Browsing by Author Kechadi, Tahar


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 64 to 83 of 89 < previous   next >
Published DateTitleAuthor(s)
20-Aug-2017Performance Evaluation of a Distributed Clustering Approach for Spatial DatasetsBendechache, MalikaLe-Khac, Nhien-AnKechadi, Tahar
Sep-2014Performance Evaluation of a Natural Language Processing approach applied in White Collar crime investigationvan Banerveld, MaartenLe-Khac, Nhien-AnKechadi, Tahar
16-Dec-2017Prediction of NB-UVB phototherapy treatment response of psoriasis patients using data miningMohamed, SharifaHuang, BingquanKechadi, Tahar
Sep-2015Project Maelstrom: Forensic Analysis of the BitTorrent-Powered BrowserFarina, JasonKechadi, TaharScanlon, Mark
31-Jan-2014Reconstruction et analyse smantique de chronologies cybercriminellesKechadi, TaharChabot, YoanBertaux, AurélieNicolle, Christophe
2014Reference Architecture for a Cloud Forensic Readiness SystemDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
27-Jun-2019Rehabilitation Exercise Segmentation for Autonomous Biofeedback Systems with ConvFSMBevilacqua, AntonioBrennan, LouiseArgent, RobCaulfield, BrianKechadi, Tahar
11-Nov-2016Retrieval and Clustering of Medicines Within Healthcare Data RecordsWallace, DuncanKechadi, Tahar
7-Jul-2015Security Threats of URL Shortening: A User's PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
Sep-2015Security Threats of URL Shortening: A Users PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
13-Feb-2015Simulating SQL-Injection Cyber-attacks using GNS3Al-Mahrouqi, AadilTobin, PatrickAbdalla, SamehKechadi, Tahar
22-May-2015SLAFM: A Service Level Agreements Formal Model for Cloud ComputingDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
2014Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial ToolFaheem, MuhammadLe-Khac, Nhien-AnKechadi, Tahar
2015The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current TrendsKechadi, TaharFaheem, MuhammadLe-Khac, Nhien-An
10-Jul-2015Toward a new approach for massive LiDAR data processingCao, Van-HungChu, Xuan-KhoiLe-Khac, Nhien-AnKechadi, TaharLaefer, Debra F.Truong-Hong, Linh
12-Jun-2014Toward a new cloud-based approach to preserve the privacy for detecting suspicious cases of money laundering in an investment bankLe-Khac, Nhien-AnKechadi, Tahar
27-Apr-2016Toward a new tool to extract the Evidence from a Memory Card of Mobile phonesWitteman, RobMeijer, ArjenLe-Khac, Nhien-AnKechadi, Tahar
25-Apr-2016Towards Automatic Service Level Agreements Information ExtractionDe Marco, LuciaFerucci, FilomenaKechadi, Taharet al.
30-Jul-2015Towards middleware security framework for next generation data centers connectivityTalpur, Samar RazaAbdalla, SamehKechadi, Tahar
12-Nov-2017A Trusted Way for Encryption Key Management in Cloud ComputingFehis, SaadNouali, OmarKechadi, Tahar