Lamia Hamza

Orcid: 0000-0002-5436-3099

According to our database1, Lamia Hamza authored at least 10 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Partially Observable Stochastic Game for Analysing Complex Attacks in IoT Networks.
J. Cyber Secur. Mobil., 2024

2023
Robust multimedia spam filtering based on visual, textual, and audio deep features and random forest.
Multim. Tools Appl., November, 2023

Adaptation to the Context in M-Learning Application Using Mobile Design Patterns.
Int. J. Interact. Mob. Technol., March, 2023

2022
Game theory approach for analysing attack graphs.
Int. J. Inf. Comput. Secur., 2022

2020
Intruder model for generating attack scenarios in computer systems.
Int. J. Inf. Comput. Secur., 2020

2018
The Optimization by Using the Learning Styles in the Adaptive Hypermedia Applications.
Int. J. Web Based Learn. Teach. Technol., 2018

Automatic security policy enforcement in computer systems.
Comput. Secur., 2018

2017
Compliance Verification Algorithm for Computer Systems Security Policies.
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017

2007
Formal Technique for Discovering Complex Attacks in Computer Systems.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2007

2006
Automatic generation of attack scenarios for intrusion detection systems.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006


  Loading...