Folgen
Louafi, Habib
Louafi, Habib
TELUQ University
Bestätigte E-Mail-Adresse bei teluq.ca - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Dynamic Optimal Countermeasure Selection for Intrusion Response System
A Shameli-Sendi, H Louafi, W He, M Cheriet
Dependable and Secure Computing, IEEE Transactions on, 2016
962016
Preserving both privacy and utility in network trace anonymization
M Mohammady, L Wang, Y Hong, H Louafi, M Pourzandi, M Debbabi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
482018
Quality prediction-based dynamic content adaptation framework applied to collaborative mobile presentations
H Louafi, S Coulombe, U Chandra
Mobile Computing, IEEE Transactions on 12 (10), 2024-2036, 2013
122013
Efficient IoT Device Fingerprinting Approach using Machine Learning
R Osei, H Louafi, M Mouhoub, Z Zhu
Proceedings of the 19th International Conference on Security and …, 2022
92022
Multi-Objective Optimization in Dynamic Content Adaptation of Slide Documents
H Louafi, S Coulombe, M Cheriet
Services Computing, IEEE Transactions on, 2015
92015
Efficient near-optimal dynamic content adaptation applied to JPEG slides presentations in mobile web conferencing
H Louafi, S Coulombe, U Chandra
2013 IEEE 27th International Conference on Advanced Information Networking …, 2013
82013
A multi-view approach to preserve privacy and utility in network trace anonymization
M Mohammady, M Oqaily, L Wang, Y Hong, H Louafi, M Pourzandi, ...
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-36, 2021
72021
Robust QoE-aware prediction-based dynamic content adaptation framework applied to slides documents in mobile Web conferencing
H Louafi, S Coulombe, U Chandra
Multimedia Tools and Applications 74 (18), 7883-7920, 2014
62014
Two-stage clustering for improve indoor positioning accuracy
H Lin, H Purmehdi, X Fei, Y Zhao, A Isac, H Louafi, W Peng
Automation in Construction, Elsevier 154, 1-10, 2023
52023
A Defense-Centric Model for Multi-step Attack Damage Cost Evaluation
A Shameli-Sendi, H Louafi, W He, M Cheriet
Future Internet of Things and Cloud (FiCloud), 2015 3rd International …, 2015
42015
Optimizing IoT device fingerprinting using machine learning
O Falola, H Louafi, M Mouhoub
Innovations in Digital Forensics, 293-317, 2023
32023
A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied to Network Traces
S Dandyan, H Louafi, S Sadaoui
2022 19th Annual International Conference on Privacy, Security & Trust (PST …, 2022
32022
An IoT Security Risk Assessment Framework for Healthcare Environment
M Waqdan, H louafi, M Mouhoub
2023 International Symposium on Networks, Computers and Communications …, 2023
22023
An Instance-based Transfer Learning Approach, Applied to Intrusion Detection
S Kawish, H Louafi, Y Yao
2023 20th Annual International Conference on Privacy, Security & Trust (PST …, 2023
22023
Payless monitoring service for tenants in cloud with traffic and energy-aware function deployment
A Shameli-Sendi, H Louafi, M Cheriet
2017 IEEE International Conference on Cloud Computing Technology and Science …, 2017
22017
IoT Device Identification based on Network Traffic Analysis and Machine Learning
SM Opoku, H Louafi, M Mouhoub
2024 International Symposium on Networks, Computers and Communications …, 2024
12024
An Uncertain Reasoning-Based Intrusion Detection System for DoS/DDoS Detection
H Singh, H Louafi, Y Yao
Proceedings of the 21th International Conference on Security and …, 2024
12024
A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare Environment
M Waqdan, H Louafi, M Mouhoub
Proceedings of the 20th International Conference on Security and …, 2023
12023
A TOPSIS-based QoE model for adapted content selection of slide documents
H Louafi, S Coulombe, M Cheriet
Multimedia Tools and Applications 77 (20), 26741-26768, 2018
12018
A Customizable Security Risk Assessment Framework Using Multi-Attribute Decision Making for IoT Systems
M Waqdan, H Louafi, M Mouhoub
Proceedings of the the 11th International Conference on Information Systems …, 2025
2025
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20