"Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security techn ..."
Network Security Technologies Design and Applications: Design and Applications by AbdelmalekAmine 330 Pages, Published 2013 by Igi Global ISBN-13: 978-1-4666-4790-9, ISBN: 1-4666-4790-6
"I. Amine, Abdelmalek, editor of compilation. II. Ait Mohamed, Otmane editor of
compilation. III. Benatallah, Boualem, editor of compilation. TK5105.59.N3434
2014 005.8--dc23 2013040298 This book is published in the IGI Global book
series Advances in Information Security, Privacy, and Ethics (AISPE) (ISSN: 1948
-9730; eISSN: 1948-9749) British Cataloguing in Publication Data A Cataloguing
in Publication record for this book is availa ..."
"This book presents the proceedings of the fifth International Symposium on Modelling and Implementation of Complex Systems (MISC 2018). The event was held in Laghouat, Algeria, on December 16–18, 2018. The 25 papers gathered here have been selected from 109 submissions using a strict peer-review process, and address a range of topics concerning the theory and applications of networking and distributed computing, including: cloud computi ..."
"This volume is a comprehensive collection of extended contributions from the fourth international symposium on Modeling and Implementing Complex Systems (MICS’2106) organized into four main topics: Networking and Cloud Computing, Software Engineering and Formal Methods, Intelligent and Information Systems, and Algorithms and Complexity. This book presents recent advances related to theory and applications of networking and distributed c ..."
"This book constitutes the refereed proceedings of the 5th IFIP TC 5 International Conference on Computer Science and Its Applications, CIIA 2015, held in Saida, Algeria, in May 2015. The 56 revised papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in the following four research tracks: computational intelligence; security and network technology; information technology; and software engi ..."
" "During the last decades Computational Intelligence has emerged and showed its contributions in various broad research communities (computer science, engineering, finance, economic, decision making, etc.). This was done by proposing approaches and algorithms based either on turnkey techniques belonging to the large panoply of solutions offered by computational intelligence such as data mining, genetic algorithms, bio-inspired method ..."
"This book constitutes the refereed proceedings of the 6th IFIP TC 5 International Conference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018.The 56 full papers presented were carefully reviewed and selected from 202 submissions. They are organized in the following topical sections: data mining and information retrieval; evolutionary computation; machine learning; optimization; planning a ..."
"This book constitutes the refereed proceedings of the 6th IFIP TC 5 International Conference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018.The 56 full papers presented were carefully reviewed and selected from 202 submissions. They are organized in the following topical sections: data mining and information retrieval; evolutionary computation; machine learning; optimization; planning a ..."
"Modeling Approaches and Algorithms for Advanced Computer Applications This volume constitutes the proceedings of the Fourth International Conference on Computer Science and Its Applications, CIIA 2013. Coverage includes computational intelligence, security network technologies, information technology, and computer systems."
"This book constitutes the refereed proceedings of the 5th IFIP TC 5 International Conference on Computer Science and Its Applications, CIIA 2015, held in Saida, Algeria, in May 2015. The 56 revised papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in the following four research tracks: computational intelligence; security and network technology; information technology; and software engi ..."
"6th IFIP TC 5 International Conference, CIIA 2018, Oran, Algeria, May 8-10, 2018,
Proceedings Abdelmalek Amine, Malek Mouhoub, Otmane Ait Mohamed, Bachir
Djebbar. Leveraging Web Intelligence for Information Cascade Detection in
Social Streams Mohamed Cherif Nait-Hamoud1,2(B), Fedoua Didi1, and
Abdelatif Ennaji3 1 Department of Science Computing, University of Abou Bekr
Belkaid, 13000 Tlemcen, Algeria ... 3 LITIS Lab, University of ..."
"Deriche, R., Blaszka, T.: Recovering and characterizing im-age features using an
efficient model based approach. In: Proceedings of the Conference on ...
International Journal of Biomedical Imaging: Parallel Computation in Medical
Imaging Applications 2011, 1–12 (2011) 9. Lowe, D.G.: Distinctive image features
from ... 105–111 (2009) Park, K., Nitin, S., Man, H.L.: Design and Performance
Evaluation of Image Processing Algorithms on ..."
"Beghriche, A., Bilami, A.: Modélisation et Gestion de la Confiance dans les
Réseaux Mobiles Ad hoc, CIIA (2009) 6. Hankerson, D., Menezes, A., Vanstone,
S.: Guide to Elliptic CurveCryptography. Springer (2004) 7. Rajeswari, G.,
Thilagavathi, K.: A Novel Protocol For Indirect Authentication. In: Mobile Networks
Based On Elliptic Curve Cryptography, JATIT (2009) 8. Aydos, M., Yanık, T., Koc,
Ç.K.: An High-Speed ECC-based Wireless Aut ..."