Rabai, Latifa Ben Arfa
30  results:
Search for persons X
?
1

A Decision Support System Based on Ontology Learning from P..:

, In: Advances in Intelligent Systems and Computing; Intelligent Systems Design and Applications,
Zaouga, Wiem ; Rabai, Latifa Ben Arfa - p. 732-742 , 2021
 
?
2

A Smart Ontology for Project Risk Management Based on PMI's..:

, In: Proceedings of Fifth International Congress on Information and Communication Technology; Advances in Intelligent Systems and Computing,
Zaouga, Wiem ; Rabai, Latifa Ben Arfa - p. 218-228 , 2020
 
?
4

A Survey of Quantitative Security Risk Analysis Models for ..:

, In: Proceedings of the 2nd International Conference on Advances in Artificial Intelligence,
Meriah, Ines ; Rabai, Latifa Ben Arfa - p. 36-40 , 2018
 
?
5

Functional Specification to Support Security Risk Assessmen..:

, In: Advances in Intelligent Systems and Computing; Software Engineering and Algorithms in Intelligent Systems,
 
?
6

Security Problems in Cloud Computing Environments: A Deep A..:

, In: Apps Management and E-Commerce Transactions in Real-Time; Advances in E-Business Research,
Jouini, Mouna ; Rabai, Latifa Ben Arfa - p. 70-103 , 2017
 
?
8

Expansion and Practical Implementation of the MFC Cybersecu..:

Rjaibi, Neila ; Rabai, Latifa Ben Arfa
International Journal of Secure Software Engineering.  6 (2015)  4 - p. 32-51 , 2015
 
?
12

Deploying Suitable Countermeasures to Solve the Security Pr..:

, In: Proceedings of the 7th International Conference on Security of Information and Networks,
 
?
13

Quantifying availability in SCADA environments using the cy..:

, In: Proceedings of the 9th Annual Cyber and Information Security Research Conference,
 
?
14

Mean Failure Cost as a Measurable Value and Evidence of Cyb..:

Rjaibi, Neila ; Rabai, Latifa Ben Arfa ; Ben Aissa, Anis.
International Journal of Secure Software Engineering.  4 (2013)  3 - p. 64-81 , 2013
 
?
15

A cybersecurity model in cloud computing environments:

Rabai, Latifa Ben Arfa ; Jouini, Mouna ; Aissa, Anis Ben.
Journal of King Saud University - Computer and Information Sciences.  25 (2013)  1 - p. 63-75 , 2013
 
1-15