Follow
Reda Yaich (PhD.)
Reda Yaich (PhD.)
Head of Cybersecyrity and Networks @IRT SystemX
Verified email at irt-systemx.fr
Title
Cited by
Cited by
Year
Investigating the practicality of adversarial evasion attacks on network intrusion detection
MA Merzouk, F Cuppens, N Boulahia-Cuppens, R Yaich
Annals of Telecommunications 77 (11), 763-775, 2022
262022
User-centric security and dependability in the clouds-of-clouds
M Lacoste, M Miettinen, N Neves, FMV Ramos, M Vukolic, F Charmet, ...
IEEE Cloud Computing 3 (5), 64-75, 2016
262016
Adaptiveness and social-compliance in trust management within virtual communities
R Yaich, O Boissier, G Picard, P Jaillon
Web Intelligence and Agent Systems: An International Journal 11 (4), 315-338, 2013
162013
An adaptive and socially-compliant trust management system for virtual communities
R Yaich, O Boissier, P Jaillon, G Picard
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 2022-2028, 2012
162012
Privacy threat analysis for connected and autonomous vehicles
B Chah, A Lombard, A Bkakria, R Yaich, A Abbas-Turki, S Galland
Procedia Computer Science 210, 36-44, 2022
132022
A deeper analysis of adversarial examples in intrusion detection
MA Merzouk, F Cuppens, N Boulahia-Cuppens, R Yaich
Risks and Security of Internet and Systems: 15th International Conference …, 2021
132021
Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
W Tounsi
John Wiley & Sons, 2019
102019
Usage control policy enforcement in SDN-based clouds: a dynamic availability service use case
K Toumi, MS Idrees, F Charmet, R Yaich, G Blanc
2016 IEEE 18th International Conference on High Performance Computing and …, 2016
72016
Digital twins for enhanced resilience: Aerospace manufacturing scenario
A Bécue, M Praddaude, E Maia, N Hogrel, I Praça, R Yaich
International Conference on Advanced Information Systems Engineering, 107-118, 2022
62022
Social-compliance in trust management within virtual communities
R Yaich, O Boissier, P Jaillon, G Picard
2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011
62011
Deep reinforcement learning-based defense strategy selection
A Charpentier, N Boulahia Cuppens, F Cuppens, R Yaich
Proceedings of the 17th International Conference on Availability …, 2022
52022
Parameterizing poisoning attacks in federated learning-based intrusion detection
MA Merzouk, F Cuppens, N Boulahia-Cuppens, R Yaich
Proceedings of the 18th International Conference on Availability …, 2023
42023
Trust management systems: A retrospective study on digital trust
R Yaich
Cyber‐Vigilance and Digital Trust: Cyber Security in the Era of Cloud …, 2019
42019
H3PC: Enhanced Security and Privacy-Preserving Platoon Construction Based on Fully Homomorphic Encryption
B Chah, A Lombard, A Bkakria, A Abbas-Turki, R Yaich
2023 IEEE 26th International Conference on Intelligent Transportation …, 2023
32023
Towards a security impact analysis framework: A risk-based and MITRE attack approach
A Belfadel, M Boyer, J Letailleur, Y Petiot, R Yaich
European Symposium on Research in Computer Security, 212-227, 2022
32022
Evading deep reinforcement learning-based network intrusion detection with adversarial attacks
MA Merzouk, J Delas, C Neal, F Cuppens, N Boulahia-Cuppens, R Yaich
Proceedings of the 17th International Conference on Availability …, 2022
32022
An agent based trust management system for multi-agent based virtual communities
R Yaich, O Boissier, G Picard, P Jaillon
Advances on Practical Applications of Agents and Multi-Agent Systems: 10th …, 2012
32012
A Systematic Approach for Automotive Privacy Management
S Pape, S Syed-Winkler, AM Garcia, B Chah, A Bkakria, M Hiller, ...
Proceedings of the 7th ACM Computer Science in Cars Symposium, 1-12, 2023
22023
Exploring the quantitative resilience analysis of cyber-physical systems
R Dagnas, M Barbeau, M Boutin, J Garcia-Alfaro, R Yaich
2023 IFIP Networking Conference (IFIP Networking), 1-6, 2023
22023
Secure and robust cyber security threat information sharing
A Bkakria, R Yaich, W Arabi
International Symposium on Foundations and Practice of Security, 3-18, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20