Tayeb Kenaza

Orcid: 0000-0002-4240-2978

According to our database1, Tayeb Kenaza authored at least 24 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems.
Comput. Secur., June, 2023

Implementing a secure remote patient monitoring system.
Inf. Secur. J. A Glob. Perspect., January, 2023

TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems.
Future Gener. Comput. Syst., 2023

Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems.
CoRR, 2023

2021
An ontology-based modelling and reasoning for alerts correlation.
Int. J. Data Min. Model. Manag., 2021

Certificateless Public Key Systems Aggregation: An enabling technique for 5G multi-domain security management and delegation.
Comput. Networks, 2021

Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2019
A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Security in device-to-device communications: a survey.
IET Networks, 2018

Implementation of a Medical Coding Support System by Combining Approaches: NLP and Machine Learning.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2018

An efficient hybrid SVDD/clustering approach for anomaly-based intrusion detection.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

FetchIoT: Efficient Resource Fetching for the Internet of Things.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

Implementing a Semantic Approach for Events Correlation in SIEM Systems.
Proceedings of the Computational Intelligence and Its Applications, 2018

2017
Combining Web-Service and Rule-Based Systems to Implement a Reliable DRG-Solution.
Proceedings of the Database and Expert Systems Applications, 2017

2016
Enhancing the SVDD Accuracy in Intrusion Detection Systems by Removing External Voids.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Toward an Efficient Ontology-Based Event Correlation in SIEM.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Efficient centralized approach to prevent from replication attack in wireless sensor networks.
Secur. Commun. Networks, 2015

Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection.
Proceedings of the SECRYPT 2015, 2015

2010
On the Use of Naive Bayesian Classifiers for Detecting Elementary and Coordinated Attacks.
Fundam. Informaticae, 2010

Piecewise Classification of Attack Patterns for Efficient Network Intrusion Detection.
Proceedings of the SECRYPT 2010, 2010

Conflicts Handling in Cooperative Intrusion Detection: A Description Logic Approach.
Proceedings of the 22nd IEEE International Conference on Tools with Artificial Intelligence, 2010

2008
A Naive Bayes Approach for Detecting Coordinated Attacks.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008


  Loading...