Cybersecurity Collaboratory

2013-2018

Cyberspace Threat Identification, Analysis and Proactive Response


2017

  1. Mokhtar Sellami, Mohand-Said Hacid, Mohamed Mohsen Gammoudi: An Incremental Approach to Data Integration in Presence of Access Control Policies. FAS*W@SASO/ICCAC 2017 187-190
  2. Sara Makki, Rafiqul Haque, Yehia Taher, Zainab Assaghir, Gregory Ditzler, Mohand-Said Hacid, Hassan Zeineddine: Fraud Analysis Approaches in the Age of Big Data - A Review of State of the Art. FAS*W@SASO/ICCAC 2017243-250
  3. Manash Sarkar, Soumya Banerjee, Youakim Badr, Arun Kumar Sangaiah: Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence. IJACI 8(3). 1-21 (2017)
  4. Xiaoyang Zhu, Youakim Badr, Jesus Pacheco, Salim Hariri: Autonomic Identity Framework for the Internet of Things. ICCAC 2017.69-79
  5. Jesus Pacheco, Xiaoyang Zhu, Youakim Badr, Salim Hariri: Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System FAS*W@SASO/ICCAC 2017.324-328
  6. Salim Hariri, Cihan Tunc, Youakim Badr: Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview. FAS*W@SASO/ICCAC 2017 352-356
  7. Mohammed Lalou, Hamamache Kheddouci, Salim Hariri: Identifying the Cyber Attack Origin with Partial Observation: A Linear Regression Based Approach. FAS*W@SASO/ICCAC 2017329-333
  8. Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Lionel Brunie, Osama Younes, Mohiy M. Hadhoud: A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applications. CCNC 2017 829-834
  9. Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie: Self-reported Verifiable Reputation with Rater Privacy. IFIPTM 2017 180-195
  10. Manuel Barbosa, Sonia Ben Mokhtar, Pascal Felber, Francisco Maia, Miguel Matos, Rui Oliveira, Etienne Riviere, Valerio Schiavoni, Spyros Voulgaris:
  11. SAFETHINGS: Data Security by Design in the IoT. EDCC 2017 17-120
  12. Sophie Cerf, Vincent Primault, Antoine Boutet, Sonia Ben Mokhtar, Robert Birke, Sara Bouchenak, Lydia Y. Chen, Nicolas Marchand, Bogdan Robu
  13. PULP: Achieving Privacy and Utility Trade-Off in User Mobility Data. SRDS 2017 164-173
  14. Esmaili, Ehsan, Ali Akoglu, Gregory Ditzler, Salim Hariri, Talal Moukabary, and Jeno Szep: Autonomic Management of 3D Cardiac Simulations. In Cloud and Autonomic Computing (ICCAC), 2017 International Conference on, pp. 1-9 IEEE, 2017
  15. Almoualem, Firas, Pratik Satam, Jang-Geun Ki, and Salim Hariri: SDR-Based Resilient Wireless Communications. In Cloud and Autonomic Computing (ICCAC), 2017 International Conference on, pp. 114-119. IEEE, 2017
  16. Satam, Pratik, Jesus Pacheco, Salim Hariri, and Mohommad Horani: Autoinfotainment Security Development Framework (ASDF) for Smart Cars. In Cloud and Autonomic Computing (ICCAC), 2017 International Conference on, pp. 153-159. IEEE, 2017.
  17. Tunc, Cihan, Farah Fargo, Youssif Al-Nashif, and Salim Hariri: Autonomic Cross-Layer Management of Cloud Systems. In Foundations and Applications of Self* Systems (FAS* W), 2017 IEEE 2nd International Workshops on, pp. 160-165. IEEE, 2017.
  18. Ozdemir, Ahmet Turan, Cihan Tunc, and Salim Hariri: Autonomic Fall Detection System. In Foundations and Applications of Self* Systems (FAS* W), 2017 IEEE 2nd International Workshops on, pp. 166-170. IEEE, 2017.
  19. Shao, Sicong, Cihan Tunc, Pratik Satam, and Salim Hariri: Real-Time IRC Threat Detection Framework. In Foundations and Applications of Self* Systems (FAS* W), 2017 IEEE 2nd International Workshops on, pp. 318-323. IEEE, 2017.
  20. Satam, Pratik, Jesus Pacheco, Salim Hariri, and Mohommad Horani: Autoinfotainment Security Development Framework (ASDF) for Smart Cars. In Cloud and Autonomic Computing (ICCAC), 2017 International Conference on, pp. 153-159. IEEE, 2017.

2016

  1. Hassina Meziane, Salima Benbernou, Mohand-Said Hacid, Zaki Malik, Mike P. Papazoglou: A view-based monitoring for usage control in web services. Distributed and Parallel Databases 34(2): 145-178 (2016)
  2. Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid: Access Control Enforcement for Selective Disclosure of Linked Data. STM 2016: 47-63
  3. Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar, Lionel Brunie, Ammar Hasan: 4PR: Privacy preserving routing in mobile delay tolerant networks. Computer Networks 111: 17-28 (2016)
  4. Albin Petit, Thomas Cerqueus, Antoine Boutet, Sonia Ben Mokhtar, David Coquil, Lionel Brunie, Harald Kosch: SimAttack: private web search under fire. J. Internet Services and Applications 7(1): 2:1-2:17 (2016)
  5. Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie: A Trustless Privacy-Preserving Reputation System. SEC 2016: 398-411
  6. Vincent Primault, Antoine Boutet, Sonia Ben Mokhtar, Lionel Brunie: Adaptive Location Privacy with ALP. SRDS 2016: 269-278
  7. Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie: A trustless privacy-preserving reputation system. IACR Cryptology ePrint Archive 2016: 16 (2016)
  8. Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie: A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval. IACR Cryptology ePrint Archive 2016: 416 (2016)
  9. Antoine Boutet, Albin Petit, Sonia Ben Mokhtar, Léa Laporte: Leveraging Query Sensitivity for Practical Private Web Search. Middleware Posters and Demos 2016: 5-6
  10. Sophie Cerf, Bogdan Robu, Nicolas Marchand, Antoine Boutet, Vincent Primault, Sonia Ben Mokhtar, Sara Bouchenak: Toward an Easy Configuration of Location Privacy Protection Mechanisms. Middleware Posters and Demos 2016: 11-12
  11. Pan, Zhiwen, Jesus Pacheco, and Salim Hariri: Anomaly behavior analysis for building automation systems. In Computer Systems and Applications (AICCSA), 2016 IEEE/ACS 13th International Conference of, pp. 1-8. IEEE, 2016.
  12. Kumbhare, Nirmal, Cihan Tunc, Salim Hariri, Ivan Djordjevic, Ali Akoglu, and Howard Jay Siegel: Just In Time Architecture (JITA) for dynamically composable data centers. In Computer Systems and Applications (AICCSA), 2016 IEEE/ACS 13th International Conference of, pp. 1-8. IEEE, 2016.
  13. Jesus Pacheco, Cihan Tunc, Pratik Satam, Salim Hariri: Secure and Resilient Cloud Services for Enhanced Living Environments. IEEE Cloud Computing 3(6): 44-52 (2016)
  14. Gu, Shuqing, Likai Yao, Cihan Tunc, Ali Akoglu, Salim Hariri, and Elizabeth Ritchie: An Autonomic Workflow Performance Manager for Weather Research and Forecast Workflows. In Cloud and Autonomic Computing (ICCAC), 2016 International Conference on, pp. 111-114. IEEE, 2016.
  15. Tunc, Cihan, Nirmal Kumbhare, Ali Akoglu, Salim Hariri, Dylan Machovec, and Howard Jay Siegel: Value of service based task scheduling for cloud computing systems. In Cloud and Autonomic Computing (ICCAC), 2016 International Conference on, pp. 1-11. IEEE, 2016.
  16. Yu, Jiakai, Cihan Tunc, and Salim Hariri: Automated Framework for Scalable Collection and Intelligent Analytics of Hacker IRC Information. In Cloud and Autonomic Computing (ICCAC), 2016 International Conference on, pp. 33-39. IEEE, 2016.
  17. Pacheco, Jesus, Cihan Tunc, and Salim Hariri: Design and evaluation of resilient infrastructures systems for smart cities. In Smart Cities Conference (ISC2), 2016 IEEE International, pp. 1-6. IEEE, 2016.
  18. Pacheco, Jesus, Shalaka Satam, Salim Hariri, Clarisa Grijalva, and Helena Berkenbrock: IoT Security Development Framework for building trustworthy Smart car services. In Intelligence and Security Informatics (ISI), 2016 IEEE Conference on, pp. 237-242. IEEE, 2016.
  19. Pacheco, Jesus, and Salim Hariri: IoT security framework for smart cyber infrastructures. In Foundations and Applications of Self* Systems, IEEE International Workshops on, pp. 242-247. IEEE, 2016.
  20. Pacheco, Jesus, Cihan Tunc, and Salim Hariri: Design and evaluation of resilient infrastructures systems for smart cities. In Smart Cities Conference (ISC2), 2016 IEEE International, pp. 1-6. IEEE, 2016.
  21. Tunc, Cihan, Nirmal Kumbhare, Ali Akoglu, Salim Hariri, Dylan Machovec, and Howard Jay Siegel: Value of service based task scheduling for cloud computing systems. In Cloud and Autonomic Computing (ICCAC), 2016 International Conference on, pp. 1-11. IEEE, 2016.

2015

  1. Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid: Inference Leakage Detection for Authorization Policies over RDF Data. DBSec 2015: 346-361
  2. Mokhtar Sellami, Mohand-Said Hacid, Mohamed Mohsen Gammoudi: Inference Control in Data Integration Systems. OTM Conferences 2015: 285-302
  3. Youakim Badr, Salim Hariri, Youssif B. Al-Nashif, Erik Blasch: Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments. ICCS 2015: 2623-2637
  4. Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Osama Younes, Mohey M. Hadhoud, Lionel Brunie: Trust management and reputation systems in mobile participatory sensing applications: A survey. Computer Networks 90: 49-73 (2015)
  5. Heidi Dikow, Omar Hasan, Harald Kosch, Lionel Brunie, Renaud Sornin: Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction. Computing 97(1): 29-49 (2015)
  6. Vincent Primault, Sonia Ben Mokhtar, Lionel Brunie: Privacy-Preserving Publication of Mobility Data with High Utility. ICDCS 2015: 802-803
  7. Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie: Time Distortion Anonymization for the Publication of Mobility Data with High Utility. TrustCom/BigDataSE/ISPA (1) 2015: 539-546
  8. Albin Petit, Thomas Cerqueus, Sonia Ben Mokhtar, Lionel Brunie, Harald Kosch: PEAS: Private, Efficient and Accurate Web Search. TrustCom/BigDataSE/ISPA (1) 2015: 571-580
  9. Vincent Primault, Sonia Ben Mokhtar, Lionel Brunie: Privacy-preserving Publication of Mobility Data with High Utility. CoRR abs/1506.09074 (2015)
  10. Al Baalbaki, Bilal, Jesus Pacheco, Cihan Tunc, Salim Hariri, and Youssif Al-Nashif: Anomaly behavior analysis system for ZigBee in smart buildings. In Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Conference of, pp. 1-4. IEEE, 2015.
  11. Satam, Pratik, Hamid Alipour, Youssif B. Al-Nashif, and Salim Hariri: Anomaly Behavior Analysis of DNS Protocol. J. Internet Serv. Inf. Secur. 5, no. 4 (2015): 85-97.
  12. Al Baalbaki, Bilal, Jesus Pacheco, Cihan Tunc, Salim Hariri, and Youssif Al-Nashif: Anomaly behavior analysis system for ZigBee in smart buildings. In Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Conference of, pp. 1-4. IEEE, 2015.
  13. Tunc, Cihan, and Salim Hariri: CLaaS: Cybersecurity Lab as a Service. J. Internet Serv. Inf. Secur. 5, no. 4 (2015): 41-59.

2014

  1. Mehdi Haddad, Jovan Stevovic, Annamaria Chiasera, Yannis Velegrakis, Mohand-Said Hacid: Access Control for Data Integration in Presence of Data Dependencies. DASFAA (2) 2014: 203-217
  2. Mokhtar Sellami, Mohamed Mohsen Gammoudi, Mohand-Said Hacid: Secure Data Integration: A Formal Concept Analysis Based Approach. DEXA (2) 2014: 326-333
  3. Albin Petit, Sonia Ben Mokhtar, Lionel Brunie, Harald Kosch: Towards efficient and accurate privacy preserving web search. MW4NG@Middleware 2014: 1:1-1:6
  4. Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie: Differentially Private Location Privacy in Practice. CoRR abs/1410.7744 (2014)
  5. Nicolas Haderer, Vincent Primault, Patrice Raveneau, Christophe Ribeiro, Romain Rouvoy, Sonia Ben Mokhtar: Towards a practical deployment of privacy-preserving crowd-sensing tasks. Middleware (Posters & Demos) 2014: 43-44