Benzekri, Abdelmalek
166  results:
Search for persons X
?
2

A SLAHP in the Face of DLL Search Order Hijacking:

, In: Communications in Computer and Information Science; Ubiquitous Security,
 
?
4

The Interplay Between Policy and Technology in Metaverses: ..:

, In: 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom),
 
?
5

Implementing the Principle of Least Privilege Using Linux C..:

, In: 2023 7th Cyber Security in Networking Conference (CSNet),
 
?
6

Governance Foundations for the European Cybersecurity Commu..:

, In: Communications in Computer and Information Science; Digital Sovereignty in Cyber Security: New Challenges in Future Vision,
 
?
7

AutoRoC-DBSCAN: Automatic Tuning of DBSCAN to Detect Malici..:

, In: Communications in Computer and Information Science; Emerging Information Security and Applications,
 
?
8

On the Validation of Web X.509 Certificates by TLS Intercep..:

Wazan, Ahmad Samer ; Laborde, Romain ; Chadwick, David W....
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  1 - p. 227-242 , 2022
 
?
 
?
10

RootAsRole: Towards a Secure Alternative to sudo/su Command..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
13

Know Your Customer: Opening a new bank account online using..:

, In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC),
 
?
14

Detecting abnormal DNS traffic using unsupervised machine l..:

, In: 2020 4th Cyber Security in Networking Conference (CSNet),
 
?
15

A User-Centric Identity Management Framework based on the W..:

, In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC),
 
1-15