Maroun Chamoun
According to our database1,
Maroun Chamoun
authored at least 36 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025
2024
An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure.
J. Cybersecur. Priv., June, 2024
Blockchain-based multi-organizational cyber risk management framework for collaborative environments.
Int. J. Inf. Sec., April, 2024
2023
Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services.
Clust. Comput., February, 2023
2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Proceedings of the 20th Mediterranean Communication and Computer Networking Conference, 2022
2021
The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes.
J. Comput. Virol. Hacking Tech., 2021
A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks.
Comput. Networks, 2021
2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
Proceedings of the 4th Cyber Security in Networking Conference, 2020
2019
Proceedings of the 2019 International Conference on Wireless Networks and Mobile Communications, 2019
Arabic Cyberbullying Detection: Enhancing Performance by Using Ensemble Machine Learning.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 2nd International Conference on Big Data and Cyber-Security Intelligence, 2019
2018
Ann. des Télécommunications, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018
Proceedings of the 2nd Cyber Security in Networking Conference, 2018
Proceedings of the 1st International Conference on Big Data and Cyber-Security Intelligence, 2018
2017
Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality?
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content.
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications.
Proceedings of the Risks and Security of Internet and Systems, 2017
Proceedings of the 2nd International Conference on Computer and Communication Systems, 2017
2016
Proceedings of the 2016 European Modelling Symposium, 2016
2015
Proceedings of the International Conference on Protocol Engineering, 2015
2014
A data flow-oriented specification method for analysing network security configurations.
Int. J. Internet Protoc. Technol., 2014
2013
A specification method for analyzing fine grained network security mechanism configurations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
2008
Proceedings of the 16th International Conference on Networks, 2008
2004
Ann. des Télécommunications, 2004