A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data
Sye Loong Keoh, Yi Han Ang and Zhaohui Tang

An Efficient Scheme for Anonymous Communication in IoT
Sara Jebri, Mohamed Abid and Ammar Bouallegue

Personal Recognition System using Hand Modality based on Local Features
Nesrine Charfi, Hanene Trichili, Adel M. Alimi and Basel Solaiman

Persistent Timeout Policy of SCTP associated with AODV by using Cross-Layer Mechanism
Issoufou Tiado Mahamadou, Idrissa Abdou and Djibo Karimou

Access Control Policies Enforcement in a Cloud Environment: Openstack
Meryeme Ayache, Mohammed Erradi and Bernd Freisleben

Introduction to The Internet Of Things Security : standardization and research challenges
Salim Elbouanani, Ahmed El Kiram and Omar Achbarou

Mining Intrusion Detection Alerts for Predicting Severity of Detected Attacks
Doaa Hassan

Toward a Novel Rule-based Attack Description and Response Language
Samih Souissi

Improved secure navigation of wheelchairs using multi-robot system and cloud computing technologies
Khaled Salhi, Mohamed Moncef Ben Khelifa, Adel Alimi and Philippe Gorce

Modeling a Secure Cloud Data Warehouse with SoaML
Emna Guermazi, Mounir Ben Ayed and HanĂȘne Ben-Abdallah

Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment
Zaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal and Deqing Zou

Digital Safe: Secure synchronization of shared files
Mayssa Jemel, Mounira Msahli and Ahmed Serhrouchni

Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext
Zaid Alaa Hussien, Hai Jin, Zaid Ameen Abduljabbar, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal and Deqing Zou

Software-Defined Networks, Security Aspects Analysis
Jaouad Benabbou, Khalid Elbaamrani, Noureddine Idboufker and Raja Elassali

Artificial Neural Network-based Methodology for Vulnerabilities Detection in EMV
Ouerdi Noura, Elfarissi Ilhame, Azizi Mostafa and Azizi Abdelmalek

Experimental study of continuous variable quantum key distribution
Nedra Benletaief, Houria Rezig and Ammar Bouallegue

MASAT: Model-based Automated Security Assessment Tool for Cloud Computing
Oussama Mjihil, Dong Seong Kim and Abdelkrim Haqiq

Side channel analysis techniques towards a methodology for reverse engineering of JavaCard byte-code
Mohammed Amine Kasmi, Mostafa Azizi and Jean-Louis Lanet

Security Modeling and Analysis of a Self-Cleansing Intrusion Tolerance Technique
Iman EL MIR, Dong Seong Kim, Abdelkrim HAQIQ

Network Intrusion Detection System Using L1-norm PCA
Khalid Chougdali, Zyad Elkhadir and Mohammed Benattou

New malware detection framework based on N-grams and Support Vector Domain Description
Mohamed El Boujnouni, Mohammed Jedra and Noureddine Zahid

Access Control in a Collaborative Session in Multi Tenant Environment
Mohamed Amine Madani, Mohammed Erradi and Yahya Benkaouz

An Incremental Refinement Approach to a Development of TMN Protocol
Sanae El Mimouni and Mohamed Bouhdadi

An electronic voting system based on homomorphic encryption and prime numbers
Ali AZOUGAGHE, Mustapha HEDABOU, Mostafa BELKASMI

Image de-noising of a metal matrix composite microstructure Using Sure-let wavelet and Weighted Bilateral Filter
Ayari Fatma and Ben Amar Chokri

Image processing of a metal matrix composite microstructure Using recent bilateral filtering approaches
Ayari Fatma and Ben Amar Chokri