default search action
Layth Sliman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Imane Haidar, Layth Sliman, Issam W. Damaj, Ali Massoud Haidar:
High Performance and Lightweight Single Semi-Lattice Algebraic Machine Learning. IEEE Access 12: 50517-50536 (2024) - [j14]Hachemi Nabil Dellys, Layth Sliman, Brendan Tran Morris, Karima Benatchba:
On Efficiency of Square-Boundaries Chaff Points Generation With Composite Representation in Fingerprint Fuzzy Vault. IEEE Access 12: 110691-110704 (2024) - 2023
- [j13]Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Abdelhamid Mellouk:
A formal verification approach for composite smart contracts security using FSM. J. King Saud Univ. Comput. Inf. Sci. 35(1): 70-86 (2023) - [j12]Wafa Ben Slama Souei, Chiraz El Hog, Raoudha Ben Djemaa, Layth Sliman, Ikram Amous Ben Amor:
Towards smart contract distributed directory based on the uniform description language. J. Comput. Lang. 77: 101225 (2023) - [c49]Mohamed Moetez Abdelhamid, Layth Sliman, Raoudha Ben Djemaa, Boussad Ait Salem:
ABISchain: Towards a Secure and Scalable Blockchain Using Swarm-based Pruning. ACSW 2023: 28-35 - [c48]Bachar Kachouh, Layth Sliman, Abed Ellatif Samhat, Kamel Barkaoui:
Demystifying Threshold Elliptic Curve Digital Signature Algorithm for MultiParty Applications. ACSW 2023: 112-121 - [c47]Hadi Al-Mubasher, Ziad Doughan, Layth Sliman, Ali M. Haidar:
A Novel Neural Network-Based Recommender System for Drug Recommendation. EANN 2023: 573-584 - [c46]Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Boussad Ait Salem, Abdelhamid Mellouk:
VNFO-DCSC: A Novel Secure End-to-End NFV Marketplace Using Dynamic Composite Smart Contracts. GLOBECOM 2023: 1632-1637 - [c45]Abir Ghannem, Emily Francis, Hajer Nabli, Layth Sliman, Raoudha Ben Djemaa:
Fuzzy FCA-based Elderly Activity Recognition. ICCA 2023: 1-6 - [c44]Ikhlas Mastour, Layth Sliman, Benoit Charroux, Raoudha Ben Djemaa, Kamel Barkaoui:
Privacy-preserving Collaborative Computation: Methods, Challenges and Directions. ICCA 2023: 1-6 - [c43]Asma Hamissi, Amine Dhraief, Layth Sliman:
On Safety of Decentralized Unmanned Aircraft System Traffic Management Using Blockchain. WETICE 2023: 1-6 - 2022
- [c42]Hajer Nabli, Ines Regaig, Raoudha Ben Djemaa, Layth Sliman:
Never Alone: a Quality of Context-aware Monitoring System for Aging in Place Smart Home. NCA 2022: 209-215 - 2021
- [j11]Saliha Artabaz, Layth Sliman, Karima Benatchba, Mouloud Koudil:
Optimized multi-biometric enhancement analysis. IET Biom. 10(3): 326-341 (2021) - [j10]Layth Sliman, Tasnime Omrani, Zahir Tari, Abed Ellatif Samhat, Rhouma Rhouma:
Towards an ultra lightweight block ciphers for Internet of Things. J. Inf. Secur. Appl. 61: 102897 (2021) - [j9]Houssein Hellani, Layth Sliman, Abed Ellatif Samhat, Ernesto Exposito:
Computing Resource Allocation Scheme for DAG-Based IOTA Nodes. Sensors 21(14): 4703 (2021) - [j8]Bachar Kachouh, Khalil Hariss, Layth Sliman, Abed Ellatif Samhat, Tamim Alsuliman:
Privacy preservation of genome data analysis using homomorphic encryption. Serv. Oriented Comput. Appl. 15(4): 273-287 (2021) - [c41]Nawel Hamdi, Chiraz El Hog, Raoudha Ben Djemaa, Layth Sliman:
A Survey on SLA Management Using Blockchain Based Smart Contracts. ISDA 2021: 1425-1433 - [c40]Mouhamad Almakhour, Ayoub Wehby, Layth Sliman, Abed Ellatif Samhat, Abdelhamid Mellouk:
Smart Contract Based Solution for Secure Distributed SDN. NTMS 2021: 1-6 - [c39]Amira Jablaoui, Hichem Kmimech, Layth Sliman, Lotfi Nabli:
A Rank Based ACO Approach for Optimal Resource Allocation and Scheduling in FMS Modeled with Labelled Petri Net. SoMeT 2021: 688-699 - [c38]Wafa Ben Slama Souei, Chiraz El Hog, Layth Sliman, Raoudha Ben Djemaa, Ikram Amous Ben Amor:
Towards a Uniform Description Language for Smart Contract. WETICE 2021: 57-62 - [c37]Houssein Hellani, Layth Sliman, Abed Ellatif Samhat, Ernesto Exposito:
Tangle the Blockchain: Towards Connecting Blockchain and DAG. WETICE 2021: 63-68 - 2020
- [j7]Hichem Kmimech, Achraf Jabeur Telmoudi, Layth Sliman, Lotfi Nabli:
Genetic-Based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets. IEEE Access 8: 22854-22861 (2020) - [j6]Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Abdelhamid Mellouk:
Verification of smart contracts: A survey. Pervasive Mob. Comput. 67: 101227 (2020) - [j5]Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Layth Sliman, Mourad Kmimech:
An MDE-Based Tool for Early Analysis of UML2.0/PSM Atomic and Composite Components. IEEE Syst. J. 14(2): 1647-1657 (2020) - [c36]Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Abdelhamid Mellouk:
On the Verification of Smart Contracts: A Systematic Review. ICBC 2020: 94-107 - [c35]Motaz Ben Hassine, Mourad Kmimech, Hussein Hellani, Layth Sliman:
Toward a Mixed Tangle-Blockchain Architecture. SoMeT 2020: 221-233
2010 – 2019
- 2019
- [j4]Hayet Brabra, Achraf Mtibaa, Fábio Petrillo, Philippe Merle, Layth Sliman, Naouel Moha, Walid Gaaloul, Yann-Gaël Guéhéneuc, Boualem Benatallah, Faïez Gargouri:
On semantic detection of cloud API (anti)patterns. Inf. Softw. Technol. 107: 65-82 (2019) - [c34]Tasnime Omrani, Layth Sliman:
A New Lightweight Encryption Approach for Correlated Content Exchange in Internet of Things. FNSS 2019: 161-171 - [c33]Hussein Hellani, Layth Sliman, Motaz Ben Hassine, Abed Ellatif Samhat, Ernesto Exposito, Mourad Kmimech:
Tangle the Blockchain: Toward IOTA and Blockchain Integration for IoT Environment. HIS 2019: 429-440 - [c32]Imed Abbassi, Layth Sliman, Mohamed Graiet, Walid Gaaloul:
On the Verification of Data Encryption Requirements in Internet of Things Using Event-B. ICDEc 2019: 147-156 - [c31]Saliha Artabaz, Layth Sliman:
Study of Score Fusion and Quality Weighting in the Bio-Secure DS2 Database. SCDS 2019: 252-261 - [c30]Hichem Kmimech, Layth Sliman, Lotfi Nabli:
GRASP-Based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets. SKG 2019: 75-80 - [c29]Hichem Kmimech, Achraf Jabeur Telmoudi, Layth Sliman, Lotfi Nabli:
Minimum Initial Marking Estimation in Labeled Petri Nets Using Simulated Annealing. SoMeT 2019: 361-370 - 2018
- [c28]Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Walid Gaaloul:
Trustless Blockchain-based Access Control in Dynamic Collaboration. BDCSIntell 2018: 27-33 - [c27]Tasnime Omrani, Rhouma Rhouma, Layth Sliman:
Lightweight Cryptography for Resource-Constrained Devices: A Comparative Study and Rectangle Cryptanalysis. ICDEc 2018: 107-118 - [c26]Hachemi Nabil Dellys, Karima Benatchba, Layth Sliman, Yen-Wei Chen:
Chaff-Points Generation Method Based on Adaptive Genetic Algorithms and Non-Fixed Size Squares Boundaries for Resource Constrained Devices. NTMS 2018: 1-4 - [c25]Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech, Layth Sliman:
A Generic Approach for the Verification of Static and Dynamic Behavioral Properties of SCDL/WS-BPEL Service-Component Architectures. PDCAT 2018: 381-389 - [c24]Layth Sliman, Hachemi Nabil Dellys:
Security, Safety and Confidentiality in IoT for Collaborative Business Technologies (SSCIoT Track of WETICE 2018). WETICE 2018: 179-180 - [e1]Layth Sliman, Ismael Bouassida Rodriguez, Kaori Yoshida:
27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2018, Paris, France, June 27-29, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-6916-7 [contents] - [i1]Alok Chauhan, V. Vijayakumar, Layth Sliman:
Ontology Matching Techniques: A Gold Standard Model. CoRR abs/1811.10191 (2018) - 2017
- [c23]Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Layth Sliman, Mourad Kmimech:
Towards a formal approach for the verification of SCA/BPEL software architectures. IISA 2017: 1-6 - [c22]Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech, Layth Sliman:
UML2ADA for Early Verification of Concurrency Inside the UML2.0 Atomic Components. ISDA 2017: 10-20 - [c21]Imed Abbassi, Mohamed Graiet, Sindyana Jlassi, Abir Elkhalfa, Layth Sliman:
A Formal Approach for Correct Elastic Package-Based Free and Open Source Software Composition in Cloud. OTM Conferences (1) 2017: 732-750 - [c20]Wael Chargui, Taoufik Sakka Rouis, Mourad Kmimech, Mohamed Tahar Bhiri, Layth Sliman, Badran Raddaoui:
Towards a Formal Verification Approach for Service Component Architecture. SoMeT 2017: 466-479 - [c19]Amal Ayach, Layth Sliman, Mourad Kmimech, Mohamed Tahar Bhiri, Badran Raddaoui:
Towards a Formal Verification Approach for Cloud Software Architecture. SoMeT 2017: 490-502 - [c18]Wael Chargui, Taoufik Sakka Rouis, Mourad Kmimech, Mohamed Tahar Bhiri, Layth Sliman, Badran Raddaoui:
Behavioral Verification of Service Component Architecture. WETICE 2017: 239-241 - 2016
- [c17]Hayet Brabra, Achraf Mtibaa, Layth Sliman, Walid Gaaloul, Faïez Gargouri:
Semantic Web Technologies in Cloud Computing: A Systematic Literature Review. SCC 2016: 744-751 - [c16]Hachemi Nabil Dellys, Layth Sliman, Saliha Artabaz, Karima Benatchba, Mouloud Koudil:
Chaff-Points Generation Using Knapsack Problem Resolution in Fingerprint Fuzzy Vault. HIS 2016: 507-516 - [c15]Hayet Brabra, Achraf Mtibaa, Layth Sliman, Walid Gaaloul, Boualem Benatallah, Faïez Gargouri:
Detecting Cloud (Anti)Patterns: OCCI Perspective. ICSOC 2016: 202-218 - [c14]Saliha Artabaz, Layth Sliman, Hachemi Nabil Dellys, Karima Benatchba, Mouloud Koudil:
Multibiometrics Enhancement Using Quality Measurement in Score Level Fusion. ISDA 2016: 260-267 - [c13]Samih Souissi, Ahmed Serhrouchni, Layth Sliman, Benoit Charroux:
Security Incident Response: Towards a Novel Decision-Making System. ISDA 2016: 667-676 - [c12]Tasnime Omrani, Layth Sliman, Rabei Becheikh, Safya Belghith, Belgacem Ben Hedia:
Towards an Ultra-lightweight Cryptosystem for IoT. SoCPaR 2016: 614-621 - 2015
- [j3]Nour Assy, Walid Gaaloul, Layth Sliman, Bruno Defude:
Configuration assistée des processus métier. Conception et expérimentation. Ingénierie des Systèmes d Inf. 20(6): 59-78 (2015) - [c11]Samih Souissi, Layth Sliman, Benoit Charroux:
A Novel Security Architecture Based on Multi-level Rule Expression Language. HIS 2015: 259-269 - [c10]Saliha Artabaz, Layth Sliman, Karima Benatchba, Hachemi Nabil Dellys, Mouloud Koudil:
Score Level Fusion Scheme in Hybrid Multibiometric System. IVIC 2015: 166-177 - [c9]Hachemi Nabil Dellys, Noussaiba Benadjimi, Meriem Romaissa Boubakeur, Layth Sliman, Karima Benatchba, Saliha Artabaz, Mouloud Koudil:
A Critical Comparison of Fingerprint Fuzzy Vault Techniques. IVIC 2015: 178-188 - [c8]Benoit Charroux, Layth Sliman, Yvan Stroppa, Nistor Grozavu:
Compose: A Domain Specific Language for scientific code computation. CFIP/NOTERE 2015: 1-4 - [c7]Hachemi Nabil Dellys, Noussaiba Benadjimi, Meriem Romaissa Boubakeur, Layth Sliman, Fathelalem F. Ali:
Fingerprint fuzzy vault chaff point generation by squares method. SoCPaR 2015: 357-362 - 2014
- [c6]Layth Sliman, Benoit Charroux, Yvan Stroppa:
Distributed Framework for Big Data Processing: a Goal Driven Approach. IDT/IIMSS/STET 2014: 385-391 - [c5]Asama Kuder Nseaf, Azizah Jaafar, Layth Sliman, Riza Sulaiman, Rahmita Wirza O. K. Rahmat:
Model of Bayesian Tangent Eye Shape for eye capture. ISDA 2014: 82-88 - [c4]Sahar A. Osman, Fathelalem F. Ali, Mohamed E. Musa, Layth Sliman:
Towards an effective e-government framework: Tasks and instruments for design and evaluation of public sector websites. ISDA 2014: 193-198 - 2013
- [c3]Layth Sliman, Benoit Charroux, Yvan Stroppa:
A New Collaborative and Cloud Based Simulation as a Service Platform: Towards a Multidisciplinary Research Simulation Support. UKSim 2013: 611-616 - 2012
- [c2]Layth Sliman, Benoit Charroux, Yvan Stroppa:
RunMyCode: An innovative platform for social production and evaluation of scientific research. CASoN 2012: 109-114
2000 – 2009
- 2009
- [j2]Layth Sliman, Frédérique Biennier, Youakim Badr:
Collaborative Business and Enterprise Urbanization: Towards a Production-Oriented Urbanization Strategy. Int. J. Enterp. Inf. Syst. 5(1): 9-31 (2009) - [j1]Layth Sliman, Frédérique Biennier, Youakim Badr:
A security policy framework for context-aware and user preferences in e-services. J. Syst. Archit. 55(4): 275-288 (2009) - 2008
- [c1]Alida Esper, Layth Sliman, Youakim Badr, Frédérique Biennier:
Towards Secured and Interoperable Business Services. IESA 2008: 301-312
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint