| Work in progress: K-nearest neighbors techniques for abac policies clustering Y Benkaouz, M Erradi, B Freisleben Proceedings of the 2016 ACM international workshop on attribute based access …, 2016 | 40 | 2016 |
| HaVe-2W3G: A vertical handoff solution between WLAN, WiMAX and 3G networks B Angoma, M Erradi, Y Benkaouz, A Berqia, MC Akalay 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 29 | 2011 |
| Clustering-based Approach for Anomaly Detection in XACML Policies. M Ait El Hadj, M Ayache, Y Benkaouz, A Khoumsi, M Erradi SECRYPT, 548-553, 2017 | 19 | 2017 |
| ABAC rule reduction via similarity computation M Ait El Hadj, Y Benkaouz, B Freisleben, M Erradi International conference on networked systems, 86-100, 2017 | 17 | 2017 |
| Robust p2p personalized learning K Boubouh, A Boussetta, Y Benkaouz, R Guerraoui 2020 International Symposium on Reliable Distributed Systems (SRDS), 299-308, 2020 | 15 | 2020 |
| A distributed protocol for privacy preserving aggregation with non-permanent participants Y Benkaouz, M Erradi Computing 97 (9), 893-912, 2015 | 15 | 2015 |
| A Collaborative Task Role Based Access Control Model. MA Madani, M Erradi, Y Benkaouz Journal of Information Assurance & Security 11 (6), 2016 | 13 | 2016 |
| Validation and correction of large security policies: A clustering and access log based approach M Ait El Hadj, M Erradi, A Khoumsi, Y Benkaouz 2018 IEEE international conference on big Data (Big Data), 5330-5332, 2018 | 12 | 2018 |
| Efficient security policy management using suspicious rules through access log analysis M Ait El Hadj, A Khoumsi, Y Benkaouz, M Erradi International Conference on Networked Systems, 250-266, 2019 | 11 | 2019 |
| Towards a Decentralized OSN for a Privacy-preserving e-health System Y Benkaouz, M Erradi Procedia Computer Science 63, 284-291, 2015 | 11 | 2015 |
| Formal approach to detect and resolve anomalies while clustering ABAC policies M Ait El Hadj, A Khoumsi, Y Benkaouz, M Erradi EAI Endorsed Transactions on Security and Safety 5 (16), 2018 | 10 | 2018 |
| A distributed polling with probabilistic privacy Y Benkaouz, R Guerraoui, M Erradi, F Huc 2013 IEEE 32nd International Symposium on Reliable Distributed Systems, 41-50, 2013 | 10 | 2013 |
| A vertical handoff implementation in a real testbed B Angoma, M Erradi, Y Benkaouz, A Berqia, MC Akalay Mobile Computing 1 (1), 1-14, 2012 | 8 | 2012 |
| Access control in a collaborative session in multi tenant environment MA Madani, M Erradi, Y Benkaouz 2015 11th International Conference on Information Assurance and Security …, 2015 | 7 | 2015 |
| EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing J Bouamama, Y Benkaouz, M Ouzzif 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023 | 6 | 2023 |
| Performance analysis of WiFi/WiMax vertical handover based on media independent handover Y Benkaouz, B Angoma, M Erradi 2012 International Conference on Multimedia Computing and Systems, 36-40, 2012 | 6 | 2012 |
| Lightx: A lightweight proof-of-bandwidth transactions transfer system I El Abid, Y Benkaouz, A Khoumsi International Conference on Networked Systems, 144-160, 2021 | 5 | 2021 |
| ABAC Based Online Collaborations in the Cloud MA Madani, M Erradi, Y Benkaouz International Conference on Emerging Technologies for Developing Countries …, 2017 | 5 | 2017 |
| Distributed privacy-preserving data aggregation via anonymization Y Benkaouz, M Erradi, B Freisleben International Conference on Networked Systems, 94-108, 2015 | 5 | 2015 |
| A distributed protocol for privacy preserving aggregation Y Benkaouz, M Erradi International Conference on Networked Systems, 221-232, 2013 | 5 | 2013 |