Publications

2015
[1035] Shameli-Sendi A, Louafi H, He W, Cheriet M. "A defense-centric model for multi-step attack damage cost evaluation.". In: The 3rd International Conference on Future Internet of Things and Cloud (FiCloud-2015). Italy: IEEE; 2015. Download: DefenseCentric.pdf (1.96 MB)
[1041] Jarraya Y, Shameli-Sendi A, Pourzandi M, Cheriet M. "Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud.". In: IEEE 8th International Conference on Cloud Computing. New York City, NY, USA: IEEE; 2015. Download: Multistage-IEEEcloud2015.pdf (641.58 KB)
[995] Nafchi HZ, Shahkolaei A, Farrahi Moghaddam R, Cheriet M. "FSITM: A Feature Similarity Index For Tone-Mapped Images." IEEE Signal Processing Letters. 2015;22(8). Download: Letter-FSITM.pdf (3.47 MB); FSITM.zip (8.89 KB); FSITM_Sup.pdf (69.48 KB)
[1040] Rojas, M.A.T.; Gonzalez NM, Sbampato, F.; Redigolo F;, Carvalho, T.C.;Nguyen K, Cheriet M. "Inclusion of Security Requirements in SLA Lifecycle Management for Cloud Computing.". In: 2nd International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE 2015) . August 24-25, 2015.Ottawa, Canada.; 2015.
[1025] Shameli-Sendi A, Jarraya Y, Fekih-Ahmed M, Pourzandi M, Talhi C, Cheriet M. "Optimal Placement of Sequentially Ordered Virtual Security Appliances in the Cloud.". In: The 14th IFIP/IEEE Symposium on Integrated Network Management (IM 2015). IEEE; 2015. Download: MOC3.pdf (1.58 MB)
2014
[968] Shameli-Sendi A, Cheriet M. "Cloud Computing: A Risk Assessment Model.". In: IEEE International Conference on Cloud Engineering (IC2E 2014). Boston, MA, USA; 2014. Download: RAaaS.pdf (387.5 KB)
ericssonlogo
inocybelogo
canalogo
cienalogo
Civimetrix Telecom logo
mitacslogo
risq logo
nserclogo
promptlogo
ecolepolytechniquelogo
University of Torontologo
frqntlogo
uqlogo
MDEIE logo
cfilogo
ciraiglogo