Maroun Chamoun

According to our database1, Maroun Chamoun authored at least 36 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025

2024
An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure.
J. Cybersecur. Priv., June, 2024

Blockchain-based multi-organizational cyber risk management framework for collaborative environments.
Int. J. Inf. Sec., April, 2024

2023
Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services.
Clust. Comput., February, 2023

2022
Cloud based private data analytic using secure computation over encrypted data.
J. King Saud Univ. Comput. Inf. Sci., 2022

LASII: Lightweight Authentication Scheme using IOTA in IoT Platforms.
Proceedings of the 20th Mediterranean Communication and Computer Networking Conference, 2022

2021
The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes.
J. Comput. Virol. Hacking Tech., 2021

A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks.
Comput. Networks, 2021

2020
On distributed ledgers security and illegal uses.
Future Gener. Comput. Syst., 2020

The Blockchain Potential in Computer Virology.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Cloud Assisted Privacy Preserving Using Homomorphic Encryption.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

2019
A Survey of Internet of Things (IoT) Authentication Schemes.
Sensors, 2019

Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs).
Proceedings of the 2019 International Conference on Wireless Networks and Mobile Communications, 2019

Arabic Cyberbullying Detection: Enhancing Performance by Using Ensemble Machine Learning.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

An Efficient FHE Scheme to Secure Cloud Computing.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Calculating the Average using Paillier's Cryptosystem.
Proceedings of the 2nd International Conference on Big Data and Cyber-Security Intelligence, 2019

2018
Developing a K-ary malware using Blockchain.
CoRR, 2018

Comiqual: collaborative measurement of internet quality.
Ann. des Télécommunications, 2018

Developing a Κ-ary malware using blockchain.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

On blockchain security and relevant attacks.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Analysis of Cryptographic Algorithms on IoT Hardware platforms.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

A Survey of DNS Tunnelling Detection Techniques Using Machine Learning.
Proceedings of the 1st International Conference on Big Data and Cyber-Security Intelligence, 2018

2017
Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality?
Proceedings of the 1st Cyber Security in Networking Conference, 2017

On DGHV and BGV fully homomorphic encryption schemes.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Analysis of authentication techniques in Internet of Things (IoT).
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications.
Proceedings of the Risks and Security of Internet and Systems, 2017

Comparative study of recent MEA malware phylogeny.
Proceedings of the 2nd International Conference on Computer and Communication Systems, 2017

2016
Cyberbullying Detection: A Survey on Multilingual Techniques.
Proceedings of the 2016 European Modelling Symposium, 2016

2015
SDN security problems and solutions analysis.
Proceedings of the International Conference on Protocol Engineering, 2015

2014
A data flow-oriented specification method for analysing network security configurations.
Int. J. Internet Protoc. Technol., 2014

2013
A specification method for analyzing fine grained network security mechanism configurations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2011
A Generic Data Flow Security Model.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

2008
A Service Oriented P2P architecture with semantic support.
Proceedings of the 16th International Conference on Networks, 2008

2004
Architecture d'un réseau actif à base de services Web.
Ann. des Télécommunications, 2004


  Loading...