Selective user plane protection in 5g virtual ran

Stere Preda , Daniel Migault , Amine Boukhtouta , Xiaowen Yue

1
2023
Forensic Data Analytics for Anomaly Detection in Evolving Networks

Li Yang , Abdallah Moubayed , Abdallah Shami , Amine Boukhtouta
99 -137

1
2023
1
2021
Diameter spoofing detection and post-spoofing attack prevention

Hyame Alameddine , MADI Taous , Amine Boukhtouta , Daniel Migault

2024
QoS AWARE REINFORCEMENT LEARNING PREVENTION INTRUSION SYSTEM

Amine Boukhtouta , Hyame Alameddine , MADI Taous , Christian Miranda Moreira

2023
Radio access network (ran) architecture

LI Wubin , Amine Boukhtouta , Daniel Migault , Stere Preda

2023
Ipsec privacy protection

Daniel Migault , Stere Preda , Amine Boukhtouta , Fereydoun FARRAHI MOGHADDAM

2023
Security Evaluation and Hardening of Free and Open Source Software (FOSS)

Robert Charpentier , Mourad Debbabi , Dima Alhadidi , Azzam Mourad
Foundations and Techniques for Open Source Software Certification 2010 33 18 -18

2010
On the analysis of the Zeus botnet crimeware toolkit

Hamad Binsalleeh , Thomas Ormerod , Amine Boukhtouta , Prosenjit Sinha
conference on privacy, security and trust 31 -38

180
2010
Capturing Returned Computable Values in AspectJ for Security Hardening

A. Boukhtouta , D. Alhadidi , M. Debbabi
Information Security Journal: A Global Perspective 18 ( 2) 87 -98

2009
Graph-theoretic characterization of cyber-threat infrastructures

M. Boukhtouta , A. , Mouheb , D.
Digital Investigation 14

16
2015
A new paradigm for decision-making: Business Intelligence and Digital Cockpits

A Boukhtouta , M Debbabi , N Tawbi
Proceedings of the 10th ISPE International Conference on Concurrent Engineering. Swets en Zeitlinger BV https://www. scopus. com/inward/record. uri

1
2003