Khaldoun Khaldi

  • Citations Per Year
Learn More
Most of the currently available intrusion detection systems do not provide any authentication functionality in order to identify the users who access a computer system. In particular, insiders are able to misuse their privileges without being detected. Some intrusion detection systems aim to authenticate legitimate users once they log in to the system, as(More)
In this paper an audio coding scheme based on the Empirical Mode Decomposition (EMD) in association with the Hilbert transform is presented. The audio signal is decomposed adaptively into intrinsic oscillatory components called Intrinsic Mode Functions (IMFs) by EMD, and the associated instantaneous amplitudes and the instantaneous phases are calculated.(More)
The main objective of this paper achieves advanced rolled fingerprints detection in real time application based on data given and is compared with the training data which is stored. Most of the currently available attack recognition techniques do not provide any verification efficiency to get customers who access a pc. In particular, associates are able to(More)
Network access control with intrusion detection system capabilities is currently being used to monitor and protect networks from malicious activities. In this paper, we propose a 3-tier architecture of a network access control that uses mobile agents to help reduce the shortcomings of currently available network access control devices. Our idea is to make(More)
  • 1