Mohamed Mejri

According to our database1, Mohamed Mejri authored at least 79 papers between 1997 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP Techniques.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

2020
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications.
Inf., 2020

Digital Waste Disposal: an automated framework for analysis of spam emails.
Int. J. Inf. Sec., 2020

RandomForestMLP: An Ensemble-Based Multi-Layer Perceptron Against Curse of Dimensionality.
CoRR, 2020

A Study on Trees's Knots Prediction from their Bark Outer-Shape.
CoRR, 2020

A Survey On 3D Inner Structure Prediction from its Outer Shape.
CoRR, 2020

A rewriting system for the assessment of XACML policies relationship.
Comput. Secur., 2020

Information security risk assessment based on decomposition probability via Bayesian Network.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
Security Enforcement on Web Services Compositions.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
Relaxed Conditions for Secrecy in a Role-Based Specification.
CoRR, 2018

Secrecy by Witness-Functions on Increasing Protocols.
CoRR, 2018

Secrecy by Witness-Functions under Equational Theories.
CoRR, 2018

SinCRY: A Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018

Performance Evaluation of Data Scheduling in IEEE802.16e in VANET Traffic Context.
Proceedings of the 11th International Conference on Developments in eSystems Engineering, 2018

2017
Formal specification and integration of distributed security policies.
Comput. Lang. Syst. Struct., 2017

Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017

Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

A Survey of Textual Event Extraction from Social Networks.
Proceedings of the First Conference on Language Processing and Knowledge Management, 2017

2016
A Rewriting System for the Assessment of XACML Policies Similarity.
CoRR, 2016

Authentication by Witness Functions.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Formal reasoning on authentication in security protocols.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

On the Abstraction of a Categorical Clustering Algorithm.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android Malware.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

A Comparative Study of Android Malware Behavior in Different Contexts.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2015
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Toward the Formalization of BPEL.
Proceedings of the Service-Oriented Computing - ICSOC 2015 Workshops, 2015

Clustering Spam Emails into Campaigns.
Proceedings of the ICISSP 2015, 2015

Security Enforcement by Rewriting: An Algebraic Approach.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Fast and Effective Clustering of Spam Emails Based on Structural Similarity.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Formal Enforcement of Security Policies on Parallel Systems with Risk Integration.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols.
CoRR, 2014

AVTAC : A Framework for Automatic Auditing of Access Control in Windows and Linux Systems.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2014

Secrecy by Witness Functions.
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014

2013
FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test.
Int. J. Grid Util. Comput., 2013

Access control validation by ontologies.
Proceedings of the IEEE 12th International Conference on Intelligent Software Methodologies, 2013

2012
Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method.
J. Comput. Networks Commun., 2012

FASER (Formal and Automatic Security Enforcement by Rewriting): An algebraic approach.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

2011
Formal enforcement of security policies on concurrent systems.
J. Symb. Comput., 2011

2010
Network Security: Formal and Optimized Configuration.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2010

Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach.
Proceedings of the SECRYPT 2010, 2010

Risk analysis in access control systems.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Specification and evaluation of polymorphic shellcode properties using a new temporal logic.
J. Comput. Virol., 2009

Secrecy of cryptographic protocols under equational theory.
Knowl. Based Syst., 2009

Formal Specification and Analysis of Firewalls.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

Using Edit Automata for Rewriting-Based Security Enforcement.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Intrusion Detection Prototype Based on ADM-Logic.
J. Softw., 2008

Enforcing Security Policies Using Algebraic Approach.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2008

Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy.
Proceedings of the SECRYPT 2008, 2008

Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Toward a new software development environment.
Knowl. Based Syst., 2007

Secrecy by interpretation functions.
Knowl. Based Syst., 2007

Automatic Enforcement of Security in Computer Networks.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2007

Practical and Universal Interpretation Functions for Secrecy.
Proceedings of the SECRYPT 2007, 2007

A Formal Approach for Security Policy Enforcement in Concurrent Programs.
Proceedings of the 2007 International Conference on Security & Management, 2007

Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic.
Proceedings of the The Second International Conference on Availability, 2007

2006
Converting an imperative program to a declarative one.
Knowl. Based Syst., 2006

Implementing Lyee-Calculus in Java.
Knowl. Based Syst., 2006

Enforcing Security Policies on Programs.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

A Formal Translation From an Imperative Language With Array to a Declarative Language.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

A Decision Procedure for Structured Cryptographic Protocols.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

2005
LyeeBuilder.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2005

Formal and Efficient Enforcement of Security Policies.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005

2004
A process algebra to formalize the Lyee methodology.
Knowl. Based Syst., 2004

Formal Implementation of Network Security Policies.
Proceedings of the Second Annual Conference on Privacy, 2004

A Declarative Approach to Stateful Intrusion Detection and Network Monitoring.
Proceedings of the Second Annual Conference on Privacy, 2004

Chaotic Protocols.
Proceedings of the Computational Science and Its Applications, 2004

2003
A new logic for electronic commerce protocols.
Theor. Comput. Sci., 2003

Security by typing.
Int. J. Softw. Tools Technol. Transf., 2003

Static analysis of Lyee requirements.
Knowl. Based Syst., 2003

Towards the Correctness of Security Protocols.
Proceedings of 19th Conference on the Mathematical Foundations of Programming Semantics, 2003

1998
An Environment for the Specification and Analysis of Cryptoprotocols.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997

Formal Automatic Verification of Authentication Crytographic Protocols.
Proceedings of the First IEEE International Conference on Formal Engineering Methods, 1997


  Loading...