Browsing by Author Kechadi, Tahar


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 72 to 89 of 89 < previous 
Published DateTitleAuthor(s)
7-Jul-2015Security Threats of URL Shortening: A User's PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
Sep-2015Security Threats of URL Shortening: A Users PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
13-Feb-2015Simulating SQL-Injection Cyber-attacks using GNS3Al-Mahrouqi, AadilTobin, PatrickAbdalla, SamehKechadi, Tahar
22-May-2015SLAFM: A Service Level Agreements Formal Model for Cloud ComputingDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
2014Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial ToolFaheem, MuhammadLe-Khac, Nhien-AnKechadi, Tahar
2015The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current TrendsKechadi, TaharFaheem, MuhammadLe-Khac, Nhien-An
10-Jul-2015Toward a new approach for massive LiDAR data processingCao, Van-HungChu, Xuan-KhoiLe-Khac, Nhien-AnKechadi, TaharLaefer, Debra F.Truong-Hong, Linh
12-Jun-2014Toward a new cloud-based approach to preserve the privacy for detecting suspicious cases of money laundering in an investment bankLe-Khac, Nhien-AnKechadi, Tahar
27-Apr-2016Toward a new tool to extract the Evidence from a Memory Card of Mobile phonesWitteman, RobMeijer, ArjenLe-Khac, Nhien-AnKechadi, Tahar
25-Apr-2016Towards Automatic Service Level Agreements Information ExtractionDe Marco, LuciaFerucci, FilomenaKechadi, Taharet al.
30-Jul-2015Towards middleware security framework for next generation data centers connectivityTalpur, Samar RazaAbdalla, SamehKechadi, Tahar
12-Nov-2017A Trusted Way for Encryption Key Management in Cloud ComputingFehis, SaadNouali, OmarKechadi, Tahar
6-Sep-2013Universal Peer-to-Peer Network Investigation FrameworkScanlon, MarkKechadi, Tahar
2017Use of Data Mining Techniques to Predict Short Term Adverse Events Occurrence in NB-UVB Phototherapy TreatmentsMohamed, SharifaHuang, BingquanKechadi, Tahar
28-Jun-2007Variance-based Clustering Technique for Distributed Data Mining ApplicationsAouad, LamineLe-Khac, Nhien-AnKechadi, Tahar
24-Mar-2014Virtual Machine Forensics by means of Introspection and Kernel Code InjectionTobin, PatrickKechadi, Tahar
4-Aug-2017Volkswagen Car Entertainment System ForensicsJacobs, DanielChoo, Kim-Kwang RaymondLe-Khac, Nhien-AnKechadi, Tahar
17-Jun-2010A Week in the Life of the Most Popular BitTorrent SwarmsScanlon, MarkHannaway, AlanKechadi, Tahar