default search action
Belhassen Zouari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j10]Noureddine Amraoui, Belhassen Zouari:
Anomalous behavior detection-based approach for authenticating smart home system users. Int. J. Inf. Sec. 21(3): 611-636 (2022) - [j9]Noureddine Amraoui, Belhassen Zouari:
Securing the operation of Smart Home Systems: a literature review. J. Reliab. Intell. Environ. 8(1): 67-74 (2022) - [j8]Marwa Salhi, Riadh Ksantini, Belhassen Zouari:
A real-time image-centric transfer function design based on incremental classification. J. Real Time Image Process. 19(1): 185-203 (2022) - 2020
- [j7]Mohamed Amine Abdeljaouad, Zied Bahroun, Nour El Houda Saadani, Belhassen Zouari:
A simulated annealing for a daily operating room scheduling problem under constraints of uncertainty and setup. INFOR Inf. Syst. Oper. Res. 58(3): 456-477 (2020) - 2017
- [j6]Rihab Khemiri, Khaoula Elbedoui-Maktouf, Bernard Grabot, Belhassen Zouari:
A fuzzy multi-criteria decision-making approach for managing performance and risk in integrated procurement-production planning. Int. J. Prod. Res. 55(18): 5305-5329 (2017) - 2013
- [j5]Chiheb Ameur Abid, Belhassen Zouari:
Local Verification Using a Distributed State Space. Fundam. Informaticae 125(1): 1-20 (2013) - 2012
- [j4]Sajeh Zairi, Belhassen Zouari, Éric Niel, Emil Dumitrescu:
Nodes self-scheduling approach for maximising wireless sensor network lifetime based on remaining energy. IET Wirel. Sens. Syst. 2(1): 52-62 (2012) - 2010
- [j3]Chiheb Ameur Abid, Belhassen Zouari:
Synthesis of controllers for symmetric systems. Int. J. Control 83(11): 2354-2367 (2010) - 2006
- [j2]Belhassen Zouari:
A Structure Causality Relation for Liveness Characterisation in Petri Nets. J. Univers. Comput. Sci. 12(2): 214-232 (2006) - 2005
- [j1]Belhassen Zouari:
A Structure Causality Relation for Liveness Characterisation in Petri Nets. J. Univers. Comput. Sci. 11(6): 1115-1133 (2005)
Conference and Workshop Papers
- 2024
- [c49]Marouene Boubakri, Belhassen Zouari:
Architectural Security and Trust Foundation for RISC-V. ISORC 2024: 1-8 - 2023
- [c48]Sawsen Khlifa, Chiheb Ameur Abid, Belhassen Zouari:
A Reduced Distributed Sate Space for Modular Petri Nets. AINA (1) 2023: 319-331 - [c47]Marwa Salhi, Riadh Ksantini, Belhassen Zouari:
Deep Interactive Volume Exploration Through Pre-Trained 3D CNN and Active Learning. VISIGRAPP (1: GRAPP) 2023: 170-178 - 2022
- [c46]Marwa Salhi, Riadh Ksantini, Belhassen Zouari:
Detection of Breast Masses in Mammograms by Incremental Discriminant Based Support Vector Machine Classifier and Active User Involvement. ICCCI (CCIS Volume) 2022: 373-384 - 2021
- [c45]Marouene Boubakri, Fausto Chiatante, Belhassen Zouari:
Towards a firmware TPM on RISC-V. DATE 2021: 647-650 - [c44]Marouene Boubakri, Fausto Chiatante, Belhassen Zouari:
Open Portable Trusted Execution Environment framework for RISC-V. EUC 2021: 1-8 - 2020
- [c43]Maroua Nouioua, Adel Alti, Belhassen Zouari:
Document Business Process Model Extension for Modeling Secure Ubiquitous Documents. AINA Workshops 2020: 628-639 - [c42]Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari, Claude Fachkha:
Prevention of DDoS Attacks in IoT Networks. AINA 2020: 1239-1250 - [c41]Noureddine Amraoui, Amine Besrour, Riadh Ksantini, Belhassen Zouari:
Securing Smart Homes using a Behavior Analysis based Authentication Approach. COMNET 2020: 1-5 - [c40]Noureddine Amraoui, Belhassen Zouari:
An ML Behavior-Based Security Control for Smart Home Systems. CRiSIS 2020: 117-130 - [c39]Noureddine Amraoui, Belhassen Zouari:
Behavior-based Anomaly Detection for Securing Smart Home Systems Automation. SoftCOM 2020: 1-6 - 2019
- [c38]Hiba Ouni, Kais Klai, Chiheb Ameur Abid, Belhassen Zouari:
Towards Parallel Verification of Concurrent Systems using the Symbolic Observation Graph. ACSD 2019: 23-32 - [c37]Noureddine Amraoui, Amine Besrour, Riadh Ksantini, Belhassen Zouari:
Implicit and Continuous Authentication of Smart Home Users. AINA 2019: 1228-1239 - [c36]Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari, Claude Fachkha:
Multi-scale Adaptive Threshold for DDoS Detection. CRiSIS 2019: 342-354 - [c35]Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari, Claude Fachkha:
Distributed Detection System Using Wavelet Decomposition and Chi-Square Test. CRiSIS 2019: 365-377 - [c34]Hiba Ouni, Kais Klai, Belhassen Zouari:
Parallel construction of the Symbolic Observation Graph. HPCS 2019: 1011-1013 - [c33]Maroua Nouioua, Belhassen Zouari, Adel Alti:
Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control. IWCMC 2019: 1964-1970 - 2018
- [c32]Imen Allani, Belhassen Zouari:
A Semantic Model for Document Management in Business Processes. AINA Workshops 2018: 331-336 - [c31]Maroua Nouioua, Adel Alti, Belhassen Zouari:
A New Formal Proxy-Based Approach for Secure Distributed Business Process on the Cloud. AINA 2018: 973-980 - [c30]Sajeh Zairi, Belhassen Zouari, Hamdi Rahal, Jean-François Pradat-Peyre:
A generic generalized stochastic Petri nets model for the performance analysis of FMS considering the resources failures. CoDIT 2018: 737-742 - [c29]Imen Chaouachi Allani, Belhassen Zouari, Chirine Ghedira:
Colored Petri net Model for Secure Document Management in Business Process Systems. CoDIT 2018: 829-834 - [c28]Hiba Ouni, Kais Klai, Chiheb Ameur Abid, Belhassen Zouari:
Reducing Time and/or Memory Consumption of the SOG Construction in a Parallel Context. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 147-154 - [c27]Fatima Ezzahra Ouerfelli, Khaled Barbaria, Elias Bou-Harb, Claude Fachkha, Belhassen Zouari:
On the Collaborative Inference of DDoS: An Information-theoretic Distributed Approach. IWCMC 2018: 518-523 - 2017
- [c26]Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari:
On the Collaborative Inference of DDoS: A Multi-scale Distributed Approach. AICCSA 2017: 376-383 - [c25]Rihab Khemiri, Khaoula Elbedoui-Maktouf, Bernard Grabot, Belhassen Zouari:
Integrating fuzzy TOPSIS and goal programming for multiple objective integrated procurement-production planning. ETFA 2017: 1-8 - [c24]Hiba Ouni, Kais Klai, Chiheb Ameur Abid, Belhassen Zouari:
Parallel Symbolic Observation Graph. ISPA/IUCC 2017: 770-777 - [c23]Hiba Ouni, Kais Klai, Chiheb Ameur Abid, Belhassen Zouari:
A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems. SCSS 2017: 107-119 - 2015
- [c22]Wafa Helali, Khaled Barbaria, Belhassen Zouari:
A Simple Erlang API for Handling DDS Data Types and Quality of Service Parameters. ENASE 2015: 19-26 - [c21]Sajeh Zairi, Anis Mezni, Belhassen Zouari:
Formal Approach for Modeling, Verification and Performance Analysis of Wireless Sensors Network. WWIC 2015: 381-395 - 2014
- [c20]Hela Kadri, Belhassen Zouari:
A high-level Petri nets approach for multi-objective optimization in pipeline networks. SIMULTECH 2014: 211-218 - [c19]Hela Kadri, Belhassen Zouari:
Shortest Path Search in Dynamic Reliability Space: Hierarchical Coloured Petri Nets Model and Application to a Pipeline Network. UKSim 2014: 254-259 - [c18]Chiheb Ameur Abid, Soukaina Ben Mohamed, Belhassen Zouari:
An Active Controller Based on Parikh Vectors. WODES 2014: 93-98 - 2013
- [c17]Sajeh Zairi, Zeineb Madhbi, Belhassen Zouari:
Generic Colored Petri Nets Model for the Makespan Optimization in Fexible Manufacturing Systems. MIM 2013: 1453-1458 - 2012
- [c16]Mohamed Karim Aroua, Belhassen Zouari:
Supervisory Control for Business Process Management Systems. Business Process Management Workshops 2012: 113-125 - [c15]Mohamed Karim Aroua, Belhassen Zouari:
A Distributed and Coordinated Massive DDOS Attack Detection and Response Approach. COMPSAC Workshops 2012: 230-235 - [c14]Mohamed Karim Aroua, Belhassen Zouari:
Modeling of A-Posteriori Access Control in Business Processes. COMPSAC Workshops 2012: 403-408 - 2010
- [c13]Chiheb Ameur Abid, Belhassen Zouari:
Decentralised Active Controller. ICINCO (2) 2010: 252-259 - [c12]Mansour Rached, Zied Bahroun, Belhassen Zouari, Armand Baboli, Jean-Pierre Campagne:
The Value of Information Sharing in a Serial Supply Chain with Centralised and Decentralised Decision. ICINCO (1) 2010: 269-272 - 2009
- [c11]Nadia Soudani, Bel G. Raggad, Belhassen Zouari:
A formal design of secure information systems by using a Formal Secure Data Flow Diagram (FSDFD). CRiSIS 2009: 131-134 - [c10]Sajeh Zairi, Éric Niel, Belhassen Zouari, Emil Dumitrescu:
Sensor self-scheduling algorithm based on one-hop neighbouring knowledge and considering the sensors remaining energy. ECC 2009: 4877-4882 - [c9]Sajeh Zairi, Belhassen Zouari, Éric Niel:
Coloured Petri Net Model for the Formal Validation of Sensor Networks. SNA 2009: 148-153 - 2008
- [c8]Khaled Barbaria, Belhassen Zouari:
A Byzantine solution to early detect massive attacks. CRiSIS 2008: 109-116 - 2007
- [c7]Sajeh Zairi, Belhassen Zouari, Laurent Piétrac:
A formal approach for the specification, verification and control of flexible manufacturing systems. ETFA 2007: 1031-1038 - [c6]Chiheb Ameur Abid, Belhassen Zouari:
A distributed verification approach for modular Petri nets. SCSC 2007: 681-690 - 2003
- [c5]Belhassen Zouari:
High-level Petri net approach for supervisory control. SMC 2003: 1161-1166 - [c4]Belhassen Zouari, Kamel Barkaoui:
Parameterized supervisor synthesis for a modular class of discrete event systems. SMC 2003: 1874-1879 - 1995
- [c3]Serge Haddad, Jean-Michel Ilié, Mohamed Taghelit, Belhassen Zouari:
Symbolic Reachability Graph and Partial Symmetries. Application and Theory of Petri Nets 1995: 238-257 - 1993
- [c2]Belhassen Zouari, Serge Haddad, Mohamed Taghelit:
A Protocol Specification Language with a High-Level Petri Net Semantics. Decentralized and Distributed Systems 1993: 225-241 - [c1]Serge Haddad, Mohamed Taghelit, Belhassen Zouari:
Assessment of ESTELLE and EDT Through Real Case Studies. PSTV 1993: 223-238
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint