-
1دورية أكاديمية
المؤلفون: Mohamed Amine Ben Farah, Elochukwu Ukwandu, Hanan Hindy, David Brosset, Miroslav Bures, Ivan Andonovic, Xavier Bellekens
المصدر: Information, Vol 13, Iss 1, p 22 (2022)
مصطلحات موضوعية: maritime industry, cyber-attack, autonomous vessel, port, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
2دورية أكاديمية
المؤلفون: Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, Xavier Bellekens
المصدر: Sensors, Vol 20, Iss 24, p 7148 (2020)
مصطلحات موضوعية: Cyber-Ranges, Test-Beds, Cyber-Security, threat simulations, training, education, Chemical technology, TP1-1185
وصف الملف: electronic resource
-
3
المؤلفون: Mohamed Amine Ben Farah, Robert Atkinson, Hanan Hindy, Christos Tachtatzis, Xavier Bellekens, Ivan Andonovic, Miroslav Bures, Elochukwu UKWANDU
مصطلحات موضوعية: TK, Information Systems
وصف الملف: application/pdf
-
4
المؤلفون: Awatef Ben Fradj, Abdennaceur Kachouri, Mohamed Amine Ben Farah, Francois Bremond, Salwa Baabou, Furqan M. Khan
المصدر: Advanced Methods for Human Biometrics ISBN: 9783030819811
مصطلحات موضوعية: Computer science, Orientation (computer vision), business.industry, ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, Representation (systemics), Context (language use), Pattern recognition, Space (commercial competition), Mixture model, Identifier, Feature (computer vision), Artificial intelligence, Set (psychology), business
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::75f5cfcaa6186e40344253fa6f7141a4
https://doi.org/10.1007/978-3-030-81982-8_7 -
5
المؤلفون: Ivan Andonovic, David Brosset, Robert Atkinson, Elochukwu Ukwandu, Hanan Hindy, Mohamed Amine Ben Farah, Christos Tachtatzis, Miroslav Bures, Dimitris Kavallieros, Xavier Bellekens
المصدر: Sensors (Basel, Switzerland)
Sensors, Vol 20, Iss 7148, p 7148 (2020)مصطلحات موضوعية: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Situation awareness, Computer science, TK, Vulnerability, Computer Science - Human-Computer Interaction, 02 engineering and technology, Review, Systems and Control (eess.SY), lcsh:Chemical technology, cyber-situation awareness, Biochemistry, Cyber-Security, Electrical Engineering and Systems Science - Systems and Control, Analytical Chemistry, Human-Computer Interaction (cs.HC), taxonomy, threat simulations, 0202 electrical engineering, electronic engineering, information engineering, FOS: Electrical engineering, electronic engineering, information engineering, lcsh:TP1-1185, Electrical and Electronic Engineering, Education: Scenario: Virtual Environment, Instrumentation, education, training, 020206 networking & telecommunications, Atomic and Molecular Physics, and Optics, Cyber-Ranges, scenario, Countermeasure, Risk analysis (engineering), Test-Beds, Software deployment, 020201 artificial intelligence & image processing, virtual environment, Cryptography and Security (cs.CR)
وصف الملف: application/pdf
-
6
المؤلفون: Abdennaceur Kachouri, Behzad Mirmahboub, Francois Bremond, Mohamed Amine Ben Farah, Salwa Baabou
المصدر: Smart Innovation, Systems and Technologies ISBN: 9783030210045
مصطلحات موضوعية: Matching (statistics), business.industry, Computer science, ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, 0102 computer and information sciences, 02 engineering and technology, Texture (music), Behavior recognition, 01 natural sciences, Re identification, Discriminative model, 010201 computation theory & mathematics, Similarity (psychology), 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Computer vision, Artificial intelligence, business, Whole body
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::6704d4fd8450e33680afdc278cf2d65e
https://doi.org/10.1007/978-3-030-21005-2_29 -
7
المؤلفون: Abdelrahman G. Abubakr, Francois Bremond, Salwa Baabou, Abdennaceur Kachouri, Mohamed Amine Ben Farah, Awatef Ben Fradj
المصدر: 2019 19th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA).
مصطلحات موضوعية: 021110 strategic, defence & security studies, Computer science, business.industry, Deep learning, Pedestrian detection, 05 social sciences, Feature extraction, ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, 0211 other engineering and technologies, 0507 social and economic geography, Process (computing), Robotics, Context (language use), 02 engineering and technology, Pedestrian, 050701 cultural studies, Object detection, Computer vision, Artificial intelligence, business
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::2fcc30179d9afcfdd85ec67966a97c87
https://doi.org/10.1109/sta.2019.8717226 -
8
المصدر: Nonlinear Dynamics. 83:1123-1136
مصطلحات موضوعية: Secure Hash Algorithm, Theoretical computer science, Plaintext-aware encryption, business.industry, Applied Mathematics, Mechanical Engineering, Key space, Aerospace Engineering, 020207 software engineering, Ocean Engineering, 02 engineering and technology, Encryption, Deterministic encryption, Control and Systems Engineering, Probabilistic encryption, SHA-2, Ciphertext, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Electrical and Electronic Engineering, business, Algorithm, Mathematics
-
9
المؤلفون: Francois Bremond, Salwa Baabou, Abdennaceur Kachouri, Awatef Ben Fradj, Mohamed Amine Ben Farah, Furqan M. Khan
المساهمون: bremond, francois, Spatio-Temporal Activity Recognition Systems (STARS), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Laboratoire d'électronique et des technologies de l'Information [Sfax] (LETI), École Nationale d'Ingénieurs de Sfax | National School of Engineers of Sfax (ENIS)
المصدر: SSD 2018-International Multi-Conference on Systems, Signals and Devices
SSD 2018-International Multi-Conference on Systems, Signals and Devices, Mar 2018, Hammamet, Tunisia. pp.1-6
SSDمصطلحات موضوعية: Tracklet pre-processing, Matching (graph theory), Computer science, 02 engineering and technology, [INFO] Computer Science [cs], Ranking (information retrieval), [INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV], Part Appearance Mixture (PAM), 020204 information systems, Similarity (psychology), 0202 electrical engineering, electronic engineering, information engineering, [INFO]Computer Science [cs], Set (psychology), Person detection, business.industry, Orientation (computer vision), Person Re-Identification (Re-ID) system, Representation (systemics), [INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV], Signature representation, Pattern recognition, Mixture model, Person tracking, Feature (computer vision), Person Re-Identification (Re-ID), 020201 artificial intelligence & image processing, Artificial intelligence, business
وصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::71c5af8fe9183619acb3d9dcb9969661
https://hal.inria.fr/hal-01849457v2 -
10
المصدر: Multimedia Tools and Applications. 75:4753-4769
مصطلحات موضوعية: Key Wrap, Theoretical computer science, Computer Networks and Communications, Computer science, Hash function, 02 engineering and technology, Encryption, computer.software_genre, 01 natural sciences, Secure Hash Standard, Multiple encryption, Secure communication, Filesystem-level encryption, SHA-2, Computer Science::Multimedia, 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, Media Technology, Cryptographic hash function, 010301 acoustics, Computer Science::Cryptography and Security, Secure Hash Algorithm, business.industry, Key space, 020207 software engineering, Disk encryption theory, Deterministic encryption, Symmetric-key algorithm, Hardware and Architecture, Probabilistic encryption, 56-bit encryption, Hash chain, 40-bit encryption, Attribute-based encryption, Link encryption, On-the-fly encryption, business, computer, Software, Double hashing