Page under construction!
- Y. Bouzida, L. Logrippo and S. Mankovski. "Concrete and Abstract Based Access Control". In the Internatioanl Journal of Information Security. DOI 10.1007/s10207-011-0138-1. Published online 14 July 2011.[pdf]
- K. Adi, Y. Bouzida, I. Hattak, L. Logrippo and S. Mankovski. "Typing for Conflict Detection in Access Control Policies". In the Proceedings of the fourth Intern. Conf. (MCETECH2009), Ottawa, May 2009 [pdf]
- F. Cuppens, N. Cuppens-Boulahia, Y. Bouzida, W. Kanoun and A. Croissant. "Expression and deployment of reaction policies". In the Proceedings of the fourth International Conference on Signal-Image Technology and Internet-Based Systems (SITIS2008), Bali, Indonesia, November 2008 [pdf]
- Y. Bouzida and C. Mangin. "A Framework for Detecting Anomalies in VoIP Networks". In the Proceedings of the third International Conference on Availability, Reliability and Security (ARES2008), Barcelona, Spain, March 2008 (acceptance rate (full paper): 21% (40/190)) [pdf]
- Y. Bouzida "Online Security rules Conflict Management". European Patent Number EP 2 023 566 A1 . Filed on August 08th 2007. Published on February 11th 2009. [pdf] [ html ]
- Y. Bouzida " Managing Security Rules Conflicts". European Patent Number EP 2 023 567 A1. Filed on August 08th 2007. Published on February 11th 2009. [pdf], [ html ]
- Y. Bouzida "Detecting Anomalies in Signaling Flows". European Patent Number EP 1 986 391 A1. Filed on April 23rd 2007. Published on October 29th 2008. [pdf]. [ html ]. US Patent Number 12/105,593. Filed on April 18th 2008. Published on October 23rd 2008 [html 1] [html 2] [ html 3]. Japan Patent Number JP2008306706 (A). Filed on April 21st 2008. Published on December 18th 2008 [ pdf ]
- Y. Bouzida and F. Cuppens. "Neural networks vs. decision trees for intrusion detection". IEEE / IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM2006) Tuebingen, Germany, September, 2006 [pdf]
- Y. Bouzida, F. Cuppens and S. Gombault. "Detecting and Reacting Against Distributed Denial of Service Attacks". IEEE International Conference on Communications (ICC2006), Istanbul, Turkey, June 2006 (acceptance rate: 39%) [pdf]
- Y. Bouzida and F. Cuppens. "Detecting known and novel network intrusions". IFIP/SEC 2006, 21st IFIP TC-11 International Information Security Conference Karlstad University, Karlstad, Sweden, May 2006. (Acceptance rate: 24.80% (35/141)) [pdf]
- F. Cuppens, F. Autrel, Y. Bouzida, J. Garcìa, S. Gombault, and T. Sans. "Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework". Annales des Télécommunications 61(1-2): 197-217 (2006) [pdf]
- Y. Bouzida, F.Cuppens and S. Gombault. "Détection de Nouvelles Attaques dans un Système de Détection d'Intrusion". (CRiSIS 2005), Bourges, France, October, 2005 [pdf]
- Y. Bouzida, F.Cuppens and S. Gombault. "Modeling Network Traffic to Detect New Anomalies Using Principal Component Analysis". (HPOVUA 2005), Porto, Portogal, July, 2005 [pdf]
- Y. Bouzida, F. Autrel, F. Cuppens and S. Gombault. "Preventing Distributed Denial of Service Attacks with Alert Correlation ". In the Proceedings of the Information Assurance and Security Track, (ITCC 2005), Las Vegas, Nevada, USA, April 2005 [pdf]
- J. Garcia, F. Autrel, J. Borrell, Y. Bouzida, S. Castillo, F. Cuppens, G. Navarro. "Preventing Coordinated Attacks via Alert Correlation". NordSec 2004 Finland. November, 2004 [pdf]
- Y. Bouzida and S. Gombault. "EigenConnections to Intrusion Detection". Proceedings of the 19th IFIP International Information Security Conference. Kluwer Academic, August, 2004. (Acceptance rate: 22.20% (35/157)) [pdf]
- Y. Bouzida, F. Cuppens, N. Cuppens-Boulahia and S. Gombault. "Efficient Intrusion Detection Using Principal Component Analysis". 3ème Conférence sur la Sécurité et Architectures Réseaux (SAR2004), La Londe, France, June, 2004 [pdf]
- Y. Bouzida and S. Gombault. "Intrusion Detection Using Principal Component Analysis". Seventh multi-conference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, July, 2003 [pdf]
- Y. Bouzida and S. Gombault. "Profils Propres pour la Détection d'Intrusion". Symposium sur la sécurité des technologies de l'information et de la communication (SSTIC 2003), Rennes, France, June, 2003 [ps]
- Y. Bouzida and S. Gombault. "An Efficient Method to Intrusion Detection". Conférence internationale Sciences électroniques, Technologies de l'Information et des Télécommunications(SETIT 2003), Sousse, Tunisia, March, 2003 [pdf]
- Y. Bouzida and R. Beghdad. "Etude Critique et Amélioration de Protocoles MAC Temps-réel". Electronic Journal on Networks and Distributed Processing. Number 12, September, 2001 [pdf]
- Y. Bouzida and R. Beghdad. "Improving the Timed Token Protocol". In the proceedings of the 1st International Conference on Networking. Springer-Verlag, ISSN: 0302-9743. July, 2001 [pdf]
- Y. Bouzida. "Principal Component Analysis for Intrusion Detection and Supervised Learning for New Attack Detection". PhD. Thesis, 2006 [pdf]
- Y. Bouzida. "Détection d'intrusion: critiques et contributions". MSc. Thesis, 2002 [pdf]
The following reports are not available, I will add them when I will find out the corresponding 3"5 floppy disks where they were stored:
- Y. Bouzida. "Intrusion Detection in computer systems". 2nd year Magistère Thesis, 2001 [pdf]
- Y. Bouzida. "Etude et Amélioration des protocoles de la sous-couche MAC Temps Réel". 1st year Magistère Thesis, 2000 [pdf]
Abdenour, if you read this page and could find the electronic copy of the following report, please send it to me (14 years ago ...)
- Y. Bouzida and A. Hadid. "Conception et réalisation d'un système de reconnaissance de visages à base de réseaux de neurones". Engineer Thesis, 1997 [pdf]