Adel Bouhoula

Orcid: 0000-0003-2920-2338

According to our database1, Adel Bouhoula authored at least 134 papers between 1992 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Correction to: Preface.
Ann. Math. Artif. Intell., October, 2023

Preface.
Ann. Math. Artif. Intell., October, 2023

A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach.
Mob. Networks Appl., February, 2023

A novel multispectral corner detector and a new local descriptor: an application to human posture recognition.
Multim. Tools Appl., 2023

Exploiting scatter matrix on one-class support vector machine based on low variance direction.
Intell. Data Anal., 2023

Towards a Reliable and Smart Approach for Detecting and Resolving Security Violations within SDWN.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Machine Learning Algorithms for Enhancing Intrusion Detection Within SDN/NFV.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

IoMT Security Model based on Machine Learning and Risk Assessment Techniques.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

A Comprehensive Study of Intrusion Detection within Internet of Things-based Smart Cities: Synthesis, Analysis and a Novel Approach.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Learning Human Postures Using Lab-Depth HOG Descriptors.
Proceedings of the Computational Collective Intelligence - 15th International Conference, 2023

2022
Optimization of parallel firewalls filtering rules.
Int. J. Inf. Sec., 2022

Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Analysis of Smart Cities Security: Challenges and Advancements.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

2021
Cyber-Risk Management within IoMT: a Context-aware Agent-based Framework for a Reliable e-Health System.
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021

Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database Application.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021

A Systematic Approach for IoT Cyber-Attacks Detection in Smart Cities Using Machine Learning Techniques.
Proceedings of the Advanced Information Networking and Applications, 2021

A Novel Face Detection Framework Based on Incremental Learning and Low Variance Directions.
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021

2020
Advanced analysis of the integrity of access control policies: the specific case of databases.
Int. Arab J. Inf. Technol., 2020

A Novel Dispersion Covariance-guided One-Class Support Vector Machines.
Proceedings of the 15th International Joint Conference on Computer Vision, 2020

A Low Inertia Guided Auto-Encoder for Anomaly Detection in Networks.
Proceedings of the 28th International Conference on Software, 2020

Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Net Auto-Solver: A formal approach for automatic resolution of OpenFlow anomalies.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Enforcing Risk-Awareness in Access Control Systems: Synthesis, Discussion and Guidelines.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Double Mask: An Efficient Rule Encoding for Software Defined Networking.
Proceedings of the 23rd Conference on Innovation in Clouds, 2020

A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

A Comprehensive Solution for the Analysis, Validation and Optimization of SDN Data-Plane Configurations.
Proceedings of the 16th International Conference on Network and Service Management, 2020

A Formal Approach for Automatic Detection and Correction of SDN Switch Misconfigurations.
Proceedings of the 16th International Conference on Network and Service Management, 2020

R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
Human face detection improvement using incremental learning based on low variance directions.
Signal Image Video Process., 2019

A novel incremental one-class support vector machine based on low variance direction.
Pattern Recognit., 2019

A Novel Multispectral Lab-depth based Edge Detector for Color Images with Occluded Objects.
Proceedings of the 14th International Joint Conference on Computer Vision, 2019

Deep and Automated SDN Data Plane Analysis.
Proceedings of the 2019 International Conference on Software, 2019

Anomaly-based Intrusion Detection Using Auto-encoder.
Proceedings of the 2019 International Conference on Software, 2019

Poster : Minimizing range rules for packet filtering using a double mask representation.
Proceedings of the 2019 IFIP Networking Conference, 2019

Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures.
Secur. Commun. Networks, 2018

A Novel Handwritten Digits Recognition Method based on Subclass Low Variances Guided Support Vector Machine.
Proceedings of the 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2018), 2018

Automated and Optimized Formal Approach to Verify SDN Access-Control Misconfigurations.
Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communications, 2018

Anomalies Correlation for Risk-Aware Access Control Enhancement.
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018

2017
FARE: FDD-based firewall anomalies resolution tool.
J. Comput. Sci., 2017

Automatic detection and correction of firewall misconfigurations- A formal approach.
Proceedings of the SCSS 2017, 2017

A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment.
Proceedings of the SCSS 2017, 2017

Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems.
Proceedings of the SCSS 2017, 2017

A New FDD-Based Method for Distributed Firewall Misconfigurations Resolution.
Proceedings of the Information Systems, 2017

Detection of Covert Channels Over ICMP Protocol.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.
J. Medical Syst., 2016

Behavior-based approach to detect spam over IP telephony attacks.
Int. J. Inf. Sec., 2016

Detection of firewall configuration errors with updatable tree.
Int. J. Inf. Sec., 2016

Incremental One-Class Models for Data Classification.
CoRR, 2016

An Accurate FDD-Based Approach for Discovering Distributed Firewalls Misconfigurations.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Novel Incremental Covariance-Guided One-Class Support Vector Machine.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2016

On Assisted Packet Filter Conflicts Resolution: An Iterative Relaxed Approach.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Risk Management for Spam over IP Telephony using Combined Countermeasures.
Proceedings of the 10th International Conference on Informatics and Systems, 2016

Risk management for spam over IP telephony using optimal countermeasure.
Proceedings of the International Conference on Digital Economy, 2016

2015
Special issue on symbolic computation in software science.
J. Symb. Comput., 2015

Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity.
Int. J. Inf. Sec., 2015

Automated and Optimized FDD-Based Method to Fix Firewall Misconfigurations.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

An Ontology Regulating Privacy Oriented Access Controls.
Proceedings of the Risks and Security of Internet and Systems, 2015

Automatic Classification and Detection of Snort Configuration Anomalies - a Formal Approach.
Proceedings of the International Joint Conference, 2015

2014
Characterization of attacks collected from the deployment of Web service honeypot.
Secur. Commun. Networks, 2014

Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud.
Proceedings of the SECRYPT 2014, 2014

Behavior Analysis of Web Service Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Formal approach for managing firewall misconfigurations.
Proceedings of the IEEE 8th International Conference on Research Challenges in Information Science, 2014

2013
A SPIT detection algorithm based on user's call behavior.
Proceedings of the 21st International Conference on Software, 2013

2012
Sufficient completeness verification for conditional and constrained TRS.
J. Appl. Log., 2012

Managing hybrid packet filter's specifications.
Int. J. Secur. Networks, 2012

Formal Checking of Multiple Firewalls
CoRR, 2012

A prefix-based approach for managing hybrid specifications in complex packet filtering.
Comput. Networks, 2012

Towards Safe and Optimal Network Designs Based on Network Security Requirements.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

2011
Trusted intrusion detection architecture for high-speed networks based on traffic classification, load balancing and high availability mechanism.
Secur. Commun. Networks, 2011

Network Security Alerts Management Architecture for Signature-Based Intrusions Detection Systems within a NAT Environment.
J. Netw. Syst. Manag., 2011

Design and implementation of Web service honeypot.
Proceedings of the 19th International Conference on Software, 2011

Systematic Deployment of Network Security Policy in Centralized and Distributed Firewalls.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Towards safe and optimal filtering rule reordering for complex packet filters.
Proceedings of the 5th International Conference on Network and System Security, 2011

Enabling flexible packet filtering through the K-map priority elimination technique.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

NAF conversion: An efficient solution for the range matching problem in packet filters.
Proceedings of the 12th IEEE International Conference on High Performance Switching and Routing, 2011

Dealing with Stateful Firewall Checking.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

A Fully Automatic Approach for Fixing Firewall Misconfigurations.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
Efficient decision tree for protocol analysis in intrusion detection.
Int. J. Secur. Networks, 2010

A delegation model for extended RBAC.
Int. J. Inf. Sec., 2010

Managing Delegation in Access Control Models
CoRR, 2010

Automatic Conformance Verification of Distributed Firewalls to Security Requirements.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Experimental analysis of attacks against web services and countermeasures.
Proceedings of the iiWAS'2010, 2010

An Access Control Model for Web Databases.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Data analyzer based on data mining for Honeypot Router.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

Enforcing Access Control to Web Databases.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Specification and evaluation of polymorphic shellcode properties using a new temporal logic.
J. Comput. Virol., 2009

Simultaneous checking of completeness and ground confluence for algebraic specifications.
ACM Trans. Comput. Log., 2009

Rank Functions Based Inference System for Group Key Management Protocols Verification.
Int. J. Netw. Secur., 2009

Ensuring security in depth based on heterogeneous network security technologies.
Int. J. Inf. Sec., 2009

An Extended Role-Based Access Control Model for Delegating Obligations.
Proceedings of the Trust, 2009

Automatic verification of conformance of firewall configurations to security policies.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Honeypot router for routing protocols protection.
Proceedings of the CRiSIS 2009, 2009

Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Firewall filtering rules analysis for anomalies detection.
Int. J. Secur. Networks, 2008

Automated Induction for Complex Data Structures
CoRR, 2008

An inference system for detecting firewall filtering rules anomalies.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Self-adjusting scheme for high speed routers.
Proceedings of the LCN 2008, 2008

Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Revocation Schemes for Delegation Licences.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Dynamic Scheme for Packet Classification Using Splay Trees.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

Automated Induction with Constrained Tree Automata.
Proceedings of the Automated Reasoning, 4th International Joint Conference, 2008

Collaboration between Security Devices toward improving Network Defense.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems.
Proceedings of the First International Conference on Emerging Security Information, 2007

Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

A Domain Specific Language for Securing Distributed Systems.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

A Stateful Real Time Intrusion Detection System for high-speed network.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

A Traffic Classification Algorithm for Intrusion Detection.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2004
On the fly pattern matching for intrusion detection with Snort.
Ann. des Télécommunications, 2004

Protocol Analysis in Intrusion Detection Using Decision Tree.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2002
Observational proofs by rewriting.
Theor. Comput. Sci., 2002

2001
Automata-Driven Automated Induction.
Inf. Comput., 2001

2000
Specification and proof in membership equational logic.
Theor. Comput. Sci., 2000

Simultaneous Checking of Completeness and Ground Confluence.
Proceedings of the Fifteenth IEEE International Conference on Automated Software Engineering, 2000

1998
Observational Proofs with Critical Contexts.
Proceedings of the Fundamental Approaches to Software Engineering, 1998

1997
Automated Theorem Proving by Test Set Induction.
J. Symb. Comput., 1997

1996
Using Induction and Rewriting to Verify and Complete Parameterized Specifications.
Theor. Comput. Sci., 1996

SPIKE-AC: A System for Proofs by Induction in Associative-Commutative Theories.
Proceedings of the Rewriting Techniques and Applications, 7th International Conference, 1996

General Framework for Mechanizing Induction using Test Set.
Proceedings of the PRICAI'96: Topics in Artificial Intelligence, 1996

Automated Verification by Induction with Associative-Commutative Operators.
Proceedings of the Computer Aided Verification, 8th International Conference, 1996

1995
Automated Mathematical Induction.
J. Log. Comput., 1995

Implicit Induction in Conditional Theories.
J. Autom. Reason., 1995

SPIKE: A System for Automatic Inductive Proofs.
Proceedings of the Algebraic Methodology and Software Technology, 1995

1994
SPIKE: a System for Sufficient Completeness and Parameterized Inductive Proofs.
Proceedings of the Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26, 1994

Sufficient Completeness and Parameterized Proofs by Induction.
Proceedings of the Algebraic and Logic Programming, 4th International Conference, 1994

1993
Automatic Case Analysis in Proof by Induction.
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993

1992
SPIKE, an Automatic Theorem Prover.
Proceedings of the Logic Programming and Automated Reasoning, 1992


  Loading...