method to predict multi-step cyberattacks. 1-6 - Erol Gelenbe:
Keynote Speaker 1: Random Neural Networks Optimise QoS, Security and Energy Consumption. 1 - Mays Kareem Jabbar
, Hafedh Trabelsi
:
A Betweenness Centrality Based Clustering in VANETs. 1-4 - Mays A. Hamdan, Amel Meddeb-Makhlouf, Hassène Mnif:
Review of Authentication with Privacy-preserving Schemes for 5G-enabled Vehicular Networks. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.