Search Results - "Benbrahim, Houda"
-
1
Smart Building Energy Inefficiencies Detection through Time Series Analysis and Unsupervised Machine Learning
Published in Energies (Basel) (01-10-2021)“…The climate of Houston, classified as a humid subtropical climate with tropical influences, makes the heating, ventilation, and air conditioning (HVAC) systems…”
Get full text
Journal Article -
2
Enhancing Cyber Threat Identification in Open-Source Intelligence Feeds through an Improved Semi-Supervised Generative Adversarial Learning Approach with Contrastive Learning
Published in IEEE access (01-01-2023)“…Responding to the challenge of efficiently leveraging Open-source Threat Intelligence Feeds (OTIFs) to enhance organizational security, this paper presents an…”
Get full text
Journal Article -
3
Assessing Data Breach Factors Through Modern Crime Theory: A Structural Equation Modeling Approach
Published in IEEE access (2024)“…Research into data security often emphasizes the need to understand the factors linked to security breaches, aiming to prevent future information security…”
Get full text
Journal Article -
4
Heterogeneous text graph for comprehensive multilingual sentiment analysis: capturing short- and long-distance semantics
Published in PeerJ. Computer science (23-02-2024)“…Multilingual sentiment analysis (MSA) involves the task of comprehending people's opinions, sentiments, and emotions in multilingual written texts. This task…”
Get full text
Journal Article -
5
COVID-19-Related Scientific Literature Exploration: Short Survey and Comparative Study
Published in Biology (Basel, Switzerland) (16-08-2022)“…The urgency of the COVID-19 pandemic caused a surge in the related scientific literature. This surge made the manual exploration of scientific articles…”
Get full text
Journal Article -
6
Correction: Talei et al. Smart Building Energy Inefficiencies Detection through Time Series Analysis and Unsupervised Machine Learning. Energies 2021, 14, 6042
Published in Energies (Basel) (01-05-2022)“…The authors wish to make the following correction to their paper [...]…”
Get full text
Journal Article -
7
Modeling and Optimization of Anaerobic Digestion: A Review
Published in E3S web of conferences (01-01-2021)“…Anaerobic digestion is recognized as being an advantageous waste management technique representing a source of clean and renewable energy. However, biogas…”
Get full text
Journal Article Conference Proceeding -
8
Machine learning and deep learning for sentiment analysis across languages: A survey
Published in Neurocomputing (Amsterdam) (28-04-2023)“…The inception and rapid growth of the Web, social media, and other online forums have resulted in the continuous and rapid generation of opinionated textual…”
Get full text
Journal Article -
9
End-to-end LDA-based automatic weak signal detection in web news
Published in Knowledge-based systems (05-01-2021)“…An extremely competitive business environment requires every company to monitor its competitors and anticipate future opportunities and risks, creating a dire…”
Get full text
Journal Article -
10
Detecting the impact of software vulnerability on attacks: A case study of network telescope scans
Published in Journal of network and computer applications (01-12-2021)“…Network scanning is one of the first steps in gathering information about a target before launching attacks. It is used to scan for vulnerable devices and…”
Get full text
Journal Article -
11
STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk
Published in IEEE transactions on dependable and secure computing (01-03-2023)“…Data breaches have begun to take on new dimensions and their prediction is becoming of great importance to organizations. Prior work has addressed this issue…”
Get full text
Journal Article -
12
An empirical study to address the problem of Unbalanced Data Sets in sentiment classification
Published in 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (01-10-2012)“…With the emergence of Web 2.0, Sentiment Analysis is receiving more and more attention. Several interesting works were performed to address different issues in…”
Get full text
Conference Proceeding -
13
STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk
Published 19-11-2024“…IEEE Transactions on Dependable and Secure Computing ( Volume: 20, Issue: 2, 01 March-April 2023) Data breaches have begun to take on new dimensions and their…”
Get full text
Journal Article -
14
A Comparison of Temporal and Spatio-Temporal Methods for Short-Term Traffic Flow Prediction
Published in 2024 International Wireless Communications and Mobile Computing (IWCMC) (27-05-2024)“…Accurate short-term traffic flow prediction is crucial for effective urban traffic management. However, selecting the most suitable prediction model and…”
Get full text
Conference Proceeding -
15
Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis
Published in 2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM) (26-10-2023)“…This paper presents the findings of a field study conducted in Rabat, the capital of Morocco, utilizing the Wardriving technique to assess Wi-Fi network…”
Get full text
Conference Proceeding -
16
Hercules Against Data Series Similarity Search
Published 26-12-2022“…Proc. VLDB Endow. 15(10): 2005-2018 (2022) We propose Hercules, a parallel tree-based technique for exact similarity search on massive disk-based data series…”
Get full text
Journal Article -
17
Quantification of soil moisture variability over agriculture fields using Sentinel imagery
Published in 2020 International Conference on Intelligent Systems and Computer Vision (ISCV) (01-06-2020)“…The purpose of this study is to quantify soil moisture variability in agriculture fields at field scale resolution using the Sentinel data (Sentinel-1 and…”
Get full text
Conference Proceeding -
18
Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study
Published in 2021 IEEE International Conference on Intelligence and Security Informatics (ISI) (02-11-2021)“…Understanding the properties exhibited by Spatial-temporal evolution of cyber attacks improve cyber threat intelligence. In addition, better understanding on…”
Get full text
Conference Proceeding -
19
Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study
Published 02-09-2021“…Understanding the properties exhibited by Spatial-temporal evolution of cyber attacks improve cyber threat intelligence. In addition, better understanding on…”
Get full text
Journal Article -
20
Return of the Lernaean Hydra: Experimental Evaluation of Data Series Approximate Similarity Search
Published 19-06-2020“…Data series are a special type of multidimensional data present in numerous domains, where similarity search is a key operation that has been extensively…”
Get full text
Journal Article