default search action
Slim Trabelsi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c37]Sofiane Lounici, Melek Önen, Orhan Ermis, Slim Trabelsi:
BlindSpot: Watermarking Through Fairness. IH&MMSec 2022: 39-50 - 2021
- [c36]Sofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi:
Yes We can: Watermarking Machine Learning Models beyond Classification. CSF 2021: 1-14 - [c35]Sofiane Lounici, Marco Rosa, Carlo Maria Negri, Slim Trabelsi, Melek Önen:
Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques. ICISSP 2021: 145-159 - [c34]Carlos Ocanto Dávila, Rocío Cabrera Lozoya, Slim Trabelsi:
Sociocultural Influences for Password Definition: An AI-based Study. ICISSP 2021: 542-549 - [c33]Sabrina Kall, Slim Trabelsi:
An Asynchronous Federated Learning Approach for a Security Source Code Scanner. ICISSP 2021: 572-579 - [c32]Sofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi:
Preventing Watermark Forging Attacks in a MLaaS Environment. SECRYPT 2021: 295-306
2010 – 2019
- 2019
- [c31]Slim Trabelsi:
Monitoring Leaked Confidential Data. NTMS 2019: 1-5 - 2018
- [c30]Francesco Di Cerbo, Slim Trabelsi:
Towards Personal Data Identification and Anonymization Using Machine Learning Techniques. ADBIS (Short Papers and Workshops) 2018: 118-126 - [c29]Chedy Missaoui, Safa Bachouch, Ibrahim Abdelkader, Slim Trabelsi:
Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures. CSS 2018: 3-17 - [c28]Slim Trabelsi, Chedy Missaoui:
Dissuading Stolen Password Reuse. ETAA@ESORICS 2018: 116-128 - 2016
- [c27]Neil Ayeb, Francesco Di Cerbo, Slim Trabelsi:
Enhancing Access Control Trees for Cloud Computing. ICWE Workshops 2016: 29-38 - [c26]Slim Trabelsi, Skander Ben Mahmoud, Anis Zouaoui:
Predictive Model for Exploit Kit based Attacks. SECRYPT 2016: 477-482 - 2015
- [j3]Volkmar Lotz, Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi:
Security Certification for Service-Based Business Ecosystems. Comput. J. 58(4): 709-723 (2015) - [c25]Francesco Di Cerbo, Dolière Francis Somé, Laurent Gomez, Slim Trabelsi:
PPL v2.0: Uniform Data Access and Usage Control on Cloud and Mobile. TELERISE@ICSE 2015: 2-7 - [c24]Daniele Sgandurra, Francesco Di Cerbo, Slim Trabelsi, Fabio Martinelli, Emil C. Lupu:
Sharing Data through Confidential Clouds: An Architectural Perspective. TELERISE@ICSE 2015: 58-61 - [c23]Slim Trabelsi, Francesco Di Cerbo, Laurent Gomez, Michele Bezzi:
A Privacy Preserving Framework for Mobile and Cloud. MOBILESoft 2015: 160-161 - [c22]Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari:
Mining social networks for software vulnerabilities monitoring. NTMS 2015: 1-7 - [c21]Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari:
Monitoring Software Vulnerabilities through Social Networks Analysis. SECRYPT 2015: 236-242 - 2014
- [c20]Slim Trabelsi, Adrien Ecuyer, Paul Cervera y Alvarez, Francesco Di Cerbo:
Optimizing Access Control Performance for the Cloud. CLOSER 2014: 551-558 - [c19]Francesco Di Cerbo, Slim Trabelsi:
Re-Identification Risk Based Security Controls. OTM Workshops 2014: 99-107 - [c18]Laurent Gomez, Slim Trabelsi:
Obligation Based Access Control. OTM Workshops 2014: 108-116 - 2013
- [c17]Francesco Di Cerbo, Slim Trabelsi, Thomas Steingruber, Gabriella Dodero, Michele Bezzi:
Sticky policies for mobile devices. SACMAT 2013: 257-260 - [c16]Slim Trabelsi, Hana Bouafif:
Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks. SECRYPT 2013: 500-505 - 2012
- [c15]Matteo Maria Casalino, Henrik Plate, Slim Trabelsi:
Transversal Policy Conflict Detection. ESSoS 2012: 30-37 - [c14]Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi, Volkmar Lotz:
Towards a Trustworthy Service Marketplace for the Future Internet. Future Internet Assembly 2012: 105-116 - [c13]Slim Trabelsi, Jakub Sendor:
Sticky policies for data control in the cloud. PST 2012: 75-80 - 2011
- [j2]Ganna Frankova, Magali Seguran, Florian Gilcher, Slim Trabelsi, Jörg Dörflinger, Marco Aiello:
Deriving business processes with service level agreements from early requirements. J. Syst. Softw. 84(8): 1351-1363 (2011) - [c12]Michele Bezzi, Slim Trabelsi:
Data Usage Control in the Future Internet Cloud. Future Internet Assembly 2011: 223-235 - [c11]Slim Trabelsi, Jakub Sendor, Stefanie Reinicke:
PPL: PrimeLife Privacy Policy Engine. POLICY 2011: 184-185 - [c10]Antonio García Vázquez, Pedro Soria-Rodriguez, Pascal Bisson, Daniel Gidoin, Slim Trabelsi, Gabriel Serme:
FI-WARE Security: Future Internet Security Core - (Invited Paper). ServiceWave 2011: 144-152 - [p1]Slim Trabelsi, Akram Njeh:
Policy Implementation in XACML. Privacy and Identity Management for Life 2011: 355-374 - 2010
- [j1]Klemens Böhm, Sandro Etalle, Jerry den Hartog, Christian Hütter, Slim Trabelsi, Daniel Trivellato, Nicola Zannone:
A Flexible Architecture for Privacy-Aware Trust Management. J. Theor. Appl. Electron. Commer. Res. 5(2): 77-96 (2010) - [c9]Slim Trabelsi, Eric Weil, Alessandro Sorniotti, Stuart Short, Michele Bezzi:
Privacy-aware policy matching. ISCC 2010: 302-307
2000 – 2009
- 2009
- [c8]Slim Trabelsi, Vincent Salzgeber, Michele Bezzi, Gilles Montagnon:
Data disclosure risk evaluation. CRiSIS 2009: 35-72 - [c7]Michele Bezzi, Gilles Montagnon, Vincent Salzgeber, Slim Trabelsi:
Sharing Data for Public Security. PrimeLife 2009: 188-197 - 2008
- [c6]Slim Trabelsi, Guillaume Urvoy-Keller, Yves Roudier:
On the Impact of DoS Attacks on Secure Service Discovery. EUC (2) 2008: 532-537 - 2007
- [c5]Slim Trabelsi, Laurent Gomez, Yves Roudier:
Context-Aware Security Policy for the Service Discovery. AINA Workshops (1) 2007: 477-482 - [c4]Slim Trabelsi, Yves Roudier:
Secure Service Publishing with Untrusted Registries - Securing Service Discovery. SECRYPT 2007: 175-179 - 2006
- [c3]Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier:
Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. ECOWS 2006: 35-43 - [c2]Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier:
Enabling Secure Discovery in a Pervasive Environment. SPC 2006: 18-31 - 2005
- [c1]Bruno Baynat, Khaled Boussetta, Pierre Eisenmann, Slim Trabelsi:
Extended Erlang-B law for performance evaluation of radio resources sharing in GSM/(E)GPRS networks. PIMRC 2005: 1713-1718
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint