Dissuading Stolen Password Reuse
Trabelsi, Slim, Missaoui, Chedy
Published in Emerging Technologies for Authorization and Authentication (2018)
Published in Emerging Technologies for Authorization and Authentication (2018)
Get full text
Book Chapter
Monitoring software vulnerabilities through social networks analysis
Trabelsi, Slim, Plate, Henrik, Abida, Amine, Ben Aoun, M. Marouane, Zouaoui, Anis, Missaoui, Chedy, Gharbi, Sofien, Ayari, Alaeddine
Published in 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE) (01.07.2015)
Get full text
Published in 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE) (01.07.2015)
Conference Proceeding
Mining social networks for software vulnerabilities monitoring
Trabelsi, Slim, Plate, Henrik, Abida, Amine, Ben Aoun, M. Marouane, Zouaoui, Anis, Missaoui, Chedy, Gharbi, Sofien, Ayari, Alaeddine
Published in 2015 7th International Conference on New Technologies, Mobility and Security (NTMS) (01.07.2015)
Published in 2015 7th International Conference on New Technologies, Mobility and Security (NTMS) (01.07.2015)
Get full text
Conference Proceeding