Samia Bouzefrane
Professeur des Universités
Personal website: http://cedric.cnam.fr/~bouzefra/
Office: 31.1.7B
2024
Articles de revue
- Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices. In IEEE Transactions on Network and Service Management, 2024. doi www
- iTEVAC: an enhanced trusted evacuation system leveraging fog computing and IoT. In Journal of Information and Telecommunication, 2024. doi www
- Self-organised map and trust-aware-based quality of service prediction for reliable services selection in distributed computing environment. In International Journal of Advanced Intelligence Paradigms, 28 (1/2): 169-192, 2024. doi www
Articles de conférence
- Privacy Preserving Federated Learning: A Novel Approach for Combining Differential Privacy and Homomorphic Encryption. In 14th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2024, pages 162-177, Springer Nature Switzerland, Paris, France, Lecture Notes in Computer Science 14625, 2024. doi www
- Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions. In 14th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2024, pages 96-110, Springer Nature Switzerland, Paris, France, Lecture Notes in Computer Science 14625, 2024. doi www
- A Bitcoin-Based Digital Identity Model for~the~Internet of~Things. In Information Security Theory and Practice. 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 -- March 1, 2024, Proceedings, pages 128-145, Springer Nature Switzerland, Paris, France, Lecture Notes in Computer Science 14625, 2024. doi www
- Security Challenges and Countermeasures in Blockchain's Peer-to-Peer Architecture. In Information Security Theory and Practice. 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 -- March 1, 2024, Proceedings, pages 111-127, Springer Nature Switzerland, Paris, France, Lecture Notes in Computer Science 14625, 2024. doi www
- Improving NDN Resilience: A Novel Mitigation Mechanism Against Cache Pollution Attack. In 2024 International Wireless Communications and Mobile Computing (IWCMC), pages 1564-1569, IEEE, Ayia Napa, Cyprus, 2024. doi www
- Enhancing privacy in VANETs through homomorphic encryption in machine learning applications. In 15th International Conference on Ambient Systems, Networks and Technologies Networks (ANT 2024), pages 151-158, Elsevier, Hasselt, Belgium, 2024. doi www
Actes de colloque
- Mobile, Secure, and Programmable Networking. Springer Nature Switzerland, Lecture Notes in Computer Science 14482, 2024. www
- Information Security Theory and Practice. Springer Nature Switzerland, Lecture Notes in Computer Science 14625, 2024. www
2023
Articles de revue
- Supervised Machine Learning for Matchmaking in Digital Business Ecosystems and Platforms. In Information Systems Frontiers, 2023. doi www
Chapitres d'ouvrage
- Hybrid Machine Learning for Matchmaking in Digital Business Ecosystems. In Encyclopedia of Data Science and Machine Learning, pages 2817-2838, IGI Global, 2023. doi www
- Application of Homomorphic Encryption in Machine Learning. In Emerging Trends in Cybersecurity Applications, pages 391-410, Springer International Publishing, 2023. doi www
Articles de conférence
- Handling security issues by using homomorphic encryption in multi-cloud environment. In The 14th International Conference on Ambient Systems, Networks and Technologies (ANT), Leuven, Belgium, 2023. www
- Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices. In ACM MobiCom '23: 29th Annual International Conference on Mobile Computing and Networking, pages 1472-1474, ACM, Madrid, Spain, 2023. doi www
2022
Articles de revue
- A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environment. In International Journal of Information and Computer Security, 17 (3/4): 261, 2022. doi www
- An approach for unsupervised contextual anomaly detection and characterization. In Intelligent Data Analysis, 26 (5): 1185-1209, 2022. doi www
- IFKMS: Inverse Function-based Key Management Scheme for IoT networks. In Journal of information security and applications, 71: 103370, 2022. doi www
Articles de conférence
- Robust approach for host-overload detection based on dynamic safety parameter. In IEEE Ficloud (The 9th International Conference on Future Internet of Things and Cloud), Rome, Italy, 2022. doi www
- Secure and non-interactive k-NN classifier using symmetric fully homomorphic encryption. In Privacy in statistical databases (PSD'2022), pages 142-154, Springer International Publishing, Paris, France, Lecture Notes in Computer Science 13463, 2022. doi www
- TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum. In IEEE International Conference on Network Softwarization (NetSoft 2022), IEEE, Milan, Italy, 2022. doi www
- Vers une gestion d'identités auto-souveraine pour les dispositifs IoT. In Computer & Electronics Security Application Rendez-vous (C&ESAR), Rennes, France, 2022. www
2021
Articles de revue
- Security and trust in ubiquitous systems. In Annals of Telecommunications - annales des télécommunications, 76 (3-4): 117-118, 2021. doi www
- A modified LOF based approach for outlier characterization in IoT. In Annals of Telecommunications - annales des télécommunications, 76 (3-4): 145-153, 2021. doi www
- CPU-based prediction with Self Organizing Map in Dynamic Cloud Data Centers. In International Journal of Sensors, Wireless Communications and Control, 11 (7): 733-747, 2021. doi www
- Exploring the forecasting approach for road accidents: Analytical measures with hybrid machine learning. In Expert Systems with Applications (167): 113855, 2021. doi www
- IEEE Access Special Section Editorial: Edge Computing and Networking for Ubiquitous AI. In IEEE Access, 9: 90933-90936, 2021. doi www
Articles de conférence
- Identity Management with Hybrid Blockchain Approach: A Deliberate Extension with Federated-Inverse-Reinforcement Learning. In IEEE 22nd International Conference on High Performance Switching and Routing (HPSR), pages 1-6, IEEE, Paris, France, 2021. doi www
- A near-autonomous and incremental intrusion detection system through active learning of known and unknown attacks. In IEEE International Conference on Security, Pattern Analysis, and Cybernetics, pages 374-379, IEEE, Chengdu, China, 2021. doi www
- Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks. In PEMWN 2021 - 10th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, Waterloo, Canada, 2021. www
- Energy-aware Service Level Agreements in 5G NFV architecture. In 8th International Conference on Future Internet of Things and Cloud (FiCloud), pages 377-382, IEEE, Rome, Italy, 2021. doi www
- Energy-aware VM Placement based on intra-balanced resource allocation in data centers. In 8th International Conference on Future Internet of Things and Cloud (FiCloud), pages 400-405, IEEE, Rome, Italy, 2021. doi www
Actes de colloque
- Mobile, Secure, and Programmable Networking: 6th international conference, MSPN 2020: Paris, France, October 28--29, 2020, revised selected papers. Springer, Paris, France, Lecture Notes in Computer Science (LNCS) 12605, 2021. www
2020
Articles de revue
- An outlier ensemble for unsupervised anomaly detection in honeypots data. In Intelligent Data Analysis, 2020. doi www
- Workflow scheduling with data transfer optimization and enhancement of reliability in cloud data centers. In International journal of communication networks and distributed systems, 24 (3), 2020. doi www
- A recommendation approach using forwarding graph to analyze mapping algorithms for Virtual Network Functions. In Recent Advances in Computer Science and Communications, 13 (6): 1325-1337, 2020. doi www
- Property based Token Attestation in Mobile Computing. In Concurrency and Computation: Practice and Experience, 2020. doi www
- IoT-Based Smart Home Process Management Using a Workflow Approach. In International Journal of Information Technology and Web Engineering, 15 (2): 50-76, 2020. doi www
- A Realistic Deployment of Named Data Networking in the Internet of Things. In Journal of Cyber Security and Mobility, 9 (1), 2020. doi www
- Matrix-based key management scheme for IoT networks. In Ad Hoc Networks, 97: 102003, 2020. doi www
- Modified reinforcement learning based- caching system for mobile edge computing. In Intelligent decision technologies, 14 (4): 537-552, 2020. doi www
Articles de conférence
- Parallel Applications Mapping onto Heterogeneous MPSoCs interconnected using Network on Chip. In The 6th International Conference on Mobile, Secure and Programmable Networking, Paris (virtuel), France, 2020. doi www
- Efficient and Lightweight Polynomial-based Key Management Scheme for Dynamic Networks. In Mobile, Secure, and Programmable Networking 6th International Conference, MSPN 2020, Paris, France, October 28--29, 2020, Revised Selected Papers, Paris (virtuel), France, 2020. doi www
- Budget-aware performance optimization of workows in multiple data center clouds. In The 6th International Conference on Mobile, Secure and Programmable Networking, pages 144-160, Paris, France, 2020. www
2019
Articles de revue
- NDN-over-ZigBee: A ZigBee support for Named Data Networking. In Future Generation Computer Systems, 93: 792-798, 2019. doi www
- An efficient authentication and key agreement scheme for e-health applications in the context of Internet of Things. In International Journal of Information and Computer Security, 11 (3): 1, 2019. doi www
- A lightweight forwarding strategy for Named Data Networking in low-end IoT. In Journal of Network and Computer Applications (JNCA), 148: 102445, 2019. doi www
- Parallel Applications Mapping onto Network on Chip Based on Heterogeneous MPSoCs Using Hybrid Algorithms. In International Journal of Distributed Systems and Technologies, 10 (2): 37-63, 2019. doi www
Chapitres d'ouvrage
- Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System. In Security Designs for the Cloud, Iot, and Social Networking, Scrivener Publishing, 2019. doi www
Articles de conférence
- Self-Organizing Maps Applied to Soil Conservation in Mediterranean Olive Groves. In PEMWN2019 - 8th IFIP/IEEE International Conference on Performance Evaluation and Modeling inWired andWireless Networks, Paris, France, 2019. www
- Modeling and Improving Named Data Networking over IEEE 802.15.4. In IFIP/IEEE PEMWN 2019 : IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, pages 1-6, IEEE, Paris, France, 2019. doi www
- New caching system under uncertainty for Mobile Edge Computing. In The Fourth IEEE International Conference on Fog and Mobile Edge Computing, Rome, Italy, 2019. www
- Comparing different Machine-Learning techniques to predict Vehicles' Positions using the received Signal Strength of periodic messages. In WMNC 2019. 12th IFIP Wireless and Mobile Networking Conference, Paris, France, 2019. www
Actes de colloque
- Mobile, Secure, and Programmable Networking: 5th international conference, MSPN 2019, Mohammedia, Morocco, April 23-24, 2019, revised selected papers. Springer, Mohammedia, Morocco, Lecture Notes in Computer Science (LNCS) 11557, 2019. www
2018
Livres
- Mobile, secure, and programmable networking: 4th international conference, MSPN 2018, Paris, France, June 18-20, 2018, revised selected papers. Springer, Lecture Notes in Computer Science, volume 11005 , 2018. www
Articles de conférence
- Towards evaluating Named Data Networking for the IoT: A framework for OMNeT++. In OMNeT Community Summit 2018, Pise, Italy, 2018. www
- Towards privacy and ownership preserving of outsourced health data in IoT-cloud context. In 13th International Symposium on Programming and Systems, Alger, Algeria, 2018. doi www
- Predicting transmission success with Machine-Learning and Support Vector Machine in VANETs. In PEMWN 2018 - 7th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, Toulouse, France, 2018. www
- Predicting Vehicles' Positions using Roadside Units: a Machine-Learning Approach. In IEEE CSCN 2018- IEEE Conference on Standards for Communications and Networking, Paris, France, 2018. www
2017
Livres
- Mobile, secure, and programmable networking : third international conference, MSPN 2017, Paris, France, June 29-30, 2017, revised selected papers. Springer, Lecture Notes in Computer Science, volume 10566 , 2017. www
Chapitres d'ouvrage
- Exploring Formal Strategy Framework for the Security in IoT in e-health using Computational Intelligence. In Internet of Things and Big Data Technologies for Next Generation Healthcare, Springer, 2017. doi www
Articles de conférence
- Mobility Prediction in Vehicular Networks: An Approach through Hybrid Neural Network under Uncertainty. In International Conference on Mobile Secure and Programmable Networking (MSPN 2017), pp.195-217, Series Springer LNCS 10566, pages 178-194, Springer, Paris, France, MSPN 2017: Mobile, Secure, and Programmable Networking , 2017. doi www
- An Ultra-Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things. In International Conference on Mobile Secure and Programmable Networking (MSPN 2017), Springer, Paris, France, 2017. doi www
2016
Articles de revue
- Service Architecture for multi-environment Mobile Cloud Services. In International Journal of High Performance Computing and Networking, 2016. doi www
Livres
- Mobile, secure, and programmable networking : second international conference, MSPN 2016, Paris, France, June 1-3, 2016, revised selected papers. Springer, Lecture Notes in Computer Science 10026, 2016. www
Chapitres d'ouvrage
- Towards a Secure RA2DL Based Approach. In Evaluation of Novel Approaches to Software Engineering 11th International Conference, ENASE 2016, Rome, Italy, April 27--28, 2016, Revised Selected Papers, pages 89-110, Springer, 2016. doi www
Articles de conférence
- Convergence in trusted computing and virtualized systems: A new dimension towards trusted intelligent system. In The 5th IFIP Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN 2016), Paris, France, 2016. doi www
- A New Scalable and Energy Efficient Algorithm for VMs Reassignment in Cloud Data Centers. In IEEE FiCLOUD, Vienne, Austria, 2016. www
- Virtualization techniques: challenges & opportunities. In MSPN 2016 : International Conference on Mobile, Secure and Programmable Networking, pages 49-62, Springer, Paris, France, 2016. doi www
- RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems. In 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering, pages 102-111, SCITEPRESS - Science and and Technology Publications, Rome, Italy, 2016. doi www
- Energy efficiency in Mobile Cloud Computing Architectures. In FiCloud Workshops 2016, Vienna, Austria, Austria, 2016. doi www
2015
Livres
- Mobile, secure, and programmable networking : first international conference, MSPN 2015, Paris, France, June 15-17, 2015, selected papers. Springer international publishing, Lecture Notes in Computer Science 9395, 2015. www
- Digital Identity Management. Iste, 2015. www
Articles de conférence
- Middleware to Integrate Mobile Devices, Sensors and Cloud Computing. In ANT 2015 - 6th International Conference on Ambient Systems, Networks and Technologies, pages 234-243, Elsevier, Greenwich,London, United Kingdom, 2015. doi www
- New Solutions for Useful Execution Models of Communicating Adaptive RA2DL. In 14th International Conference on Intelligent Software Methodologies, Tools and Techniques (SoMET'2015), pages 87-101, Naples, Italy, 2015. doi www
- Toward a Framework in Cloudlet-Based Architecture for a Real-Time Predictional Model. In 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), pages 1016-1021, IEEE, Beijing, China, 2015. doi www
- A Hybrid Algorithm for DAG Application Scheduling on Computational Grids. In International Conference on Mobile, Secure and Programmable Networking (MSPN'2015), pages 63-77, Springer, Paris, France, 2015. doi www
- RA2DL: New Flexible Solution for Adaptive AADL-based Control Components. In 5th international conference on Pervasive and embedded computing and communication systems, pages 63-77, Angers, France, 2015. www
2014
Livres
- La gestion des identités numériques. , 2014. www
Chapitres d'ouvrage
- L?identité numérique dans le Cloud Computing. In La gestion des identités numériques, pages 340, 2014. www
- Systèmes d?authentification. In La gestion des identités numériques, pages 340, 2014. www
Articles de conférence
- Analysis and Detection of DoS Attacks in Cloud Computing by Using QSE Algorithm. In The 16th IEEE International Conference on High Performance Computing and Communications, pages 1117-1124, X, France, 2014. www
- Trusted Platforms to secure Mobile Cloud Computing. In The 16th IEEE International Conference on High Performance Computing and Communications, pages 1096-1103, X, France, 2014. www
- Cloudlets Authentication in NFC-based Mobile Computing. In 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pages 267 ? 272, Oxford, United Kingdom, 2014. www
2013
Livres
- Les cartes `a puce. Lavoisier, 2013. www
Chapitres d'ouvrage
- Mise en oeuvre d'une application, choix de solutions, performances. In Mise en oeuvre d?une application, choix de solutions, performances, 2013. www
- Mise en oeuvre d'une application, choix de solutions, performances. In Les cartes `a puce, pages 350, Hermes, 2013. www
- Java Card et son évolution. In Les cartes `a puce, pages 326, 2013. www
Articles de conférence
- Towards secure identity management in smartphone environments. In 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pages 2133-2135, X, France, 2013. www
- A Cloud based Dual-Root Trust Model for Secure Mobile Online Transactions. In IEEE WCNC (Wireless Communications and Networking Conference), pages 4404-4409, Shangai, France, 2013. www
- Towards a Modular and Lightweight Model for Android Development Platforms. In 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pages 2129-2132, X, France, 2013. www
- MCC-OSGi: An OSGi-based Mobile Cloud Service Model. In The IEEE ISADS (Eleventh International Symposium on Autonomous Decentralized Systems), pages 37-44, Mexico, France, 2013. www
- Making Offloading Decisions Resistant to Network Unavailability for Mobile Cloud Collaboration. In 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pages `a para^itre, X, United States, 2013. www
2012
Articles de conférence
- An OSGi Based Service Architecture in The Context of Tag-to-MobiCloud Computing. In Chip-to-Cloud Security Forum, Nice, France, 2012. www
2011
Articles de revue
- Anomaly Detection in RFID system. In International Journal of Radio Frequency Identification Technology and Applications, 3: 1-13, 2011. doi www
- A user-centric PKI based-protocol to manage FC$^2$ digital identities. In International Journal of Computer Science, Vol. 8 (Issue 1): 1694-0814, 2011. www
Articles de conférence
- Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS Environments. In 4th IFIP International Conference on New Technologies, Mobility and Security, pages 1-5, Paris, France, 2011. www
- Integrating a service architecture based on OSGI within Android platforms. In e-Smart Conference, Sept. 2011, Nice Antipolis, France, 2011. www
- Privacy preservation and low cost authentication in federated identity management systems. In E-SMART 2011 : The Future of Digital Security Technologies, pages ., Nice, France, 2011. www
- An OSGi-based Service Oriented Architecture for Android Software Development Platforms. In International Conference on Software Systems Engineering and their Applications, pages 1-10, Paris, France, 2011. www
- A new security architecture for mesh networks: Application to sensor networks and ZigBee standard. In The International Conference on Secure Networking and Applications, pages 36-39, X, France, 2011. www
2009
Articles de conférence
- Measurement Analysis when Benchmarking Java Card Platforms. In Workshop in Information Security Theory and Practices, Belgium, pages 84-94, X, France, LNCS , 2009. www
2008
Articles de revue
- Handling Overload and Data-relaxation Control in Distributed Real-Time Database Systems. In International Journal of computer and their applications, 15: 187-200, 2008. www
- Gestion de la surcharge dans les systèmes de gestion de base de données temps réel. In Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 27: 879-910, 2008. www
Articles de conférence
- A methodology for testing Java Card performance. In CFSE'08 Conférence Franc caise en Systèmes d'Exploitation, Suisse, X, France, 2008. www
- Identity management systems and interoperability in a heterogeneous environment. In Int. Conf. on Advanced Technologies for Communications, Hanoi, pages 243-246, X, France, 2008. www
- An Open-Source Tool to Benchmark Java Card Platforms. In e-Smart Conf., Sophia Antipolis, X, France, 2008. www
- Evaluation of Java Card Performance. In Cardis'08 Eighth Smart Card Research and Advanced Application Conf., Egham, Surrey, England, pages 228-240, X, France, LNCS 5189 / IFIP , 2008. www
2007
Articles de conférence
- A Typed Compositional Language for Real-Time Systems. In IEEE Int. Symposium on High Assurance Systems Engineering, Dallas, pages 63-72, X, France, 2007. www
- Performance Evaluation of Java Card Bytecodes. In Workshop in Information Security Theory and Practices 2007: Smart Cards,Mobile and Ubiquitous Comput, pages 127-137, X, France, LNCS 4462 , 2007. www
- How to Measure the Performance of Java Card Platforms?. In e-Smart Conf., Sophia Antipolis, X, France, 2007. www
2006
Articles de conférence
- Vers une approche par composants pour la modélisation d'applications temps réel. In MOSIM'06 Conférence Francophone de Modélisation et Simulation, Rabat, pages 1-10, X, France, 2006. www
- Applying the CBSE paradigm on real-time systems. In WFCS'06 IEEE Int. Workshop on Factory Communication Systems, Torino, pages 368-373, X, France, 2006. www
2005
Articles de conférence
- BOSSA et le Concert Virtuel Réparti, intégration et paramétrage souple d'une politique d'ordonnancement spécifique pour une application multimédia distribuée. In RTS''05 13th Int. Conf. on Real-Time Systems Paris, pages 18-39, X, France, 2005. www
- Performing Real-Time Scheduling in an Interactive Audio-Streaming Application. In Int. Conf. on Enterprise Information Systems, Miami, pages 140-147, X, France, ISBN 972-8865-19-8 5, 2005. www
- Utilisation de l'approche par composants pour la conception d'applications temps réel. In (RJCITR'05) Premières Rencontres des Jeunes Chercheurs en Informatique Temps Réel, Nancy, X, France, 2005. www
2004
Articles de conférence
- A transactional multi-mode model to handle overload in distributed RTDBSs. In 6th Int. Conf. on Enterprise Information Systems, Porto., pages 328-336, X, France, 2004. www
- A Java Platform to Control Real-Time Transactions Overload. In The 7th IEEE Int. Symp. on Object-oriented Real-time distributed Computing, pages 219-226, X, France, 2004. www
2003
Livres
Articles de conférence
- How to Manage Real-Time Transactions Overload in epsilon-data applications ?. In The 15th EuroMicro Real-Time Systems Conference (WIP Session), Porto, X, France, 2003. www
- Distributed Overload Control for Real-Time Replicated Database Systems. In The 5th Int. Conf. on Enterprise Information Systems, Angers (France), pages 380-388, X, France, 2003. www
- How to Manage Replicated Real-Time Databases in an Overloaded Distributed System?. In Real-Time Systems Conference, Paris, pages 484-501, X, France, 2003. www