Search Results - "Belhassen, Zouari"

Refine Results
  1. 1

    Securing the operation of Smart Home Systems: a literature review by Amraoui, Noureddine, Zouari, Belhassen

    “…Smart Home Systems (SHSs) represent one of the most prevailing Internet of Things (IoT) applications. While IoT-based SHSs can be user-driven or automatically…”
    Get full text
    Journal Article
  2. 2

    Anomalous behavior detection-based approach for authenticating smart home system users by Amraoui, Noureddine, Zouari, Belhassen

    “…This paper presents Duenna, an authentication framework for smart home systems (SHSs). When using controlling apps (e.g., a smartphone app), Duenna makes sure…”
    Get full text
    Journal Article
  3. 3

    A fuzzy multi-criteria decision-making approach for managing performance and risk in integrated procurement-production planning by Khemiri, Rihab, Elbedoui-Maktouf, Khaoula, Grabot, Bernard, Zouari, Belhassen

    “…Nowadays in Supply Chain (SC) networks, a high level of risk comes from SC partners. An effective risk management process becomes as a consequence mandatory,…”
    Get full text
    Journal Article
  4. 4

    A Semantic Model for Document Management in Business Processes by Imen, Allani, Belhassen, Zouari

    “…Although information and data flows or documents are important assets in business processes organization, the connection between data flow and control flow…”
    Get full text
    Conference Proceeding
  5. 5

    A real-time image-centric transfer function design based on incremental classification by Salhi, Marwa, Ksantini, Riadh, Zouari, Belhassen

    Published in Journal of real-time image processing (01-02-2022)
    “…A key issue in scientific visualization is the transfer function (TF) for direct volume rendering (DVR). The TF serves as a tool for translating data values…”
    Get full text
    Journal Article
  6. 6

    Towards a firmware TPM on RISC-V by Boubakri, Marouene, Chiatante, Fausto, Zouari, Belhassen

    “…To develop the next generation of Internet of Things, Edge devices and systems which leverage progress in enabling technologies such as 5G, distributed…”
    Get full text
    Conference Proceeding
  7. 7

    A New Formal Proxy-Based Approach for Secure Distributed Business Process on the Cloud by Maroua, Nouioua, Adel, Alti, Belhassen, Zouari

    “…Today, the main focus of multi-site companies is to find a powerful Business Process Management (BPM) and advanced secure communications with the lowest cost…”
    Get full text
    Conference Proceeding
  8. 8

    Towards Parallel Verification of Concurrent Systems using the Symbolic Observation Graph by Ouni, Hiba, Klai, Kais, Abid, Chiheb Ameur, Zouari, Belhassen

    “…An efficient way to cope with the combinatorial explosion problem induced by the model checking process is to compute the Symbolic Observation Graph (SOG)…”
    Get full text
    Conference Proceeding
  9. 9

    Architectural Security and Trust Foundation for RISC-V by Boubakri, Marouene, Zouari, Belhassen

    “…Modern System-on-Chips (SoC) rely on Trusted Execution Environment (TEE) to ensure the integrity and confidentiality of sensitive information by providing a…”
    Get full text
    Conference Proceeding
  10. 10

    Real-Time Distributed Management for Control of Smart Grids by Mhadhbi, Zeineb, Zairi, Sajeh, Gueguen, Cedric, Zouari, Belhassen

    “…This paper proposes a real-time neighborhood energy management (NEM) approach that aims to manage real-time residential energy. The introduced approach…”
    Get full text
    Journal Article
  11. 11

    Integrating fuzzy TOPSIS and goal programming for multiple objective integrated procurement-production planning by Khemiri, Rihab, Elbedoui-Maktouf, Khaoula, Grabot, Bernard, Zouari, Belhassen

    “…In this paper, a four-phase approach for Integrated Procurement-Production (IPP) tactical planning in a multiechelon, multi-product and multi-period Supply…”
    Get full text
    Conference Proceeding
  12. 12

    Synthesis of controllers for symmetric systems by Abid, Chiheb Ameur, Zouari, Belhassen

    Published in International journal of control (01-11-2010)
    “…This article deals with supervisory control problem for coloured Petri (CP) nets. Considering a CP-net, we build a condensed version of the ordinary…”
    Get full text
    Journal Article
  13. 13

    Behavior-based Anomaly Detection for Securing Smart Home Systems Automation by Amraoui, Noureddine, Zouari, Belhassen

    “…This paper presents a framework for securing Smart Home Systems (SHSs) automation control. When SHS devices are autonomously controlled by automation apps…”
    Get full text
    Conference Proceeding
  14. 14

    Open Portable Trusted Execution Environment framework for RISC-V by Boubakri, Marouene, Chiatante, Fausto, Zouari, Belhassen

    “…A Trusted Execution Environment (TEE) is a relatively new technology that provides hardware-enforced isolation within a processor allowing an application to…”
    Get full text
    Conference Proceeding
  15. 15

    Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control by Maroua, Nouioua, Belhassen, Zouari, Adel, Alti

    “…The business process management is powerful discipline used by the companies in order to improve their performance and increase their productivity and…”
    Get full text
    Conference Proceeding
  16. 16

    Parallel construction of the Symbolic Observation Graph by Ouni, Hiba, Klai, Kais, Zouari, Belhassen

    “…Extended AbstractAn efficient way to cope with the combinatorial explosion problem induced by the model checking process is to compute the Symbolic Observation…”
    Get full text
    Conference Proceeding
  17. 17

    A Structure Causality Relation for Liveness Characterisation in Petri Nets by Zouari, Belhassen

    Published in Journal of Universal Computer Science (01-01-2006)
    “…Characterising liveness using a structure based approach is a key issue in theory of Petri nets. In this paper, we introduce a structure causality relation…”
    Get full text
    Journal Article
  18. 18

    Securing Smart Homes using a Behavior Analysis based Authentication Approach by Amraoui, Noureddine, Besrour, Amine, Ksantini, Riadh, Zouari, Belhassen

    “…This paper presents TRICA, a security framework for smart homes. When using controlling apps (e.g., smartphone app), TRICA makes sure that only legitimate…”
    Get full text
    Conference Proceeding
  19. 19

    Shortest Path Search in Dynamic Reliability Space: Hierarchical Coloured Petri Nets Model and Application to a Pipeline Network by Kadri, Hela, Zouari, Belhassen

    “…His work proposes a hierarchical Coloured Petri Nets (CPN) model for finding the most reliable path in an oil pipeline network. A path is achieved with the…”
    Get full text
    Conference Proceeding
  20. 20

    Parallel Symbolic Observation Graph by Ouni, Hiba, Klai, Kais, Abid, Chiheb Ameur, Zouari, Belhassen

    “…Model checking is a powerful technique for verifying and analyzing complex systems in many application fields. The analysis process of complex and concurrent…”
    Get full text
    Conference Proceeding