Search Results - "Hendaoui, Fatma"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection by Hendaoui, Fatma, Hendaoui, Saloua

    Published in Expert systems with applications (05-12-2024)
    “…Phishing attacks have recently become a real danger that threatens the security of sensitive data. This research paper presents a new approach based on Secure…”
    Get full text
    Journal Article
  2. 2

    Corrigendum: Efficient differential privacy enabled federated learning model for detecting COVID-19 disease using chest X-ray images by Ahmed, Rawia, Maddikunta, Praveen Kumar Reddy, Gadekallu, Thippa Reddy, Alshammari, Naif Khalaf, Hendaoui, Fatma Ali

    Published in Frontiers in medicine (24-10-2024)
    “…[This corrects the article DOI: 10.3389/fmed.2024.1409314.].[This corrects the article DOI: 10.3389/fmed.2024.1409314.]…”
    Get full text
    Journal Article
  3. 3

    Efficient differential privacy enabled federated learning model for detecting COVID-19 disease using chest X-ray images by Ahmed, Rawia, Maddikunta, Praveen Kumar Reddy, Gadekallu, Thippa Reddy, Alshammari, Naif Khalaf, Hendaoui, Fatma Ali

    Published in Frontiers in medicine (03-06-2024)
    “…The rapid spread of COVID-19 pandemic across the world has not only disturbed the global economy but also raised the demand for accurate disease detection…”
    Get full text
    Journal Article
  4. 4

    UAP: A unified authentication platform for IoT environment by Hendaoui, Fatma, Eltaief, Hamdi, Youssef, Habib

    “…The Internet of Things (IoT) is a network that encompasses every physical object being connected to the Internet. The IoT objects face several issues and…”
    Get full text
    Journal Article
  5. 5

    Enhancing data authentication in software-defined networking (SDN) using multiparty computation by Hendaoui, Fatma, Eltaief, Hamdi, Youssef, Habib

    Published in Cluster computing (01-12-2024)
    “…In software-defined networking (SDN), where software assumes a progressively prominent position in the network administration, it becomes imperative to…”
    Get full text
    Journal Article
  6. 6

    Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review by Hendaoui, Fatma, Ferchichi, Ahlem, Trabelsi, Lamia, Meddeb, Rahma, Ahmed, Rawia, Khelifi, Manel Khazri

    Published in Cluster computing (01-10-2024)
    “…Many sensitive applications require that data remain confidential and undisclosed, even for intrusion detection objectives. For this purpose, the detection of…”
    Get full text
    Journal Article
  7. 7

    A collaborative key management scheme for distributed smart objects by Hendaoui, Fatma, Eltaief, Hamdi, Youssef, Habib

    “…Secure communication of Internet of Things (IoT) devices relies on cryptographic approaches whose robustness is based on the security of encryption keys. For…”
    Get full text
    Journal Article
  8. 8

    Synergistic Solution: IDS and Scheduler Harmony for Secure 5G Radio Resources by Hendaoui, Saloua, Hendaoui, Fatma

    “…The diverse range of applications in 5G networks introduces novel security challenges, particularly due to the high volume of transmitted packets. The…”
    Get full text
    Conference Proceeding
  9. 9

    FID: Fuzzy Based Intrusion Detection for Distributed Smart Devices by Hendaoui, Fatma, Eltaief, Hamdi, Youssef, Habib

    “…Internet of Things (IoT) applications are driving the world to be smart by providing limitless services with optimized time and resources. Security and safety…”
    Get full text
    Conference Proceeding
  10. 10

    CGK: A Collaborative Group Key Management Scheme by Hendaoui, Fatma, Eltaief, Hamdi, Youssef, Habib, Trad, Abdelbasset

    “…Secure communication in Wireless Sensor Networks (WSN) is usually based on symmetric cryptographic approaches, whose robustness relies on an efficient key…”
    Get full text
    Conference Proceeding