Lotfi Ben Othmane
Orcid: 0000-0003-0883-7844Affiliations:
- University of North Texas, TX, USA
- Iowa State University, Ames, IA, USA (former)
- Fraunhofer SIT, Darmstadt, Germany (2014 - 2016)
- Western Michigan University, Kalamazoo, MI, USA
According to our database1,
Lotfi Ben Othmane
authored at least 49 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System.
Proceedings of the Risks and Security of Internet and Systems, 2023
Towards a Domain-Agnostic Knowledge Graph-as-a-Service Infrastructure for Active Cyber Defense with Intelligent Agents.
Proceedings of the 52nd IEEE Applied Imagery Pattern Recognition Workshop, 2023
2022
Dataset, May, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Making Secure Software Insecure without Changing Its Code: The Possibilities and Impacts of Attacks on the DevOps Pipeline.
CoRR, 2022
Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles.
CoRR, 2022
Proceedings of the IEEE Secure Development Conference, 2022
Evaluation of the Architecture Alternatives for Real-Time Intrusion Detection Systems for Vehicles.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment.
Proceedings of the ICSSP/ICGSE 2022: 16th International Conference on Software and System Processes and 17th International Conference on Global Software Engineering, Virtual Event / Pittsburgh, PA, USA, May 19, 2022
2021
Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs.
IEEE Trans. Inf. Forensics Secur., 2021
Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs.
CoRR, 2021
CoRR, 2021
Proceedings of the Risks and Security of Internet and Systems, 2021
Proceedings of the Risks and Security of Internet and Systems, 2021
2020
Comput. Secur., 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
2019
IEEE Trans. Serv. Comput., 2019
Comput. Secur., 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
2018
BP: Security Concerns and Best Practices for Automation of Software Deployment Processes: An Industrial Case Study.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
Impacts of Security Attacks on The Effectiveness of Collaborative Adaptive Cruise Control Mechanism.
Proceedings of the IEEE International Smart Cities Conference, 2018
Proceedings of the IEEE International Smart Cities Conference, 2018
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018
2017
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
Data Sci. Eng., 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Int. J. Secur. Softw. Eng., 2016
Int. J. Secur. Softw. Eng., 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Consumer Oriented Privacy Preserving Access Control for Electronic Health Records in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
Towards Effective Security Assurance for Incremental Software Development the Case of Zen Cart Application.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Comput. Secur., 2015
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015
Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study.
Proceedings of the Information Security - 18th International Conference, 2015
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks.
J. Netw. Comput. Appl., 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
A time-evolution model for the privacy degree of information disseminated in online social networks.
Int. J. Commun. Networks Distributed Syst., 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013
2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010