Classification of security threats in information systems M Jouini, LBA Rabai, AB Aissa Procedia Computer Science 32, 489-496, 2014 | 434 | 2014 |
A cybersecurity model in cloud computing environments LBA Rabai, M Jouini, AB Aissa, A Mili Journal of King Saud University-Computer and Information Sciences 25 (1), 63-75, 2013 | 159 | 2013 |
Quantifying security threats and their potential impacts: a case study AB Aissa, RK Abercrombie, FT Sheldon, A Mili Innovations in Systems and Software Engineering 6, 269-281, 2010 | 74 | 2010 |
Towards quantitative measures of Information Security: A Cloud Computing case study M Jouini, AB Aissa, LBA Rabai, A Mili International Journal of cyber-security and digital forensics (IJCSDF) 1 (3 …, 2012 | 54 | 2012 |
Defining and computing a value based cyber-security measure AB Aissa, RK Abercrombie, FT Sheldon, A Mili Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-9, 2011 | 40 | 2011 |
Cyber security measurement in depth for e-learning systems N Rjaibi, LBA Rabai, AB Aissa, M Louadi International Journal of Advanced Research in Computer Science and Software …, 2012 | 39 | 2012 |
Quantifying security threats for E-learning systems LBA Rabai, N Rjaibi, AB Aissa International Conference on Education and e-Learning Innovations, 1-6, 2012 | 29 | 2012 |
An economic model of security threats for cloud computing systems LBA Rabai, M Jouini, M Nafati, AB Aissa, A Mili Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 29 | 2012 |
WITHDRAWN: A new model for epidemic prediction: COVID-19 in kingdom saudi arabia case study IA Mohamed, AB Aissa, LF Hussein, AI Taloba Materials Today: Proceedings, 2021 | 16 | 2021 |
Quantifying security threats and their impact. AB Aissa, RK Abercrombie, FT Sheldon, A Mili CSIIRW 9, 2009 | 15 | 2009 |
Modeling stakeholder/value dependency through mean failure cost AB Aissa, RK Abercrombie, FT Sheldon, A Mili Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 13 | 2010 |
Mean failure cost as a measurable value and evidence of cybersecurity: E-learning case study N Rjaibi, LBA Rabai, AB Aissa, A Mili International Journal of Secure Software Engineering (IJSSE) 4 (3), 64-81, 2013 | 12 | 2013 |
Mean failure cost as a measure of critical security requirements: E-learning case study N Rjaibi, LBA Rabai, H Omrani, AB Aissa Proceedings of The 2012 World Congress in Computer Science, Computer …, 2012 | 11 | 2012 |
The mean failure cost cybersecurity model toward security measures and associated mechanisms N Rjaibi, LBA Rabai, AB Aissa International Journal of Cyber-Security and Digital Forensics 2 (2), 23-36, 2013 | 10 | 2013 |
A Novel Stochastic Model For Cybersecurity Metric Inspired By Markov Chain Model And Attack Graphs AE Anis Ben Aissa, Islam Abdalla, Loay F. Hussein INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 9 (3), 6329-6335, 2020 | 8* | 2020 |
Classification for Iot threats based on the analytic hierarchy process IA Mohamed, AB Aissa, LF Hussein Int. J. Sci. Technol. Res 9, 4860-4867, 2020 | 8 | 2020 |
Quantifying availability in SCADA environments using the cyber security metric MFC AB Aissa, LBA Rabai, RK Abercrombie, A Mili, FT Sheldon Proceedings of the 9th annual cyber and information security research …, 2014 | 8 | 2014 |
A basic security requirements taxonomy to quantify security threats: an e-learning application N Rjaibi, LBA Rabai, AB Aissa Proceedings of the Third International Conference on Digital Information …, 2013 | 8 | 2013 |
Quantifying the impact of unavailability in cyber-physical environments AB Aissa, RK Abercrombie, FT Sheldon, A Mili 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 1-8, 2014 | 5 | 2014 |
Development of a Secured Vehicle Spot Detection System Using GSM IAM Loay F. Hussein, Anis Ben Aissa International Journal of Interactive Mobile Technologies 15 (04), 85-100, 2021 | 4 | 2021 |