关注
Phd REZOUG Nachida
Phd REZOUG Nachida
professor of computer science
在 esi.dz 的电子邮件经过验证
标题
引用次数
引用次数
年份
Survey of Machine Learning based intrusion detection methods for Internet of Medical Things
A Si-Ahmed, MA Al-Garadi, N Boustia
Applied Soft Computing 140, 110227, 2023
692023
A dynamic access control model
N Boustia, A Mokhtari
Applied Intelligence 36, 190-207, 2012
212012
A new collaborative filtering approach based on game theory for recommendation systems
S Benkessirat, N Boustia, R Nachida
Journal of web engineering 20 (2), 303-326, 2021
182021
Representation and reasoning on orbac: Description logic with defaults and exceptions approach
N Boustia, A Mokhtari
2008 Third International Conference on Availability, Reliability and …, 2008
152008
Detection of phishing URLs using temporal convolutional network
MA Remmide, F Boumahdi, N Boustia, CL Feknous, R Della
Procedia Computer Science 212, 74-82, 2022
112022
Dynamic delegation based on temporal context
O Bettaz, N Boustia, A Mokhtari
Procedia Computer Science 96, 245-254, 2016
112016
A mixed deep learning based model to early detection of depression
B Fatima, M Amina, R Nachida, H Hamza
Journal of Web Engineering 19 (3–4), 429-455, 2020
102020
OrBAC from access control model to access usage model
K Guesmia, N Boustia
Applied Intelligence 48, 1996-2016, 2018
92018
Bridging context and data warehouses through ontologies
O Barkat, S Khouri, L Bellatreche, N Boustia
Proceedings of the Symposium on Applied Computing, 336-341, 2017
82017
Modeling disjunctive context in access control
N Boustia, S Dahlab, A Mokhtari, A Usthb
context 22, 23, 2012
82012
A contextual multilevel access control model with default and exception description logic
N Boustia, A Mokhtari
2010 International Conference for Internet Technology and Secured …, 2010
62010
ProRes: proactive re-selection of materialized views
MC Mouna, L Bellatreche, N Boustia
Computer Science and Information Systems 19 (2), 735-762, 2022
52022
Phishing Email detection using Bi-GRU-CNN model
MA Remmide, F Boumahdi, N Boustia
International conference on applied cybersecurity, 71-77, 2021
52021
Deep learning for recommender systems: Literature review and perspectives
B Selma, B Narhimène, R Nachida
2021 International Conference on Recent Advances in Mathematics and …, 2021
52021
Extending nonmonotonic description logic with temporal aspects
O Bettaz, N Boustia, A Mokhtari
2013 IEEE INISTA, 1-5, 2013
52013
DLδǫ− OrBAC: Context based Access Control
N Boustia, A Mokhtari
Proc. WOSIS’09, 111-118, 2009
52009
Contextual‐based approach to reduce false positives
N Chergui, N Boustia
IET Information Security 14 (1), 89-98, 2020
42020
Overview of recommendation systems
S Benkessirat, N Boustia, N Rezoug
Smart Education and e-Learning 2019, 357-372, 2019
42019
HYRAQ: optimizing large-scale analytical queries through dynamic hypergraphs
MC Mouna, L Bellatreche, N Boustia
Proceedings of the 24th Symposium on International Database Engineering …, 2020
32020
A contextual attribute based access control model based on T-JClassicδ∊
K Guesmia, N Boustia
2015 12th International Symposium on Programming and Systems (ISPS), 1-6, 2015
32015
系统目前无法执行此操作,请稍后再试。
文章 1–20