scispace - formally typeset
M

Martine Bellaiche

Researcher at École Polytechnique de Montréal

Publications -  39
Citations -  881

Martine Bellaiche is an academic researcher from École Polytechnique de Montréal. The author has contributed to research in topics: Cloud computing & Cloud computing security. The author has an hindex of 10, co-authored 35 publications receiving 624 citations. Previous affiliations of Martine Bellaiche include École Polytechnique & École Normale Supérieure.

Papers
More filters
Journal ArticleDOI

VANET security surveys

TL;DR: The various categories of applications in VANETs are introduced, as well as some security requirements, threats and certain architectures are proposed to solve the security problem.
Journal ArticleDOI

A deep learning approach for proactive multi-cloud cooperative intrusion detection system

TL;DR: A machine learning-based cooperative IDS that efficiently exploits the historical feedback data to provide the ability of proactive decision making is proposed that is based on a Denoising Autoencoder, which is used as a building block to construct a deep neural network.
Journal ArticleDOI

Towards quantification and evaluation of security of Cloud Service Providers

TL;DR: A methodology for performance quantification and evaluation of Cloud security services, based on a set of quantitative evaluation metrics which is developed using the Goal-Question-Metric (GQM) paradigm is proposed.
Journal ArticleDOI

A broker-based framework for standardization and management of Cloud Security-SLAs

TL;DR: A broker-based framework that manages the Cloud Security-SLA is proposed and an evaluation and selection model that is fundamentally based on computing the adequate trade-off between the security CIA triad attributes in the context of a multi-objective optimization problem is proposed.
Journal ArticleDOI

A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

TL;DR: New types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined.