A novel approach for terrorist sub-communities detection based on constrained evidential clustering F Saidi, Z Trabelsi, HB Ghazela 2018 12th international conference on research challenges in information …, 2018 | 26 | 2018 |
Approaches to analyze cyber terrorist communities: Survey and challenges F Saidi, Z Trabelsi, K Salah, HB Ghezala Computers & Security 66, 66-80, 2017 | 26 | 2017 |
A novel framework for semantic classification of cyber terrorist communities on Twitter F Saidi, Z Trabelsi, E Thangaraj Engineering Applications of Artificial Intelligence 115, 105271, 2022 | 12 | 2022 |
A hybrid deep learning-based framework for future terrorist activities modeling and prediction F Saidi, Z Trabelsi Egyptian Informatics Journal 23 (3), 437-446, 2022 | 10 | 2022 |
A survey of extremism online content analysis and prediction techniques in twitter based on sentiment analysis Z Trabelsi, F Saidi, E Thangaraj, T Veni Security Journal 36 (2), 221-248, 2023 | 8 | 2023 |
Fuzzy logic based intrusion detection system as a service for malicious port scanning traffic detection F Saidi, Z Trabelsi, HB Ghazela 2019 IEEE/ACS 16th International Conference on Computer Systems and …, 2019 | 7 | 2019 |
A dendritic cell algorithm based approach for malicious TCP port scanning detection N Almasalmeh, F Saidi, Z Trabelsi 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 5 | 2019 |
Attention-based deep learning modelling for intrusion detection B AlOmar, Z Trabelsi, F Saidi ECCWS 2023 22nd European Conference on Cyber Warfare and Security, 2023 | 3 | 2023 |
Fuzzy IDS as a service on the cloud for malicious TCP port scanning traffic detection F Saidi, Z Trabelsi, HB Ghazela Intelligent Decision Technologies, 1-10, 2020 | 2 | 2020 |
Mobile LifeLong Learners on the Cloud J Akaichi, F Saidi DIVAI 2012, 35, 2012 | 2 | 2012 |
An evidential clustering based framework for cyber terrorist cells topology identification F Saidi, Z Trabelsi, HB Ghazela 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 1 | 2018 |
Towards a Multidimensional Model for Terrorist Attacks Analysis and Mining F Saidi, Z Trabelsi, HB Ghézala 28th International Conference on Computer Theory and Applications (ICCTA 2018), 2018 | 1 | 2018 |
Smart fuzzy querying based on user's profile and context: A critical care planning system case study F Saidi, J Akaichi 2015 5th National Symposium on Information Technology: Towards New Smart …, 2015 | 1 | 2015 |
Corrigendum to “A hybrid deep learning-based framework for future terrorist activities modeling and prediction”[Egypt. Inform. J. 23 (3) 2022, 437–446](Egyptian Informatics … F Saidi, Z Trabelsi Egyptian Informatics Journal 24 (2), 215-216, 2023 | | 2023 |
An Approach for Thwarting Malicious Secret Channel: The Case of IP Record Route Option Header-Based Covert Channels F Saidi, Z Trabelsi, HB Ghézela Risks and Security of Internet and Systems: 14th International Conference …, 2020 | | 2020 |
Approaches to analyze cyber terrorist communities: survey and F Saidi, Z Trabelsi, K Salah, HB Ghezala Terrorism 112, 9, 2017 | | 2017 |
Preface ix Committee x Biographies xi Academic Papers K Adamos, I Filippopoulos, G Stergiopoulos, D Gritzalis, B AlOmar, ... | | |