default search action
Mounira Msahli
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Abdul Wahid, Mounira Msahli, Albert Bifet, Gérard Memmi:
NFA: A neural factorization autoencoder based online telephony fraud detection. Digit. Commun. Networks 10(1): 158-167 (2024) - [c21]Qingjie Zhang, Lijun Chi, Di Wang, Mounira Msahli, Gérard Memmi, Tianwei Zhang, Chao Zhang, Han Qiu:
Laser Shield: a Physical Defense with Polarizer against Laser Attacks on Autonomous Driving Systems. DAC 2024: 65:1-65:6 - [c20]Mounira Msahli, Pascal Lafourcade, Dhekra Mahmoud:
Formal Analysis of C-ITS PKI Protocols. SECRYPT 2024: 198-210 - 2023
- [j6]Akshaya Ravi, Mounira Msahli, Han Qiu, Gérard Memmi, Albert Bifet, Meikang Qiu:
Wangiri Fraud: Pattern Analysis and Machine-Learning-Based Detection. IEEE Internet Things J. 10(8, April 15): 6794-6802 (2023) - [j5]Wei Cai, Jian Zhao, Xinning Gui, Mounira Msahli, Victor C. M. Leung:
Guest Editorial Special Issue on Social Studies, Human Factors, and Applications in Metaverse. IEEE Trans. Comput. Soc. Syst. 10(5): 2160-2164 (2023) - [c19]Lijun Chi, Mounira Msahli, Gérard Memmi, Han Qiu:
Public-attention-based Adversarial Attack on Traffic Sign Recognition. CCNC 2023: 740-745 - [c18]Qingjie Zhang, Maosen Zhang, Han Qiu, Tianwei Zhang, Mounira Msahli, Gérard Memmi:
ATTA: Adversarial Task-transferable Attacks on Autonomous Driving Systems. ICDM 2023: 798-807 - 2022
- [j4]Sihem Mesnager, Bimal Mandal, Mounira Msahli:
Survey on recent trends towards generalized differential and boomerang uniformities. Cryptogr. Commun. 14(4): 691-735 (2022) - [j3]Rajkumar Gaur, Shiva Prakash, Sanjay Kumar, Kumar Abhishek, Mounira Msahli, Abdul Wahid:
A Machine-Learning-Blockchain-Based Authentication Using Smart Contracts for an IoHT System. Sensors 22(23): 9074 (2022) - 2021
- [j2]Ayyoub Lamssaggad, Nabil Benamar, Abdelhakim Senhaji Hafid, Mounira Msahli:
A Survey on the Current Security Landscape of Intelligent Transportation Systems. IEEE Access 9: 9180-9208 (2021) - [j1]Han Qiu, Qinkai Zheng, Mounira Msahli, Gérard Memmi, Meikang Qiu, Jialiang Lu:
Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction. IEEE Trans. Intell. Transp. Syst. 22(7): 4560-4569 (2021) - [c17]Laetitia Debesse, Sihem Mesnager, Mounira Msahli:
POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack. ACNS Workshops 2021: 485-489 - [c16]Badr Eddine Boukari, Akshaya Ravi, Mounira Msahli:
Machine Learning Detection for SMiShing Frauds. CCNC 2021: 1-2 - 2020
- [i1]Mounira Msahli, Nancy Cam-Winget, William Whyte, Ahmed Serhrouchni, Houda Labiod:
TLS Authentication Using Intelligent Transport System (ITS) Certificates. RFC 8902: 1-13 (2020)
2010 – 2019
- 2019
- [c15]Ashref Aloui, Mounira Msahli, Talel Abdessalem, Sihem Mesnager, Stéphane Bressan:
Privacy as a Service: Anonymisation of NetFlow Traces. ICEBE 2019: 561-571 - [c14]Mounira Msahli, Houda Labiod, Gilles Ampt:
Security Interoperability for Cooperative ITS: Architecture and Validation. NTMS 2019: 1-6 - 2017
- [c13]Mayssa Jemel, Mounira Msahli, Ahmed Serhrouchni:
Towards an Efficient File Synchronization between Digital Safes. AINA 2017: 136-143 - [c12]Mounira Msahli, Ahmed Serhrouchni, Houda Labiod, Arnaud Kaiser, Brigitte Lonc:
TLS for Cooperative ITS Services. IOV 2017: 176-189 - [c11]Ashref Aloui, Mounira Msahli, Talel Abdessalem, Stéphane Bressan, Sihem Mesnager:
Preserving privacy in distributed system (PPDS) protocol: Security analysis. IPCCC 2017: 1-7 - [c10]Ashref Aloui, Mounira Msahli, Talel Abdessalem, Stéphane Bressan, Sihem Mesnager:
Protocol for preserving privacy in distributed system (PPDS). IWCMC 2017: 1885-1890 - 2016
- [c9]Mayssa Jemel, Mounira Msahli, Ahmed Serhrouchni:
SyncDS: A digital safe based file synchronization approach. CCNC 2016: 317-318 - [c8]Mounira Msahli, Ahmed Serhrouchni, Mohamad Badra:
Extending TLS with KMIP Protocol for Cloud Computing. NTMS 2016: 1-6 - 2015
- [c7]Mayssa Jemel, Mounira Msahli, Ahmed Serhrouchni:
Digital safe: Secure synchronization of shared files. IAS 2015: 67-72 - [c6]Mounira Msahli, Mohamed Tahar Hammi, Ahmed Serhrouchni:
Safe box cloud authentication using TLS extesion. SSIC 2015: 1-6 - 2014
- [c5]Mounira Msahli, Ahmed Serhrouchni:
PCM in cloud. GrC 2014: 201-206 - [c4]Mounira Msahli, Xiuzhen Chen, Ahmed Serhrouchni:
Towards a Fine-Grained Access Control for Cloud. ICEBE 2014: 286-291 - 2013
- [c3]Mounira Msahli, Ahmed Serhrouchni:
SBaaS: Safe Box as a service. CollaborateCom 2013: 143-147 - [c2]Balkis Hamdane, Mounira Msahli, Ahmed Serhrouchni, Sihem Guemara El Fatmi:
Data-based access control in named data networking. CollaborateCom 2013: 531-536 - [c1]Mounira Msahli, Rached Abdeljaoued, Ahmed Serhrouchni:
Access control in probative value Cloud. ICITST 2013: 607-611
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint