Belhassen Zouari

Orcid: 0000-0002-9842-0032

According to our database1, Belhassen Zouari authored at least 58 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Architectural Security and Trust Foundation for RISC-V.
Proceedings of the 27th IEEE International Symposium on Real-Time Distributed Computing, 2024

2023
Deep Interactive Volume Exploration Through Pre-Trained 3D CNN and Active Learning.
Proceedings of the 18th International Joint Conference on Computer Vision, 2023

A Reduced Distributed Sate Space for Modular Petri Nets.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
A real-time image-centric transfer function design based on incremental classification.
J. Real Time Image Process., 2022

Securing the operation of Smart Home Systems: a literature review.
J. Reliab. Intell. Environ., 2022

Anomalous behavior detection-based approach for authenticating smart home system users.
Int. J. Inf. Sec., 2022

Detection of Breast Masses in Mammograms by Incremental Discriminant Based Support Vector Machine Classifier and Active User Involvement.
Proceedings of the Advances in Computational Collective Intelligence, 2022

2021
Open Portable Trusted Execution Environment framework for RISC-V.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

Towards a firmware TPM on RISC-V.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
A simulated annealing for a daily operating room scheduling problem under constraints of uncertainty and setup.
INFOR Inf. Syst. Oper. Res., 2020

Behavior-based Anomaly Detection for Securing Smart Home Systems Automation.
Proceedings of the 28th International Conference on Software, 2020

An ML Behavior-Based Security Control for Smart Home Systems.
Proceedings of the Risks and Security of Internet and Systems, 2020

Securing Smart Homes using a Behavior Analysis based Authentication Approach.
Proceedings of the Eighth IEEE International Conference on Communications and Networking, 2020

Prevention of DDoS Attacks in IoT Networks.
Proceedings of the Advanced Information Networking and Applications, 2020

Document Business Process Model Extension for Modeling Secure Ubiquitous Documents.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Parallel construction of the Symbolic Observation Graph.
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019

Distributed Detection System Using Wavelet Decomposition and Chi-Square Test.
Proceedings of the Risks and Security of Internet and Systems, 2019

Multi-scale Adaptive Threshold for DDoS Detection.
Proceedings of the Risks and Security of Internet and Systems, 2019

Implicit and Continuous Authentication of Smart Home Users.
Proceedings of the Advanced Information Networking and Applications, 2019

Towards Parallel Verification of Concurrent Systems using the Symbolic Observation Graph.
Proceedings of the 19th International Conference on Application of Concurrency to System Design, 2019

2018
On the Collaborative Inference of DDoS: An Information-theoretic Distributed Approach.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Reducing Time and/or Memory Consumption of the SOG Construction in a Parallel Context.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

A generic generalized stochastic Petri nets model for the performance analysis of FMS considering the resources failures.
Proceedings of the 5th International Conference on Control, 2018

Colored Petri net Model for Secure Document Management in Business Process Systems.
Proceedings of the 5th International Conference on Control, 2018

A New Formal Proxy-Based Approach for Secure Distributed Business Process on the Cloud.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

A Semantic Model for Document Management in Business Processes.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
A fuzzy multi-criteria decision-making approach for managing performance and risk in integrated procurement-production planning.
Int. J. Prod. Res., 2017

A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems.
Proceedings of the SCSS 2017, 2017

Parallel Symbolic Observation Graph.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Integrating fuzzy TOPSIS and goal programming for multiple objective integrated procurement-production planning.
Proceedings of the 22nd IEEE International Conference on Emerging Technologies and Factory Automation, 2017

On the Collaborative Inference of DDoS: A Multi-scale Distributed Approach.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2015
Formal Approach for Modeling, Verification and Performance Analysis of Wireless Sensors Network.
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015

A Simple Erlang API for Handling DDS Data Types and Quality of Service Parameters.
Proceedings of the ENASE 2015, 2015

2014
An Active Controller Based on Parikh Vectors.
Proceedings of the 12th International Workshop on Discrete Event Systems, 2014

Shortest Path Search in Dynamic Reliability Space: Hierarchical Coloured Petri Nets Model and Application to a Pipeline Network.
Proceedings of the UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 2014

A high-level Petri nets approach for multi-objective optimization in pipeline networks.
Proceedings of the 4th International Conference On Simulation And Modeling Methodologies, 2014

2013
Local Verification Using a Distributed State Space.
Fundam. Informaticae, 2013

Generic Colored Petri Nets Model for the Makespan Optimization in Fexible Manufacturing Systems.
Proceedings of the 7th IFAC Conference on Manufacturing Modelling, Management, and Control, 2013

2012
Nodes self-scheduling approach for maximising wireless sensor network lifetime based on remaining energy.
IET Wirel. Sens. Syst., 2012

Modeling of A-Posteriori Access Control in Business Processes.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

A Distributed and Coordinated Massive DDOS Attack Detection and Response Approach.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Supervisory Control for Business Process Management Systems.
Proceedings of the Business Process Management Workshops, 2012

2010
Synthesis of controllers for symmetric systems.
Int. J. Control, 2010

The Value of Information Sharing in a Serial Supply Chain with Centralised and Decentralised Decision.
Proceedings of the ICINCO 2010, 2010

Decentralised Active Controller.
Proceedings of the ICINCO 2010, 2010

2009
Coloured Petri Net Model for the Formal Validation of Sensor Networks.
Proceedings of the ISCA First International Conference on Sensor Networks and Applications (SNA-2009), 2009

Sensor self-scheduling algorithm based on one-hop neighbouring knowledge and considering the sensors remaining energy.
Proceedings of the 10th European Control Conference, 2009

A formal design of secure information systems by using a Formal Secure Data Flow Diagram (FSDFD).
Proceedings of the CRiSIS 2009, 2009

2008
A Byzantine solution to early detect massive attacks.
Proceedings of the CRiSIS '08, 2008

2007
A distributed verification approach for modular Petri nets.
Proceedings of the 2007 Summer Computer Simulation Conference, 2007

A formal approach for the specification, verification and control of flexible manufacturing systems.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007

2006
A Structure Causality Relation for Liveness Characterisation in Petri Nets.
J. Univers. Comput. Sci., 2006

2003
Parameterized supervisor synthesis for a modular class of discrete event systems.
Proceedings of the IEEE International Conference on Systems, 2003

High-level Petri net approach for supervisory control.
Proceedings of the IEEE International Conference on Systems, 2003

1995
Symbolic Reachability Graph and Partial Symmetries.
Proceedings of the Application and Theory of Petri Nets 1995, 1995

1993
Assessment of ESTELLE and EDT Through Real Case Studies.
Proceedings of the Protocol Specification, 1993

A Protocol Specification Language with a High-Level Petri Net Semantics.
Proceedings of the Decentralized and Distributed Systems, 1993


  Loading...