Karima Boudaoud
According to our database1,
Karima Boudaoud
authored at least 37 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
1
1
1
1
1
1
2
7
5
2
5
2
1
1
3
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
2021
2020
What Do You Think About Your Company's Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms.
Frontiers Big Data, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2017
Multim. Tools Appl., 2017
2016
LOV4IoT: A Second Life for Ontology-Based Domain Knowledge to Build Semantic Web of Things Applications.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016
2015
Proceedings of the 24th Wireless and Optical Communication Conference, 2015
Generation of Transmission Control Rules Compliant with Existing Access Control Policies.
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Cross-Domain Internet of Things Application Development: M3 Framework and Evaluation.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web of Things Applications.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015
2014
Enrich machine-to-machine data with semantic web technologies for cross-domain applications.
Proceedings of the IEEE World Forum on Internet of Things, 2014
Proceedings of the Joint Proceedings of the 6th International Workshop on the Foundations, 2014
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
Designing Security Properties-Centric Communication Protocols using a Component-Based Approach.
Int. J. Distributed Syst. Technol., 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
A security-property-based approach for lowering power consumption of secure mobile Web access.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
A low-energy consuming and user-centric security management architecture adapted to mobile environments.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
A Low-energy Consuming and Component-based Security Management Architecture for Mobile Devices.
Proceedings of the 2010 International Conference on Security & Management, 2010
2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
2003
A Flexible Approach to Semi-Automatic Accessibility Evaluation.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
2002
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Policy-driven model for security management.
Proceedings of the Network Control and Engineering for QoS, 2002
An Information Model for Network Security Management.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002
2000
Proceedings of the Telecommunication Network Intelligence, 2000
Proceedings of the Networked Planet: Management Beyond 2000, 2000
1999
Proceedings of the 1st Latin American Network Operations and Management Symposium, 1999