Thabet Slimani

Work place: College of Computers and Information Technologies, Taif University, Kingdom of Saudi Arabia

E-mail: thabet.slimani@gmail.com

Website:

Research Interests: Computational Science and Engineering, Data Mining, Database Management System, World Wide Web, Data Structures and Algorithms

Biography

Thabet Slimani: got a PhD in Computer Science (2011) from the University of Tunisia. He is currently an Assistant Professor of Information Technology at the Department of Information Technology of Taif University at Saudia Arabia and a LARODEC Labo member (University of Tunisia), where he is involved both in research and teaching activities. His research interests are mainly related to Semantic Web, Data Mining, Business Intelligence, Knowledge Management and recently Web services. Thabet has published his research through international conferences, chapter in books and peer reviewed journals. He also serves as a reviewer for some conferences and journals. 

Author Articles
Forensics Investigation of Web Application Security Attacks

By Amor Lazzez Thabet Slimani

DOI: https://doi.org/10.5815/ijcnis.2015.03.02, Pub. Date: 8 Feb. 2015

Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

[...] Read more.
Efficient Analysis of Pattern and Association Rule Mining Approaches

By Thabet Slimani Amor Lazzez

DOI: https://doi.org/10.5815/ijitcs.2014.03.09, Pub. Date: 8 Feb. 2014

The process of data mining produces various patterns from a given data source. The most recognized data mining tasks are the process of discovering frequent itemsets, frequent sequential patterns, frequent sequential rules and frequent association rules. Numerous efficient algorithms have been proposed to do the above processes. Frequent pattern mining has been a focused topic in data mining research with a good number of references in literature and for that reason an important progress has been made, varying from performant algorithms for frequent itemset mining in transaction databases to complex algorithms, such as sequential pattern mining, structured pattern mining, correlation mining. Association Rule mining (ARM) is one of the utmost current data mining techniques designed to group objects together from large databases aiming to extract the interesting correlation and relation among huge amount of data. In this article, we provide a brief review and analysis of the current status of frequent pattern mining and discuss some promising research directions. Additionally, this paper includes a comparative study between the performance of the described approaches.

[...] Read more.
Other Articles