Search Results - "Belhassen, Zouari"
-
1
Securing the operation of Smart Home Systems: a literature review
Published in Journal of reliable intelligent environments (01-03-2022)“…Smart Home Systems (SHSs) represent one of the most prevailing Internet of Things (IoT) applications. While IoT-based SHSs can be user-driven or automatically…”
Get full text
Journal Article -
2
Anomalous behavior detection-based approach for authenticating smart home system users
Published in International journal of information security (01-06-2022)“…This paper presents Duenna, an authentication framework for smart home systems (SHSs). When using controlling apps (e.g., a smartphone app), Duenna makes sure…”
Get full text
Journal Article -
3
A fuzzy multi-criteria decision-making approach for managing performance and risk in integrated procurement-production planning
Published in International journal of production research (17-09-2017)“…Nowadays in Supply Chain (SC) networks, a high level of risk comes from SC partners. An effective risk management process becomes as a consequence mandatory,…”
Get full text
Journal Article -
4
A Semantic Model for Document Management in Business Processes
Published in 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) (01-05-2018)“…Although information and data flows or documents are important assets in business processes organization, the connection between data flow and control flow…”
Get full text
Conference Proceeding -
5
A real-time image-centric transfer function design based on incremental classification
Published in Journal of real-time image processing (01-02-2022)“…A key issue in scientific visualization is the transfer function (TF) for direct volume rendering (DVR). The TF serves as a tool for translating data values…”
Get full text
Journal Article -
6
Towards a firmware TPM on RISC-V
Published in 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-02-2021)“…To develop the next generation of Internet of Things, Edge devices and systems which leverage progress in enabling technologies such as 5G, distributed…”
Get full text
Conference Proceeding -
7
A New Formal Proxy-Based Approach for Secure Distributed Business Process on the Cloud
Published in 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) (01-05-2018)“…Today, the main focus of multi-site companies is to find a powerful Business Process Management (BPM) and advanced secure communications with the lowest cost…”
Get full text
Conference Proceeding -
8
Towards Parallel Verification of Concurrent Systems using the Symbolic Observation Graph
Published in 2019 19th International Conference on Application of Concurrency to System Design (ACSD) (01-06-2019)“…An efficient way to cope with the combinatorial explosion problem induced by the model checking process is to compute the Symbolic Observation Graph (SOG)…”
Get full text
Conference Proceeding -
9
Architectural Security and Trust Foundation for RISC-V
Published in 2024 IEEE 27th International Symposium on Real-Time Distributed Computing (ISORC) (22-05-2024)“…Modern System-on-Chips (SoC) rely on Trusted Execution Environment (TEE) to ensure the integrity and confidentiality of sensitive information by providing a…”
Get full text
Conference Proceeding -
10
Real-Time Distributed Management for Control of Smart Grids
Published in IEEE journal of emerging and selected topics in power electronics (01-03-2017)“…This paper proposes a real-time neighborhood energy management (NEM) approach that aims to manage real-time residential energy. The introduced approach…”
Get full text
Journal Article -
11
Integrating fuzzy TOPSIS and goal programming for multiple objective integrated procurement-production planning
Published in 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) (01-09-2017)“…In this paper, a four-phase approach for Integrated Procurement-Production (IPP) tactical planning in a multiechelon, multi-product and multi-period Supply…”
Get full text
Conference Proceeding -
12
Synthesis of controllers for symmetric systems
Published in International journal of control (01-11-2010)“…This article deals with supervisory control problem for coloured Petri (CP) nets. Considering a CP-net, we build a condensed version of the ordinary…”
Get full text
Journal Article -
13
Behavior-based Anomaly Detection for Securing Smart Home Systems Automation
Published in 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) (17-09-2020)“…This paper presents a framework for securing Smart Home Systems (SHSs) automation control. When SHS devices are autonomously controlled by automation apps…”
Get full text
Conference Proceeding -
14
Open Portable Trusted Execution Environment framework for RISC-V
Published in 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC) (01-10-2021)“…A Trusted Execution Environment (TEE) is a relatively new technology that provides hardware-enforced isolation within a processor allowing an application to…”
Get full text
Conference Proceeding -
15
Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control
Published in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC) (01-06-2019)“…The business process management is powerful discipline used by the companies in order to improve their performance and increase their productivity and…”
Get full text
Conference Proceeding -
16
Parallel construction of the Symbolic Observation Graph
Published in 2019 International Conference on High Performance Computing & Simulation (HPCS) (01-07-2019)“…Extended AbstractAn efficient way to cope with the combinatorial explosion problem induced by the model checking process is to compute the Symbolic Observation…”
Get full text
Conference Proceeding -
17
A Structure Causality Relation for Liveness Characterisation in Petri Nets
Published in Journal of Universal Computer Science (01-01-2006)“…Characterising liveness using a structure based approach is a key issue in theory of Petri nets. In this paper, we introduce a structure causality relation…”
Get full text
Journal Article -
18
Securing Smart Homes using a Behavior Analysis based Authentication Approach
Published in 2020 IEEE Eighth International Conference on Communications and Networking (ComNet) (27-10-2020)“…This paper presents TRICA, a security framework for smart homes. When using controlling apps (e.g., smartphone app), TRICA makes sure that only legitimate…”
Get full text
Conference Proceeding -
19
Shortest Path Search in Dynamic Reliability Space: Hierarchical Coloured Petri Nets Model and Application to a Pipeline Network
Published in 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation (01-03-2014)“…His work proposes a hierarchical Coloured Petri Nets (CPN) model for finding the most reliable path in an oil pipeline network. A path is achieved with the…”
Get full text
Conference Proceeding -
20
Parallel Symbolic Observation Graph
Published in 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC) (01-12-2017)“…Model checking is a powerful technique for verifying and analyzing complex systems in many application fields. The analysis process of complex and concurrent…”
Get full text
Conference Proceeding