Browsing by Author Kechadi, Tahar


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 78 to 97 of 100 < previous   next >
Published DateTitleAuthor(s)
31-Jan-2014Reconstruction et analyse smantique de chronologies cybercriminellesKechadi, TaharChabot, YoanBertaux, AurélieNicolle, Christophe
2014Reference Architecture for a Cloud Forensic Readiness SystemDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
27-Jun-2019Rehabilitation Exercise Segmentation for Autonomous Biofeedback Systems with ConvFSMBevilacqua, AntonioBrennan, LouiseArgent, RobCaulfield, BrianKechadi, Tahar
11-Nov-2016Retrieval and Clustering of Medicines Within Healthcare Data RecordsWallace, DuncanKechadi, Tahar
7-Jul-2015Security Threats of URL Shortening: A User's PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
Sep-2015Security Threats of URL Shortening: A Users PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
1-Jan-2020Segmentation of shoulder rehabilitation exercises for single and multiple inertial sensor systemsBrennan, LouiseBevilacqua, AntonioKechadi, TaharCaulfield, Brian
13-Feb-2015Simulating SQL-Injection Cyber-attacks using GNS3Al-Mahrouqi, AadilTobin, PatrickAbdalla, SamehKechadi, Tahar
22-May-2015SLAFM: A Service Level Agreements Formal Model for Cloud ComputingDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
2014Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial ToolFaheem, MuhammadLe-Khac, Nhien-AnKechadi, Tahar
2015The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current TrendsKechadi, TaharFaheem, MuhammadLe-Khac, Nhien-An
10-Jul-2015Toward a new approach for massive LiDAR data processingCao, Van-HungChu, Xuan-KhoiLe-Khac, Nhien-AnKechadi, TaharLaefer, Debra F.Truong-Hong, Linh
12-Jun-2014Toward a new cloud-based approach to preserve the privacy for detecting suspicious cases of money laundering in an investment bankLe-Khac, Nhien-AnKechadi, Tahar
27-Apr-2016Toward a new tool to extract the Evidence from a Memory Card of Mobile phonesWitteman, RobMeijer, ArjenLe-Khac, Nhien-AnKechadi, Tahar
25-Apr-2016Towards Automatic Service Level Agreements Information ExtractionDe Marco, LuciaFerucci, FilomenaKechadi, Taharet al.
30-Jul-2015Towards middleware security framework for next generation data centers connectivityTalpur, Samar RazaAbdalla, SamehKechadi, Tahar
12-Nov-2017A Trusted Way for Encryption Key Management in Cloud ComputingFehis, SaadNouali, OmarKechadi, Tahar
6-Sep-2013Universal Peer-to-Peer Network Investigation FrameworkScanlon, MarkKechadi, Tahar
Apr-2018Use of Data Mining Techniques to Predict Short Term Adverse Events Occurrence in NB-UVB Phototherapy TreatmentsMohamed, SharifaHuang, BingquanKechadi, Tahar
28-Jun-2007Variance-based Clustering Technique for Distributed Data Mining ApplicationsAouad, LamineLe-Khac, Nhien-AnKechadi, Tahar