Browsing by Author Kechadi, Tahar


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 57 to 76 of 90 < previous   next >
Published DateTitleAuthor(s)
8-May-2008Mining Spatio-temporal Data at Different Levels of DetailCamossi, ElenaBertolotto, MichelaKechadi, Tahar
11-Nov-2016Missing Data Analysis Using Multiple Imputation in Relation to Parkinson's DiseaseHouari, RimaBounceur, AhcèneKechadi, Taharet al.
18-Oct-2019Mobile health (mHealth) applications for children in treatment for obesity: A randomised feasibility studyBrowne, SarahO'Donnell, ShaneTully, LouiseDow, MckenzieO'Connor, JamesKechadi, TaharDoyle, GerardineO'Malley, Grace
Feb-2013MPM Job Scheduling Problem: a bi-objective approachTselios, DimitriosSavvas, Ilias K.Kechadi, Tahar
29-Oct-2014Network Forensics Readiness and Security Awareness FrameworkAl-Mahrouqi, AadilAbdalla, SamehKechadi, Tahar
Oct-2015Network Investigation Methodology for BitTorrent Sync: A Peer-to-Peer Based File Synchronisation ServiceScanlon, MarkFarina, JasonKechadi, Tahar
2016A New Distributed Chinese Wall Security Policy ModelFehis, SaadNouali, OmarKechadi, Tahar
27-Aug-2015Overview of the Forensic Investigation of Cloud ServicesFarina, JasonScanlon, MarkLe-Khac, Nhien-AnKechadi, Tahar
20-Aug-2017Performance Evaluation of a Distributed Clustering Approach for Spatial DatasetsBendechache, MalikaLe-Khac, Nhien-AnKechadi, Tahar
Sep-2014Performance Evaluation of a Natural Language Processing approach applied in White Collar crime investigationvan Banerveld, MaartenLe-Khac, Nhien-AnKechadi, Tahar
16-Dec-2017Prediction of NB-UVB phototherapy treatment response of psoriasis patients using data miningMohamed, SharifaHuang, BingquanKechadi, Tahar
Sep-2015Project Maelstrom: Forensic Analysis of the BitTorrent-Powered BrowserFarina, JasonKechadi, TaharScanlon, Mark
31-Jan-2014Reconstruction et analyse smantique de chronologies cybercriminellesKechadi, TaharChabot, YoanBertaux, AurélieNicolle, Christophe
2014Reference Architecture for a Cloud Forensic Readiness SystemDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
27-Jun-2019Rehabilitation Exercise Segmentation for Autonomous Biofeedback Systems with ConvFSMBevilacqua, AntonioBrennan, LouiseArgent, RobCaulfield, BrianKechadi, Tahar
11-Nov-2016Retrieval and Clustering of Medicines Within Healthcare Data RecordsWallace, DuncanKechadi, Tahar
7-Jul-2015Security Threats of URL Shortening: A User's PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
Sep-2015Security Threats of URL Shortening: A Users PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
13-Feb-2015Simulating SQL-Injection Cyber-attacks using GNS3Al-Mahrouqi, AadilTobin, PatrickAbdalla, SamehKechadi, Tahar
22-May-2015SLAFM: A Service Level Agreements Formal Model for Cloud ComputingDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar