Mohamed Mejri

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Error Resilience in Deep Neural Networks Using Neuron Gradient Statistics.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2024

A Novel Hyperdimensional Computing Framework for Online Time Series Forecasting on the Edge.
CoRR, 2024

2023
HealthBlock: A Framework for a Collaborative Sharing of Electronic Health Records Based on Blockchain.
Future Internet, March, 2023

Enforcing Security Policies Using an Algebraic Approach.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2023

DIDOR: A Decentralized Identifier Based Onion Routing Protocol.
Proceedings of the Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, 2023

Differential Privacy: Toward a Better Tuning of the Privacy Budget (ε) Based on Risk.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Impact of Feature Encoding on Malware Classification Explainability.
Proceedings of the 15th International Conference on Electronics, 2023

An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Detection of suspicious internet traffic based on differential analysis and logical rules.
J. Comput. Virol. Hacking Tech., 2022

SpamDL: A High Performance Deep Learning Spam Detector Using Stanford Global Vectors and Bidirectional Long Short-Term Memory Neural Networks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022

Low Power Neural Network Accelerators Using Collaborative Weight Tuning and Shared Shift-Add optimization.
Proceedings of the 65th IEEE International Midwest Symposium on Circuits and Systems, 2022

Soft Error Resilient Deep Learning Systems Using Neuron Gradient Statistics.
Proceedings of the 28th IEEE International Symposium on On-Line Testing and Robust System Design, 2022

2021
Semantic Segmentation and Object Detection Towards Instance Segmentation: Breast Tumor Identification.
CoRR, 2021

Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Toward the Formalization of Business Process Model and Notation.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Extreme Gradient Boosting for Cyberpropaganda Detection.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP Techniques.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

$\mathbb {K}$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2020
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications.
Inf., 2020

Digital Waste Disposal: an automated framework for analysis of spam emails.
Int. J. Inf. Sec., 2020

RandomForestMLP: An Ensemble-Based Multi-Layer Perceptron Against Curse of Dimensionality.
CoRR, 2020

A Study on Trees's Knots Prediction from their Bark Outer-Shape.
CoRR, 2020

A Survey On 3D Inner Structure Prediction from its Outer Shape.
CoRR, 2020

A rewriting system for the assessment of XACML policies relationship.
Comput. Secur., 2020

Information security risk assessment based on decomposition probability via Bayesian Network.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
Security Enforcement on Web Services Compositions.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
Relaxed Conditions for Secrecy in a Role-Based Specification.
CoRR, 2018

SinCRY: A Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018

Performance Evaluation of Data Scheduling in IEEE802.16e in VANET Traffic Context.
Proceedings of the 11th International Conference on Developments in eSystems Engineering, 2018

2017
Formal specification and integration of distributed security policies.
Comput. Lang. Syst. Struct., 2017

Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017

Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

A Survey of Textual Event Extraction from Social Networks.
Proceedings of the First Conference on Language Processing and Knowledge Management, 2017

2016
A Rewriting System for the Assessment of XACML Policies Similarity.
CoRR, 2016

Authentication by Witness Functions.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Formal reasoning on authentication in security protocols.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

On the Abstraction of a Categorical Clustering Algorithm.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android Malware.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

A Comparative Study of Android Malware Behavior in Different Contexts.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2015
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Toward the Formalization of BPEL.
Proceedings of the Service-Oriented Computing - ICSOC 2015 Workshops, 2015

Clustering Spam Emails into Campaigns.
Proceedings of the ICISSP 2015, 2015

Security Enforcement by Rewriting: An Algebraic Approach.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Fast and Effective Clustering of Spam Emails Based on Structural Similarity.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Secrecy by witness-functions under equational theories.
Proceedings of the 2015 7th International Conference on Electronics, 2015

Formal Enforcement of Security Policies on Parallel Systems with Risk Integration.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols.
CoRR, 2014

AVTAC : A Framework for Automatic Auditing of Access Control in Windows and Linux Systems.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2014

Secrecy by witness-functions on increasing protocols.
Proceedings of the 6th International Conference on Electronics, 2014

Secrecy by Witness Functions.
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014

2013
FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test.
Int. J. Grid Util. Comput., 2013

Access control validation by ontologies.
Proceedings of the IEEE 12th International Conference on Intelligent Software Methodologies, 2013

2012
Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method.
J. Comput. Networks Commun., 2012

FASER (Formal and Automatic Security Enforcement by Rewriting): An algebraic approach.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

2011
Formal enforcement of security policies on concurrent systems.
J. Symb. Comput., 2011

2010
Network Security: Formal and Optimized Configuration.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2010

Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach.
Proceedings of the SECRYPT 2010, 2010

Risk analysis in access control systems.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Specification and evaluation of polymorphic shellcode properties using a new temporal logic.
J. Comput. Virol., 2009

Secrecy of cryptographic protocols under equational theory.
Knowl. Based Syst., 2009

Formal Specification and Analysis of Firewalls.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

Using Edit Automata for Rewriting-Based Security Enforcement.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Intrusion Detection Prototype Based on ADM-Logic.
J. Softw., 2008

Enforcing Security Policies Using Algebraic Approach.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2008

Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy.
Proceedings of the SECRYPT 2008, 2008

Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Toward a new software development environment.
Knowl. Based Syst., 2007

Secrecy by interpretation functions.
Knowl. Based Syst., 2007

Automatic Enforcement of Security in Computer Networks.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2007

Practical and Universal Interpretation Functions for Secrecy.
Proceedings of the SECRYPT 2007, 2007

A Formal Approach for Security Policy Enforcement in Concurrent Programs.
Proceedings of the 2007 International Conference on Security & Management, 2007

Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic.
Proceedings of the The Second International Conference on Availability, 2007

2006
Converting an imperative program to a declarative one.
Knowl. Based Syst., 2006

Implementing Lyee-Calculus in Java.
Knowl. Based Syst., 2006

Enforcing Security Policies on Programs.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

A Formal Translation From an Imperative Language With Array to a Declarative Language.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

A Decision Procedure for Structured Cryptographic Protocols.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

2005
LyeeBuilder.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2005

Formal and Efficient Enforcement of Security Policies.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005

2004
A process algebra to formalize the Lyee methodology.
Knowl. Based Syst., 2004

Formal Implementation of Network Security Policies.
Proceedings of the Second Annual Conference on Privacy, 2004

A Declarative Approach to Stateful Intrusion Detection and Network Monitoring.
Proceedings of the Second Annual Conference on Privacy, 2004

Chaotic Protocols.
Proceedings of the Computational Science and Its Applications, 2004

2003
A new logic for electronic commerce protocols.
Theor. Comput. Sci., 2003

Security by typing.
Int. J. Softw. Tools Technol. Transf., 2003

Static analysis of Lyee requirements.
Knowl. Based Syst., 2003

Towards the Correctness of Security Protocols.
Proceedings of 19th Conference on the Mathematical Foundations of Programming Semantics, 2003

1998
An Environment for the Specification and Analysis of Cryptoprotocols.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997

Formal Automatic Verification of Authentication Crytographic Protocols.
Proceedings of the First IEEE International Conference on Formal Engineering Methods, 1997


  Loading...