Skip to Content
Session V-25: Special Session: Emergent Methods, Techniques and Tools for Cybersecurity
7/4/24, 10:20 AM - 7/4/24, 12:20 PM (Europe/Malta) (2 hours)

Session chair(s): Jaouhar Fattahi, Mohamed Mejri, Ridha Ghayoula, Emil Pricop

Paper  ID

Title

Authors

429 

Intrusion Detection Explainability by Ensemble Learning with a Case Study 

Elyes Manai, Mohamed Mejri, Jaouhar Fattahi* (Canada)

457 

FingFor: A Deep Learning Tool for Biometric Forensics 

Jaouhar Fattahi*, Baha Eddine Lakdher, Mohamed Mejri, Ridha Ghayoula, Elyes Manai, Marwa Ziadia (Canada)

461 

Sexism Discovery Using CNN, Word Embeddings, NLP and Data Augmentation 

Jaouhar Fattahi*, Feriel Sghaier, Mohamed Mejri, Ridha Ghayoula, Sahbi Bahroun, Marwa Ziadia (Canada)

465 

Handwritten Signature Recognition Using Parallel CNNs and Transfer Learning for Forensics 

Jaouhar Fattahi*, Feriel Sghaier, Mohamed Mejri, Ridha Ghayoula, Emil Pricop, Baha Eddine Lakdher (Canada)

194 

Confusion Matrix Explainability to Improve Model Performance : Application to Network Intrusion Detection 

Elyes Manai, Mohamed Mejri, Jaouhar Fattahi* (Canada) 

475 

The Good and Bad Seeds of CNN Parallelization in Forensic Facial Recognition 

Jaouhar Fattahi*, Baha Eddine Lakdher, Mohamed Mejri, Ridha Ghayoula, Feriel Sghaier, Laila Boumlik (Canada)

492 

Extended Group TOPSIS Method with Application for Cybersecurity 

Constanta Zoie Radulescu*, Marius Radulescu, Adrian Victor Vevera, Radu Boncea (Romania) 

755 

Optimal and Secure Routing Protocol Based on Key Management for IoT 

Radhia Radhia khdhir, Salwa Othmen, Aymen Belghith*, Khaled Hamouid (Saudi Arabia)