Search Results - "Boudaoud, Karima"
-
1
Interdisciplinary IoT and Emotion Knowledge Graph-Based Recommendation System to Boost Mental Health
Published in Applied sciences (01-10-2022)“…Humans are feeling emotions every day, but they can still encounter difficulties understanding them. To better understand emotions, we integrated…”
Get full text
Journal Article -
2
Usability of End-to-End Encryption in E-Mail Communication
Published in Frontiers in big data (14-07-2021)“…This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and…”
Get full text
Journal Article -
3
What Do You Think About Your Company's Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms
Published in Frontiers in big data (30-10-2020)“…Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent…”
Get full text
Journal Article -
4
Privacy aware group based recommender system in multimedia services
Published in Multimedia tools and applications (01-12-2017)“…Recommending similar-interest users’ groups in multimedia services is the problem of detecting for each registered user his/her membership to one…”
Get full text
Journal Article -
5
European Network For Gender Balance in Informatics (EUGAIN): Activities and Results
Published 24-06-2024“…This chapter provides a summary of the activities and results of the European Network For Gender Balance in Informatics (EUGAIN, EU COST Action CA19122). The…”
Get full text
Journal Article -
6
Enrich machine-to-machine data with semantic web technologies for cross-domain applications
Published in 2014 IEEE World Forum on Internet of Things (WF-IoT) (01-03-2014)“…The Internet of Things, more specifically, the Machine-to-Machine (M2M) standard enables machines and devices such as sensors to communicate with each other…”
Get full text
Conference Proceeding -
7
LOV4IoT: A Second Life for Ontology-Based Domain Knowledge to Build Semantic Web of Things Applications
Published in 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (01-08-2016)“…Semantic Web of Things is a new field combining Semantic Web and Internet of Things technologies to be surrounded by smart objects and applications connected…”
Get full text
Conference Proceeding -
8
Cross-Domain Internet of Things Application Development: M3 Framework and Evaluation
Published in 2015 3rd International Conference on Future Internet of Things and Cloud (01-08-2015)“…Internet of Things (IoT) applications are becoming more and more popular but not interoperable with each other. In this paper, we propose the…”
Get full text
Conference Proceeding -
9
Cloud computing, security and data concealment
Published in 2011 IEEE Symposium on Computers and Communications (ISCC) (01-06-2011)“…Cloud computing is a new paradigm providing software and hardware resources according to the customers' needs. However, it introduces new security risks such…”
Get full text
Conference Proceeding -
10
Secure Email -- A Usability Study
Published 12-10-2021“…FC 2020: Workshops, International Conference on Financial Cryptography and Data Security, 12063, pp.36-46, 2020, Lecture Notes in Computer Science book series…”
Get full text
Journal Article -
11
oneM2M Architecture Based User Centric IoT Application Development
Published in 2015 3rd International Conference on Future Internet of Things and Cloud (01-08-2015)“…This paper presents a user centric and cross-domain IoT application development framework for smart devices. The framework includes automatic discovery of M2M…”
Get full text
Conference Proceeding -
12
Standardizing generic cross-domain applications in Internet of Things
Published in 2014 IEEE Globecom Workshops (GC Wkshps) (01-12-2014)“…Domain-specific Internet of Things (IoT) applications are becoming more and more popular. Each of these applications uses their own technologies and terms to…”
Get full text
Conference Proceeding -
13
An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture
Published in 2014 IEEE International Conference on Internet of Things (iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) (01-09-2014)“…Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M) architecture is a difficult task, since there is a need to secure…”
Get full text
Conference Proceeding -
14
Applying Internet of Things for personalized healthcare in smart homes
Published in 2015 24th Wireless and Optical Communication Conference (WOCC) (01-10-2015)“…The paper advocates for applying Internet of Things (IoT) for personalized healthcare in smart homes. An IoT architecture is presented which enables such…”
Get full text
Conference Proceeding Journal Article -
15
Reusing and Unifying Background Knowledge for Internet of Things with LOV4IoT
Published in 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (01-08-2016)“…Ontology-based applications are becoming more and more popular and are usually domain-specific (e.g., eHealth or domotic). Designing ontologies and…”
Get full text
Conference Proceeding -
16
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web of Things Applications
Published in 2015 IEEE International Conference on Data Science and Data Intensive Systems (01-12-2015)“…Internet of Things (IoT) is becoming more and more popular. Increasingly, European projects (CityPulse, IoT.est, IoT-i and IERC), standard development…”
Get full text
Conference Proceeding -
17
A Semantic Engine for Internet of Things: Cloud, Mobile Devices and Gateways
Published in 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (01-07-2015)“…Semantics is becoming a requirement in Internet of Things (IoT). Recent works underline future challenges for IoT: (1) integrate semantic web technologies, (2)…”
Get full text
Conference Proceeding -
18
Integrating machine-to-machine measurement framework into oneM2M architecture
Published in 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS) (01-08-2015)“…Recent challenges in Internet of Things (IoT) include - (i) providing interoperability among IoT data, (ii) interpreting data generated by IoT devices, and…”
Get full text
Conference Proceeding -
19
An alternative version of HTTPS to provide non-repudiation security property
Published in 2014 International Wireless Communications and Mobile Computing Conference (IWCMC) (01-08-2014)“…The number of mobile devices connected to the Internet is rapidly growing, inducing security issues that cannot be prevented by common mechanisms such as…”
Get full text
Conference Proceeding -
20
A security framework for mobile cloud applications
Published in 2013 11th RoEduNet International Conference (01-01-2013)“…Mobile Cloud Computing is a new concept, which offers Cloud resources and services for mobile devices. It also brings several advantages to mobile devices and…”
Get full text
Conference Proceeding