default search action
Ouissem Ben Fredj
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j8]Alaeddine Mihoub, Ouissem Ben Fredj, Omar Cheikhrouhou, Abdelouahid Derhab, Moez Krichen:
Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Comput. Electr. Eng. 98: 107716 (2022) - [c10]Omar Cheikhrouhou, Ouissem Ben Fredj, Nesrine Atitallah, Salem Hellal:
Intrusion Detection in Industrial IoT. SIN 2022: 1-4 - [c9]Ouissem Ben Fredj:
A NLP-inspired method to predict multi-step cyberattacks. SIN 2022: 1-6 - 2021
- [j7]Darpan Anand, Vineeta Khemchandani, Munish Sabharwal, Omar Cheikhrouhou, Ouissem Ben Fredj:
Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems. Secur. Commun. Networks 2021: 9940183:1-9940183:15 (2021) - 2020
- [c8]Ouissem Ben Fredj, Omar Cheikhrouhou, Moez Krichen, Habib Hamam, Abdelouahid Derhab:
An OWASP Top Ten Driven Survey on Web Application Protection Methods. CRiSIS 2020: 235-252 - [c7]Ouissem Ben Fredj, Alaeddine Mihoub, Moez Krichen, Omar Cheikhrouhou, Abdelouahid Derhab:
CyberSecurity Attack Prediction: A Deep Learning Approach. SIN 2020: 5:1-5:6
2010 – 2019
- 2019
- [j6]Ouissem Ben Fredj:
SPHERES: an efficient server-side web application protection system. Int. J. Inf. Comput. Secur. 11(1): 33-60 (2019) - 2016
- [j5]Ouissem Ben Fredj:
An Automatic Alert Unification Method for Heterogeneous Alert Signatures. Int. J. Netw. Secur. 18(6): 1180-1191 (2016) - 2015
- [j4]Ouissem Ben Fredj:
A realistic graph-based alert correlation system. Secur. Commun. Networks 8(15): 2477-2493 (2015) - 2013
- [i1]Amor Lazzez, Ouissem Ben Fredj, Thabet Slimani:
IAX-Based Peer-to-Peer VoIP Architecture. CoRR abs/1310.5805 (2013) - 2011
- [j3]Hassen Sallay, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, Majdi Ben Saad:
Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework. Int. J. Inf. Secur. Priv. 5(4): 47-58 (2011) - [j2]Ouissem Ben Fredj, Hassen Sallay, Mohsen Rouached, Adel Ammar, Khalid Al-Shalfan, Majdi Ben Saad:
Survey on Architectures and Communication Libraries dedicated for High Speed Networks. J. Ubiquitous Syst. Pervasive Networks 3(2): 79-86 (2011)
2000 – 2009
- 2007
- [j1]Ouissem Ben Fredj, Éric Renault:
RWAPI over InfiniBand: Design and Performance. Scalable Comput. Pract. Exp. 8(3) (2007) - [c6]Ouissem Ben Fredj, Éric Renault:
Performance Evaluation of Distributed Computing over Heterogeneous Networks. HPCC 2007: 53-61 - [c5]Ouissem Ben Fredj, Éric Renault:
Chajara: An XML-Based Topology Description for Cluster-of-Clusters. WETICE 2007: 247-248 - 2006
- [c4]Ouissem Ben Fredj, Éric Renault:
Remote-Write performance over the Myrinet-2000 Network. PDCS 2006: 152-158 - [c3]Ouissem Ben Fredj, Éric Renault:
Performance analysis of RWAPI on top of the MYRINET-2000 interconnect. Communications and Computer Networks 2006: 40-45 - [c2]Ouissem Ben Fredj, Éric Renault:
The Critical's Path of Communication Model Analysis for a Performant Implementations of High-speed Interfaces over the Myrinet Interconnect. Communications in Computing 2006: 192-198 - [c1]Ouissem Ben Fredj, Eric Renault:
RWAPI over InfiniBand: Design and Performance. ISPDC 2006: 50-57
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint