Search Results - "Hendaoui, Fatma"
-
1
SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection
Published in Expert systems with applications (05-12-2024)“…Phishing attacks have recently become a real danger that threatens the security of sensitive data. This research paper presents a new approach based on Secure…”
Get full text
Journal Article -
2
Corrigendum: Efficient differential privacy enabled federated learning model for detecting COVID-19 disease using chest X-ray images
Published in Frontiers in medicine (24-10-2024)“…[This corrects the article DOI: 10.3389/fmed.2024.1409314.].[This corrects the article DOI: 10.3389/fmed.2024.1409314.]…”
Get full text
Journal Article -
3
Efficient differential privacy enabled federated learning model for detecting COVID-19 disease using chest X-ray images
Published in Frontiers in medicine (03-06-2024)“…The rapid spread of COVID-19 pandemic across the world has not only disturbed the global economy but also raised the demand for accurate disease detection…”
Get full text
Journal Article -
4
UAP: A unified authentication platform for IoT environment
Published in Computer networks (Amsterdam, Netherlands : 1999) (07-04-2021)“…The Internet of Things (IoT) is a network that encompasses every physical object being connected to the Internet. The IoT objects face several issues and…”
Get full text
Journal Article -
5
Enhancing data authentication in software-defined networking (SDN) using multiparty computation
Published in Cluster computing (01-12-2024)“…In software-defined networking (SDN), where software assumes a progressively prominent position in the network administration, it becomes imperative to…”
Get full text
Journal Article -
6
Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review
Published in Cluster computing (01-10-2024)“…Many sensitive applications require that data remain confidential and undisclosed, even for intrusion detection objectives. For this purpose, the detection of…”
Get full text
Journal Article -
7
A collaborative key management scheme for distributed smart objects
Published in Transactions on emerging telecommunications technologies (01-06-2018)“…Secure communication of Internet of Things (IoT) devices relies on cryptographic approaches whose robustness is based on the security of encryption keys. For…”
Get full text
Journal Article -
8
Synergistic Solution: IDS and Scheduler Harmony for Secure 5G Radio Resources
Published in 2024 International Wireless Communications and Mobile Computing (IWCMC) (27-05-2024)“…The diverse range of applications in 5G networks introduces novel security challenges, particularly due to the high volume of transmitted packets. The…”
Get full text
Conference Proceeding -
9
FID: Fuzzy Based Intrusion Detection for Distributed Smart Devices
Published in 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) (01-10-2017)“…Internet of Things (IoT) applications are driving the world to be smart by providing limitless services with optimized time and resources. Security and safety…”
Get full text
Conference Proceeding -
10
CGK: A Collaborative Group Key Management Scheme
Published in 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS) (01-08-2014)“…Secure communication in Wireless Sensor Networks (WSN) is usually based on symmetric cryptographic approaches, whose robustness relies on an efficient key…”
Get full text
Conference Proceeding