Lotfi ben Othmane
Citado por
Citado por
An Entity-centric Approach for Privacy and Identity Management in Cloud Computing
P Angin, B Bhargava, R Ranchal, N Singh, M Linderman, L Ben Othmane, ...
Reliable Distributed Systems, 2010 29th IEEE Symposium on, 177-183, 2010
Secdevops: Is it a marketing buzzword?-mapping research on security in devops
V Mohan, LB Othmane
2016 11th international conference on availability, reliability and security …, 2016
Protection of Identity Information in Cloud Computing without Trusted Third Party
R Ranchal, B Bhargava, LB Othmane, L Lilien, A Kim, M Kang, ...
Reliable Distributed Systems, 2010 29th IEEE Symposium on, 368-372, 2010
Secure Information Sharing in Digital Supply Chains
B Bhargava, R Ranchal, LB Othmane
Proceedings of IEEE IACC, 2013
A Survey of Security and Privacy in Connected Vehicles
L ben Othmane, H Weffers, MM Mohamad, M Wolf
Wireless Sensor and Mobile Ad-Hoc Networks, 217-247, 2015
Extending the Agile Development Process to Develop Acceptably Secure Software
L Ben Othmane, P Angin, H Weffers, B Bhargava
IEEE Transactions on Dependable and Secure Computing 11 (6), 497 - 509, 2014
Protecting Privacy of Sensitive Data Dissemination Using Active Bundles
L Ben Othmane, L Lilien
Privacy, Security, Trust and the Management of e-Business, 2009. CONGRESS'09 …, 2009
Identification of dependency-based attacks on node. js
B Pfretzschner, L ben Othmane
Proceedings of the 12th international conference on availability …, 2017
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach
H Oueslati, MM Rahman, L ben Othmane
Proc. of the 10th International Conference on Availability, Reliability and …, 2015
Threats to Validity in Empirical Software Security Research
DS Cruzes, L ben Othmane
Empirical Research for Software Security: Foundations and Experience, 2017
Active Bundles for Protecting Confidentiality of Sensitive Data Throughout Their Lifecycle
L ben Othmane
Western Michigan University, 2010
Incorporating attacker capabilities in risk estimation and mitigation
L Ben Othmane, R Ranchal, R Fernando, B Bhargava, E Bodden
Computers & Security 51, 41-61, 2015
A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks
LT Lilien, L Ben Othmane, P Angin, A DeCarlo, RM Salih, B Bhargava
Journal of Network and Computer Applications, 2014
Detection of Message Injection Attacks onto the CAN Bus using Similarities of Successive Messages-Sequence Graphs
M Jedh, L Othmane, N Ahmed, B Bhargava
IEEE Transactions on Information Forensics and Security 16, 4133 - 4146, 2021
BP: security concerns and best practices for automation of software deployment processes: an industrial case study. In 2018 IEEE Cybersecurity Development (SecDev)
V Mohan, L ben Othmane, A Kres
IEEE Computer Society, 2018
Epics: A framework for enforcing security policies in composite web services
R Ranchal, B Bhargava, P Angin, L ben Othmane
IEEE Transactions on Services Computing, 2018
Towards Extended Safety in Connected Vehicles
L ben Othmane, A Al-Fuqaha, E ben Hamida, M van den Brand
16th International IEEE Conference on Intelligent Transportation Systems …, 2013
On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus
L Ben Othmane, L Dhulipala, N Multari, M Govindarasu
IEEE Transactions on Dependable and Secure Computing, 2020
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors
LB Othmane, G Chehrazi, E Bodden, P Tsalovski, AD Brucker
Data Science and Engineering 2 (2), 107–124, 2017
An End-to-End Security Auditing Approach for Service Oriented Architectures
M Azarmi, B Bhargava, P Angin, R Ranchal, N Ahmed, A Sinclair, ...
31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012), 2012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20