Samia Bouzefrane

Samia Bouzefrane
National Conservatory of Arts and Crafts | CNAM · École d’ingénieurs du Cnam (EiCnam)

Professor

About

179
Publications
42,291
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
900
Citations
Introduction
Samia Bouzefrane is Professor at Conservatoire National des Arts et Métiers (Cnam) in Paris. Samia does research in Internet of Things and its security using artificial intelligence, Computer Security and Reliability. Her current projects are 'NDN for Internet of Things', 'Data protection and privacy in ehealth'. She is a reseacher at CEDRIC Lab.
Additional affiliations
September 2002 - present
National Conservatory of Arts and Crafts
Position
  • Professor (Associate)

Publications

Publications (179)
Article
Full-text available
Accurate leaf segmentation is crucial for optimizing plant recognition and enhancing leaf identification precision. However, leaf segmentation encounters challenges when working with images captured in natural scenes. These images often contain intricate backgrounds with soil artifacts, overlapping leaves, plant elements, shadows, and variations in...
Article
In the dynamic field of fog computing, there is a clear trend toward exploiting local, resource-rich nodes to bypass traditional cloud infrastructure limitations. This study introduces an innovative method for enhancing the reliability of Wi-Fi systems, crucial in fog computing, by integrating quality-focused user feedback. Our approach significant...
Article
Full-text available
Significant advancements in Cooperative and Autonomous Driving via Vehicle-to-everything (V2X) communications owe much to the rapid expansion and technological progress in vehicular communications, promising benefits like enhanced traffic flow and reduced energy consumption. However, this reliance on connected vehicles opens new security vulnerabil...
Article
Full-text available
Machine Learning (ML) classifiers are pivotal in various applied ML domains. The accuracy of these classifiers requires meticulous training, making the exposure of training datasets a critical concern, especially concerning privacy. This study identifies a significant trade-off between accuracy, computational efficiency, and security of the classif...
Chapter
Full-text available
Ensuring the data security and privacy stands as a prominent concern in the landscape of machine learning. The conventional approach of centralizing training data raises privacy concerns. Federated learning addresses this by avoiding the need to transfer local data when training a global model, opting to share only local model updates. Despite this...
Conference Paper
Full-text available
Deep Learning (DL) techniques are effective for designing network intrusion detection systems (NIDS) but they lack leveraging IoT network topology. In the meanwhile, Graph Neural Networks (GNNs) consider both statistical properties and topological dependencies outperforming DL in complex IoT systems. However, three improvements are required: 1) Sca...
Article
Full-text available
Microservices architecture has become an increasingly common approach for building complex software systems. With the distributed nature of microservices, multiple actors can contribute to a service, hence affecting the dynamics of the environment and making the management of liabilities and trust more challenging. Service-Level Agreements (SLAs) a...
Article
Full-text available
The trend of the next generation of the internet has already been scrutinized by top analytics enterprises. According to Gartner investigations, it is predicted that, by 2024, 75% of the global population will have their personal data covered under privacy regulations. This alarming statistic necessitates the orchestration of several security compo...
Article
Full-text available
The Cache Pollution Attack (CPA) is a recent threat that poses a significant risk to Named Data Networks (NDN). This attack can impact the caching process in various ways, such as causing increased cache misses for legitimate users, delays in data retrieval, and exhaustion of resources in NDN routers. Despite the numerous countermeasures suggested...
Article
Full-text available
In the digital era, organizations belonging to the same or different market segments come together in digital platforms that allow them to exchange. These organizations are unified within a Digital Business Ecosystem. However, the rapid growth of the number of these organizations accentuates the complexity of finding economic partners, customers, s...
Book
Full-text available
Big data technologies, such as machine learning, have increased data utility exponentially. At the same time, the cloud has made the deployment of these technologies more accessible. However, computations of unencrypted sensitive data in a cloud environment may expose threats and Cybersecurity attacks. We consider a class of innovative cryptographi...
Article
Due to the rapid growth of the Internet of Things (IoT), secure communication is becoming a significant concern. Nodes that compose such a dynamic network need to exchange sensitive and valuable data. The data must be kept safe against attacks. This protection requires the development of efficient key management protocols. However, this task is cha...
Chapter
Digital platforms bring together organizations from different market segments. Consequently, digital business ecosystems orient themselves gradually according to the constraints imposed by different organizations although they are under the same segments. This phenomenon of influence also considerably enriches the data corpus. It has seldom been ob...
Chapter
Full-text available
“Machine learning as a service” (MLaaS) in the cloud accelerates the adoption of machine learning techniques. Nevertheless, the externalization of data on the cloud raises a serious vulnerability issue because it requires disclosing private data to the cloud provider. This paper deals with this problem and brings a solution for the K-nearest neighb...
Article
Full-text available
Outlier detection has been widely explored and applied to different real-world problems. However, outlier characterization that consists in finding and understanding the outlying aspects of the anomalous observations is still challenging. In this paper, we present a new approach to simultaneously detect subspace outliers and characterize them. We i...
Chapter
Full-text available
Big data technologies, such as machine learning, have increased data utility exponentially. At the same time, the cloud has made the deployment of these technologies more accessible. However, computations of unencrypted sensitive data in a cloud environment may expose threats and cybersecurity attacks. We consider a class of innovative cryptographi...
Conference Paper
Vehicular Ad hoc Networks (VANETs), while promising new approaches to improving road safety, must be protected from a variety of threats. Greedy behavior attacks at the level of the Medium Access (MAC) Layer can have devastating effects on the performance of a VANET. This kind of attack has been extensively studied in contention-based MAC protocols...
Preprint
Outlier detection has been widely explored and applied to different real-world problems. However, outlier characterization that consists in finding and understanding the outlying aspects of the anomalous observations is still challenging. In this paper, we present a new approach to simultaneously detect subspace outliers and characterize them. We i...
Conference Paper
The virtualization of operating systems and networkfunctions results in a large amount of virtual machines (VM) thatare hosted in data-center servers called physical machines (PM).This requires an efficient management and consolidation in orderto use as few physical resources as possible to reduce the energyconsumption. This paper addresses the VM...
Conference Paper
Full-text available
Intrusion detection is a traditional practice of security experts, however, there are several issues which still need to be tackled. Therefore, in this paper, after highlighting these issues, we present an architecture for a hybrid Intrusion Detection System (IDS) for an adaptive and incremental detection of both known and unknown attacks. The IDS...
Article
Full-text available
Named Data Networking (NDN) is a promising architecture that aims to natively satisfy emerging applications such as the Internet of Things (IoT). Therefore, enabling NDN in real-world IoT deployments is becoming essential in order to benefit from Information Centric Networking (ICN) features. To design realistic NDN-based communication solutions fo...
Chapter
Users pay to use resources in cloud systems which makes them more demanding on performance and costs. Optimizing the response time of the applications and meeting user’s budget needs are therefore critical requirements when scheduling applications.
Chapter
To meet the growing requirements of today’s applications, multiprocessor architectures (MPSoCs) interconnected with a network on chip (NoC) are considered as a major solution for future powerful embedded systems. Mapping phase is one of the most critical challenge in designing these systems. It consists of assigning application’ tasks on the target...
Chapter
Wireless sensor networks and Internet of Things (IoT) are part of dynamic networks as new nodes can join while existing members can leave the system at any time. These networks mainly suffer from severe resource constraints like energy, storage and computation, which makes securing communications between nodes a real challenge. Several key establis...
Book
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in October 2020. The 16 full papers presented in this volume were carefully reviewed and selected from 31 submissions. They discuss new trends in networking infrastructur...
Article
Full-text available
Conventional intersection management that allows multiple vehicles from one road at a time, e.g., Round-Robin (RR), may constitute bottlenecks in urban traffic management. Consequently, new intelligent intersection management (IIM) approaches were proposed to reduce time loss, fuel wastage, and ecological damage. IIM is also suited to take advantag...
Article
Full-text available
With its rapid development recently, edge computing with processing, storage, and networking capabilities has become an important solution to break through the bottleneck of emerging technology development by virtue of its advantages in reducing data transmission, decreasing service latency, and easing cloud computing pressure. Among several applic...
Article
Full-text available
Backgroud The major objective of resource management systems in the cloud environments is to assist providers in making consistent and cost-effective decisions related to the dynamic resource allocation. However, because of the demand changes of the applications and the exponential evolution of the cloud, the resource management systems are constan...
Article
Full-text available
Caching contents at the edge of mobile networks is an efficient mechanism that can alleviate the backhaul links load and reduce the transmission delay. For this purpose, choosing an adequate caching strategy becomes an important issue. Recently, the tremendous growth of Mobile Edge Computing (MEC) empowers the edge network nodes with more computati...
Conference Paper
Full-text available
Conventional intersection management that allows multiple vehicles from one road at a time, e.g., Round-Robin (RR), may constitute bottlenecks in urban traffic management. Consequently, new intelligent intersection management (IIM) approaches were proposed to reduce time loss, fuel wastage, and ecological damage. IIM is also suited to take advantag...
Article
Full-text available
Urban traffic forecasting models generally follow either a Gaussian Mixture Model (GMM) or a Support Vector Classifier (SVC) to estimate the features of potential road accidents. Although SVC can provide good performances with less data than GMM, it incurs a higher computational cost. This paper proposes a novel framework that combines the descript...
Article
Full-text available
Nowadays, computers, as well as smart devices, are connected through communication networks making them more vulnerable to attacks. Honeypots are proposed as deception tools but usually used as part of a proactive defense strategy. Hence, this article demonstrates how honeypots data can be analyzed in an active defense strategy. Furthermore, anomal...
Article
The Internet of Things (IoT) is a growing paradigm that is revolutionary for information and communication technology (ICT) because it gathers numerous application domains by integrating several enabling technologies. Outlier detection is a field of tremendous importance, including in IoT. In previous works on outlier detection, the proposed method...
Article
Full-text available
The new concept of the Internet of Things (IoT) is bringing new forms of knowledge and applications that rely on smart objects able to sense and process the collected data on a remote workflow server in the perspective to generate automated decisions. In this context, one of the main problems is how to schedule the data flow circulating between obj...
Chapter
Designing of effective cyber-physical system (CPS) encompassing different vertical applications solicits different components of design. Most of the components are uncertain and dynamic in nature. They either could be in the form of hardware sensors, optimization process and their scheduling nature. In this chapter, we investigate various levels of...
Article
Infrastructure as a Service (IaaS) clouds offer huge opportunities to solvelarge-scalescientificproblems.Executingworkflowsinsuchenvironments can be expensive in time if not rightly scheduled. Although scheduling workflows in clouds is widely studied, the most approaches focus in two user QoS requirements namely makespan (i.e., completion time) and...
Article
Infrastructure as a service (IaaS) clouds offer huge opportunities to solve large-scale scientific problems. Executing workflows in such environments can be expensive in time if not scheduled rightly. Although scheduling workflows in the cloud is widely studied, most approaches focus on two user's quality of service requirements namely makespan (i....
Article
Full-text available
IP has been designed for Internet decades ago to connect computers and share expensive resources such as tape drives and printers. Nowadays, Internet of Things and other emerging applications use Internet to fetch and exchange content such as monitoring data and movies. This content-centric use of Internet highlights the limitations of the IP archi...
Chapter
This chapter contains sections titled: Introduction Ontological Structure of Clinical Pathways Proposed Model Conclusion and Further Scope of Research
Article
The key management is the central element of network security. In fact, key distribution is necessary for securing applications in the context of Internet of Things (IoT). However, existing key management protocols are not directly applicable on IoT due, among other things, to severe and high resource constraints of some devices that make up the Io...
Article
The proliferation of Internet of Things (IoT) devices has given a new dimension to networking operations. In fact, IoT issues in terms of complex communication patterns, dynamic topologies and security force to re-think basic networking operations in a more adapted way. Moreover, the IoT needs contribute to show the limitations of the IP model to s...
Article
Background Network Functions Virtualization (NFV) is a paradigm shift in the way network operators deploy and manage their services. The basic idea behind this new technology is the separation of network functions from the traditional dedicated hardware by implementing them as a software that is able to run on top of general-purpose hardware. Thus,...
Article
Full-text available
Mapping parallel applications onto a network on chip (NoC) that is based on heterogeneous MPSoCs is considered as an instance of an NP-hard and a multi-objective problem. Various multi-objective algorithms have been proposed in the literature to handle this issue. Metaheuristics stand out as highly appropriate approaches to deal with this kind of p...
Conference Paper
Full-text available
Named Data Networking is a promising architecture for emerging Internet applications such as the Internet of Things (IoT). Many studies have already investigated how NDN can be an alternative for IP in future IoT deployments. However, NDN-IoT propositions need accurate evaluation at network level and system level as well. This paper introduces an N...