- Information and Cyber Security
- Formal Methods in Verification
- Smart Grid Security and Resilience
- Multi-Agent Systems and Negotiation
- Digital and Cyber Forensics
- Air Quality Monitoring and Forecasting
- Cloud Data Security Solutions
- Business Process Modeling and Analysis
- Air Quality and Health Impacts
- Context-Aware Activity Recognition Systems
- Vehicle emissions and performance
- Advanced Malware Detection Techniques
- Service-Oriented Architecture and Web Services
- Model-Driven Software Engineering Techniques
- Distributed systems and fault tolerance
- Music and Audio Processing
- Advanced Software Engineering Methodologies
- Vehicle Noise and Vibration Control
- Blockchain Technology Applications and Security
- Mobile Agent-Based Network Management
- Advanced Database Systems and Queries
- UAV Applications and Optimization
- Cryptography and Data Security
- Modular Robots and Swarm Intelligence
- Logic, programming, and type systems
Badji Moktar-Annaba University
2018-2024
University of Constantine 3
2014-2021
Université Constantine 2
2016-2021
University Frères Mentouri Constantine 1
2014-2015
The oil and gas (O&G) industry is the engine of global economy.Oil production passes through axes related to exploration, research, extraction, transportation, finally final manufacturing energy products.All these stages permeate some risks that threaten both human factor material factor.The merged with fourth technological 4.0, which included multiple technologies systems, most important cyber-physical system (CPS), researchers have named petroleum systems if it embodied within this...
Trust is the currency of every transaction and exchange pillar trusted system concept, which one needs today future.Those systems ease communication sharing with little user-side load are used in numerous organizations, financial institutions, military scenarios, highly confidential works.The evolution Cyber-Physical Systems (CPS) affects people's way life applied health care, smart homes, commerce, etc.The cyber-physical treated as a trust if principles security safety, confidentiality,...
In the last few years, evolution of information technology has resulted in development several interesting and sensitive fields such as dark Web cyber-criminality, especially using ransomware attacks. This paper aims to bring out only critical features make their observation, or not, software behaviour sufficient decide whether it is not. Therefore, we propose a new solution for detection based on machine learning algorithms system calls. First, introduce our produced dataset collected calls...
Cloud computing is an emerging topic in the IT industry, it brings new design challenges and security issues, as resources rapid availability quick scalability. Since formal methods provide a reliable mathematical basis giving rise to safely analyzable models, we aim this paper propose framework for cloud architectural elasticity. Bigraphical Reactive Systems are adopted semantic their graphical aspect rigorous basis. Then, Maude language used implement obtained bigraphical model. system...
In the last years, cloud computing has emerged as a new information technology (IT) model. Which provides an easy way for data processing and storage remotely through network. Nowadays, become attractive scheme users to store their data. When fil es in system, they still worried about security of files guarantee confidentiality integrity them. this work, we propose multi-agent framework provide security. The proposed enables by providing both For purpose, client-side encryption method, which...
Formal methods offer a great potential for early integration of verification in the design process.These are based on theories and mathematical notations that allow formal specification program check its implementation.They global vision high-level structure system organization.In addition, software architecture plays key role as pivot point between requirements implementation.In this paper, we present approach Bigraphical Reactive Systems specifying verifying main features Multi Agent (MAS)...
Multi-Agent Systems (MAS) can be subject to changes reflecting the continuous emergence of new requirements. Thus, diversity basics on one hand, and complexity concepts related agents other make it difficult conceive develop a reconfigurable multi-agent syst em architecture. In this paper, we relay formal methods manage these aspects reason design MAS architectures. Precisely, propose modelling approach based Bigraphs (BRS) for specification system architectures their reconfiguration. BRS...
Industrial control systems (ICSs) and supervisory data acquisition (SCADA) are frequently used essential to the operation of vital infrastructure such as oil gas pipelines, power plants, distribution grids, airport towers. However, these confront a number obstacles risks that can jeopardize their safety reliability, including communication failures, cyber-attacks, environmental hazards, human errors. How ensure SCADA both effective secure? The industry literature needs include an analysis...
Unmanned Aerial Vehicles (UAVs), popularly known as drones, are widely used for safe aims and some sensitive missions such monitoring of critical infrastructure, surveillance operations, cargo delivery. However, technology can be terrible objectives, particularly in recent years when it has become the most essential tool battles Ukraine conflict. This prompted to resort monster war. Drones becoming more useful, yet there security concerns. a serious threat public safety, personal privacy,...
With the recent upsurge in music consumption, recommendation systems have gained substantial prominence.Platforms like Spotify are increasingly relied upon by users for curated music, underscoring need improved algorithms.While analysis of user preferences and historical listening behaviours has conventionally been employed to tailor recommendations, these techniques often restricted examining textual data, such as lyrics titles, thereby potentially limiting effectiveness recommendations.The...
There exist several approaches proposed for building Context-Aware Systems (CAS). However, due to the continually changing environment, large number of interrelated components, complexity and diversity application domains make modelling context-aware systems a particularly challenging task. To address increasing modelling: i) It is critical take into account importance environment (operational context); ii) rely on software engineering concepts such as abstraction modularity in order reduce...
Shoulder surfing is a common threat used to steal sensitive information, specifically credential and PIN number either by human or recorder cameras. The proposed solution designed for both PCs smartphone-based login interfaces. In this paper, we propose new authentication scheme based on augmented misinformation existing techniques in addition the introduction of novel one maximizing security level keeping it simple use. We reuse crossing-based technique with keys layout randomisation...
One of the primary objectives ambient systems is to provide services based on ability interact with environment (including objects, humans and system components). An must deal dynamic integration new unexpected elements (e.g. users or devices). To fulfil functions, we need specify its context. In this paper, present an elaborated formal approach model core concepts context-aware their reconfigurations. The enables a high-level abstraction supports building by providing modularity separation...
Multi-agent systems are recognized as a major area of distributed artificial intelligence. In fact, MAS have found multiple applications, including the design and development complex, hierarchical critical systems. However, ensuring accuracy complex interactions correct execution activities is becoming tedious task. this work, we focus on formal specification interaction, holonic sociotechnical concepts to BRS-MAS model. The proposed approach, based Bigraphical reactive Bigraphs, provide...
This paper investigates the use of a sequence-to-sequence approach for multi-step prediction PM <inf xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2.5</inf> concentrations. The aim is to analyze effects varying lengths input and output sequences, as well different architectures, specifically LSTM (Long Short Term Memory) Transformer. models were trained using three years concentration data. results indicate that models, incorporating time series...
Introduction: This paper focuses on the prediction of weekly peak levels Particulate Matter with an aerodynamic diameter less than 2.5 µm (PM2.5 ), using various Machine Learning (ML) models. The study compares ML models to deep learning and emphasizes explain ability for PM2.5 prediction.
 Materials methods: We examine different combinations features time window dimensions evaluate performance It utilizes Support Vector (SVM), Multi-Layer Perceptron (MLP), Decision Tree (DT), five...
Shot Boundary Detection (SBD) is an important step required by CBVIR systems. In order to perform scalable SBD, a MapReduce based solution proposed. So, instead of handling consecutive frames in sequential manner, they can be processed fully parallel way. Usually, the case, descriptors are compared and shot boundaries detected if significant variations have occurred. It seems simple, but it take centuries processes immense multimedia datasets. Then, on transitivity similarity relation,...