Loading...
Images of Nouria Harbi
(0 from 0 )Education
10 years of CEMARA database in the AnDDI-Rares network
journals.scholarsportal.info
Dynamic management of data warehouse security levels based on user profiles. Authors. Amina El Ouazzani · Sara Rhazlane · Nouria Harbi · Hassan Badir ... › details
Books & Literature
Socio-Economic Intervention in Organizations: The ...
books.google.com
HARBI Zardet and Nouria Harbi ISEOR has accumulated a large quantity of data representing experience and know-how acquired through its extensive ...
Strategic Engineering of the Reed: Reflections on ...
books.google.com
This unique software has been developed in ISEOR with the active cooperation of Nouria Harbi, PhD in information system (Harbi, 1990).
The Socio-Economic Approach to Management Revisited: The ...
books.google.com
A Tool for understanding Hidden Costs and Performance?1 nouria Harbi, Guy Saint-Léger, and olivier Voyant In their search for improvement, companies have ...
Advances in Databases and Information Systems: 25th European ...
books.google.com
... and Camille Noûs2( B ) 1 Université de Lyon, Lyon 2, UR ERIC, 5 avenue Pierre Mend`es France, Bron Cedex, France {a.azri,cecile.favre,nouria.harbi ...
Related Documents
Varunya Attasena - Nouria Harbi Jérôme Darmont - Archive ...
hal.archives-ouvertes.fr
› file › DOLAP
Attacks Classification in Adaptive Intrusion Detection using ...
dspace.uiu.ac.bd
by CM Rahman · · Cited by 58 — Nouria Harbi is with the ERIC Laboratory, University Lumière Lyon 2–. France (). Emna Bahri is with the ERIC Laboratory, ... › bitstream › handle
Dds - ID:5c14f6e5af DOCU.TIPS
docu.tips
[5] Dewan Md. Farid, Nouria Harbi, and Mohammad Zahidur Rahman,“Combining Naive Bayes and Decision Tree for adaptive intrusion detection”, Network Security ... › Others
Scientific Publications
Tracks > Security, Privacy, Trust and Blockchain - INTIS'2020
intis2020.sciencesconf.org
CALL FOR PAPERS. Security, Privacy, Trust and Blockchain. Session chair. Nouria HARBI, David PIERROT, Rachida FISSOUNE. Lyon 2 Université, ERIC LABORATORY, ... › page › track5
Publications
Socio-economic intervention in organizations : the intervener ...
www.worldcat.org
Appendix 1: SEAMES[registered]: A Professional Knowledge Management Software Program, Veronique Zardet and Nouria Harbi.; PART I: SEAM INTERVENTIONS IN ... › isbn
Calling to CNN-LSTM for Rumor Detection - ECML PKDD 2021
2021.ecmlpkdd.org
by A Azri · Cited by 1 — Abderrazek Azri ( )1, Cécile Favre ( )1, Nouria Harbi ( )1,. Jérôme Darmont ( )1[0000−0003−1491−384X], and Camille Noûs2. 1 Université de Lyon, Lyon 2, ... › › sub_874
Miscellaneous
A Survey of DDOS Attacks Using Machine Learning Techniques
www.e3s-conferences.org
[Google Scholar]; Dewan Md. Farid, Nouria Harbi, EmnaBahri, Mohammad Zahid ur Rahman, Chowdhury Mofizur Rahman,‟ Attacks Classification in Adaptive ... › articles › ref
AnalyzingNB, DT and NBTree Intrusion Detection Algorithms
jzs.univsul.edu.iq
[8] Dewan Md. Farid, Nouria Harbi, and Mohammad Zahidur Rahman, "COMBINING. NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION. › issues › jzs
Calling to CNN-LSTM for Rumor Detection: A Deep Hal-Inria
hal.inria.fr
by A Azri · · Cited by 1 — Abderrazek Azri, Cécile Favre, Nouria Harbi, Jérôme Darmont, Camille Noûs. Calling to CNN-LSTM for Rumor Detection: A Deep Multi-channel Model for Message ... › hal
Dynamic Classification of Sensitivity Levels of Datawarehouse ...
hal.univ-lorraine.fr
Amina El Ouazzani, Nouria Harbi, Hassan Badir. Dynamic Classification of Sensitivity Levels of Datawarehouse Based on User Profiles. › ERIC › hal
Formation pour consultants et franchises
ns3040652.ip-164-132-163.eu
... was developed as early as in tight collaboration between Henri Savall, Véronique Zardet and Nouria Harbi in cooperation with Jacques Kouloumdjian. › siteiseor › transf...
IADIS Portal - IADIS Digital Library
www.iadisportal.org
Title: A NEW SUPERVISED LEARNING ALGORITHM USING NAÏVE BAYESIAN CLASSIFIER. Author(s):, Dewan Md. Farid, Jerome Darmont, and Nouria Harbi, Chowdhury Mofizur ... › digital-library › a-new-sup...
Improved Ensemble Technique based on Support Vector ...
ijoscience.com
Dewan Md. Farid, Nouria Harbi, Emna Bahri, Mohammad Zahidur Rahman, Chowdhury Mofizur Rahman “Attacks Classification in Adaptive Intrusion Detection using ... › ojsscience › article › view
Intrusion detection systems are used to identify, classify
studylib.net
[4] Attacks Classification in Adaptive Intrusion Detection using Decision Tree Dewan Md. Farid, Nouria Harbi, Emna Bahri, Mohammad Zahidur Rahman, ... › ... › Data Mining
Journal Articles - Hassan BADIR
badir.fr
Amina El Ouazzani, Nouria Harbi, Hassan Badir. User Profile Management to protect sensitive data in Warehouses. International Journal of Next-Generation ... › journal-articles
Modeling Conflict of Interest in the Design of Secure Data ...
www.academia.edu
MODELING CONFLICT OF INTEREST IN THE DESIGN OF SECURE DATA WAREHOUSES Salah Triki, Hanene Ben-Abdallah, Jamel Feki, Nouria Harbi To cite this version: Salah ... › Modeling_Conflict_of_Int...
Review Of Network Intrusion Detection Systems - International ...
www.ijstr.org
[14] Dewan Md. Farid, Nouria Harbi, and Mohammad Zahidur Rahman, “Combining Naive Bayes and Decision tree for Adaptive Intrusion Detection”, ... › paper-references
Sharing-based Privacy and Availability of Cloud Data ...
hal.cirad.fr
by V Attasena · · Cited by 11 — Varunya Attasena, Nouria Harbi, Jérôme Darmont. Sharing-based Privacy and Availability of Cloud Data Warehouses. 9èmes journées francophones sur les ... › ERIC
Related search requests for Nouria Harbi
Cécile Favre |
People Forename "Nouria" (23) Name "Harbi" (147) |
sorted by relevance / date