iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.dagstuhl.de/pid/91/6959.rss
dblp: Jihène Krichène https://dblp.org/pid/91/6959.html dblp person page RSS feed Thu, 25 Apr 2024 05:49:17 +0200 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Jihène Krichènehttps://dblp.org/pid/91/6959.html14451 Forensic Investigation in Communication Networks Using Incomplete Digital Evidences.https://doi.org/10.4236/ijcns.2009.29100, , :
Forensic Investigation in Communication Networks Using Incomplete Digital Evidences. Int. J. Commun. Netw. Syst. Sci. 2(9): 857-873 ()]]>
https://dblp.org/rec/journals/ijcns/RekhisKB09Thu, 01 Jan 2009 00:00:00 +0100
Heterogeneous Security Policy Validation: From Formal to Executable Specifications.https://doi.org/10.4304/jnw.3.8.55-69, , :
Heterogeneous Security Policy Validation: From Formal to Executable Specifications. J. Networks 3(8): 55-69 ()]]>
https://dblp.org/rec/journals/jnw/KricheneHB08Tue, 01 Jan 2008 00:00:00 +0100
Incident Response Probabilistic Cognitive Maps.https://doi.org/10.1109/ISPA.2008.33, :
Incident Response Probabilistic Cognitive Maps. ISPA : 689-694]]>
https://dblp.org/rec/conf/ispa/KricheneB08Tue, 01 Jan 2008 00:00:00 +0100
Cognitive-Maps Based Investigation of Digital Security Incidents.https://doi.org/10.1109/SADFE.2008.20, , :
Cognitive-Maps Based Investigation of Digital Security Incidents. SADFE : 25-40]]>
https://dblp.org/rec/conf/sadfe/RekhisKB08Tue, 01 Jan 2008 00:00:00 +0100
DigForNet: Digital Forensic in Networking.https://doi.org/10.1007/978-0-387-09699-5_41, , :
DigForNet: Digital Forensic in Networking. SEC : 637-651]]>
https://dblp.org/rec/conf/sec/RekhisKB08Tue, 01 Jan 2008 00:00:00 +0100
Security policy validation using temporal executable specifications.https://doi.org/10.1109/ICSMC.2007.4413742, , :
Security policy validation using temporal executable specifications. SMC : 2848-2853]]>
https://dblp.org/rec/conf/smc/KricheneHB07Mon, 01 Jan 2007 00:00:00 +0100
Network security project management: a security policy-based approach.https://doi.org/10.1109/ICSMC.2007.4413707, :
Network security project management: a security policy-based approach. SMC : 3311-3316]]>
https://dblp.org/rec/conf/smc/KricheneB07Mon, 01 Jan 2007 00:00:00 +0100
Collective computer incident response using cognitive maps.https://doi.org/10.1109/ICSMC.2004.1398448, , :
Collective computer incident response using cognitive maps. SMC (1) : 1080-1085]]>
https://dblp.org/rec/conf/smc/KricheneHB04Thu, 01 Jan 2004 00:00:00 +0100