Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a soft skill taxonomy from job openings., , , and . Soc. Netw. Anal. Min., 9 (1): 43:1-43:19 (2019)Securing the Internet of Things (IoT)., , , and . WINCOM, page 1-6. IEEE, (2018)Analysis of Hacking Related Trade in the Darkweb., , , and . ISI, page 79-84. IEEE, (2018)An empirical study of global malware encounters., , and . HotSoS, page 8:1-8:11. ACM, (2015)Privacy-Preserving Relationship Path Discovery in Social Networks., , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 189-208. Springer, (2009)STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1074-1087 (March 2023)A Trustable Reputation Scheme Based on Private Relationships., , , , and . ASONAM, page 19-24. IEEE Computer Society, (2009)Remote assessment of countries' nuclear, biological, and cyber capabilities: joint motivation and latent capability approach., , , and . Soc. Netw. Anal. Min., 5 (1): 5:1-5:21 (2015)Longitudinal analysis of a large corpus of cyber threat descriptions., , and . J. Comput. Virol. Hacking Tech., 12 (1): 11-22 (2016)Using Social Network Analysis to Analyze Development Priorities of Moroccan Institutions., , and . SBP-BRiMS, volume 12720 of Lecture Notes in Computer Science, page 195-203. Springer, (2021)