A comprehensive cost performance analysis for a QoS-based scheme in network mobility (NEMO)
Hussein, Loay F., Abass, Islam Abdalla Mohamed, Aissa, Anis Ben, Hashim, Aisha-Hassan Abdalla, Alzahrani, Ahmad A., Alharithi, Fahd S.
Published in Alexandria engineering journal (01.08.2023)
Published in Alexandria engineering journal (01.08.2023)
Get full text
Journal Article
Classification of Security Threats in Information Systems
Jouini, Mouna, Rabai, Latifa Ben Arfa, Aissa, Anis Ben
Published in Procedia computer science (2014)
Published in Procedia computer science (2014)
Get full text
Journal Article
Quantifying security threats and their potential impacts: a case study
Aissa, Anis Ben, Abercrombie, Robert K., Sheldon, Frederick T., Mili, Ali
Published in Innovations in systems and software engineering (01.12.2010)
Published in Innovations in systems and software engineering (01.12.2010)
Get full text
Journal Article
Defining and computing a value based cyber-security measure
Aissa, Anis Ben, Abercrombie, Robert K., Sheldon, Frederick T., Mili, Ali
Published in Information systems and e-business management (01.12.2012)
Published in Information systems and e-business management (01.12.2012)
Get full text
Journal Article
A new model for epidemic prediction: COVID-19 in kingdom saudi arabia case study
Mohamed, Islam Abdalla, Aissa, Anis Ben, Hussein, Loay F, Taloba, Ahmed I, Kallel, Tarak
Published in Materials today : proceedings (23.01.2021)
Published in Materials today : proceedings (23.01.2021)
Get full text
Journal Article
WITHDRAWN: IoT enabled modulated residential surveillance system using Fuzzy logic
Taloba, Ahmed I., Mohamed, Islam Abdalla, Aissa, Anis Ben, Hussein, Loay F., kallel, Tarak
Published in Materials today : proceedings (01.02.2021)
Published in Materials today : proceedings (01.02.2021)
Get full text
Journal Article
Defining and Computing a Valued Based Cyber-Security Measure
Aissa, Anis Ben, Abercrombie, Robert K, Sheldon, Frederick T, Mili, Ali
Published in Information systems and e-business management (01.01.2012)
Published in Information systems and e-business management (01.01.2012)
Get full text
Journal Article
Quantifying security threats for E-learning systems
Ben Arfa Rabai, Latifa, Rjaibi, N., Ben Aissa, Anis
Published in International Conference on Education and e-Learning Innovations (01.07.2012)
Published in International Conference on Education and e-Learning Innovations (01.07.2012)
Get full text
Conference Proceeding
An economic model of security threats for cloud computing systems
Rabai, L. B. A., Jouini, M., Nafati, M., Aissa, A. B., Mili, A.
Published in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (01.06.2012)
Published in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (01.06.2012)
Get full text
Conference Proceeding