default search action
Hassen Sallay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Azizah Assiri, Hassen Sallay:
Efficient Privacy-Aware Forwarding for Enhanced Communication Privacy in Opportunistic Mobile Social Networks. Future Internet 16(2): 48 (2024) - 2021
- [j15]Sami Bourouis, Hassen Sallay, Nizar Bouguila:
A Competitive Generalized Gamma Mixture Model for Medical Image Diagnosis. IEEE Access 9: 13727-13736 (2021) - [j14]Hassen Sallay, Sami Bourouis, Nizar Bouguila:
Online Learning of Finite and Infinite Gamma Mixture Models for COVID-19 Detection in Medical Images. Comput. 10(1): 6 (2021) - 2020
- [j13]Aymen Akremi, Hassen Sallay, Mohsen Rouached, Rafik Bouaziz:
Applying Digital Forensics to Service Oriented Architecture. Int. J. Web Serv. Res. 17(1): 17-42 (2020)
2010 – 2019
- 2019
- [j12]Aymen Akremi, Mohamed-Foued Sriti, Hassen Sallay, Mohsen Rouached:
Ontology-Based Smart Sound Digital Forensics Analysis for Web Services. Int. J. Web Serv. Res. 16(1): 70-92 (2019) - [j11]Sami Bourouis, Faisal R. Al-Osaimi, Nizar Bouguila, Hassen Sallay, Fahd M. Aldosari, Mohamed Al Mashrgy:
Bayesian inference by reversible jump MCMC for clustering based on finite generalized inverted Dirichlet mixtures. Soft Comput. 23(14): 5799-5813 (2019) - 2018
- [c14]Wentao Fan, Sami Bourouis, Nizar Bouguila, Fahd M. Aldosari, Hassen Sallay, K. M. Jamil Khayyat:
EP-Based Infinite Inverted Dirichlet Mixture Learning: Application to Image Spam Detection. IEA/AIE 2018: 342-354 - [c13]Fahd M. Aldosari, Sami Bourouis, Nizar Bouguila, Hassen Sallay, Khalid M. Jamil Khayyat:
Infinite Scaled Dirichlet Mixture Models for Spam Filtering via Bayesian and Variational Bayes Learning. iThings/GreenCom/CPSCom/SmartData 2018: 1841-1847 - 2017
- [j10]Wentao Fan, Hassen Sallay, Nizar Bouguila:
Online Learning of Hierarchical Pitman-Yor Process Mixture of Generalized Dirichlet Distributions With Feature Selection. IEEE Trans. Neural Networks Learn. Syst. 28(9): 2048-2061 (2017) - [c12]Sami Bourouis, Faisal R. Al-Osaimi, Nizar Bouguila, Hassen Sallay, Fahd M. Aldosari, Mohamed Al Mashrgy:
Video Forgery Detection Using a Bayesian RJMCMC-Based Approach. AICCSA 2017: 71-75 - 2016
- [j9]Wentao Fan, Hassen Sallay, Nizar Bouguila, Sami Bourouis:
Variational learning of hierarchical infinite generalized Dirichlet mixture models and applications. Soft Comput. 20(3): 979-990 (2016) - 2015
- [j8]Wentao Fan, Hassen Sallay, Nizar Bouguila, Sami Bourouis:
A hierarchical Dirichlet process mixture of generalized Dirichlet distributions for feature selection. Comput. Electr. Eng. 43: 48-65 (2015) - [j7]Hassen Sallay, Sami Bourouis:
Intrusion detection alert management for high-speed networks: current researches and applications. Secur. Commun. Networks 8(18): 4362-4372 (2015) - [c11]Aymen Akremi, Hassen Sallay, Mohsen Rouached, Mohamed-Fouad Sriti, Mohamed Abid, Rafik Bouaziz:
Towards a Built-In Digital Forensics-Aware Framework for Web Services. CIS 2015: 367-370 - [c10]Wentao Fan, Hassen Sallay, Nizar Bouguila, Ji-Xiang Du:
Human Action Recognition Using Accelerated Variational Learning of Infinite Dirichlet Mixture Models. ICMLA 2015: 451-456 - [c9]Aymen Akremi, Hassen Sallay, Mohsen Rouached, Rafik Bouaziz, Mohamed Abid:
Forensics-aware web services composition and ranking. iiWAS 2015: 56:1-56:10 - 2014
- [j6]Mohsen Rouached, Hassen Sallay:
A semantic QoS-aware web services composition framework. Int. J. Bus. Inf. Syst. 17(1): 94-111 (2014) - [j5]Mohsen Rouached, Hassen Sallay:
A service oriented communication model for high speed intrusion detection systems. Int. J. Bus. Inf. Syst. 17(3): 323-339 (2014) - [j4]Aymen Akremi, Hassen Sallay, Mohsen Rouached:
An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks. Int. J. Inf. Secur. Priv. 8(1): 62-78 (2014) - [c8]Wentao Fan, Hassen Sallay, Nizar Bouguila, Sami Bourouis:
A Hierarchical Infinite Generalized Dirichlet Mixture Model with Feature Selection. ICAIS 2014: 1-10 - [c7]Hassen Sallay, Sami Bourouis, Nizar Bouguila:
Web Service Intrusion Detection Using a Probabilistic Framework. ICSEng 2014: 161-166 - 2013
- [c6]Mohsen Rouached, Hassen Sallay:
RESTful Web Services for High Speed Intrusion Detection Systems. ICWS 2013: 621-622 - [c5]Hassen Sallay, Adel Ammar, Majdi Ben Saad, Sami Bourouis:
A Real Time Adaptive Intrusion Detection Alert Classifier for High Speed Networks. NCA 2013: 73-80 - [c4]Wentao Fan, Nizar Bouguila, Hassen Sallay:
Anomaly Intrusion Detection Using Incremental Learning of an Infinite Mixture Model with Feature Selection. RSKT 2013: 364-373 - 2012
- [c3]Mohsen Rouached, Hassen Sallay:
An Efficient Formal Framework for Intrusion Detection Systems. ANT/MobiWIS 2012: 968-975 - 2011
- [j3]Hassen Sallay, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, Majdi Ben Saad:
Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework. Int. J. Inf. Secur. Priv. 5(4): 47-58 (2011) - [j2]Ouissem Ben Fredj, Hassen Sallay, Mohsen Rouached, Adel Ammar, Khalid Al-Shalfan, Majdi Ben Saad:
Survey on Architectures and Communication Libraries dedicated for High Speed Networks. J. Ubiquitous Syst. Pervasive Networks 3(2): 79-86 (2011) - 2010
- [j1]Hassen Sallay:
On Arabic Texts Compression and Searching. J. Digit. Inf. Manag. 8(6): 355-361 (2010)
2000 – 2009
- 2004
- [b1]Hassen Sallay:
Architecture de supervision et modèle de comptabilité pour le multicast IP. Henri Poincaré University, Nancy, France, 2004 - 2003
- [c2]Hassen Sallay, Olivier Festor:
A Highly Distributed Dynamic IP Multicast Accounting and Management Framework. Integrated Network Management 2003: 45-58 - 2002
- [c1]Hassen Sallay, Radu State, Olivier Festor:
A distributed management platform for integrated multicast monitoring. NOMS 2002: 483-495
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint