default search action
BDCSIntell 2018: Hadath, Lebanon
- Marie-Rita Hojeij, Béatrice Finance, Yehia Taher, Karine Zeitouni, Rafiqul Haque, Mohamed Dbouk:
Proceedings of the 1st International Conference on Big Data and Cyber-Security Intelligence, BDCSIntell 2018, Hadath, Lebanon, December 13-15, 2018. CEUR Workshop Proceedings 2343, CEUR-WS.org 2019
Keynote session
- Amr El Abbadi:
Efficient, Consistent and Secure Global-Scale Data Management. 1-2 - Mohand-Said Hacid, Mehdi Haddad:
An Access Control Framework for Data Integration. 3 - Cyril Ray:
Data Variety and Integrity Assessment for Maritime Anomaly Detection. 4-7
Big Data Analytics for IoT
- Jingwei Zuo, Karine Zeitouni, Yehia Taher:
SE2TeC: A Scalable Engine for Efficient and Expressive Time Series Classification. 8-11 - Ola Majed, Hassan Harb, Mohamad Hamze, Ali Jaber:
FKmeans: A Fast Data Classification Technique to Handle Big Data Collected in Sensor Network. 12-17 - Lívia Almada Cruz, Karine Zeitouni, José A. F. de Macêdo:
Trajectory Prediction from External Sensor Data using Recurrent Neural Networks. 18-20 - Sandy Rihana, Patrick Hockayem, Ramy Salloum:
Artificial Neural Network for Sit-to-Stand classification based on Inertial Measurement Units Data. 21-26
Data Driven Security
- Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Walid Gaaloul:
Trustless Blockchain-based Access Control in Dynamic Collaboration. 27-33 - Nada Chendeb Taher, Iman Mallat, Nazim Agoulmine, Nour El Mawass:
Performance/Cost Analysis of a Cloud Based Solution for Big Data Analytic: Application in Intrusion Detection. 34-41 - Sara Makki, Rafiqul Haque, Yehia Taher, Zainab Assaghir, Mohand-Said Hacid, Hassan Zeineddine:
A Cost-Sensitive Cosine Similarity K-Nearest Neighbor for Credit Card Fraud Detection. 42-47 - Eliane Koussa, Jean-Charles Faugère, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
Combinatorial Digital Signature Scheme. 48-54 - Ahmad Hijazi, Abed El Safadi, Jean-Marie Flaus:
A Deep Learning Approach for Intrusion Detection System in Industry Network. 55-62 - Shiraz Yassine, Jawad Khalife, Maroun Chamoun, Hussein El Ghor:
A Survey of DNS Tunnelling Detection Techniques Using Machine Learning. 63-66
Semantic Web and Ontology
- Redouane Bouhamoum, Zoubida Kedad, Stéphane Lopes:
Schema Discovery in Large Web Data Sources. 67-74 - Mohamad Rihany, Zoubida Kedad, Stéphane Lopes:
Keyword Search Over RDF Graphs Using WordNet. 75-82 - Wael F. Youssef, Siba Haidar, Philippe Joly:
Generic Video Surveillance Description Ontology. 83-88
Applications
- Hadi Fadlallah, Yehia Taher, Ali Jaber:
RaDEn: A Scalable and Efficient Radiation Data Engineering. 89-93 - Ahmad Al Sayyid, Rafiqul Haque, Ali Jaber, Sara Makki, Yehia Taher:
ProgMod: An Analytical Model for Prognosis Prediction of AML Patients Using Survival Regression and Gene Expression Levels. 94-99 - Mohamed Dbouk, Mariam Hakim, Ihab Sbeity:
CityPro: From Big-Data to Intelligent-Data; a Smart Approach. 100-106
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.