Name
Papers
Collaborators
MALEK BEN SALEM
27
38
Citations 
PageRank 
Referers 
185
16.19
453
Referees 
References 
361
191
Search Limit
100453
Title
Citations
PageRank
Year
Are Smart Home Devices Abandoning IPV Victims?00.342020
Active Authentication using File System Decoys and User Behavior Modeling: Results of a Large Scale Study00.342019
Gaussian Process-Based Dimension Reduction for Goal-Oriented Sequential Design00.342019
(M, K)-Firm Constraints And Derived Data Management For The Qos Enhancement In Distributed Real-Time Dbms00.342019
Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems00.342018
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems.00.342018
Self-Healing Cyber Resilient Framework For Software Defined Networking-Enabled Energy Delivery System00.342018
A Novel Architecture for Automatic Document Classification for Effective Security in Edge Computing Environments10.352018
A Validation Approach For Ontology-Based Real-Time Dbms00.342018
A feedback control scheduling architecture for real-time ontology00.342017
Universal Prediction Distribution for Surrogate Models10.372017
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage10.352016
Orchestration of software-defined security services10.352016
Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology.20.402015
Applicability of the Imprecise Computation Approach for the QoS Enhancement in Distributed RTDBMS.00.342014
Applicability of the (m,k)-firm Approach for the QoS Enhancement in Distributed RTDBMS00.342013
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models140.632013
Management of the real-time derived data in a Distributed Real-Time DBMS using the semi-total replication data00.342013
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud551.862012
Combining Baiting and User Search Profiling Techniques for Masquerade Detection.40.812012
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection20.392012
Decoy document deployment for effective masquerade attack detection241.522011
On the design and execution of cyber-security user studies: methodology, challenges, and lessons learned20.382011
Cloud Computing.00.342011
Modeling user search behavior for masquerade detection381.952011
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.120.842010
Designing Host and Network Sensors to Mitigate the Insider Threat281.612009