Jaouhar Fattahi

According to our database1, Jaouhar Fattahi authored at least 26 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP Techniques.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

2020
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications.
Inf., 2020

2019
Towards a reliable approach on scaling in data acquisition.
Proceedings of the 23rd International Conference on System Theory, Control and Computing, 2019

On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
Relaxed Conditions for Secrecy in a Role-Based Specification.
CoRR, 2018

Considerations regarding security issues impact on systems availability.
CoRR, 2018

Circular Antenna Array Design for Breast Cancer Detection.
CoRR, 2018

Secrecy by Witness-Functions on Increasing Protocols.
CoRR, 2018

Fusion of ANN and SVM Classifiers for Network Attack Detection.
CoRR, 2018

Secrecy by Witness-Functions under Equational Theories.
CoRR, 2018

SinCRY: A Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018

A Theorem for Secrecy in Tagged Protocols Using the Theory of Witness-Functions.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018

2017
A Slow Read attack Using Cloud.
CoRR, 2017

Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017

Radiation pattern synthesis using hybrid fourier-woodward-lawson-neural networks for reliable mimo antenna systems.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Method for authentication of sensors connected on Modbus TCP.
Proceedings of the 4th International Conference on Control, 2017

2016
Authentication by Witness Functions.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Sidelobe level reduction in linear array pattern synthesis using Taylor-MUSIC algorithm for reliable IEEE 802.11 MIMO applications.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Formal reasoning on authentication in security protocols.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

2015
Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

2014
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols.
CoRR, 2014

Secrecy by Witness Functions.
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014

2011
Dynamic Context-Aware and Limited Resources-Aware Service Adaptation for Pervasive Computing.
Adv. Softw. Eng., 2011


  Loading...