Multiple subregion allocation models S Benabdallah, JR Wright Journal of Urban Planning and Development 118 (1), 24-40, 1992 | 63 | 1992 |
A multi-attribute decision model for intrusion response system BA Fessi, S Benabdallah, N Boudriga, M Hamdi Information Sciences 270, 237-254, 2014 | 39 | 2014 |
A decisional framework system for computer network intrusion detection BA Fessi, M Hamdi, S Benabdallah, N Boudriga European Journal of Operational Research 177 (3), 1824-1838, 2007 | 30 | 2007 |
A framework for development of fuzzy GOMS model for human‐computer interaction W Karwowski, E Kosiba, S Benabdallah, G Salvendy International Journal of Human‐Computer Interaction 2 (4), 287-305, 1990 | 28 | 1990 |
A new genetic algorithm approach for intrusion response system in computer networks BA Fessi, S BenAbdallah, M Hamdi, N Boudriga 2009 IEEE Symposium on Computers and Communications, 342-347, 2009 | 25 | 2009 |
Shape considerations in spatial optimization S Benabdallah, JR Wright Civil Engineering Systems 8 (3), 145-152, 1991 | 22 | 1991 |
Evolutionary potential timetables optimization by means of genetic and greedy algorithms NE Arous, Najet, S. Benabdallah Proceedings 1999 International Conference on Information Intelligence and …, 1999 | 17 | 1999 |
Security issues in e-government models: what governments should do S Benabdallah, SEF Guemara, N Boudriga IEEE International Conference on Systems, Man and Cybernetics 2, 398-403, 2002 | 11 | 2002 |
Apports Différentiels de l'Internet pour la Veille Anticipative: Application au cas de Réponse aux Atteintes à la Sécurité des Réseaux d'Entreprise M Sadok, S Benabdallah, H Lesca Colloque de l'Association Information et Management, 2003 | 10 | 2003 |
Computer graphics in truss-model design approach S Benabdallah, JA Ramirez, RH Lee Journal of computing in civil engineering 3 (3), 285-301, 1989 | 10 | 1989 |
A clustering data fusion method for intrusion detection system BA Fessi, SB Abdallah, Y Djemaiel, N Boudriga 2011 IEEE 11th International Conference on Computer and Information …, 2011 | 9 | 2011 |
Data collection for information security system BA Fessi, S Benabdallah, M Hamdi, S Rekhis, N Boudriga 2010 Second International Conference on Engineering System Management and …, 2010 | 9 | 2010 |
SELECTION OF AN EXPERT SYSTEM-DEVELOPMENT SHELL BA Engel, DD Jones, JR Wright, S Benabdallah AI APPLICATIONS 5 (1), 15-22, 1991 | 8 | 1991 |
Fuzzy data and communication in human-computer interaction: For bad or for good W Karwowski, E Kosiba, S Benabdallah, G Salvendy Proceedings of the third international conference on human-computer …, 1989 | 8 | 1989 |
Collective Intelligence Process for risk reduction: theory, implementation and practical application to security incident response M Sadok, S Benabdallah, H Lesca Papier de Recherche CERAG, Grenoble, 2004 | 7 | 2004 |
Laying out the Foundation for a Digital Government Model Case Study: Tunisia N Boudriga, S Benabdallah Advances in digital government: technology, human factors, and policy, 289-303, 2002 | 7 | 2002 |
A dynamic resource allocation decision model for IT security L Hajjem, S Benabdallah, FB Abdelaziz 2010 Second International Conference on Engineering System Management and …, 2010 | 4 | 2010 |
Automated Intrusion Response System: Surveys and Analysis. BA Fessi, M Hamdi, S Benabdallah, N Boudriga Security and Management, 149-155, 2008 | 3 | 2008 |
Collective intelligence for risk reduction: theory, implementation and practical application to security incident response M SADOK, S BENABDALLAH, H LESCA CERAG UMR CNRS 5820, 2006-08, 2006 | 3 | 2006 |
Development of an expert system for the analysis of urban drainage using SWMM (storm water management model) C Baffaut, S Benabdallah, D Wood, J Delleur, M Houck, J Wright | 3 | 1987 |