Follow
Anis Ben Aissa
Anis Ben Aissa
National Engineering School of Tunis, Tunisia
Verified email at enit.utm.tn
Title
Cited by
Cited by
Year
Classification of security threats in information systems
M Jouini, LBA Rabai, AB Aissa
Procedia Computer Science 32, 489-496, 2014
4042014
A cybersecurity model in cloud computing environments
LBA Rabai, M Jouini, AB Aissa, A Mili
Journal of King Saud University-Computer and Information Sciences 25 (1), 63-75, 2013
1552013
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6, 269-281, 2010
742010
Towards quantitative measures of Information Security: A Cloud Computing case study
M Jouini, AB Aissa, LBA Rabai, A Mili
International Journal of cyber-security and digital forensics (IJCSDF) 1 (3 …, 2012
552012
Cyber security measurement in depth for e-learning systems
N Rjaibi, LBA Rabai, AB Aissa, M Louadi
International Journal of Advanced Research in Computer Science and Software …, 2012
402012
Defining and computing a value based cyber-security measure
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-9, 2011
392011
An economic model of security threats for cloud computing systems
LBA Rabai, M Jouini, M Nafati, AB Aissa, A Mili
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
302012
Quantifying security threats for E-learning systems
LBA Rabai, N Rjaibi, AB Aissa
International Conference on Education and e-Learning Innovations, 1-6, 2012
272012
WITHDRAWN: A new model for epidemic prediction: COVID-19 in kingdom saudi arabia case study
IA Mohamed, AB Aissa, LF Hussein, AI Taloba
Materials Today: Proceedings, 2021
152021
Quantifying security threats and their impact.
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
CSIIRW 9, 2009
152009
Modeling stakeholder/value dependency through mean failure cost
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
132010
Mean failure cost as a measurable value and evidence of cybersecurity: E-learning case study
N Rjaibi, LBA Rabai, AB Aissa, A Mili
International Journal of Secure Software Engineering (IJSSE) 4 (3), 64-81, 2013
122013
The mean failure cost cybersecurity model toward security measures and associated mechanisms
N Rjaibi, LBA Rabai, AB Aissa
International Journal of Cyber-Security and Digital Forensics 2 (2), 23-36, 2013
112013
Mean failure cost as a measure of critical security requirements: E-learning case study
N Rjaibi, LBA Rabai, H Omrani, AB Aissa
Proceedings of The 2012 World Congress in Computer Science, Computer …, 2012
112012
Quantifying availability in SCADA environments using the cyber security metric MFC
AB Aissa, LBA Rabai, RK Abercrombie, A Mili, FT Sheldon
Proceedings of the 9th annual cyber and information security research …, 2014
82014
A basic security requirements taxonomy to quantify security threats: an e-learning application
N Rjaibi, LBA Rabai, AB Aissa
Proceedings of the Third International Conference on Digital Information …, 2013
82013
A Novel Stochastic Model For Cybersecurity Metric Inspired By Markov Chain Model And Attack Graphs
AE Anis Ben Aissa, Islam Abdalla, Loay F. Hussein
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 9 (3), 6329-6335, 2020
62020
Classification For Iot threats based on the analytic hierarchy process
IA Mohamed, AB Aissa, LF Hussein
Int. J. Sci. Technol. Res 9, 4860-4867, 2020
62020
Quantifying the impact of unavailability in cyber-physical environments
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 1-8, 2014
52014
Development of a Secured Vehicle Spot Detection System Using GSM
IAM Loay F. Hussein, Anis Ben Aissa
International Journal of Interactive Mobile Technologies 15 (04), 85-100, 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20