Tayeb Kenaza
Tayeb Kenaza
Ecole militaire polytechnique
Dirección de correo verificada de - Página principal
Citado por
Citado por
A naive bayes approach for detecting coordinated attacks
S Benferhat, T Kenaza, A Mokhtari
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
Security in device‐to‐device communications: a survey
O Nait Hamoud, T Kenaza, Y Challal
IET Networks 7 (1), 14-22, 2018
Toward an Efficient Ontology-Based Event Correlation in SIEM
MA Tayeb Kenaza
The 7th International Conference on Ambient Systems, Networks and …, 2016
An efficient hybrid svdd/clustering approach for anomaly-based intrusion detection
T Kenaza, K Bennaceur, A Labed
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 435-443, 2018
Fetchiot: Efficient resource fetching for the internet of things
B Djamaa, MA Kouda, A Yachir, T Kenaza
2018 Federated Conference on Computer Science and Information Systems …, 2018
Adaptive SVDD-based learning for false alarm reduction in intrusion detection
T Kenaza, A Labed, Y Boulahia, M Sebehi
2015 12th International Joint Conference on e-Business and …, 2015
On the use of naive bayesian classifiers for detecting elementary and coordinated attacks
T Kenaza, K Tabia, S Benferhat
Fundamenta Informaticae 105 (4), 435-466, 2010
False alert filtering and detection of high severe alerts using Naive Bayes
S Benferhat, T Kenaza, A Mokhtari
Computer Security Conference (CSC’08), 2008
Conflicts handling in cooperative intrusion detection: A description logic approach
S Yahi, S Benferhat, T Kenaza
2010 22nd IEEE International Conference on Tools with Artificial …, 2010
Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence
Y Merah, T Kenaza
The 16th International Conference on Availability, Reliability and Security, 1-8, 2021
Tree-augmented naive bayes for alert correlation
S Benferhat, T Kenaza, A Mokhtari
3rd conference on Advances in Computer Security and Forensics (ACSF'08), 45-62, 2008
IDS adaptation for an efficient detection in high-speed networks
A Zaidi, T Kenaza, N Agoulmine
2010 Fifth International Conference on Internet Monitoring and Protection, 11-15, 2010
A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications.
ON Hamoud, T Kenaza, Y Challal
ICETE (2), 84-95, 2019
Towards using multiple KGC for CL-PKC to secure D2D communications
ON Hamoud, T Kenaza, Y Challal
2018 International Conference on Smart Communications in Network …, 2018
Efficient centralized approach to prevent from replication attack in wireless sensor networks
T Kenaza, ON Hamoud, N Nouali‐Taboudjemat
Security and Communication Networks 8 (2), 220-231, 2015
Scheduling real-time of the synchronous hybrid tasks under energy constraint
A Abbas, H Hentous, T Kenaza
2009 Third International Conference on Sensor Technologies and Applications …, 2009
An ontology-based modelling and reasoning for alerts correlation
T Kenaza
International Journal of Data Mining, Modelling and Management 13 (1-2), 65-80, 2021
Dynamic clustering for iot key management in hostile application area
S Souaidi, T Kenaza, B Djamaa, M Aldwairi
International Conference on Computer Science and its Applications, 48-56, 2018
Piecewise classification of attack patterns for efficient network intrusion detection
A Zaidi, N Agoulmine, T Kenaza
2010 International Conference on Security and Cryptography (SECRYPT), 1-5, 2010
Réseaux Bayésiens naïfs pour la détection des attaques coordonnées
S Benferhat, T Kenaza, A Mokhtari
Journées Francophone sur les Réseaux Bayésiens, 2008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20