Survey of Machine Learning based intrusion detection methods for Internet of Medical Things A Si-Ahmed, MA Al-Garadi, N Boustia Applied Soft Computing 140, 110227, 2023 | 69 | 2023 |
A dynamic access control model N Boustia, A Mokhtari Applied Intelligence 36, 190-207, 2012 | 21 | 2012 |
A new collaborative filtering approach based on game theory for recommendation systems S Benkessirat, N Boustia, R Nachida Journal of web engineering 20 (2), 303-326, 2021 | 18 | 2021 |
Representation and reasoning on orbac: Description logic with defaults and exceptions approach N Boustia, A Mokhtari 2008 Third International Conference on Availability, Reliability and …, 2008 | 15 | 2008 |
Detection of phishing URLs using temporal convolutional network MA Remmide, F Boumahdi, N Boustia, CL Feknous, R Della Procedia Computer Science 212, 74-82, 2022 | 11 | 2022 |
Dynamic delegation based on temporal context O Bettaz, N Boustia, A Mokhtari Procedia Computer Science 96, 245-254, 2016 | 11 | 2016 |
A mixed deep learning based model to early detection of depression B Fatima, M Amina, R Nachida, H Hamza Journal of Web Engineering 19 (3–4), 429-455, 2020 | 10 | 2020 |
OrBAC from access control model to access usage model K Guesmia, N Boustia Applied Intelligence 48, 1996-2016, 2018 | 9 | 2018 |
Bridging context and data warehouses through ontologies O Barkat, S Khouri, L Bellatreche, N Boustia Proceedings of the Symposium on Applied Computing, 336-341, 2017 | 8 | 2017 |
Modeling disjunctive context in access control N Boustia, S Dahlab, A Mokhtari, A Usthb context 22, 23, 2012 | 8 | 2012 |
A contextual multilevel access control model with default and exception description logic N Boustia, A Mokhtari 2010 International Conference for Internet Technology and Secured …, 2010 | 6 | 2010 |
ProRes: proactive re-selection of materialized views MC Mouna, L Bellatreche, N Boustia Computer Science and Information Systems 19 (2), 735-762, 2022 | 5 | 2022 |
Phishing Email detection using Bi-GRU-CNN model MA Remmide, F Boumahdi, N Boustia International conference on applied cybersecurity, 71-77, 2021 | 5 | 2021 |
Deep learning for recommender systems: Literature review and perspectives B Selma, B Narhimène, R Nachida 2021 International Conference on Recent Advances in Mathematics and …, 2021 | 5 | 2021 |
Extending nonmonotonic description logic with temporal aspects O Bettaz, N Boustia, A Mokhtari 2013 IEEE INISTA, 1-5, 2013 | 5 | 2013 |
DLδǫ− OrBAC: Context based Access Control N Boustia, A Mokhtari Proc. WOSIS’09, 111-118, 2009 | 5 | 2009 |
Contextual‐based approach to reduce false positives N Chergui, N Boustia IET Information Security 14 (1), 89-98, 2020 | 4 | 2020 |
Overview of recommendation systems S Benkessirat, N Boustia, N Rezoug Smart Education and e-Learning 2019, 357-372, 2019 | 4 | 2019 |
HYRAQ: optimizing large-scale analytical queries through dynamic hypergraphs MC Mouna, L Bellatreche, N Boustia Proceedings of the 24th Symposium on International Database Engineering …, 2020 | 3 | 2020 |
A contextual attribute based access control model based on T-JClassicδ∊ K Guesmia, N Boustia 2015 12th International Symposium on Programming and Systems (ISPS), 1-6, 2015 | 3 | 2015 |