Malek Ben Salem

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Toward fair graph neural networks via real counterfactual samples.
Knowl. Inf. Syst., November, 2024

Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2020
Are Smart Home Devices Abandoning IPV Victims?
Proceedings of the 19th IEEE International Conference on Trust, 2020

Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural Networks.
Proceedings of the Security and Privacy in Communication Networks, 2020

2019
(m, k)-firm constraints and derived data management for the QoS enhancement in distributed real-time DBMS.
Int. Arab J. Inf. Technol., 2019

2018
A Validation Approach for Ontology-Based Real-time DBMS.
Int. J. Comput. Intell. Syst., 2018

A Novel Architecture for Automatic Document Classification for Effective Security in Edge Computing Environments.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018

A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
A feedback control scheduling architecture for real-time ontology.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

2016
Orchestration of software-defined security services.
Proceedings of the IEEE International Conference on Communication, 2016

2015
Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology.
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015

Multi-versions data and epsilon-serializability for QoS enhancement in distributed RTDBMS.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
Applicability of the Imprecise Computation Approach for the QoS Enhancement in Distributed RTDBMS.
Proceedings of the IEEE 13th International Symposium on Parallel and Distributed Computing, 2014

2013
Applicability of the (m, k)-firm Approach for the QoS Enhancement in Distributed RTDBMS.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

Management of the real-time derived data in a Distributed Real-Time DBMS using the semi-total replication data.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

2011
Cloud Computing.
J. Internet Serv. Inf. Secur., 2011


  Loading...