Layth Sliman - Enseignant-chercheur à Efrei - Efrei

Ce module a été développé afin de rendre le site Efrei accessible au plus grand nombre.

Si malgré notre vigilance, vous rencontriez le moindre problème d’accessibilité sur notre site, n’hésitez pas à nous contacter à l’adresse site-groupe@efrei.fr ou par téléphone au +33 188 289 000.

Layth SLIMAN

Enseignant chercheur et responsable de la thématique de recherche « Sécurité et Confiance »

Layth SLIMAN

Enseignant chercheur et responsable de la thématique de recherche « Sécurité et Confiance »

Qu’enseignez-vous aux étudiants Efrei ? Pour quel programme ?

« Cela évolue d’une année à l’autre, Pour cette année, j’enseigne aux étudiants Efrei de cycle M les sujets suivants : Modélisation des systèmes d’informations, Knowledge Management, Business Process Management. »

Comment votre parcours vous a-t-il amené à être enseignant-chercheur à Efrei ?

« Cela fait 21 ans déjà que je suis dans le métier (depuis l’année 2000). Après avoir terminé ma thèse, je suis tombé sur une offre Efrei qui correspondait à mes attentes et à mon profil. »

Quel est votre rôle au sein de l’équipe de recherche ?

« Je suis responsable de la thématique de recherche « Sécurité et Confiance ». Cette une équipe composée d’une vingtaine de personnes (6 permanents, 8 thésards, 2 étudiants en parcours recherche et plusieurs stagiaires). Concrètement, j’encadre des thèses de doctorat et des projets étudiants, je gère les dépôts de projets, et j’organise des conférences internationales et des éditoriaux dans des revues scientifiques. »

Pouvez-vous nous présenter brièvement vos travaux de recherche et nous les expliquer ?

« Mes domaines de recherche sont principalement liés à la sécurité et à la confiance dans le numérique. L’objectif étant d’apporter les éléments nécessaires aux entreprises / organisations pour qu’ils puissent adopter de nouveaux modèles de collaboration en toute confiance et sérénité. Nous travaillons sur des concepts et solutions technologiques telles que : la blockchain, des concepts de « Privacy by design », l’utilisation de l’Intelligence Artificielle pour la sécurité comme par exemple l’utilisation de machine learning pour identifier les comportements frauduleux et éliminer les risques. »

Quel a été le projet de recherche le plus enrichissant pour vous et pourquoi ?

« Pour moi, les projets de recherche sont comme mes enfants. Chaque projet m’apporte quelque chose, ce n’est pas forcément technique ou scientifique mais c’est aussi le contact humain, l’imagination, ou la créativité des autres qui alimente notre propre créativité. L’aspect collaboratif avec les autres est très important pour moi aussi. De ce fait, tous les projets sont pour moi très enrichissants, sans exception. »

Quels sont les aspects de votre métier qui vous passionnent le plus ?

« Se sentir capable de « s’innover » en apprenant des autres :  toutes les découvertes que ce soit humaines, techniques et scientifiques sont importantes et enrichissantes. Travailler avec des personnes de profils et de cultures différentes aussi… tous ces aspects nous donne du dynamisme et nous donne l’opportunité de penser autrement. Tous les jours il y a des découvertes à faire, ce qui fait qu’on ne s’ennuie jamais dans le métier ! »

Pourquoi la recherche est importante dans le numérique ?

« Le numérique figure parmi les domaines les plus dynamiques. Ce secteur bouge très vite et représente le moteur de la croissance économique. Il est aujourd’hui piloté par l’industrie. La recherche permet de faire abstraction à tout ce qui est volatile et obsolète, identifier des nouvelles idées et accompagner les entreprises afin de proposer des innovations pérennes et responsables. »

Les étudiants sont-ils intégrés à la recherche au sein du campus ?

« Oui, relativement. Aujourd’hui, certains étudiants sont même intéressés pour faire des stages liés à la recherche dans un laboratoire ou de mener des projets. Notre ambition est d’aller au-delà de l’état actuel, c’est à dire les sensibiliser et les motiver pour qu’ils aillent plus loin que leur statut d’ingénieur en y intégrant une dimension recherche… et pour les plus intéressés, les accompagner pour qu’ils produisent des thèses. »

Pour un étudiant souhaitant s’orienter vers ce domaine, quels conseils lui donneriez-vous ? Quelles compétences clés lui conseilleriez-vous de développer ?

« Pour s’orienter vers la recherche, il faut tout d’abord se préparer à accepter son ignorance. Il ne faut pas le prendre comme un frein, mais plutôt comme une motivation à apprendre. Il faut toujours avoir soif d’apprendre et vouloir intégrer des expériences, accepter les autres et leurs différentes cultures, leurs différentes façons de réfléchir… Pour moi c’est ça le profil du chercheur idéal. Enfin, la maîtrise de l’anglais est indispensable car l’anglais est la langue de la science. »

Un dernier mot ?

« Pour les étudiants : si vous avez des doutes, venez-nous voir et échangeons ensemble ! »

Intérêts & Projets

Champs d'intérêts

  • Collaborative Information Systems.

This involves many topics including : Web 2.0, IS Architecture, IoT Cryptography, Cloud Computing, SaaS, Semantic Web and Semantic SOA.

Enseignements

  • Information System Architecture
  • Knowledge Management
  • Security and Risk Management

Projets

http://www.execandshare.org

International Journals

  1. Bachar Kachouh, Khalil Hariss, Layth Sliman, Abed Ellatif Samhat, Tamim Alsuliman. Privacy Preservation of Genome Data Analysis using Homomorphic Encryption. To appear in Service Oriented Computing and Applications, Springer, 2021, Q2 Journal.
    https://rdcu.be/cxMz2
  2. Introduction to medical data and big data exploitation in research: Errors, solutions and trends. Tamim Alsuliman, Dania Humaidan, Layth Sliman, Rémy Duléryd.
    www.sciencedirect.com/science/article/abs/pii/S2452318621000362?via%3Dihub
  3. Hussein Hellani, Layth Sliman, Abed Ellatif Samhat, Ernesto Exposito. Overview on Blockchain-Based Supply Chain Systematics and Their Scalability Tools. Emerging Science Journal, 2021, Q1 Jouranl.
    https://www.ijournalse.org/index.php/ESJ/article/view/554
  4. Hussein Hellani, Layth Sliman, Abed Ellatif Samhat, Ernesto Exposito. Computing Resource Allocation Scheme for DAG-Based IOTA Nodes. Sensors, MDPI, 2021, Q1 Journal.
    https://www.mdpi.com/1424-8220/21/14/4703
  5. Layth Sliman, Tasnime Omrani, Zahir Tari, Abed Ellatif Samhat, Rhouma Rhouma. Towards an Ultra-Lightweight Block Ciphers for the Internet of Things. Volume 61, 2021, Q2 Jouranl.
    https://www.sciencedirect.com/science/article/pii/S2214212621001241
  6. Saliha Artabaz, Layth Sliman, Karima Benatchba, and Mouloud Koudil. Optimized Multi-Biometrics Systems Enhancement Analysis. in IET Biometrics, April 2021, Q2 Jouranl.
    https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/bme2.12026
  7. Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Abdelhamid Mellouk. Verification of Smart Contracts: A survey. Pervasive and Mobile Computing, Volume 67, Elsevier, 2020, Q1 Jouranl.
    https://www.sciencedirect.com/science/article/abs/pii/S1574119220300821
  8. Tamim Alsuliman, Dania Humaidan, Layth Sliman. Machine Learning and Artificial Intelligence in the Service of Medicine: Necessity or Potentiality?, Current Research in Translational Medicine, Elsevier, Volume 68, Issue 4, Pages 245-251, 2020, Q2 Jouranl. https://www.sciencedirect.com/science/article/abs/pii/S2452318620300192
  9. Hichem Kmimech, Achraf Telmoudi, Layth Sliman, Lotfi Nabli. Genetic-based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets. IEEE Access, 2020, Q1 Journal.
    https://ieeexplore.ieee.org/abstract/document/8952652
  10. Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Layth Sliman, and Mourad Kmimech. An MDE-Based Tool for Early Analysis of UML2.0/PSM Atomic and Composite Component. IEEE Systems Journal, vol. 14, no. 2, pp. 1647-1657, June 2020, Q1 Journal.
    https://ieeexplore.ieee.org/abstract/document/8952652
  11. Hayet Brabra, Achraf Mtibaa, Fabio Petrillo, Philippe Merle, Layth Sliman, Naouel Moha, Walid Gaaloul, Yann-Gaël Guéhéneuc, Boualem Benatallah, and Faiez Gargouri. On Semantic Detection of Cloud API (Anti) Patterns. Information and Software Technology, Volume 107, Pages 65-82, Elsevier, Elsevier, March 2019, Q2 Journal. https://www.sciencedirect.com/science/article/abs/pii/S095058491830226X
  12. Rizwan Iqbal, AbMasrah AzrifahAzmi Murad, Layth Sliman and Clay Palmeirada Silva. A mathematical evaluation for measuring correctness of domain ontologies using concept maps, Measurement, Volume 118, Pages 73-82, Elsevier, March 2018, Q1 Journal.
    https://doi.org/10.1016/j.measurement.2018.01.009
  13. Samih Souissi and Layth Sliman. An Attack Description and Response Architecture Based on Multilevel Rule Expression Language, Journal of Information Assurance and Security, 2016 (Indexed- Open Access).
    http://www.mirlabs.org/jias/secured/Volume11-Issue1/vol11-issue1.html
  14. Hachemi Nabil Dellys, Noussaiba Benadjimi, Meriem Romaissa Boubakeur, Layth Sliman, and Fathelalem Ali. Chaff Point Generation by Squares Method Using Composite Representation in Fingerprint Fuzzy Vault. Journal of Information Assurance and Security, pp. 1-10, Volume 11, Issue 1, 2016 (Indexed – Open Access). http://www.mirlabs.org/jias/secured/Volume11-Issue1/vol11-issue1.html
  15. Layth Sliman, Frédérique Biennier, and Youakim Badr. A Security Policy Framework for Context-Aware and User Preferences in e-Services. Journal of Systems Architecture Volume 55, Issue 4, p.275-288, ScienceDirect, 2009, Q1 Journal. https://www.sciencedirect.com/science/article/abs/pii/S1383762108001665
  16. Layth Sliman, Frédérique Biennier, Youakim Badr, and Anne Legait. Collaborative Business and Enterprise Urbanization: Towards a production-oriented Urbanization Strategy, International Journal of Enterprise Information Systems, Vol. 5, No.1 P. 9-31, IGI Global, USA 2009, Q3 Journal.
    www.igi-global.com/article/collaborative-business-enterprise-urbanization/3948

International Conferences (with proceedings and referees)

  1. Houssein Hellani, Layth SLIMAN, Abed Ellatif SAMHAT, Ernesto EXPOSITO. Tangle the Blockchain:Towards Connecting Blockchain and DAG. to appear in Procceedings of WETICE2021, the 30th IEEE International Conference on Infrastructures for Collaborative Enterprise, October 2021.
  2. Wafa Ben Slama Souei, Chiraz El Hog, Layth Sliman, Raoudha Ben Djemaa. Towards a Uniform Description Language for Smart Contract. To appear in Procceedings of WETICE2021, the 30th IEEE International Conference on Infrastructures for Collaborative Enterprise, October 2021.
  3. Amira Jablaoui, Hichem Kmimech ,Layth Sliman. A Rank Based ACO Approach for Minimum Initial Marking Estimation in Labelled Petri Net. To appear in Proceedings of the 20th International Conference on Intelligent Software Methodologies, Tools, and Techniques (SOMET2021), Frontiers in Artificial Intelligence and Applications, IOS Press.
  4. Mouhamad Almakhour, Ayoub Wehby, Layth Sliman, Abed Ellatif Samhat, Abdelhamid Mellouk. Smart Contract Based Solution for Secure Distributed SDN. Proceedings of NTMS-2021, the 11th IFIP International Conference on New Technologies, Mobility and Security, Pages 1-6, April 2021.
    https://ieeexplore.ieee.org/abstract/document/9432647
  5. Mohamad Almakhour, Layth Sliman and Abdlatif Samhat. On the verification of Smart Contract: A Systematic review. International Conference on Blockchain and Cryptocurrency, ICBC 2020, Springer, Pages 94-107.
    https://link.springer.com/chapter/10.1007/978-3-030-59638-5_7
  6. Motaz Ben Hassine, Mourad Kmimech, Hussein Hellani, and Layth Sliman. Toward a mixed Tangle-Blockchain architecture. SOMET2020, September 2020, IOS Press, Pages 221-234.
    https://hal-univ-pau.archives-ouvertes.fr/hal-02957070/document
  7. Hussein Hellani, Layth Sliman, Ernesto Exposito, Mourad Kmimech. Tangle The Blockchain: Toward IOTA and Blockchain Integration for IoT Environment. Proceedings of the 15th International Conference on Information Assurance and Security, IAS2019, Springer, December 2019. pp. 429-440.
    https://link.springer.com/chapter/10.1007/978-3-030-49336-3_42
  8. Tasnime Omrani and Layth Sliman. A new Lightweight Encryption Approach for Correlated Content Exchange in Internet of Things. Proceedings of Future Network Systems and Security. FNSS 2019. LNCS, Communications in Computer and Information Science, vol. 1113, Pages 161-171, October 2019.
    https://link.springer.com/chapter/10.1007/978-3-030-34353-8_12#citeas
  9. Kmimech Hichem, Layth Sliman, Lotfi Nabli. GRASP-based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets. 2019 15th International Conference on Semantics, Knowledge and Grids (SKG), Guangzhou, China, 2019, Pages 75-80.
    https://ieeexplore.ieee.org/document/9044089
  10. Hichem Kmimech, Achraf Jabeur Telmoudi, Layth Sliman, Lotfi Nabli. Minimum Initial Marking Estimation in Labeled Petri Nets Using Simulated Annealing. Proceedings of the 15th International Conference on Intelligent Software, Methodologies and Techniques Frontiers in Artificial Intelligence and Applications, Pages 361-370, September 2019.
    http://ebooks.iospress.nl/volumearticle/52701
  11. Saliha Artabaz, Layth Sliman. Study of Score Fusion and Quality Weighting in the Bio-Secure DS2 Database. Proceedings of Soft Computing in Data Science. SCDS 2019. Communications in Computer and Information Science, volume 1100, Pages 252-262, Springer, June 2019.
    https://link.springer.com/chapter/10.1007/978-981-15-0399-3_20
  12. Hichem kmimech, Layth Sliman and Lotfi Nabil. GRASP-based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets. Proceedings of 15th International Conference on Semantics, Knowledge and Grids, SKG2019, IEEE CPS, Pages 75-80.
    https://ieeexplore.ieee.org/document/9044089
  13. Imed Abbassi, Layth Sliman, Mohamed Graiet, and Walid Gaaloul. Verifying Data Security Requirements in Internet of Things Using Event-B. Proceedings of Digital Economy. Emerging Technologies and Business Innovation. Proceedings of ICDEc 2019. Lecture Notes in Business Information Processing, April 2019, Pages 147-156.
    https://link.springer.com/chapter/10.1007/978-3-030-30874-2_11#citeas
  14. Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat and Walid Gaaloul. Trustless Blockchain-based Access Control in Dynamic Collaboration. Proceedings of the International Conference on Big Data and Cyber-Security Intelligence-BDCSIntell 2018, Pages: 27-33, December 2018.
    https://www.cognitus.fr/BDCSIntell2018/conference-program/
  15. Layth Sliman. Ocular Guided Robotized Wheelchair for Quadriplegics Users. Proceedings of the 29th TRON Symposium, IEEE, Pages: 1 – 7, Tokyo, December 2018.
    https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8633325
  16. Taoufik Sakka Rouis, Layth Sliman Mohamed Tahar Bhiri, and Mourad Kmimech. A Generic Approach for the Verification of Static and Dynamic Behavioral Properties of SCDL/WS-BPEL Service-Component Architectures. Proceedings of the International Conference on Parallel and Distributed Computing: Applications and Technologies, PDCAT 2018, Pages: 381-389, LNCS, 2018.
    https://link.springer.com/chapter/10.1007/978-981-13-5907-1_41
  17. Hachemi Nabil Dellys, Karima Benatchba, Layth Sliman, and Yen Wei Chen. Chaff-Points Generation Method Based on Adaptive Genetic Algorithms and Non-Fixed Size Squares Boundaries for Resource-Constrained Devices. Proceedings the 9th IFIP International Conference on New Technologies, Mobility, and Security (NTMS), Pages: 1-4, 2018.
    https://ieeexplore.ieee.org/document/8328727
  18. Tasnime Omrani, Rhouma Rhouma, and Layth Sliman. Lightweight Cryptography for Resource-Constrained Devices: a Comparative Study and Rectangle Cryptanalysis. ICDEc 2018, Pages: 107118, Lecture Note in Computer Science. https://link.springer.com/chapter/10.1007/978-3-319-97749-2_8
  19. Wael Chargui, Taoufik Sakka Rouis, Mourad Kmimech, Mohamed Tahar Bhiri, Badran Raddaoui, and Layth Sliman. Towards a Formal Verification Approach for Service Component Architecture. Proceedings of the 16th International Conference on Intelligent Software, Methodologies and Techniques, SoMeT 2017, Pages: 466-479, IOS Press, 2017.
    http://ebooks.iospress.nl/publication/47589
  20. Wael Chargui, Taoufik Sakka Rouis, Mourad Kmimech, Mohamed Tahar Bhiri, Layth Sliman, and Badran Raddaoui. Behavioral Verification of Service-Component Architecture. The 26th IEEE WETICE Conference, Poznan, Poland, Pages: 239-241, 2017.
    https://ieeexplore.ieee.org/document/8003824
  21. Taoufik Sakka Rouis, Mohamed Tahar Bhir, Layth Sliman, and Mourad Kmimech. Towards a Formal Approach for the Verification of SCA/BPEL Software Architectures. The 8th International Conference on Information, Intelligence, Systems, and Applications (IISA), Pages: 1-6, August 2017, Larnaca. Cyprus. https://ieeexplore.ieee.org/document/8316371
  22. Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech, and Layth Sliman. UML2ADA for Early Verification of Concurrency inside the UML2.0 Atomic Components. The 17th International Conference on Intelligent Systems Design and Applications (ISDA), Pages: 10-20, December 2017.
    https://link.springer.com/chapter/10.1007/978-3-319-76348-4_2
  23. Imed Abbassi, Mohamed Graiet, Sindyana Jlassi, Abir Elkhalfa, and Layth Sliman. A Formal Approach for Correct Elastic Package-Based Free and Open Source Software Composition in Cloud. Proceedings of the 25th International Conference on Cooperative Information Systems COOPIS, Pages 732, 751, Greece, 2017.
    https://link.springer.com/chapter/10.1007%2F978-3-319-69462-7_46
  24. Abir Elkhalfa, Layth Sliman, Sindyana Jlassi, and Imed Abbassi. Verifying the package-based Free and Open Source Software Configuration using EVENT-B. Proceeding of IEEE Wetice2017. Pages: 69-71 2017, (short paper).
    https://www.computer.org/csdl/proceedings/wetice/2017/1759/00/1759a069-abs.html
  25. Amal Ayach, Layth Sliman, Mourad Kmimech, Mohamed Tahar Bhiri and Badran Raddaoui. Towards a Formal Verification Approach for Cloud Software Architecture. Proceedings of the 16th International Conference on Intelligent Software, Methodologies and Techniques, SoMeT 2017, Pages 490 – 502, IOS Press: 2017. http://ebooks.iospress.nl/publication/47591
  26. Tasnime Omrani, Layth Sliman, Rabie Becheikh, Safya Belghith and Belgacem Ben Hedia. Towards an Ultra-lightweight Cryptosystem for IoT. International Conference on Soft Computing and Pattern Recognition, Socpar, Pages 614-621, Lecture Note in Computer, Science, 2016.
    https://link.springer.com/chapter/10.1007%2F978-3-319-60618-7_60
  27. Saliha Artabaz, Hachemi Nabil Dellys, Layth Sliman, Karima Benatchba, and Mouloud Koudil. Multibiometrics Enhancement Using Quality Measurement in Score Level Fusion. The 16th International Conference on Intelligent Systems Design and Applications, ISDA 2016, Pages 60-67, Lecture Note in Computer Science, 2016.
    https://link.springer.com/chapter/10.1007/978-3-319-53480-0_26
  28. Samih Souissi, Ahmed Serhrouchni, Layth Sliman and Benoit Charroux. Security Incident Response: Towards a novel decision-making system. Proceedings of the 20th International Conference on Intelligent Systems Design and Applications, ISDA 2016, Pages 667-676, Lecture Note in Computer Science, December 2016.
    https://link.springer.com/chapter/10.1007/978-3-319-53480-0_66
  29. Hachemi Nabil Dellys., Layth Sliman, Saliha Artabaz., Karima Benatchba, and Mouloud Koudil. Chaff Points Generation Using Knapsack problem resolution in Fingerprint Fuzzy Vault. Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Pages 507-516, Lecture Note in Computer Science, November 2016.
    https://link.springer.com/chapter/10.1007/978-3-319-52941-7_50
  30. Hayet Brabra, Achraf Mtibaa, Layth Sliman, Walid Gaaloul, Boualem Benatallah, and Faïez Gargouri. Detecting Cloud (Anti) Patterns: OCCI Perspective. Proceedings of the 14th International Conference on Service-Oriented Computing ICSO, Pages 202-218, Lecture Note in Computer Science 2016.
    https://link.springer.com/book/10.1007/978-3-319-46295-0
  31. Samih Souissi, Layth Sliman, and Benoit Charroux. A Novel Security Architecture Based on Multilevel Rule Expression Language. Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Pages 259-269, Lecture Note in Computer Science, 2016.
    https://link.springer.com/book/10.1007/978-3-319-52941-7
  32. Hayet Brabra, Achraf Mtibaa, Layth Sliman, Walid Gaaloul, Boualem Benatallah, and Faiez Gargouri. Semantic Web Technologies in Cloud Computing: A Systematic Literature Review. IEEE International Conference on Services Computing (IEEE SCC), Page(s):744 – 751, USA, 2016.
    https://ieeexplore.ieee.org/document/7557522
  33. Saliha Arbataz, Layth Sliman, Karima Benatachba, Hachemi Nabil Dellys and Mouloud Koudil. Score Level Fusion Scheme in Hybrid Multi-biometric System. International Visual Informatics Conference, IVIC 2015: Advances in Visual Informatics, pp 166-177, Lecture Notes in Computer Science (LNCS), 2016.
    https://link.springer.com/chapter/10.1007/978-3-319-25939-0_15
  34. Hachemi Nabil Dellys, Noussaiba Benadjimi, Layth Sliman, Karima Benatchba, Saliha Artabaz, and Mouloud Koudil. A Critical Comparison of Fingerprint Fuzzy Vault Techniques. Advances in Visual Informatics, Pages 178-188, Lecture Notes in Computer Science, 2015.
    https://link.springer.com/chapter/10.1007/978-3-319-25939-0_16
  35. Hachemi Nabil Dellys, Noussaiba Benadjimi, Meriem Romaissa Boubakeur, Layth Sliman and Fathelalem Ali. Fingerprint Fuzzy Vault Chaff Point Generation by Squares Method. Proceedings of 7th International Conference on Soft Computing and Pattern Recognition, Pages 357-362, IEEE Kyushu, Japan, 2015. https://ieeexplore.ieee.org/document/7492773
  36. Benoit Charroux, Layth Sliman, and Yvan Stroppa. Compose: A Domain-Specific Language foR Scientific Code Computation. in proceedings of IEEE CFIP-NOTERE’15, Pages 1-4, Paris, 2015.
    https://ieeexplore.ieee.org/abstract/document/7293496
  37. Asama Kuder, Azizah Jaafar, Riza Sulaiman, Rahmita Wirza, and Layth Sliman. Model of Bayesian Tangent Eye Shape for Eye Capture. in proceedings of IEEE Intelligent System Design and Application, ISDA14, Page(s):82 – 88, Okinawa, 2014.
    https://ieeexplore.ieee.org/document/7066277
  38. Layth Sliman, Benoit Charroux and Yvan Stroppa, Distributed Framework for Big Data Processing: a Goal-Driven Approach. Frontiers in Artificial Intelligence and Applications: Smart Digital Futures – E-book, Volume 262, Pages: 385 – 391- IOS Press, 2014.
    http://ebooks.iospress.nl/volumearticle/36329
  39. Safa Taieb, Layth Sliman, Benoit Charroux, and Yvan Stroppa. Towards a Total Traceability of Research Collaboration: a New Distributed Research-Oriented Version Control System. Proceedings of the International Conference on Information Technology Pages: 170-183, 2013.
    http://acit2k.org/ACIT/2013Proceedings/170.pdf
  40. Layth Sliman, Benoît Charroux, and Yvan Stroppa. A New Collaborative and Cloud-Based Simulation as a Service Platform: Towards a Multidisciplinary Research Simulation Support. Proceedings of 15th International Conference on Computer Modelling and Simulation, IEEE UKSIM, Pages: 611 – 616, Cambridge, UK, 2013. https://ieeexplore.ieee.org/document/6527488
  41. Layth Sliman, Benoît Charroux, and Yvan Stroppa (2012), RunMyCode: an Innovative Platform for Social Production and Evaluation of Scientific Research. In Proceedings of Fourth International Conference on Computational Aspects of Social Networks, CASON 2012, Pages: 109-114, IEEE.
    https://ieeexplore.ieee.org/document/6412387
  42. Layth Sliman, Youakim Badr, Frédérique Biennier, and Zensho Nakao. Towards a Resource-Driven Modelling Paradigm in Collaborative and Service-Oriented Enterprises. Proceeding of 13th IFAC Symposium on Information Control Problems in Manufacturing, INCOM’09, Pages:1614-1619, Elsevier, Moscow, Russia, 2009.
    https://www.sciencedirect.com/science/article/pii/S1474667016340319
  43. Layth Sliman, Youakim Badr and Nicolas Salatge, Frederique Bennier, and Zensho Nakao. Single Sign-On Integration in a Distributed ESB. In proceedings of N2S’2009, First International Conference on Network and Service Security, Pages 1-5, Paris, France, 2009.
    https://ieeexplore.ieee.org/document/5161676
  44. Alida Esper, Layth Sliman, Ahlem Zayati, Youakim Badr and Frédérique Biennier, Towards Secured and Interoperable Business Services. Enterprise Interoperability: New Challenges and Industrial Approaches, Pages 301-312, Springer, London, 2008.
    https://link.springer.com/chapter/10.1007/978-1-84800-221-0_24

National Conferences (with proceedings and referees)

  1. Layth Sliman, Ahlem Zayati, Youakim Badr, Frédérique Biennier and Mohamed Moalla. Interopérabilité et Définition des Services Industriels. In proceedings of CIGI’09, 8ème Congrès International de Génie Industriel, Bagnères de Bigorre, France,2009.
    https://hal.archives-ouvertes.fr/hal-00393938
  2. Layth Sliman, Frédérique Biennier, Sylvie Servigne (2006), Urbanisation Conjoint de l’Entreprise et de son Système d’Information. In proceedings of IPI 2006 « Comprendre et piloter la mutation des systèmes de production », pp. 169-180, Allevard, France, 2006.
    https://hal.archives-ouvertes.fr/hal-01566851

International Workshops (with proceedings and referees)

  1. Layth Sliman, Benoit Charroux, Nazim Agoulmine. An Innovative Negotiations and Enactment Smart Contract-based Framework for on-line Sharing Economy Platforms. 9th International Workshop on ADVANCEs in ICT Infrastructures and Services https://hal.archives-ouvertes.fr/hal-03133495/
  2. Saliha Artabaz, Layth Sliman, Karima Benatchba, and Mouloud Koudil. Study on Score Fusion and Quality Weighing in Bio-secure DS2 Database. Cambridge Summit, 2018.
    http://info.vit.ac.in/cambridgesummit2018/souvenir/files/assets/basic-html/page64.html

Journal Special Issues

  1. Huimin Lu, Layth Sliman, Yujie Li. Special issue on Enabling Soft Computing Technologies for Next-Generation Cloud Systems: Trends & Future Directions.
    https://www.journals.elsevier.com/applied-soft-computing/call-for-papers
  2. Vijayakumar V, Layth Sliman, Subramaniyaswamy V, and K. R. R. Rao. Special Issue « Advances in Sustainable Computing for Wireless Sensor Networks », Sensors, MDPI, Switzerland, 2019.
    www.mdpi.com/journal/sensors/special_issues/Sus_WSN
  3. V. Vijayakumar, M. Sivabalakrishnan, and Layth Sliman. Special Issue on: Man-Machine Interface, International Journal of Knowledge Engineering and Soft Data Paradigms, InderScience, 2016:
    https://www.inderscience.com/info/dl.php?filename=2016/ijkesdp-5163.pdf

International Conferences Proceedings

  1. Layth Sliman and Kaori Yoshida. Enabling Technologies: Infrastructure for Collaborative Enterprises, conference proceedings (Rank B), IEEE, 2018:
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8495654
  2. Fathelalem Ali, Ajith Abraham, Layth Sliman, Hideyuki Takagi, Azah Kamilah Muda, and Kun Ma. Proceedings of the 2014 International Conference on Intelligent Systems Design and Applications (Rank C), Okinawa, Japan, ISBN 978-1-4799-7938-7, IEEE, 2014:
    http://www.mirlabs.net/isda14/proceedings/
  3. Fathelalem Ali, Ajith Abraham, Layth Sliman, Hideyuki Takagi, Azah Kamilah Muda, and Kun Ma. Proceedings of the 2014 International Conference on Information Assurance and Security (IAS 2014), Okinawa, Japan, ISBN 978-1-4799-8099-4, IEEE, 2014: https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7058893

Keynotes and Plenary Speeches in International Conferences

  1. Layth Sliman. On IoT as a Service Security: Business and Service Perspectives, 8th International Conference on Soft Computing and Pattern Recognition, SOCPAR 2016 (Unranked, 100 participants), Vellore, India: http://www.mirlabs.net/socpar16/speakers.php
  2. Layth Sliman. IoT analytics: from Big data to Fast and Smart Data, 16th International Conference on Hybrid Intelligent Systems (Rank C, 100 participants), Marrakech, Morocco:
    http://www.mirlabs.net/his16/speakers.php
  3. Layth Sliman. Novel Trends in Research Sharing and Reproducibility. IEEE- CCIIS2013 Conference, (Unranked, 100 participants), Vellore, India, 2013. Link deactivated: https://engineering.careers360.com/ieee-cciis-2013
  4. Layth Sliman. Run and Share your Research findings: is it a Novel Era of Research Sharing and Reproducibility? IEEE, ISDA13 (Rank C, 100 participants), Kuala-Lumpur, Malaysia, December 2013: http://www.mirlabs.net/isda13/speakers.php#p4

Invited International Seminars

  1. Layth Sliman, Towards Blockchain-Based Collaborative Enterprise, West Virginia University, USA:
    http://community.wvu.edu/~skhushalanisolanki/seminars5.html
  2. Layth Sliman. IoT Digital Innovation Hub, Blockchain, and IoT based business collaboration: will the love blossom? :
    https://iotec.usal.es/en/node/119
  3. Layth Sliman. Blockchain and IoT Opportunities for the SMEs, Polytechnic Institute of Torino:
    http://icelab.polito.it/news/blockchain_and_iot_opportunities_for_the_smes
  4. Layth Sliman. Big Data Analytics in Public Sector, The iA Group Forum, Kuala Lumpur, August 2014:
    http://www.theiagroup.com/news/big-data-analytics-public-sector-forum-20th-august-2014
  5. Layth Sliman. Run and Share your Research Findings: New Concepts in Research Sharing and Reproducibility, The Institute of Visual Informatics (IVI), Malaysia, August 2014: http://www.ivi.ukm.my/ivi-monthly-seminar-run-and-share-your-research-findings-newconcepts-in-research-sharing-and-reproducibility/
  6. Layth Sliman. Enterprise Architecture, Basics and Concepts, The Institute of Visual Informatics, Malaysia, September 2018:
    http://www.ivi.ukm.my/enterprise-architecture-basics-and-concepts/

International Scientific Events Organization

  1. Organization Chair: NTMS 2021, 11th IFIP International Conference on New Technology,
    Mobility and Security: http://www.ntms-conf.org/ntms2021/
  2. Workshop chair: Towards Blockchain-Based Collaborative Enterprise, ICSOC2019, Toulouse, France, October 2019: http://www.olab-dynamics.net/workshop/
  3. General chair: IEEE WETICE 2018, 27th IEEE conference Infrastructure for Collaborative Enterprise, Paris, 2018: http://www.olab-dynamics.net/wetice2018/committees.html
  4. Organization Chair: NTMS 2018, 10th IFIP International Conference on New Technology,
    Mobility and Security: http://www.ntms-conf.org/ntms2018/
  5. Co-chair: Track on Security, Safety and Confidentiality in IoT for Collaborative Business Technologies: http://www.olab-dynamics.net/wetice2018/ssciot.html
  6. General Co-chair SOCPAR2017, 9th International Conference on Soft Computing and Pattern Recognition. http://www.mirlabs.net/socpar17/committees.php
  7. General Co-chair IAS2017, 13th International conference on Information Assurance and Security: http://www.mirlabs.net/ias17/committees.php
  8. General Co-chair IBICA2017, 8th International Conference on Innovations in Bio-Inspired Computing and Applications: http://mirlabs.net/ibica17/committees.php
  9. Organization Chair: WETICE 2016, 25th IEEE conference Infrastructure for Collaborative Enterprise, Paris, 2016. http://www-inf.int-evry.fr/WETICE/WETICE2016/
  10. Workshop Chair: NTMS16, 8th IFIP International Conference on New Technology, Mobility and Security. http://www.ntms-conf.org/ntms2016/index.php
  11. Organization Chair: NTMS15, 7th IFIP International Conference on New Technology, Mobility and Security: http://www.ntms-conf.org/ntms-2015/
  12. Co-chair: Workshop on Reproducibility of Computation Based Research: Languages, Standards, Methodologies and Platforms: http://www.ntms-conf.org/ntms-2015/index.php/workshops/reproducibility-of-computationbased-research-workshop
  13. Co-chair: Workshop on Soft Computing Methods for the Design, Deployment, and Reliability of Networks and Network Applications:
    http://www.ntms-conf.org/ntms-2015/index.php/workshops/soft-computing-methods-forthe-design-deployment-and-reliability-of-networks-and-network-applications-workshop
  14. General Co-Chair: 14th IEEE International Conference on Intelligent System Design and Application): http://www.mirlabs.net/isda14/
  15. General Co-Chair: 10th International Conference on Information Assurance and Security, Japan, IEEE Japan Section: http://www.mirlabs.net/ias14/
  16. Member of technical program committee of more than 50 international conferences, examples: ISGT14, DPNoC 2015, ICEPIT 2014, DPNoC 2014, WoTBD 2015, DNAC’16, CICN 2018, ICCAD’18, SSS’18, CICN, ANT-2019, 2019, DISP’19, ICDEC 2019, and INAIT 2019.
layth-sliman

Enseignant chercheur et responsable de la thématique de recherche « Sécurité et Confiance »