Noria Foukia

According to our database1, Noria Foukia authored at least 15 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
CleverTrash: an IoT system for waste sorting with deep learning.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

2017
Privacy Verification Chains for IoT.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
PISCES: A framework for privacy by design in IoT.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2011
Security in Artificial Systems.
Proceedings of the Self-organising Software - From Natural to Artificial Adaptation, 2011

2009
DDoS Defense Mechanisms: A New Taxonomy.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

2008
An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Using trust for key distribution and route selection in Wireless Sensor Networks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

2007
Social Collaboration, Stochastic Strategies and Information Referrals.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

2006
Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail.
Proceedings of the Trust Management, 4th International Conference, 2006

2005
Adaptive trust negotiation and access control for grids.
Proceedings of the 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), 2005

IDReAM: intrusion detection and response executed with agent mobility architecture and implementation.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

2004
IDReAM: Intrusion Detection and Response Executed with Agent Mobility.
Proceedings of the Engineering Self-Organising Systems, 2004

2003
Combining Immune Systems and Social Insect Metaphors: A Paradigm for Distributed Intrusion Detection and Response System.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

Self-Organisation: Paradigms and Applications.
Proceedings of the Engineering Self-Organising Systems, 2003

Managing Computer Networks Security through Self-Organization: A Complex System Perspective.
Proceedings of the Engineering Self-Organising Systems, 2003


  Loading...