Follow
Faouzi JAIDI
Faouzi JAIDI
University of Carthage - (1) ENICarthage | (2) Sup'Com
Verified email at supcom.tn
Title
Cited by
Cited by
Year
A comprehensive study of security and cyber-security risk management within e-Health systems: Synthesis, analysis and a novel quantified approach
S Ksibi, F Jaidi, A Bouhoula
Mobile Networks and Applications 28 (1), 107-127, 2023
172023
A methodology and toolkit for deploying reliable security policies in critical infrastructures
F Jaïdi, F Labbene Ayachi, A Bouhoula
Security and Communication Networks 2018, 2018
112018
An approach to formally validate and verify the compliance of low level access control policies
F Jaidi, FL Ayachi
2014 IEEE 17th International Conference on Computational Science and …, 2014
102014
A systematic approach for IoT cyber-attacks detection in smart cities using machine learning techniques
M Houichi, F Jaidi, A Bouhoula
International Conference on Advanced Information Networking and Applications …, 2021
92021
Advanced techniques for deploying reliable and efficient access control: Application to E-healthcare
F Jaïdi, F Labbene-Ayachi, A Bouhoula
Journal of medical systems 40, 1-9, 2016
92016
The problem of integrity in RBAC-based policies within relational databases: synthesis and problem study
F Jaidi, FL Ayachi
Proceedings of the 9th International Conference on Ubiquitous Information …, 2015
92015
Cyber-risk management within IoMT: a context-aware agent-based framework for a reliable e-health system
S Ksibi, F Jaidi, A Bouhoula
The 23rd International Conference on Information Integration and Web …, 2021
82021
A risk awareness approach for monitoring the compliance of RBAC-based policies
F Jaidi, FL Ayachi
2015 12th International Joint Conference on e-Business and …, 2015
72015
To summarize the problem of non-conformity in concrete rbac-based policies: synthesis, system proposal and future directives
F Jaidi, F Labbene Ayachi
NNGT International Journal of Information Security 2, 1-12, 2015
72015
A formal approach based on verification and validation techniques for enhancing the integrity of concrete role based access control policies
F Jaidi, FL Ayachi
International Joint Conference: CISIS’15 and ICEUTE’15, 53-64, 2015
72015
Fairness and access control for mobile P2P auctions over MANETs
HKB Ayed, F Jaïdi, I Doghri
Journal of theoretical and applied electronic commerce research 7 (3), 11-27, 2012
72012
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems
S Ksibi, F Jaïdi, A Bouhoula
17th International Conference on Security and Cryptography - SECRYPT 2020 …, 2020
62020
A formal system for detecting anomalies of non-conformity in concrete rbac-based policies
F Jaidi, FL Ayachi
International Conference on Computer Information Systems WCCAIS-2015-ICCIS, 2015
52015
Enforcing a risk assessment approach in access control policies management: analysis, correlation study and model enhancement
PA Evina, FL Ayachi, F Jaïdi, A Bouhoula
2019 15th International Wireless Communications & Mobile Computing …, 2019
42019
A Quantified Trust-Risk Assessment Approach for Enhancing Firewalls-Filtering Services
F JAIDI
Journal of Information Assurance and Security 14 (2), 030-039, 2019
42019
Anomalies Correlation for Risk-Aware Access Control Enhancement.
PA Evina, FL Ayachi, F Jaidi, A Bouhoula
ENASE, 299-304, 2018
42018
Advances in security in computing and communications
J Sen
BoD–Books on Demand, 2017
42017
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment.
F Jaidi, FL Ayachi, A Bouhoula
SCSS, 120-132, 2017
42017
A Reverse Engineering and Model Transformation Approach for RBAC-Administered Databases
F Jaidi, F Labbene Ayachi
2015 International Conference on High Performance Computing & Simulation …, 2015
42015
Machine Learning Algorithms for Enhancing Intrusion Detection Within SDN/NFV
A Sahbi, F Jaidi, A Bouhoula
2023 International Wireless Communications and Mobile Computing (IWCMC), 602-607, 2023
32023
The system can't perform the operation now. Try again later.
Articles 1–20