Follow
Louafi, Habib
Title
Cited by
Cited by
Year
Dynamic Optimal Countermeasure Selection for Intrusion Response System
A Shameli-Sendi, H Louafi, W He, M Cheriet
Dependable and Secure Computing, IEEE Transactions on, 2016
812016
Preserving both privacy and utility in network trace anonymization
M Mohammady, L Wang, Y Hong, H Louafi, M Pourzandi, M Debbabi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
412018
Quality prediction-based dynamic content adaptation framework applied to collaborative mobile presentations
H Louafi, S Coulombe, U Chandra
Mobile Computing, IEEE Transactions on 12 (10), 2024-2036, 2013
112013
Multi-Objective Optimization in Dynamic Content Adaptation of Slide Documents
H Louafi, S Coulombe, M Cheriet
Services Computing, IEEE Transactions on, 2015
92015
Efficient near-optimal dynamic content adaptation applied to JPEG slides presentations in mobile web conferencing
H Louafi, S Coulombe, U Chandra
2013 IEEE 27th International Conference on Advanced Information Networking …, 2013
82013
SYSTEMS AND METHODS FOR DETECTION OF ABNORMAL UE BEHAVIOR
H Louafi, M Pourzandi
WO Patent WO/2020/049,346, 2020
72020
Robust QoE-aware prediction-based dynamic content adaptation framework applied to slides documents in mobile Web conferencing
H Louafi, S Coulombe, U Chandra
Multimedia Tools and Applications 74 (18), 7883-7920, 2014
62014
A multi-view approach to preserve privacy and utility in network trace anonymization
M Mohammady, M Oqaily, L Wang, Y Hong, H Louafi, M Pourzandi, ...
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-36, 2021
42021
A Defense-Centric Model for Multi-step Attack Damage Cost Evaluation
A Shameli-Sendi, H Louafi, W He, M Cheriet
Future Internet of Things and Cloud (FiCloud), 2015 3rd International …, 2015
42015
Two-stage clustering for improve indoor positioning accuracy
H Lin, H Purmehdi, X Fei, Y Zhao, A Isac, H Louafi, W Peng
Automation in Construction, Elsevier 154, 1-10, 2023
22023
A feistel network-based prefix-preserving anonymization approach, applied to network traces
S Dandyan, H Louafi, S Sadaoui
2022 19th Annual International Conference on Privacy, Security & Trust (PST …, 2022
22022
Efficient IoT Device Fingerprinting Approach using Machine Learning
R Osei, H Louafi, M Mouhoub, Z Zhu
Proceedings of the 19th International Conference on Security and …, 2022
22022
Optimizing IoT device fingerprinting using machine learning
O Falola, H Louafi, M Mouhoub
Innovations in Digital Forensics, 293-317, 2023
12023
Payless monitoring service for tenants in cloud with traffic and energy-aware function deployment
A Shameli-Sendi, H Louafi, M Cheriet
2017 IEEE International Conference on Cloud Computing Technology and Science …, 2017
12017
An IoT Security Risk Assessment Framework for Healthcare Environment
M Waqdan, H louafi, M Mouhoub
2023 International Symposium on Networks, Computers and Communications …, 2023
2023
An Instance-based Transfer Learning Approach, Applied to Intrusion Detection
S Kawish, H Louafi, Y Yao
2023 20th Annual International Conference on Privacy, Security & Trust (PST …, 2023
2023
A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare Environment
M Waqdan, H Louafi, M Mouhoub
Proceedings of the 20th International Conference on Security and …, 2023
2023
An Event-Driven Forensic Auditing Framework for Clouds
H Louafi, Y Xin, M Bozorgi, R Ellis, Y Jarraya, M Pourzandi, L Wang
Innovations in Digital Forensics, 191-228, 2023
2023
Digital Evidence Collection in IoT Environment
JI Obioha, AP Mohan, H Louafi
Innovations in Digital Forensics, 263-292, 2023
2023
A TOPSIS-based QoE model for adapted content selection of slide documents
H Louafi, S Coulombe, M Cheriet
Multimedia Tools and Applications 77 (20), 26741-26768, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20