Faouzi Jaïdi
Orcid: 0000-0001-5893-5296
According to our database1,
Faouzi Jaïdi
authored at least 32 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT).
Int. J. Inf. Sec., February, 2025
2024
Securing IoMT Applications: A n Approach for Enhancing the Reliability of Security Policies within Cloud Databases.
J. Inf. Sci. Eng., November, 2024
2023
A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach.
Mob. Networks Appl., February, 2023
Towards a Reliable and Smart Approach for Detecting and Resolving Security Violations within SDWN.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Proceedings of the International Wireless Communications and Mobile Computing, 2023
A Comprehensive Study of Intrusion Detection within Internet of Things-based Smart Cities: Synthesis, Analysis and a Novel Approach.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
2022
Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
2021
Cyber-Risk Management within IoMT: a Context-aware Agent-based Framework for a Reliable e-Health System.
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021
Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database Application.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021
A Systematic Approach for IoT Cyber-Attacks Detection in Smart Cities Using Machine Learning Techniques.
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Advanced analysis of the integrity of access control policies: the specific case of databases.
Int. Arab J. Inf. Technol., 2020
Enforcing Risk-Awareness in Access Control Systems: Synthesis, Discussion and Guidelines.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
A Comprehensive Solution for the Analysis, Validation and Optimization of SDN Data-Plane Configurations.
Proceedings of the 16th International Conference on Network and Service Management, 2020
2019
FW-TR: Towards a Novel Generation of Firewalls Based on Trust-Risk Assessment of Filtering Rules and Policies.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
2018
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures.
Secur. Commun. Networks, 2018
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018
2017
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment.
Proceedings of the SCSS 2017, 2017
Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems.
Proceedings of the SCSS 2017, 2017
Proceedings of the Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017
2016
Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.
J. Medical Syst., 2016
2015
Proceedings of the SECRYPT 2015, 2015
The problem of integrity in RBAC-based policies within relational databases: synthesis and problem study.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
A Formal Approach Based on Verification and Validation Techniques for Enhancing the Integrity of Concrete Role Based Access Control Policies.
Proceedings of the International Joint Conference, 2015
2014
An Approach to Formally Validate and Verify the Compliance of Low Level Access Control Policies.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2012
J. Theor. Appl. Electron. Commer. Res., 2012