\n \n \n
\n
\n \n 2024\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Leveraging Complex Network Analysis for ExplainableNetwork Intrusion Detection.\n \n \n \n\n\n \n Kanawati, R.\n\n\n \n\n\n\n In
Journée MathSTIC Mathématiques, Apprentissage et Réseaux, 2024. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@InProceedings{A3:KanawatiMS2024,\n author = {Rushed Kanawati},\n booktitle = {Journ\\'ee MathSTIC Math\\'ematiques, Apprentissage et R\\'eseaux},\n title = {Leveraging Complex Network Analysis for ExplainableNetwork Intrusion Detection},\n year = {2024},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2022\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Analyse de réseaux complexs et la santé.\n \n \n \n\n\n \n Kanawati, R.\n\n\n \n\n\n\n In
Colloque IA & Santé, Paris, November 2022. USPN\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@InProceedings{A3:KanawatiIAS2022,\n author = {Rushed Kanawati},\n booktitle = {Colloque IA & Sant\\'e},\n title = {Analyse de r\\'eseaux complexs et la sant\\'e.},\n year = {2022},\n address = {Paris},\n month = nov,\n organization = {USPN},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Centrality Mining in Complex networks.\n \n \n \n\n\n \n Kanawati, R.\n\n\n \n\n\n\n In
Plateforme AFIA - Ateier DEcouverte de Connaissances et Apprentissage dans les Données graphEs (DECADE), Saint Etienne, June 2022. AFIA\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@InProceedings{A3:KanawatiDecade2022,\n author = {Rushed Kanawati},\n booktitle = {Plateforme AFIA - Ateier DEcouverte de Connaissances et Apprentissage dans les Donn\\'ees graphEs (DECADE)},\n title = {Centrality Mining in Complex networks},\n year = {2022},\n address = {Saint Etienne},\n month = jun,\n organization = {AFIA},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Centrality Mining in Complex networks.\n \n \n \n\n\n \n Kanawati, R.\n\n\n \n\n\n\n In
Seminar of Data Science departement, UoS, Osanbruck, May 2022. Osnabruck university\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@InProceedings{A3:KanawatiDSUOS2022,\n author = {Rushed Kanawati},\n booktitle = {Seminar of Data Science departement, UoS},\n title = {Centrality Mining in Complex networks},\n year = {2022},\n address = {Osanbruck},\n month = may,\n organization = {Osnabruck university},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2019\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n IA et cybersécurité.\n \n \n \n\n\n \n Anglade, T.; and Kanawati, R.\n\n\n \n\n\n\n In
Collocque ESLSCA : Intelligenece Artificielle et cybersécurité : Perception juridiques, Paris, September 2019. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@INPROCEEDINGS{A3:AngladeKESLSCA2019,\n author = {Thomas Anglade and Rushed Kanawati},\n title = {IA et cybers\\'ecurit\\'e},\n booktitle = {Collocque ESLSCA : Intelligenece Artificielle et cybers\\'ecurit\\'e\n\t: Perception juridiques},\n year = {2019},\n address = {Paris},\n month = {September},\n owner = {rushed},\n timestamp = {2019.11.04}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Multiplex networks.\n \n \n \n \n\n\n \n Kanawati, R.\n\n\n \n\n\n\n In
THE FIRST UM6P SPRING SCHOOL AND CONFERENCE ON COMPLEXITY ANALYSIS OF INDUSTRIAL SYSTEMS AND ADVANCED MODELING, Ben Guerir, Morocco, April 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
link\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@INPROCEEDINGS{A3:KanawatiCAISAM2019,\n author = {Rushed Kanawati},\n title = {Multiplex networks},\n booktitle = {THE FIRST UM6P SPRING SCHOOL AND CONFERENCE ON COMPLEXITY ANALYSIS\n\tOF INDUSTRIAL SYSTEMS AND ADVANCED MODELING},\n year = {2019},\n address = {Ben Guerir, Morocco},\n month = {April},\n owner = {rushed},\n timestamp = {2019.11.03},\n url_link = {http://jm6p.org}\n}\n\n
\n
\n\n\n\n
\n\n\n \n\n\n\n\n\n
\n
\n\n
\n
\n \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n \n\n\n \n\n\n\n\n\n
\n
\n\n
\n
\n \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Détection de communautés dans les réseaux multiplexes: approches & applications.\n \n \n \n\n\n \n Kanawati, R.\n\n\n \n\n\n\n In
Thyrex : Fondements théoriques des réseaux multiplexes, 2016. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@InProceedings{A3:KanawatiTHYREX2016,\n author = {Rushed Kanawati},\n booktitle = {Thyrex : Fondements th\\'eoriques des r\\'eseaux multiplexes},\n title = {D\\'etection de communaut\\'es dans les r\\'eseaux multiplexes: approches \\& applications},\n year = {2016},\n owner = {rushed},\n timestamp = {2019.11.04},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2015\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Multiplex network Analysis.\n \n \n \n\n\n \n Kanawati, R.\n\n\n \n\n\n\n In Février 2015. \n
Fédération des unités de recherche mathématiques de Marseille\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@INPROCEEDINGS{A3:KanawatiFRUMAM2015,\n author = {Rushed Kanawati},\n title = {Multiplex network Analysis},\n year = {2015},\n month = {F\\'evrier},\n note = {F\\'ed\\'eration des unit\\'es de recherche math\\'ematiques de Marseille},\n owner = {rushed},\n timestamp = {2018.03.01}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Multiplex network analysis,.\n \n \n \n\n\n \n Kanawati, R.\n\n\n \n\n\n\n In
Invited talk at MARAMI'2015, 2015. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@INPROCEEDINGS{A3:KanawatiMARAMI2015,\n author = {Rushed Kanawati},\n title = {Multiplex network analysis,},\n booktitle = {Invited talk at MARAMI'2015},\n year = {2015},\n owner = {rushed},\n timestamp = {2018.02.28}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2014\n \n \n (2)\n \n \n
\n
\n \n \n \n\n\n \n\n\n\n\n\n
\n
\n\n
\n
\n \n undefined\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Leveraging Complex Network Analysis for ExplainableNetwork Intrusion Detection.\n \n \n \n\n\n \n Kanawati, R.\n\n\n \n\n\n\n . .\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@Article{,\n author = {Rushed Kanawati},\n title = {Leveraging Complex Network Analysis for ExplainableNetwork Intrusion Detection},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n