Author of the publication

A trust-based approach for security policies enhancement in dynamic social networks.

, and . Int. J. Auton. Comp., 2 (2): 155-175 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mobile Agent view Synchronization System to Uphold a Trajectory data Warehouse., , , and . KES, volume 60 of Procedia Computer Science, page 276-283. Elsevier, (2015)A trust-based approach for security policies enhancement in dynamic social networks., and . Int. J. Auton. Comp., 2 (2): 155-175 (2016)Privacy Protection Protocol in Social Networks Based on Sexual Predators Detection., and . ICC 2016, page 63:1-63:6. ACM, (2016)Opinion leaders' detection in dynamic social networks., , , and . Concurr. Comput. Pract. Exp., (2021)The Next Generation of Disaster Management and Relief Planning: Immersive Analytics Based Approach., , , and . iLRN, volume 840 of Communications in Computer and Information Science, page 80-93. Springer, (2018)Overlapping community detection in social networks., and . BIBM, page 17-23. IEEE Computer Society, (2013)Big Data Analytics for Opinion Mining and Patterns Detection of the Tunisian Election., , and . SIMBig, volume 1743 of CEUR Workshop Proceedings, page 157-164. CEUR-WS.org, (2016)A fuzzy model for friendship prediction in healthcare social networks., , , and . ASONAM, page 1050-1054. IEEE Computer Society, (2016)Social Networks Security Policies., , and . IIMSS, page 395-403. Springer, (2016)Wherever You Are, I'll Catch You Modeling the Identification of Location-Based Communities in Mobile Social Networks., and . ICC 2016, page 64:1-64:5. ACM, (2016)