<div dir="ltr"><div class="gmail-I_ZkbNhI gmail-D_FY gmail-W_6D6F" style="display:table;width:864px;color:rgb(29,34,40);font-family:"Helvetica Neue","Segoe UI",Helvetica,Arial,"Lucida Grande",sans-serif;font-size:13px;outline:none"><div class="gmail-msg-body gmail-P_wpofO gmail-mq_AS" style="font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;line-height:normal;padding:2px 0px 0px;word-break:break-word;outline:none"><div class="gmail-jb_0 gmail-X_6MGW gmail-N_6Fd5" style="padding-bottom:0px;padding-left:24px;padding-right:16px;outline:none"><div style="outline:none"><div id="gmail-yiv6193809308" style="outline:none"><div style="outline:none"><div class="gmail-yiv6193809308WordSection1" style="outline:none"><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none"><i style="outline:none"><span style="color:rgb(31,73,125);background:yellow;outline:none">KINDLY SHARE</span></i></b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none"><i style="outline:none"><span style="color:black;background:yellow;outline:none">Apologies if you receive multiple copies</span><span style="color:black;outline:none"> </span></i></b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p align="center" class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;text-align:center;outline:none"><b style="outline:none"><span style="font-size:14pt;outline:none">CRiSIS 2024 : The 19th International Conference on Risks and Security of Internet and Systems</span></b></p><p align="center" class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;text-align:center;outline:none"><b style="outline:none"><span style="font-size:12pt;color:rgb(31,73,125);outline:none">November 26th - 28th, 2024</span></b></p><p align="center" class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;text-align:center;outline:none"><b style="outline:none"><span style="font-size:12pt;color:rgb(31,73,125);outline:none">Aix-en-Provence, France</span></b></p><p align="center" class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;text-align:center;outline:none"><b style="outline:none"><span style="color:rgb(31,73,125);outline:none"> </span></b></p><p align="center" class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;text-align:center;outline:none"><b style="outline:none"><span style="color:red;outline:none">New deadline : July 15th, 2024</span></b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">The 19th International Conference on Risks and Security of Internet and Systems (CRiSIS) in 2024</b> continues its tradition of addressing critical security challenges in Internet-connected applications, networks, and systems. The indispensability of the Internet for information exchange among diverse user groups and organizations has led to heightened risks around security and privacy. This vulnerability is exacerbated by the sophistication of online attacks, the proliferation of cybercrime, and the readily available tools for attackers, who are increasingly motivated and skilled.</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">The advent of complex technologies, including pervasive computing, mobile, and wireless devices and networks, introduces new security challenges, necessitating the deployment of advanced security mechanisms and techniques. These advancements are crucial for protecting critical sectors such as energy, transportation, health, defense, banking, critical infrastructures, embedded systems and networks, avionics systems, and more, ensuring an acceptable level of security assurance.</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">CRiSIS 2024</b> serves as an essential platform for stakeholders in computer and network security from the industrial, academic, and governmental sectors to convene, share insights, and showcase the latest developments in combating Internet-related security threats, vulnerabilities, and the necessary countermeasures to address them.</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">TOPICS</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">======</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">We target contributions from both academia and industrials on the following topics, but not limited to:</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- AI and machine learning-based security approaches</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Formal methods and logics-centered security approaches</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Analysis and management of risk</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Attacks and defenses</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Attack data acquisition and network monitoring</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Authorization, Authentication, and Identity Management</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Blockchain and Distributed Ledger Technologies</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Cryptography, biometrics, watermarking</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Dependability and fault tolerance of Internet applications</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Distributed systems security and safety</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Embedded system security and safety</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Empirical methods for security and risk evaluation</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Hardware-based security and physical security</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Intrusion detection and prevention systems</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Organizational, ethical, and legal issues</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Privacy protection and anonymization</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Risk-aware access and usage control</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Analysis and management of cyber crisis</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security and risk assessment</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security and risks metrics</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security and dependability of operating systems</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security and safety of critical infrastructures</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security and privacy of peer-to-peer system</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security and privacy of wireless networks</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security in Cloud/Edge/Fog computing</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security models and security policies</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security of big data</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security of industrial control systems</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security of intelligent transportation systems</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security of e-commerce, electronic voting, and database systems</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security of new-generation networks</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security of smart cities</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security of smart grid</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security of social networks</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security of the IoT and IIoT</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Security of VoIP and multimedia</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Smartphone security and privacy</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Traceability, metrology and forensics</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Trust management</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Ubiquitous computing security</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Use of smart cards and personal devices for Internet applications</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Virtualization security</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Web and Web-service security</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">IMPORTANT DATES</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">================</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">Submission deadline: July 15th, 2024</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">Notification of acceptance: August 30th, 2024</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">Camera-ready paper due: October 15th, 2024</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">PAPER SUBMISSION</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">=================</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">Submitted papers must not significantly overlap with papers already published or those being concurrently submitted to a journal or conference with proceedings. Papers should be written in English and submitted electronically in PDF format.</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">Selected papers presented at the conference will be included in the post-proceedings, to be published by Springer in the Lecture Notes in Computer Science (LNCS) series. Authors are required to revise their papers according to review comments before publication. Pre-proceedings will be available at the time of the conference.</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">The maximum length for submissions is 16 pages for full papers and 6 pages for short papers, following the LNCS formatting guidelines. We recommend the use of LNCS Springer Overleaf Template (<a rel="nofollow noopener noreferrer" target="_blank" href="https://www.overleaf.com/latex/templates/springer-lecture-notes-in-computer-science/kzwwpvhwnvfj#.WtR5Hy5ua71" style="color:rgb(5,99,193);outline:none">https://www.overleaf.com/latex/templates/springer-lecture-notes-in-computer-science/kzwwpvhwnvfj#.WtR5Hy5ua71</a>). Authors must upload their paper as PDF file using the EasyChair</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">submission system: <a rel="nofollow noopener noreferrer" target="_blank" href="https://easychair.org/conferences/?conf=crisis2024" style="color:rgb(5,99,193);outline:none">https://easychair.org/conferences/?conf=crisis2024</a></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">WEB SITE</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">========</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><a rel="nofollow noopener noreferrer" target="_blank" href="https://crisis2024.univ-gustave-eiffel.fr/" style="color:rgb(5,99,193);outline:none">https://crisis2024.univ-gustave-eiffel.fr</a></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">GENERAL CHAIRS</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">==============</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Frédéric Cuppens, Polytechnique Montreal, Canada</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Nora Cuppens, Polytechnique Montreal, Canada</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Jean-Paul Mizzi, Université Gustave Eiffel, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- David Garcia, CESI Lineact, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">PROGRAM COMMITTEE CHAIRS</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">==========================</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Simon Collart Dutilleul, Université Gustave Eiffel, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Samir Ouchani, CESI Lineact, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">PUBLICITY CHAIRS</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">===============</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Slim Kallel, University of Sfax, Tunisia</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">ORGANIZING COMMITTE</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">=====================</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- David Garcia, CESI Lineact, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Amine Mohammed Boudouaia, CESI Lineact, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Malika Benkhalifa, Ecole d'Ingénieurs CESI, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Philippe Bon, Gustave Eiffel University, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Seddik Reguieg, Gustave Eiffel University, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Valérie Osmont, Gustave Eiffel University, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Danielle Zennir, Gustave Eiffel University, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none">- Danielle Zennir, Gustave Eiffel University, France</p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"> </p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">=============================</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">Dr. Samir Ouchani, Ing., PhD., HDR.</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">Research Director, CESI Lineact.</b></p><p class="gmail-yiv6193809308MsoNormal" style="margin:0cm 0cm 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;outline:none"><b style="outline:none">Aix-en-Provence, France.</b></p></div></div></div></div></div></div><div class="gmail-jb_0 gmail-X_6MGW gmail-N_6Fd5" style="padding-bottom:0px;padding-left:24px;padding-right:16px;outline:none"></div></div><div class="gmail-H_7jIs gmail-D_F gmail-ab_C gmail-Q_69H5 gmail-E_36RhU" style="height:64px;display:flex;color:rgb(29,34,40);font-family:"Helvetica Neue","Segoe UI",Helvetica,Arial,"Lucida Grande",sans-serif;font-size:13px;outline:none"><div class="gmail-D_F gmail-W_6D6F gmail-r_BN gmail-gl_C" style="width:892px;display:flex;outline:none"><br></div></div><span class="gmail_signature_prefix">-- </span><br><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><font style="font-family:tahoma,sans-serif" size="1"><i>Ali Benzerbadj <br></i></font></div><div dir="ltr"><font style="font-family:tahoma,sans-serif" size="1"><i><span><font style="background-color:inherit">Lecturer, University of Ain Temouchent<br></font></span></i></font></div><div><font style="font-family:tahoma,sans-serif" size="1"><i><font style="background-color:inherit">Ain Temouchent, Algeria</font><br></i></font></div><div><font style="font-family:tahoma,sans-serif" size="1"><i>Research Laboratory in Industrial Computing and Networks (RIIR)<br></i></font></div><div><font style="font-family:tahoma,sans-serif" size="1"><i>Research team :"Networks and QoS"<br></i></font></div><font style="font-family:tahoma,sans-serif" size="1">University of Oran 1 Ahmed Ben Bella, Oran, Algeria<br></font><div><font style="font-family:tahoma,sans-serif" size="1">Mob(s): +213 6 61622162</font></div><font style="font-family:tahoma,sans-serif" size="1">E-mail(s):<a href="mailto:ali.benzerbadj@univ-temouchent.edu.dz" target="_blank">.benzerbadj@univ-temouchent.edu.dz</a>, <a href="mailto:ali_benz@yahoo.fr" target="_blank">ali_benz@yahoo.fr</a>,</font></div></div></div>