Karima Boudaoud

According to our database1, Karima Boudaoud authored at least 37 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
1
1
1
1
1
1
2
7
5
2
5
2
1
1
3
2
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
European Network For Gender Balance in Informatics (EUGAIN): Activities and Results.
CoRR, 2024

2021
Usability of End-to-End Encryption in E-Mail Communication.
Frontiers Big Data, 2021

2020
What Do You Think About Your Company's Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms.
Frontiers Big Data, 2020

Secure Email - A Usability Study.
Proceedings of the Financial Cryptography and Data Security, 2020

2017
Privacy aware group based recommender system in multimedia services.
Multim. Tools Appl., 2017

2016
LOV4IoT: A Second Life for Ontology-Based Domain Knowledge to Build Semantic Web of Things Applications.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

Reusing and Unifying Background Knowledge for Internet of Things with LOV4IoT.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

2015
Applying Internet of Things for personalized healthcare in smart homes.
Proceedings of the 24th Wireless and Optical Communication Conference, 2015

Generation of Transmission Control Rules Compliant with Existing Access Control Policies.
Proceedings of the Security and Privacy in Communication Networks, 2015

A Semantic Engine for Internet of Things: Cloud, Mobile Devices and Gateways.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Cross-Domain Internet of Things Application Development: M3 Framework and Evaluation.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

oneM2M Architecture Based User Centric IoT Application Development.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Assisting IoT Projects and Developers in Designing Interoperable Semantic Web of Things Applications.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

Integrating machine-to-machine measurement framework into oneM2M architecture.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2014
Enrich machine-to-machine data with semantic web technologies for cross-domain applications.
Proceedings of the IEEE World Forum on Internet of Things, 2014

Demo Paper: Helping IoT Application Developers with Sensor-based Linked Open Rules.
Proceedings of the Joint Proceedings of the 6th International Workshop on the Foundations, 2014

An alternative version of HTTPS to provide non-repudiation security property.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

Standardizing generic cross-domain applications in Internet of Things.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

2013
The STAC (security toolbox: attacks & countermeasures) ontology.
Proceedings of the 22nd International World Wide Web Conference, 2013

Securing Mobile Mashups with SCCM.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Designing Security Properties-Centric Communication Protocols using a Component-Based Approach.
Int. J. Distributed Syst. Technol., 2012

2011
A middleware for securing mobile mashups.
Proceedings of the 20th International Conference on World Wide Web, 2011

A security-property-based approach for lowering power consumption of secure mobile Web access.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Cloud computing, security and data concealment.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

A low-energy consuming and user-centric security management architecture adapted to mobile environments.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

A Component-Based Approach to Security Protocol Design.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Designing Security Protocols Adapted to the Constraints of Mobile Environments.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A Low-energy Consuming and Component-based Security Management Architecture for Mobile Devices.
Proceedings of the 2010 International Conference on Security & Management, 2010

2008
Towards an efficient implementation of traceback mechanisms in autonomous systems.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

2003
A Flexible Approach to Semi-Automatic Accessibility Evaluation.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

2002
An intelligent agent-based model for security management.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Policy-driven model for security management.
Proceedings of the Network Control and Engineering for QoS, 2002

An Information Model for Network Security Management.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

2000
A Multi-agents System for Network Security Management.
Proceedings of the Telecommunication Network Intelligence, 2000

Network security management with intelligent agents.
Proceedings of the Networked Planet: Management Beyond 2000, 2000

1999
Distributed Network Security Management Using Intelligent Agents.
Proceedings of the 1st Latin American Network Operations and Management Symposium, 1999


  Loading...