Export 182 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Abdo JBou, Demerjian J, Chaouchi H, Atechian T, Bassil C.  2015.  Privacy using mobile cloud computing. Digital Information and Communication Technology and its Applications (DICTAP), 2015 Fifth International Conference on. :178–182.
Abdo JBou, Demerjian J, Chaouchi H, Atechian T.  2015.  Enhanced Revenue Optimizing SLA-Based Admission Control for IaaS Cloud Networks. Future Internet of Things and Cloud (FiCloud), 2015 3rd International Conference on.
Abdo JBou, Demerjian J, Chaouchi H, Yared R, Atechian T.  2015.  Micro-economy effect on cloud federation. Computer & Information Technology (GSCIT), 2015 Global Summit on.
Abdo JBou, Demerjian J, Chaouchi H, Barbar K, Pujolle G, Atechian T.  2014.  Cloud Federation? We Are Not Ready Yet High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC, CSS, ICESS), 2014 IEEE Intl Conf on.
Abdo JBou, Jreish R, Demerjian J, Atechian T.  2016.  Optimizing Radio Resource Allocation in Multicast Mobile Networks. Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES), 2016 IEEE Intl Conference on.
Abidi A, Guyeux C, AL Bouna B, Bouallègue B, Machhout M.  2016.  The dynamics of the CBC Mode of Operation. arXiv preprint arXiv:1605.02950.
Acedo Ede Lera, Razavi-Ghods N, Ovejéro DGonzalez, Sarkis R, Craeye C.  2011.  Compact representation of the effects of mutual coupling in non-regular arrays devoted to the SKA telescope. Electromagnetics in Advanced Applications (ICEAA), 2011 International Conference on.
AL Bouna B, Chbeir R.  2008.  MC SE: a multimedia context-based security engine. Proceedings of the 11th international conference on Extending database technology: Advances in database technology. :705–709.
AL Bouna B, Chbeir R, Gabillon A, Capolsini P.  2012.  A fine-grained image access control model. Signal Image Technology and Internet Based Systems (SITIS), 2012 Eighth International Conference on. :603–612.
AL Bouna B, Chbeir R.  2008.  Content-based policy specification for multimedia authorization and access control model. Cyber Warfare and Cyber Terrorism. :345–357.
AL Bouna B, Raad EJ, Elia C, Chbeir R, Haraty R.  2013.  De-linkability: A privacy-preserving constraint for safely outsourcing multimedia documents. Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems. :68–75.
AL Bouna B, Chbeir R, Marrara S.  2007.  A multimedia access control language for virtual and ambient intelligence environments. Proceedings of the 2007 ACM workshop on Secure web services. :111–120.
AL Bouna B, Clifton C, Malluhi Q.  2015.  Anonymizing transactional datasets. Journal of Computer Security. 23:89–106.
AL Bouna B, Chbeir R, Gabillon A, Capolsini P.  2013.  A Flexible Image-Based Access Control Model for Social Networks. Security and Privacy Preserving in Social Networks. :337–364.
AL Bouna B, Chbeir R, Miteran J.  2007.  Mca2cm: Multimedia context-aware access control model. Intelligence and Security Informatics, 2007 IEEE. :115–123.
AL Bouna B, Clifton C, Malluhi Q.  2011.  Preserving Privacy from Unsafe Data Correlation. Qatar Foundation Annual Research Forum Proceedings. :CSP9.
AL Bouna B, Chbeir R.  2006.  Multimedia-based authorization and access control policy specification. Proceedings of the 3rd ACM workshop on Secure web services. :61–68.
AL Bouna B, Couchot J-F, Couturier R, Fadil YAhmed, Guyeux C.  2015.  Performance Study of Steganalysis Techniques. Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on.
AL Bouna B, Clifton C, Malluhi QM.  2015.  Efficient Sanitization of Unsafe Data Correlations. Proceedings of the Workshops of the {EDBT/ICDT} 2015 Joint Conference (EDBT/ICDT), Brussels, Belgium, March 27th, 2015.. :278–285.
AL Bouna B, Chbeir R, Marrara S.  2009.  Enforcing role based access control model with multimedia signatures. Journal of Systems Architecture. 55:264–274.
AL Bouna B, Chbeir R, Gabillon A.  2011.  The image protector-a flexible security rule specification toolkit. Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on. :345–350.
AL Bouna B, Raad EJ, Chbeir R, Elia C, Haraty R.  2015.  Anonymizing multimedia documents. World Wide Web. :1–21.
AL Bouna B, Chbeir R.  2009.  Detecting inference channels in private multimedia data via social networks. Data and Applications Security XXIII. :208–224.
AL Bouna B, Clifton C, Malluhi Q.  2013.  Using safety constraint for transactional dataset anonymization. Data and Applications Security and Privacy XXVII. :164–178.
Al Zahr S, Doumith E A, Forestier P.  2017.  Advanced Demand Response Considering Modular and Deferrable Loads Under Time-Variable Rates. IEEE Global Communications Conference (GLOBECOM).

Pages