<?xml version="1.0"?>
<dblpperson name="Mohamed Mejri" pid="32/720" n="147">
<person publtype="disambiguation" key="homepages/32/720" mdate="2020-08-18">
<author pid="32/720">Mohamed Mejri</author>
<author pid="32/720">Mohammed Mejri</author>
</person>
<r><article key="journals/access/MejriAC26" mdate="2026-04-01">
<author orcid="0000-0002-0455-7880" pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0001-9938-2157" pid="271/9975">Chandramouli N. Amarnath</author>
<author orcid="0000-0003-1553-4470" pid="31/928">Abhijit Chatterjee</author>
<title>RESOLVE: Reasoning in Hyperdimensional Spaces With Relational and Object Level Features Using Vector Symbolic Processing.</title>
<year>2026</year>
<pages>42322-42341</pages>
<volume>14</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2026.3670753</ee>
<url>db/journals/access/access14.html#MejriAC26</url>
<stream>streams/journals/access</stream>
</article>
</r>
<r><inproceedings key="conf/iccel/MejriDM26" mdate="2026-04-01">
<author pid="32/720">Mohamed Mejri</author>
<author pid="346/6043">Mahboobeh Dorafshanian</author>
<author pid="94/7340">Djedjiga Mouheb</author>
<title>Beyond Additive Noise: Derivative-Driven Differential Privacy for IoT Analytics.</title>
<pages>1-6</pages>
<year>2026</year>
<booktitle>ICCE</booktitle>
<ee>https://doi.org/10.1109/ICCE67443.2026.11449895</ee>
<crossref>conf/iccel/2026</crossref>
<url>db/conf/iccel/icce2026.html#MejriDM26</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2603-17275" mdate="2026-04-13">
<author pid="32/720">Mohamed Mejri</author>
<author pid="359/6446">Ashiqur Rasul</author>
<author pid="31/928">Abhijit Chatterjee</author>
<title>DANCE: Dynamic 3D CNN Pruning: Joint Frame, Channel, and Feature Adaptation for Energy Efficiency on the Edge.</title>
<year>2026</year>
<month>March</month>
<volume>abs/2603.17275</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2603.17275</ee>
<url>db/journals/corr/corr2603.html#abs-2603-17275</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/access/MejriDM25" mdate="2025-10-14">
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0003-1064-5024" pid="346/6043">Mahboobeh Dorafshanian</author>
<author pid="94/7340">Djedjiga Mouheb</author>
<title>MDM-Privacy: A Derivative-Driven Framework for Differential Privacy.</title>
<pages>163071-163084</pages>
<year>2025</year>
<volume>13</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2025.3610100</ee>
<url>db/journals/access/access13.html#MejriDM25</url>
<stream>streams/journals/access</stream>
</article>
</r>
<r><article key="journals/tcad/AmarnathMIC25" mdate="2025-08-09">
<author orcid="0000-0001-9938-2157" pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="412/1741">Jackson Isenberg</author>
<author orcid="0000-0003-1553-4470" pid="31/928">Abhijit Chatterjee</author>
<title>Error Resilient Online Reinforcement Learning Using Adaptive Statistical Checks.</title>
<pages>3112-3125</pages>
<year>2025</year>
<month>August</month>
<volume>44</volume>
<journal>IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.</journal>
<number>8</number>
<ee>https://doi.org/10.1109/TCAD.2025.3529820</ee>
<url>db/journals/tcad/tcad44.html#AmarnathMIC25</url>
<stream>streams/journals/tcad</stream>
</article>
</r>
<r><inproceedings key="conf/codit/AttoFMHT25" mdate="2026-03-30">
<author pid="431/1396">Djibrim Mahaman Tahir M. Atto</author>
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="66/5390">Brahim Hnich</author>
<author pid="393/7080">Abdoul Majid O. Thiombiano</author>
<title>Cyber-Troll Detection using Deep Learning and NLP: A Comparative Study.</title>
<pages>1-6</pages>
<year>2025</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT66093.2025.11321840</ee>
<crossref>conf/codit/2025</crossref>
<url>db/conf/codit/codit2025.html#AttoFMHT25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/FattahiMGJBS25" mdate="2026-03-30">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="05/10597">Ridha Ghayoula</author>
<author pid="25/10460">Sawssen Jalel</author>
<author pid="179/0588">Laila Boumlik</author>
<author pid="386/9914">Feriel Sghaier</author>
<title>Inception-based Deep Learning Model for Arabic Audio Emotion Recognition in Forensics.</title>
<pages>1-6</pages>
<year>2025</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT66093.2025.11321894</ee>
<crossref>conf/codit/2025</crossref>
<url>db/conf/codit/codit2025.html#FattahiMGJBS25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/KhedherFMGL25" mdate="2026-03-30">
<author pid="431/1252">Abdelkarim Khedher</author>
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="05/10597">Ridha Ghayoula</author>
<author pid="267/7509">Lassaad Latrach</author>
<title>A LIME-Explained VGG16 Model for Disguise and Makeup Face Recognition in Forensics.</title>
<pages>653-658</pages>
<year>2025</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT66093.2025.11321582</ee>
<crossref>conf/codit/2025</crossref>
<url>db/conf/codit/codit2025.html#KhedherFMGL25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/DrissFMBG25" mdate="2026-03-30">
<author pid="431/1847">Hadir Driss</author>
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="42/8844">Sahbi Bahroun</author>
<author pid="05/10597">Ridha Ghayoula</author>
<title>A BERT Deep Learning Model for Arabic Spam Detection.</title>
<pages>1648-1653</pages>
<year>2025</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT66093.2025.11321615</ee>
<crossref>conf/codit/2025</crossref>
<url>db/conf/codit/codit2025.html#DrissFMBG25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/FattahiMGBSZ25" mdate="2026-03-30">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="05/10597">Ridha Ghayoula</author>
<author pid="179/0588">Laila Boumlik</author>
<author pid="386/9914">Feriel Sghaier</author>
<author pid="162/4027">Marwa Ziadia</author>
<title>Parallel CNN Deep Learning Model for Security Monitoring and Fault Prediction in Electrical Systems.</title>
<pages>3073-3078</pages>
<year>2025</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT66093.2025.11321524</ee>
<crossref>conf/codit/2025</crossref>
<url>db/conf/codit/codit2025.html#FattahiMGBSZ25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/FattahiMGJBS25a" mdate="2026-03-30">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="05/10597">Ridha Ghayoula</author>
<author pid="25/10460">Sawssen Jalel</author>
<author pid="179/0588">Laila Boumlik</author>
<author pid="386/9914">Feriel Sghaier</author>
<title>RansFighter: a GRU-based Tool for Ransomware Detection.</title>
<pages>3079-3083</pages>
<year>2025</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT66093.2025.11321781</ee>
<crossref>conf/codit/2025</crossref>
<url>db/conf/codit/codit2025.html#FattahiMGJBS25a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/FattahiSMGM25" mdate="2026-03-30">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="386/9914">Feriel Sghaier</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="05/10597">Ridha Ghayoula</author>
<author pid="59/9714">Nadia Mesghouni</author>
<title>Reassessing CAPTCHAs in the Era of Advanced Deep Learning.</title>
<pages>3084-3088</pages>
<year>2025</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT66093.2025.11321565</ee>
<crossref>conf/codit/2025</crossref>
<url>db/conf/codit/codit2025.html#FattahiSMGM25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csr2/SahaMA25" mdate="2025-09-02">
<author pid="373/4032">Pierre Fobougong Saha</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="24/408">Kamel Adi</author>
<title>Optimized Security Measure Selection: Leveraging MILP Solvers To Balance Risk And Cost.</title>
<pages>186-193</pages>
<year>2025</year>
<booktitle>CSR</booktitle>
<ee>https://doi.org/10.1109/CSR64739.2025.11130015</ee>
<crossref>conf/csr2/2025</crossref>
<url>db/conf/csr2/csr2025.html#SahaMA25</url>
<stream>streams/conf/csr2</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/csr2/MbayeMS25" mdate="2025-09-02">
<author pid="208/8892">Babacar Mbaye</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="373/4032">Pierre Fobougong Saha</author>
<title>A Proposal for an Ontology to Enhance IT Architecture Resilience.</title>
<pages>510-517</pages>
<year>2025</year>
<booktitle>CSR</booktitle>
<ee>https://doi.org/10.1109/CSR64739.2025.11130124</ee>
<crossref>conf/csr2/2025</crossref>
<url>db/conf/csr2/csr2025.html#MbayeMS25</url>
<stream>streams/conf/csr2</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/MzoughiFMBG25" mdate="2026-02-23">
<author pid="427/6555">Ghofrane Mzoughi</author>
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="42/8844">Sahbi Bahroun</author>
<author pid="05/10597">Ridha Ghayoula</author>
<title>Stress Monitoring Using HRV and Deep Recurrent Neural Networks for Safety in Workplace: A Comparative Analysis.</title>
<pages>607-624</pages>
<year>2025</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA250558</ee>
<crossref>conf/somet/2025</crossref>
<url>db/conf/somet/somet2025.html#MzoughiFMBG25</url>
</inproceedings>
</r>
<r><article key="journals/tcad/AmarnathMMC24" mdate="2024-04-01">
<author orcid="0000-0001-9938-2157" pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="304/3493">Kwondo Ma</author>
<author orcid="0000-0003-1553-4470" pid="31/928">Abhijit Chatterjee</author>
<title>Error Resilience in Deep Neural Networks Using Neuron Gradient Statistics.</title>
<pages>1149-1162</pages>
<year>2024</year>
<month>April</month>
<volume>43</volume>
<journal>IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TCAD.2023.3335144</ee>
<url>db/journals/tcad/tcad43.html#AmarnathMMC24</url>
</article>
</r>
<r><inproceedings key="conf/codit/ManaiMF24" mdate="2024-11-12">
<author pid="352/3105">Elyes Manai</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="97/11071">Jaouhar Fattahi</author>
<title>Confusion Matrix Explainability to Improve Model Performance: Application to Network Intrusion Detection.</title>
<pages>1-5</pages>
<year>2024</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT62066.2024.10708595</ee>
<crossref>conf/codit/2024</crossref>
<url>db/conf/codit/codit2024.html#ManaiMF24</url>
<stream>streams/conf/codit</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/ManaiMF24a" mdate="2024-11-12">
<author pid="352/3105">Elyes Manai</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="97/11071">Jaouhar Fattahi</author>
<title>Intrusion Detection Explainability by Ensemble Learning with a Case Study.</title>
<pages>1542-1547</pages>
<year>2024</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT62066.2024.10708602</ee>
<crossref>conf/codit/2024</crossref>
<url>db/conf/codit/codit2024.html#ManaiMF24a</url>
<stream>streams/conf/codit</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/FattahiLMGMZ24" mdate="2025-03-03">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="389/8081">Baha Eddine Lakdher</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-3893-6977" pid="05/10597">Ridha Ghayoula</author>
<author pid="352/3105">Elyes Manai</author>
<author pid="162/4027">Marwa Ziadia</author>
<title>FingFor: a Deep Learning Tool for Biometric Forensics.</title>
<pages>1667-1672</pages>
<year>2024</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT62066.2024.10708215</ee>
<crossref>conf/codit/2024</crossref>
<url>db/conf/codit/codit2024.html#FattahiLMGMZ24</url>
<stream>streams/conf/codit</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/FattahiSMGBZ24" mdate="2025-03-03">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="386/9914">Feriel Sghaier</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-3893-6977" pid="05/10597">Ridha Ghayoula</author>
<author pid="42/8844">Sahbi Bahroun</author>
<author pid="162/4027">Marwa Ziadia</author>
<title>Sexism Discovery using CNN, Word Embeddings, NLP and Data Augmentation.</title>
<pages>1685-1690</pages>
<year>2024</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT62066.2024.10708284</ee>
<crossref>conf/codit/2024</crossref>
<url>db/conf/codit/codit2024.html#FattahiSMGBZ24</url>
<stream>streams/conf/codit</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/FattahiSMGPL24" mdate="2025-03-03">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="386/9914">Feriel Sghaier</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-3893-6977" pid="05/10597">Ridha Ghayoula</author>
<author pid="141/8033">Emil Pricop</author>
<author pid="389/8081">Baha Eddine Lakdher</author>
<title>Handwritten Signature Recognition using Parallel CNNs and Transfer Learning for Forensics.</title>
<pages>1697-1702</pages>
<year>2024</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT62066.2024.10708517</ee>
<crossref>conf/codit/2024</crossref>
<url>db/conf/codit/codit2024.html#FattahiSMGPL24</url>
<stream>streams/conf/codit</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/codit/FattahiLMGSB24" mdate="2025-03-03">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="389/8081">Baha Eddine Lakdher</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-3893-6977" pid="05/10597">Ridha Ghayoula</author>
<author pid="386/9914">Feriel Sghaier</author>
<author pid="179/0588">Laila Boumlik</author>
<title>The Good and Bad Seeds of CNN Parallelization in Forensic Facial Recognition.</title>
<pages>1719-1724</pages>
<year>2024</year>
<booktitle>CoDIT</booktitle>
<ee>https://doi.org/10.1109/CoDIT62066.2024.10708195</ee>
<crossref>conf/codit/2024</crossref>
<url>db/conf/codit/codit2024.html#FattahiLMGSB24</url>
<stream>streams/conf/codit</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/csr2/LadouceurHMJ24" mdate="2024-10-01">
<author pid="386/5881">Rachel Ladouceur</author>
<author pid="233/8925">Abubakr Hassan</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="47/10516">Fehmi Jaafar</author>
<title>Can Deep Learning Detect Fake News Better when Adding Context Features?</title>
<pages>56-61</pages>
<year>2024</year>
<booktitle>CSR</booktitle>
<ee>https://doi.org/10.1109/CSR61664.2024.10679393</ee>
<crossref>conf/csr2/2024</crossref>
<url>db/conf/csr2/csr2024.html#LadouceurHMJ24</url>
<stream>streams/conf/csr2</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/ets/KomarrajuMTDAC24" mdate="2024-07-04">
<author pid="283/6983">Suhasini Komarraju</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="364/7485">Akhil Tammana</author>
<author pid="379/5378">Gowsika Dharmaraj</author>
<author pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="31/928">Abhijit Chatterjee</author>
<title>AMS Test Stimulus Generation and Response Analysis Using Hyperdimensional Clustering: Minimizing Misclassification Rate.</title>
<pages>1-4</pages>
<year>2024</year>
<booktitle>ETS</booktitle>
<ee>https://doi.org/10.1109/ETS61313.2024.10567386</ee>
<crossref>conf/ets/2024</crossref>
<url>db/conf/ets/ets2024.html#KomarrajuMTDAC24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icecet/DiakhameDM24" mdate="2025-11-15">
<author pid="406/9905">Mouhamadou Lamine Diakhame</author>
<author orcid="0000-0001-6606-7337" pid="83/7725">Ch&#233;rif Diallo</author>
<author pid="32/720">Mohamed Mejri</author>
<title>MCM-Llama: A Fine-Tuned Large Language Model for Real-Time Threat Detection through Security Event Correlation.</title>
<pages>1-6</pages>
<year>2024</year>
<booktitle>ICECET</booktitle>
<ee>https://doi.org/10.1109/ICECET61485.2024.10698464</ee>
<crossref>conf/icecet/2024</crossref>
<url>db/conf/icecet/icecet2024.html#DiakhameDM24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icit2/DorafshanianAMN24" mdate="2024-08-04">
<author pid="346/6043">Mahboobeh Dorafshanian</author>
<author orcid="0000-0002-4157-7282" pid="310/1672">Muhammad Aitsam</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="80/2950">Alessandro G. Di Nuovo</author>
<title>Beyond Data Collection: Safeguarding User Privacy in Social Robotics.</title>
<pages>1-6</pages>
<year>2024</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT58233.2024.10540743</ee>
<crossref>conf/icit2/2024</crossref>
<url>db/conf/icit2/icit2024.html#DorafshanianAMN24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iiaiaai/ManaiMF24" mdate="2024-12-24">
<author orcid="0000-0003-1386-6201" pid="352/3105">Elyes Manai</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="97/11071">Jaouhar Fattahi</author>
<title>Minimizing Model Misclassification Using Regularized Loss Interpretability.</title>
<pages>231-236</pages>
<year>2024</year>
<booktitle>IIAI-AAI</booktitle>
<ee>https://doi.org/10.1109/IIAI-AAI63651.2024.00052</ee>
<crossref>conf/iiaiaai/2024</crossref>
<url>db/conf/iiaiaai/iiaiaai2024.html#ManaiMF24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itc/KomarrajuMCNG24" mdate="2024-12-10">
<author pid="283/6983">Suhasini Komarraju</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="31/928">Abhijit Chatterjee</author>
<author pid="00/5935">Suriyaprakash Natarajan</author>
<author pid="45/4381">Prashant Goteti</author>
<title>TEACH: Outlier Oriented Testing of Analog/Mixed-Signal Circuits Using One-class Hyperdimensional Clustering.</title>
<pages>426-435</pages>
<year>2024</year>
<booktitle>ITC</booktitle>
<ee>https://doi.org/10.1109/ITC51657.2024.00065</ee>
<crossref>conf/itc/2024</crossref>
<url>db/conf/itc/itc2024.html#KomarrajuMCNG24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/latw/MejriAC24" mdate="2024-06-05">
<author pid="32/720">Mohamed Mejri</author>
<author pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="31/928">Abhijit Chatterjee</author>
<title>DeepER-HD: An Error Resilient HyperDimensional Computing Framework with DNN Front-End for Feature Selection.</title>
<pages>1-6</pages>
<year>2024</year>
<booktitle>LATS</booktitle>
<ee>https://doi.org/10.1109/LATS62223.2024.10534617</ee>
<crossref>conf/latw/2024</crossref>
<url>db/conf/latw/lats2024.html#MejriAC24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mwscas/MejriAC24" mdate="2024-10-10">
<author pid="32/720">Mohamed Mejri</author>
<author pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="31/928">Abhijit Chatterjee</author>
<title>ADARE-HD: Adaptive-Resolution Framework for Efficient Object Detection and Tracking via HD-Computing.</title>
<pages>811-817</pages>
<year>2024</year>
<booktitle>MWSCAS</booktitle>
<ee>https://doi.org/10.1109/MWSCAS60917.2024.10658671</ee>
<crossref>conf/mwscas/2024</crossref>
<url>db/conf/mwscas/mwscas2024.html#MejriAC24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secrypt/SahaMA24" mdate="2025-05-31">
<author pid="373/4032">Pierre Fobougong Saha</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0003-2869-0333" pid="24/408">Kamel Adi</author>
<title>Toward the Foundation of Digital Identity Theory.</title>
<pages>812-819</pages>
<year>2024</year>
<booktitle>SECRYPT</booktitle>
<ee>https://doi.org/10.5220/0012838100003767</ee>
<crossref>conf/secrypt/2024</crossref>
<url>db/conf/secrypt/secrypt2024.html#SahaMA24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/SadeghianM24" mdate="2024-10-09">
<author pid="132/8958">Ali Sadeghian</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Detecting and Mitigating the Weakest Cybersecurity Link in an Information System.</title>
<pages>45-59</pages>
<year>2024</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA240355</ee>
<crossref>conf/somet/2024</crossref>
<url>db/conf/somet/somet2024.html#SadeghianM24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/FattahiSMBGM24" mdate="2025-03-03">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="386/9914">Feriel Sghaier</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="42/8844">Sahbi Bahroun</author>
<author orcid="0000-0002-3893-6977" pid="05/10597">Ridha Ghayoula</author>
<author pid="352/3105">Elyes Manai</author>
<title>Cyberbullying Detection Using Bag-of-Words, TF-IDF, Parallel CNNs and BiLSTM Neural Networks.</title>
<pages>72-84</pages>
<year>2024</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA240357</ee>
<crossref>conf/somet/2024</crossref>
<url>db/conf/somet/somet2024.html#FattahiSMBGM24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/FattahiFMG24" mdate="2025-03-03">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="387/0545">Obeb Fkiri</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-3893-6977" pid="05/10597">Ridha Ghayoula</author>
<title>Hands and Palms Recognition by Transfer Learning for Forensics: A Comparative Study.</title>
<pages>213-225</pages>
<year>2024</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA240370</ee>
<crossref>conf/somet/2024</crossref>
<url>db/conf/somet/somet2024.html#FattahiFMG24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/FattahiSMMG24" mdate="2025-03-03">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="386/9914">Feriel Sghaier</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="352/3105">Elyes Manai</author>
<author orcid="0000-0002-3893-6977" pid="05/10597">Ridha Ghayoula</author>
<title>Recognition of Handwritten Tamazight Characters Using ResNet, MobileNet and VGG Transfer Learning.</title>
<pages>429-440</pages>
<year>2024</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA240390</ee>
<crossref>conf/somet/2024</crossref>
<url>db/conf/somet/somet2024.html#FattahiSMMG24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/ManaiMF24" mdate="2024-10-22">
<author orcid="0000-0003-1386-6201" pid="352/3105">Elyes Manai</author>
<author orcid="0000-0003-4820-3176" pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-3905-9099" pid="97/11071">Jaouhar Fattahi</author>
<title>Fingerprint Fraud Explainability Using Grad-Cam for Forensic Procedures.</title>
<pages>457-470</pages>
<year>2024</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA240393</ee>
<crossref>conf/somet/2024</crossref>
<url>db/conf/somet/somet2024.html#ManaiMF24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vts/MejriAC24" mdate="2024-06-03">
<author pid="32/720">Mohamed Mejri</author>
<author pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="31/928">Abhijit Chatterjee</author>
<title>Error Resilient Hyperdimensional Computing Using Hypervector Encoding and Cross-Clustering.</title>
<pages>1-7</pages>
<year>2024</year>
<booktitle>VTS</booktitle>
<ee>https://doi.org/10.1109/VTS60656.2024.10538955</ee>
<crossref>conf/vts/2024</crossref>
<url>db/conf/vts/vts2024.html#MejriAC24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2402-01999" mdate="2024-02-09">
<author pid="32/720">Mohamed Mejri</author>
<author pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="31/928">Abhijit Chatterjee</author>
<title>A Novel Hyperdimensional Computing Framework for Online Time Series Forecasting on the Edge.</title>
<year>2024</year>
<volume>abs/2402.01999</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2402.01999</ee>
<url>db/journals/corr/corr2402.html#abs-2402-01999</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2405-14436" mdate="2024-06-19">
<author pid="32/720">Mohamed Mejri</author>
<author pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="31/928">Abhijit Chatterjee</author>
<title>LARS-VSA: A Vector Symbolic Architecture For Learning with Abstract Rules.</title>
<year>2024</year>
<volume>abs/2405.14436</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2405.14436</ee>
<url>db/journals/corr/corr2405.html#abs-2405-14436</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2411-08290" mdate="2025-01-01">
<author pid="32/720">Mohamed Mejri</author>
<author pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="31/928">Abhijit Chatterjee</author>
<title>RESOLVE: Relational Reasoning with Symbolic and Object-Level Features Using Vector Symbolic Processing.</title>
<year>2024</year>
<volume>abs/2411.08290</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2411.08290</ee>
<url>db/journals/corr/corr2411.html#abs-2411-08290</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/fi/AbdelgalilM23" mdate="2023-05-17">
<author orcid="0000-0002-4574-0980" pid="345/9038">Leina Abdelgalil</author>
<author orcid="0000-0003-4820-3176" pid="32/720">Mohamed Mejri</author>
<title>HealthBlock: A Framework for a Collaborative Sharing of Electronic Health Records Based on Blockchain.</title>
<pages>87</pages>
<year>2023</year>
<month>March</month>
<volume>15</volume>
<journal>Future Internet</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.3390/fi15030087</ee>
<url>db/journals/fi/fi15.html#AbdelgalilM23</url>
</article>
</r>
<r><inproceedings key="conf/csr2/IbrahimMJ23" mdate="2023-09-06">
<author pid="355/8531">Abubakr Ibrahim</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="47/10516">Fehmi Jaafar</author>
<title>An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection.</title>
<pages>160-167</pages>
<year>2023</year>
<booktitle>CSR</booktitle>
<ee>https://doi.org/10.1109/CSR57506.2023.10224956</ee>
<crossref>conf/csr2/2023</crossref>
<url>db/conf/csr2/csr2023.html#IbrahimMJ23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecai2/ManaiMF23" mdate="2024-12-24">
<author orcid="0000-0003-1386-6201" pid="352/3105">Elyes Manai</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="97/11071">Jaouhar Fattahi</author>
<title>Impact of Feature Encoding on Malware Classification Explainability.</title>
<pages>1-6</pages>
<year>2023</year>
<booktitle>ECAI</booktitle>
<ee>https://doi.org/10.1109/ECAI58194.2023.10193964</ee>
<crossref>conf/ecai2/2023</crossref>
<url>db/conf/ecai2/ecai2023.html#ManaiMF23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icissp/DorafshanianM23" mdate="2023-05-11">
<author pid="346/6043">Mahboobeh Dorafshanian</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Differential Privacy: Toward a Better Tuning of the Privacy Budget (&#949;) Based on Risk.</title>
<pages>783-792</pages>
<year>2023</year>
<booktitle>ICISSP</booktitle>
<ee>https://doi.org/10.5220/0011896600003405</ee>
<crossref>conf/icissp/2023</crossref>
<url>db/conf/icissp/icissp2023.html#DorafshanianM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/safer-tea/PierreM23" mdate="2024-09-05">
<author pid="373/4032">Pierre Fobougong Saha</author>
<author pid="32/720">Mohamed Mejri</author>
<title>DIDOR: A Decentralized Identifier Based Onion Routing Protocol.</title>
<pages>71-85</pages>
<year>2023</year>
<booktitle>SAFER-TEA</booktitle>
<ee>https://doi.org/10.1007/978-3-031-56396-6_5</ee>
<crossref>conf/safer-tea/2023</crossref>
<url>db/conf/safer-tea/safer-tea2023.html#PierreM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/HounwanouM23" mdate="2023-10-28">
<author orcid="0000-0001-6168-8206" pid="302/2457">Honor&#233; Hounwanou</author>
<author orcid="0000-0003-4820-3176" pid="32/720">Mohamed Mejri</author>
<title>Enforcing Security Policies Using an Algebraic Approach.</title>
<pages>195-210</pages>
<year>2023</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA230235</ee>
<crossref>conf/somet/2023</crossref>
<url>db/conf/somet/somet2023.html#HounwanouM23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2307-05614" mdate="2023-07-24">
<author pid="352/3105">Elyes Manai</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="97/11071">Jaouhar Fattahi</author>
<title>Impact of Feature Encoding on Malware Classification Explainability.</title>
<year>2023</year>
<volume>abs/2307.05614</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2307.05614</ee>
<url>db/journals/corr/corr2307.html#abs-2307-05614</url>
</article>
</r>
<r><article key="journals/virology/ElsiddigM22" mdate="2022-11-13">
<author orcid="0000-0002-8047-6329" pid="331/5630">Mohammed Ali Elsiddig</author>
<author pid="32/720">Mohammed Mejri</author>
<title>Detection of suspicious internet traffic based on differential analysis and logical rules.</title>
<pages>347-365</pages>
<year>2022</year>
<volume>18</volume>
<journal>J. Comput. Virol. Hacking Tech.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11416-022-00421-6</ee>
<url>db/journals/virology/virology18.html#ElsiddigM22</url>
</article>
</r>
<r><inproceedings key="conf/iolts/AmarnathMMC22" mdate="2022-10-06">
<author pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="304/3493">Kwondo Ma</author>
<author pid="31/928">Abhijit Chatterjee</author>
<title>Soft Error Resilient Deep Learning Systems Using Neuron Gradient Statistics.</title>
<pages>1-7</pages>
<year>2022</year>
<booktitle>IOLTS</booktitle>
<ee>https://doi.org/10.1109/IOLTS56730.2022.9897815</ee>
<crossref>conf/iolts/2022</crossref>
<url>db/conf/iolts/iolts2022.html#AmarnathMMC22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mwscas/MaMAC22" mdate="2022-08-29">
<author pid="304/3493">Kwondo Ma</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="271/9975">Chandramouli N. Amarnath</author>
<author pid="31/928">Abhijit Chatterjee</author>
<title>Low Power Neural Network Accelerators Using Collaborative Weight Tuning and Shared Shift-Add optimization.</title>
<pages>1-4</pages>
<year>2022</year>
<booktitle>MWSCAS</booktitle>
<ee>https://doi.org/10.1109/MWSCAS54063.2022.9859458</ee>
<crossref>conf/mwscas/2022</crossref>
<url>db/conf/mwscas/mwscas2022.html#MaMAC22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/FattahiMZG22" mdate="2025-03-03">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="162/4027">Marwa Ziadia</author>
<author orcid="0000-0002-3893-6977" pid="05/10597">Ridha Ghayoula</author>
<title>SpamDL: A High Performance Deep Learning Spam Detector Using Stanford Global Vectors and Bidirectional Long Short-Term Memory Neural Networks.</title>
<pages>143-162</pages>
<year>2022</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA220246</ee>
<crossref>conf/somet/2022</crossref>
<url>db/conf/somet/somet2022.html#FattahiMZG22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fps/ZiadiaMF21" mdate="2022-06-28">
<author orcid="0000-0002-8563-4736" pid="162/4027">Marwa Ziadia</author>
<author orcid="0000-0003-4820-3176" pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-3905-9099" pid="97/11071">Jaouhar Fattahi</author>
<title>$\mathbb {K}$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications.</title>
<pages>321-337</pages>
<year>2021</year>
<booktitle>FPS</booktitle>
<ee>https://doi.org/10.1007/978-3-031-08147-7_22</ee>
<crossref>conf/fps/2021</crossref>
<url>db/conf/fps/fps2021.html#ZiadiaMF21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccsp/FattahiM21" mdate="2021-03-02">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<title>SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP Techniques.</title>
<pages>107-112</pages>
<year>2021</year>
<booktitle>CSP</booktitle>
<ee>https://doi.org/10.1109/CSP51677.2021.9357595</ee>
<crossref>conf/iccsp/2021</crossref>
<url>db/conf/iccsp/iccsp2021.html#FattahiM21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccsp/FattahiM21a" mdate="2021-03-02">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes.</title>
<pages>193-199</pages>
<year>2021</year>
<booktitle>CSP</booktitle>
<ee>https://doi.org/10.1109/CSP51677.2021.9357588</ee>
<crossref>conf/iccsp/2021</crossref>
<url>db/conf/iccsp/iccsp2021.html#FattahiM21a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/ZiadiaMF21" mdate="2021-09-24">
<author pid="162/4027">Marwa Ziadia</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="97/11071">Jaouhar Fattahi</author>
<title>Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting.</title>
<pages>85-98</pages>
<year>2021</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA210011</ee>
<crossref>conf/somet/2021</crossref>
<url>db/conf/somet/somet2021.html#ZiadiaMF21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/FattahiMZ21" mdate="2021-09-24">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="162/4027">Marwa Ziadia</author>
<title>Extreme Gradient Boosting for Cyberpropaganda Detection.</title>
<pages>99-112</pages>
<year>2021</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA210012</ee>
<crossref>conf/somet/2021</crossref>
<url>db/conf/somet/somet2021.html#FattahiMZ21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/FattahiZM21" mdate="2021-09-24">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="162/4027">Marwa Ziadia</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings.</title>
<pages>155-165</pages>
<year>2021</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA210016</ee>
<crossref>conf/somet/2021</crossref>
<url>db/conf/somet/somet2021.html#FattahiZM21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/HounwanouBM21" mdate="2021-09-24">
<author pid="302/2457">Honor&#233; Hounwanou</author>
<author pid="179/0588">Laila Boumlik</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Toward the Formalization of Business Process Model and Notation.</title>
<pages>248-264</pages>
<year>2021</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/FAIA210024</ee>
<crossref>conf/somet/2021</crossref>
<url>db/conf/somet/somet2021.html#HounwanouBM21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2108-03287" mdate="2021-08-11">
<author pid="32/720">Mohamed Mejri</author>
<author pid="277/9444">Aymen Mejri</author>
<author pid="299/1496">Oumayma Mejri</author>
<author pid="299/1804">Chiraz Fekih</author>
<title>Semantic Segmentation and Object Detection Towards Instance Segmentation: Breast Tumor Identification.</title>
<year>2021</year>
<volume>abs/2108.03287</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2108.03287</ee>
<url>db/journals/corr/corr2108.html#abs-2108-03287</url>
</article>
</r>
<r><article key="journals/compsec/MejriYMC20" mdate="2023-08-28">
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0003-1134-1233" pid="53/5982">Hamdi Yahyaoui</author>
<author orcid="0000-0001-9434-5322" pid="34/4038">Azzam Mourad</author>
<author pid="273/9104">Mohamad Chehab</author>
<title>A rewriting system for the assessment of XACML policies relationship.</title>
<pages>101957</pages>
<year>2020</year>
<volume>97</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2020.101957</ee>
<ee>https://www.wikidata.org/entity/Q115053014</ee>
<url>db/journals/compsec/compsec97.html#MejriYMC20</url>
</article>
</r>
<r><article key="journals/ijisec/SheikhalishahiS20" mdate="2023-08-28">
<author pid="168/2454">Mina Sheikhalishahi</author>
<author orcid="0000-0001-8149-9322" pid="119/6683">Andrea Saracino</author>
<author pid="m/FMartinelli">Fabio Martinelli</author>
<author pid="192/2137">Antonio La Marra</author>
<author pid="32/720">Mohammed Mejri</author>
<author orcid="0000-0002-1030-0918" pid="68/4054">Nadia Tawbi</author>
<title>Digital Waste Disposal: an automated framework for analysis of spam emails.</title>
<pages>499-522</pages>
<year>2020</year>
<volume>19</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s10207-019-00470-x</ee>
<ee>https://www.wikidata.org/entity/Q115147804</ee>
<url>db/journals/ijisec/ijisec19.html#SheikhalishahiS20</url>
</article>
</r>
<r><article key="journals/information/ZiadiaFMP20" mdate="2020-07-09">
<author pid="162/4027">Marwa Ziadia</author>
<author orcid="0000-0002-3905-9099" pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-4021-6549" pid="141/8033">Emil Pricop</author>
<title>Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications.</title>
<pages>130</pages>
<year>2020</year>
<volume>11</volume>
<journal>Inf.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.3390/info11030130</ee>
<url>db/journals/information/information11.html#ZiadiaFMP20</url>
</article>
</r>
<r><inproceedings key="conf/isncc/YermalovichM20" mdate="2021-01-15">
<author pid="282/9352">Pavel Yermalovich</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Information security risk assessment based on decomposition probability via Bayesian Network.</title>
<pages>1-8</pages>
<year>2020</year>
<booktitle>ISNCC</booktitle>
<ee>https://doi.org/10.1109/ISNCC49221.2020.9297330</ee>
<crossref>conf/isncc/2020</crossref>
<url>db/conf/isncc/isncc2020.html#YermalovichM20</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2002-04571" mdate="2025-12-10">
<author orcid="0000-0002-0455-7880" pid="32/720">Mohamed Mejri</author>
<author pid="239/4349-1">Antoine Richard 0001</author>
<author pid="04/6378">C&#233;dric Pradalier</author>
<title>A Survey On 3D Inner Structure Prediction from its Outer Shape.</title>
<year>2020</year>
<volume>abs/2002.04571</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2002.04571</ee>
<url>db/journals/corr/corr2002.html#abs-2002-04571</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2010-03173" mdate="2025-12-10">
<author pid="32/720">Mohamed Mejri</author>
<author pid="239/4349-1">Antoine Richard 0001</author>
<author pid="04/6378">C&#233;dric Pradalier</author>
<title>A Study on Trees's Knots Prediction from their Bark Outer-Shape.</title>
<year>2020</year>
<volume>abs/2010.03173</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2010.03173</ee>
<url>db/journals/corr/corr2010.html#abs-2010-03173</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2010-07444" mdate="2020-10-20">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<title>SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP Techniques.</title>
<year>2020</year>
<volume>abs/2010.07444</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2010.07444</ee>
<url>db/journals/corr/corr2010.html#abs-2010-07444</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2011-01188" mdate="2021-10-14">
<author orcid="0000-0002-0455-7880" pid="32/720">Mohamed Mejri</author>
<author pid="277/9444">Aymen Mejri</author>
<title>RandomForestMLP: An Ensemble-Based Multi-Layer Perceptron Against Curse of Dimensionality.</title>
<year>2020</year>
<volume>abs/2011.01188</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2011.01188</ee>
<url>db/journals/corr/corr2011.html#abs-2011-01188</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2012-15041" mdate="2021-01-08">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes.</title>
<year>2020</year>
<volume>abs/2012.15041</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2012.15041</ee>
<url>db/journals/corr/corr2012.html#abs-2012-15041</url>
</article>
</r>
<r><inproceedings key="conf/ccece/FattahiMP19" mdate="2021-04-09">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-4021-6549" pid="141/8033">Emil Pricop</author>
<title>On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions.</title>
<pages>1-5</pages>
<year>2019</year>
<booktitle>CCECE</booktitle>
<ee>https://doi.org/10.1109/CCECE.2019.8861950</ee>
<crossref>conf/ccece/2019</crossref>
<url>db/conf/ccece/ccece2019.html#FattahiMP19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iscc/BoumlikM19" mdate="2020-02-03">
<author pid="179/0588">Laila Boumlik</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Security Enforcement on Web Services Compositions.</title>
<pages>1010-1015</pages>
<year>2019</year>
<booktitle>ISCC</booktitle>
<ee>https://doi.org/10.1109/ISCC47284.2019.8969593</ee>
<crossref>conf/iscc/2019</crossref>
<url>db/conf/iscc/iscc2019.html#BoumlikM19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1903-00499" mdate="2019-03-30">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="141/8033">Emil Pricop</author>
<title>On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions.</title>
<year>2019</year>
<volume>abs/1903.00499</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1903.00499</ee>
<url>db/journals/corr/corr1903.html#abs-1903-00499</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1903-05791" mdate="2019-03-31">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="141/8033">Emil Pricop</author>
<title>Authentication by Witness Functions.</title>
<year>2019</year>
<volume>abs/1903.05791</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1903.05791</ee>
<url>db/journals/corr/corr1903.html#abs-1903-05791</url>
</article>
</r>
<r><inproceedings key="conf/dese/RaissiMG18" mdate="2019-03-05">
<author pid="236/7277">Khadija Raissi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="216/4230">Bechir Ben Gouissem</author>
<title>Performance Evaluation of Data Scheduling in IEEE802.16e in VANET Traffic Context.</title>
<pages>58-63</pages>
<year>2018</year>
<booktitle>DeSE</booktitle>
<ee>https://doi.org/10.1109/DeSE.2018.00015</ee>
<crossref>conf/dese/2018</crossref>
<url>db/conf/dese/dese2018.html#RaissiMG18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/FattahiCM18" mdate="2018-08-30">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="72/11086">Mario Couture</author>
<author pid="32/720">Mohamed Mejri</author>
<title>SinCRY: A Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules.</title>
<pages>187-200</pages>
<year>2018</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/978-1-61499-900-3-187</ee>
<crossref>conf/somet/2018</crossref>
<url>db/conf/somet/somet2018.html#FattahiCM18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1801-01612" mdate="2018-08-13">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Secrecy by Witness-Functions under Equational Theories.</title>
<year>2018</year>
<volume>abs/1801.01612</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1801.01612</ee>
<url>db/journals/corr/corr1801.html#abs-1801-01612</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1801-03597" mdate="2018-08-13">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="15/5776">Hanane Houmani</author>
<title>Secrecy by Witness-Functions on Increasing Protocols.</title>
<year>2018</year>
<volume>abs/1801.03597</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1801.03597</ee>
<url>db/journals/corr/corr1801.html#abs-1801-03597</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1801-08410" mdate="2018-08-13">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="15/5776">Hanane Houmani</author>
<title>Relaxed Conditions for Secrecy in a Role-Based Specification.</title>
<year>2018</year>
<volume>abs/1801.08410</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1801.08410</ee>
<url>db/journals/corr/corr1801.html#abs-1801-08410</url>
</article>
</r>
<r><article key="journals/cl/MejriY17" mdate="2023-08-28">
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0003-1134-1233" pid="53/5982">Hamdi Yahyaoui</author>
<title>Formal specification and integration of distributed security policies.</title>
<pages>1-35</pages>
<year>2017</year>
<volume>49</volume>
<journal>Comput. Lang. Syst. Struct.</journal>
<ee>https://doi.org/10.1016/j.cl.2016.12.004</ee>
<ee>https://www.wikidata.org/entity/Q115097987</ee>
<url>db/journals/cl/cl49.html#MejriY17</url>
</article>
</r>
<r><inproceedings key="conf/lpkm/MejriA17" mdate="2023-03-10">
<author pid="32/720">Mohamed Mejri</author>
<author pid="54/4115">Jalel Akaichi</author>
<title>A Survey of Textual Event Extraction from Social Networks.</title>
<year>2017</year>
<booktitle>LPKM</booktitle>
<ee type="oa">https://ceur-ws.org/Vol-1988/LPKM2017_paper_15.pdf</ee>
<crossref>conf/lpkm/2017</crossref>
<url>db/conf/lpkm/lpkm2017.html#MejriA17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/smc/FattahiMZGSP17" mdate="2018-11-02">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="162/4027">Marwa Ziadia</author>
<author pid="194/9078">Elies Ghayoula</author>
<author pid="203/8438">Ouejdene Samoud</author>
<author orcid="0000-0002-4021-6549" pid="141/8033">Emil Pricop</author>
<title>Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context.</title>
<pages>1127-1132</pages>
<year>2017</year>
<booktitle>SMC</booktitle>
<ee>https://doi.org/10.1109/SMC.2017.8122763</ee>
<crossref>conf/smc/2017</crossref>
<url>db/conf/smc/smc2017.html#FattahiMZGSP17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/smc/FattahiMZOP17" mdate="2018-11-02">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="162/4027">Marwa Ziadia</author>
<author pid="203/8380">Takwa Omrani</author>
<author orcid="0000-0002-4021-6549" pid="141/8033">Emil Pricop</author>
<title>Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?</title>
<pages>2649-2654</pages>
<year>2017</year>
<booktitle>SMC</booktitle>
<ee>https://doi.org/10.1109/SMC.2017.8123025</ee>
<crossref>conf/smc/2017</crossref>
<url>db/conf/smc/smc2017.html#FattahiMZOP17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/FattahiMZPS17" mdate="2018-11-02">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="162/4027">Marwa Ziadia</author>
<author orcid="0000-0002-4021-6549" pid="141/8033">Emil Pricop</author>
<author pid="203/8438">Ouejdene Samoud</author>
<title>Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models.</title>
<pages>441-453</pages>
<year>2017</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/978-1-61499-800-6-441</ee>
<crossref>conf/somet/2017</crossref>
<url>db/conf/somet/somet2017.html#FattahiMZPS17</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/FattahiMZSGP17" mdate="2018-08-13">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="162/4027">Marwa Ziadia</author>
<author pid="203/8438">Ouejdene Samoud</author>
<author pid="194/9078">Elies Ghayoula</author>
<author pid="141/8033">Emil Pricop</author>
<title>Cryptographic Protocol for Multipart Missions Involving Two Independent and Distributed Decision Levels in a Military Context.</title>
<year>2017</year>
<volume>abs/1707.07801</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1707.07801</ee>
<url>db/journals/corr/corr1707.html#FattahiMZSGP17</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/FattahiMZOP17" mdate="2018-08-13">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="162/4027">Marwa Ziadia</author>
<author pid="203/8380">Takwa Omrani</author>
<author pid="141/8033">Emil Pricop</author>
<title>Witness-Functions versus Interpretation-Functions for Secrecy in Cryptographic Protocols: What to Choose?</title>
<year>2017</year>
<volume>abs/1707.09078</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1707.09078</ee>
<url>db/journals/corr/corr1707.html#FattahiMZOP17</url>
</article>
</r>
<r><inproceedings key="conf/fps/SheikhalishahiM16" mdate="2024-05-07">
<author pid="168/2454">Mina Sheikhalishahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-1030-0918" pid="68/4054">Nadia Tawbi</author>
<author pid="m/FMartinelli">Fabio Martinelli</author>
<title>Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm.</title>
<pages>161-178</pages>
<year>2016</year>
<booktitle>FPS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-51966-1_11</ee>
<crossref>conf/fps/2016</crossref>
<url>db/conf/fps/fps2016.html#SheikhalishahiM16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icete/BoileauGPFM16" mdate="2017-05-21">
<author pid="37/5481">Catherine Boileau</author>
<author pid="41/2632">Fran&#231;ois Gagnon</author>
<author pid="174/4800">J&#233;r&#233;mie Poisson</author>
<author pid="151/7209">Simon Frenette</author>
<author pid="32/720">Mohamed Mejri</author>
<title>A Comparative Study of Android Malware Behavior in Different Contexts.</title>
<pages>47-54</pages>
<year>2016</year>
<booktitle>DCNET</booktitle>
<ee>https://doi.org/10.5220/0005997300470054</ee>
<crossref>conf/icete/2016d</crossref>
<url>db/conf/icete/dcnet2016.html#BoileauGPFM16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icete/BoileauGPFM16a" mdate="2019-01-21">
<author pid="37/5481">Catherine Boileau</author>
<author pid="41/2632">Fran&#231;ois Gagnon</author>
<author pid="174/4800">J&#233;r&#233;mie Poisson</author>
<author pid="151/7209">Simon Frenette</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android Malware.</title>
<pages>48-71</pages>
<year>2016</year>
<booktitle>ICETE (Selected Papers)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-67876-4_3</ee>
<crossref>conf/icete/2016s</crossref>
<url>db/conf/icete/icete2016.html#BoileauGPFM16a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mldm/SheikhalishahiM16" mdate="2024-05-07">
<author pid="168/2454">Mina Sheikhalishahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-1030-0918" pid="68/4054">Nadia Tawbi</author>
<title>On the Abstraction of a Categorical Clustering Algorithm.</title>
<pages>659-675</pages>
<year>2016</year>
<booktitle>MLDM</booktitle>
<ee>https://doi.org/10.1007/978-3-319-41920-6_51</ee>
<crossref>conf/mldm/2016</crossref>
<url>db/conf/mldm/mldm2016.html#SheikhalishahiM16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/smc/FattahiMGP16" mdate="2025-03-03">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-3893-6977" pid="05/10597">Ridha Ghayoula</author>
<author orcid="0000-0002-4021-6549" pid="141/8033">Emil Pricop</author>
<title>Formal reasoning on authentication in security protocols.</title>
<pages>282-289</pages>
<year>2016</year>
<booktitle>SMC</booktitle>
<ee>https://doi.org/10.1109/SMC.2016.7844255</ee>
<crossref>conf/smc/2016</crossref>
<url>db/conf/smc/smc2016.html#FattahiMGP16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/FattahiMP16" mdate="2017-06-15">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-4021-6549" pid="141/8033">Emil Pricop</author>
<title>Authentication by Witness Functions.</title>
<pages>1990-1997</pages>
<year>2016</year>
<booktitle>Trustcom/BigDataSE/ISPA</booktitle>
<ee>https://doi.org/10.1109/TrustCom.2016.0304</ee>
<crossref>conf/trustcom/2016</crossref>
<url>db/conf/trustcom/trustcom2016.html#FattahiMP16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/MejriY16" mdate="2018-08-13">
<author pid="32/720">Mohamed Mejri</author>
<author pid="53/5982">Hamdi Yahyaoui</author>
<title>A Rewriting System for the Assessment of XACML Policies Similarity.</title>
<year>2016</year>
<volume>abs/1605.05887</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1605.05887</ee>
<url>db/journals/corr/corr1605.html#MejriY16</url>
</article>
</r>
<r><inproceedings key="conf/c2si/ZiadiaM15" mdate="2017-05-24">
<author pid="162/4027">Marwa Ziadia</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Formal Enforcement of Security Policies on Parallel Systems with Risk Integration.</title>
<pages>133-148</pages>
<year>2015</year>
<booktitle>C2SI</booktitle>
<ee>https://doi.org/10.1007/978-3-319-18681-8_11</ee>
<crossref>conf/c2si/2015</crossref>
<url>db/conf/c2si/c2si2015.html#ZiadiaM15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecai2/FattahiM15" mdate="2022-04-08">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Secrecy by witness-functions under equational theories.</title>
<year>2015</year>
<booktitle>ECAI</booktitle>
<ee>https://doi.org/10.1109/ECAI.2015.7301205</ee>
<crossref>conf/ecai2/2015</crossref>
<url>db/conf/ecai2/ecai2015.html#FattahiM15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fps/SheikhalishahiS15" mdate="2024-05-07">
<author pid="168/2454">Mina Sheikhalishahi</author>
<author orcid="0000-0001-8149-9322" pid="119/6683">Andrea Saracino</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-1030-0918" pid="68/4054">Nadia Tawbi</author>
<author pid="m/FMartinelli">Fabio Martinelli</author>
<title>Fast and Effective Clustering of Spam Emails Based on Structural Similarity.</title>
<pages>195-211</pages>
<year>2015</year>
<booktitle>FPS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-30303-1_12</ee>
<crossref>conf/fps/2015</crossref>
<url>db/conf/fps/fps2015.html#SheikhalishahiS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fps/SuiM15" mdate="2017-05-24">
<author pid="134/8471">Guangye Sui</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Security Enforcement by Rewriting: An Algebraic Approach.</title>
<pages>311-321</pages>
<year>2015</year>
<booktitle>FPS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-30303-1_22</ee>
<crossref>conf/fps/2015</crossref>
<url>db/conf/fps/fps2015.html#SuiM15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icissp/AlishahiMT15" mdate="2022-10-02">
<author pid="168/2454">Mina Sheikh Alishahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-1030-0918" pid="68/4054">Nadia Tawbi</author>
<title>Clustering Spam Emails into Campaigns.</title>
<pages>90-97</pages>
<year>2015</year>
<booktitle>ICISSP</booktitle>
<ee>https://doi.org/10.5220/0005244500900097</ee>
<ee>https://ieeexplore.ieee.org/document/7509934/</ee>
<crossref>conf/icissp/2015</crossref>
<url>db/conf/icissp/icissp2015.html#AlishahiMT15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icsoc/BoumlikM15" mdate="2017-05-19">
<author pid="179/0588">Laila Boumlik</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Toward the Formalization of BPEL.</title>
<pages>157-167</pages>
<year>2015</year>
<booktitle>ICSOC Workshops</booktitle>
<ee>https://doi.org/10.1007/978-3-662-50539-7_13</ee>
<crossref>conf/icsoc/2015w</crossref>
<url>db/conf/icsoc/icsoc2015w.html#BoumlikM15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/smc/FattahiMP15" mdate="2017-06-15">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-4021-6549" pid="141/8033">Emil Pricop</author>
<title>Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions.</title>
<pages>1189-1196</pages>
<year>2015</year>
<booktitle>SMC</booktitle>
<ee>https://doi.org/10.1109/SMC.2015.213</ee>
<crossref>conf/smc/2015</crossref>
<url>db/conf/smc/smc2015.html#FattahiMP15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/stm/SheikhalishahiS15" mdate="2024-05-07">
<author pid="168/2454">Mina Sheikhalishahi</author>
<author orcid="0000-0001-8149-9322" pid="119/6683">Andrea Saracino</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-1030-0918" pid="68/4054">Nadia Tawbi</author>
<author pid="m/FMartinelli">Fabio Martinelli</author>
<title>Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.</title>
<pages>3-19</pages>
<year>2015</year>
<booktitle>STM</booktitle>
<ee>https://doi.org/10.1007/978-3-319-24858-5_1</ee>
<crossref>conf/stm/2015</crossref>
<url>db/conf/stm/stm2015.html#SheikhalishahiS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/apn/FattahiMH14" mdate="2023-03-10">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="15/5776">Hanane Houmani</author>
<title>Secrecy by Witness Functions.</title>
<pages>34-52</pages>
<year>2014</year>
<booktitle>FMS @ Petri Nets</booktitle>
<ee type="oa">https://ceur-ws.org/Vol-1158/paper3.pdf</ee>
<crossref>conf/apn/2014fms</crossref>
<url>db/conf/apn/fms2014.html#FattahiMH14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecai2/FattahiMH14" mdate="2022-05-02">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="15/5776">Hanane Houmani</author>
<title>Secrecy by witness-functions on increasing protocols.</title>
<pages>1-6</pages>
<year>2014</year>
<booktitle>ECAI</booktitle>
<ee>https://doi.org/10.1109/ECAI.2014.7090214</ee>
<crossref>conf/ecai2/2014</crossref>
<url>db/conf/ecai2/ecai2014.html#FattahiMH14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/ArrachidMS14" mdate="2017-05-19">
<author pid="136/4454">Khadija Arrachid</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="136/4470">Etienne Theodore Sadio</author>
<title>AVTAC : A Framework for Automatic Auditing of Access Control in Windows and Linux Systems.</title>
<pages>672-691</pages>
<year>2014</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/978-1-61499-434-3-672</ee>
<crossref>conf/somet/2014</crossref>
<url>db/conf/somet/somet2014.html#ArrachidMS14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/FattahiMH14" mdate="2018-08-13">
<author pid="97/11071">Jaouhar Fattahi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="15/5776">Hanane Houmani</author>
<title>A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols.</title>
<year>2014</year>
<volume>abs/1408.2774</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1408.2774</ee>
<url>db/journals/corr/corr1408.html#FattahiMH14</url>
</article>
</r>
<r><article key="journals/ijguc/SuiM13" mdate="2020-08-25">
<author pid="134/8471">Guangye Sui</author>
<author pid="32/720">Mohamed Mejri</author>
<title>FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test.</title>
<pages>204-211</pages>
<year>2013</year>
<volume>4</volume>
<journal>Int. J. Grid Util. Comput.</journal>
<number>2/3</number>
<ee>https://doi.org/10.1504/IJGUC.2013.056257</ee>
<url>db/journals/ijguc/ijguc4.html#SuiM13</url>
</article>
</r>
<r><inproceedings key="conf/somet/MejriSAL13" mdate="2017-05-19">
<author pid="32/720">Mohamed Mejri</author>
<author pid="136/4470">Etienne Theodore Sadio</author>
<author pid="136/4454">Khadija Arrachid</author>
<author pid="136/4464">Memel Emmanuel Lathe</author>
<title>Access control validation by ontologies.</title>
<pages>63-68</pages>
<year>2013</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.1109/SoMeT.2013.6645642</ee>
<crossref>conf/somet/2013</crossref>
<url>db/conf/somet/somet2013.html#MejriSAL13</url>
</inproceedings>
</r>
<r><article key="journals/jcnc/HoumaniM12" mdate="2020-09-02">
<author pid="15/5776">Hanane Houmani</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method.</title>
<year>2012</year>
<volume>2012</volume>
<journal>J. Comput. Networks Commun.</journal>
<ee type="oa">https://doi.org/10.1155/2012/254942</ee>
<ee>https://www.wikidata.org/entity/Q58907655</ee>
<url>db/journals/jcnc/jcnc2012.html#HoumaniM12</url>
<pages>254942:1-254942:18</pages>
</article>
</r>
<r><inproceedings key="conf/cisda/SuiMS12" mdate="2017-05-25">
<author pid="134/8471">Guangye Sui</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="61/2308">Hatem Ben Sta</author>
<title>FASER (Formal and Automatic Security Enforcement by Rewriting): An algebraic approach.</title>
<pages>1-8</pages>
<year>2012</year>
<booktitle>CISDA</booktitle>
<ee>https://doi.org/10.1109/CISDA.2012.6291527</ee>
<crossref>conf/cisda/2012</crossref>
<url>db/conf/cisda/cisda2012.html#SuiMS12</url>
</inproceedings>
</r>
<r><article key="journals/jsc/LangarMA11" mdate="2025-05-31">
<author pid="29/3084">Mahjoub Langar</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0003-2869-0333" pid="24/408">Kamel Adi</author>
<title>Formal enforcement of security policies on concurrent systems.</title>
<pages>997-1016</pages>
<year>2011</year>
<volume>46</volume>
<journal>J. Symb. Comput.</journal>
<number>9</number>
<ee type="oa">https://doi.org/10.1016/j.jsc.2011.05.003</ee>
<url>db/journals/jsc/jsc46.html#LangarMA11</url>
</article>
</r>
<r><inproceedings key="conf/csreaSAM/LangarMA10" mdate="2010-12-10">
<author pid="29/3084">Mahjoub Langar</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="24/408">Kamel Adi</author>
<title>Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems.</title>
<pages>400-405</pages>
<year>2010</year>
<booktitle>Security and Management</booktitle>
<crossref>conf/csreaSAM/2010</crossref>
<url>db/conf/csreaSAM/csreaSAM2010.html#LangarMA10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pst/MaAML10" mdate="2025-05-31">
<author pid="253/2346">Ji Ma</author>
<author orcid="0000-0003-2869-0333" pid="24/408">Kamel Adi</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="l/LuigiLogrippo">Luigi Logrippo</author>
<title>Risk analysis in access control systems.</title>
<pages>160-166</pages>
<year>2010</year>
<booktitle>PST</booktitle>
<ee>https://doi.org/10.1109/PST.2010.5593248</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PST.2010.5593248</ee>
<crossref>conf/pst/2010</crossref>
<url>db/conf/pst/pst2010.html#MaAML10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secrypt/LangarMA10" mdate="2011-01-07">
<author pid="29/3084">Mahjoub Langar</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="24/408">Kamel Adi</author>
<title>Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach.</title>
<pages>66-74</pages>
<year>2010</year>
<booktitle>SECRYPT</booktitle>
<crossref>conf/secrypt/2010</crossref>
<url>db/conf/secrypt/secrypt2010.html#LangarMA10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/FallM10" mdate="2017-05-19">
<author pid="04/9515">Marfall N. Fall</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Network Security: Formal and Optimized Configuration.</title>
<pages>229-246</pages>
<year>2010</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/978-1-60750-629-4-229</ee>
<crossref>conf/somet/2010</crossref>
<url>db/conf/somet/somet2010.html#FallM10</url>
</inproceedings>
</r>
<r><article key="journals/kbs/HoumaniMF09" mdate="2020-02-25">
<author pid="15/5776">Hanane Houmani</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0001-5256-210X" pid="49/6628">Hamido Fujita</author>
<title>Secrecy of cryptographic protocols under equational theory.</title>
<pages>160-173</pages>
<year>2009</year>
<volume>22</volume>
<journal>Knowl. Based Syst.</journal>
<number>3</number>
<ee>https://doi.org/10.1016/j.knosys.2008.11.004</ee>
<ee>https://www.wikidata.org/entity/Q57558455</ee>
<url>db/journals/kbs/kbs22.html#HoumaniMF09</url>
</article>
</r>
<r><article key="journals/virology/TalbiMB09" mdate="2025-09-06">
<author pid="12/3446">Mehdi Talbi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0003-2920-2338" pid="56/4435">Adel Bouhoula</author>
<title>Specification and evaluation of polymorphic shellcode properties using a new temporal logic.</title>
<pages>171-186</pages>
<year>2009</year>
<volume>5</volume>
<journal>J. Comput. Virol.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s11416-008-0089-x</ee>
<url>db/journals/virology/virology5.html#TalbiMB09</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/Ould-SlimaneMA09" mdate="2025-05-31">
<author pid="92/2437">Hakima Ould-Slimane</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0003-2869-0333" pid="24/408">Kamel Adi</author>
<title>Using Edit Automata for Rewriting-Based Security Enforcement.</title>
<pages>175-190</pages>
<year>2009</year>
<booktitle>DBSec</booktitle>
<crossref>conf/dbsec/2009</crossref>
<ee type="oa">https://doi.org/10.1007/978-3-642-03007-9_12</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2009/Ould-SlimaneMA09.pdf</ee>
<url>db/conf/dbsec/dbsec2009.html#Ould-SlimaneMA09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/MejriAF09" mdate="2025-05-31">
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0003-2869-0333" pid="24/408">Kamel Adi</author>
<author orcid="0000-0001-5256-210X" pid="49/6628">Hamido Fujita</author>
<title>Formal Specification and Analysis of Firewalls.</title>
<pages>284-293</pages>
<year>2009</year>
<booktitle>SoMeT</booktitle>
<ee>https://doi.org/10.3233/978-1-60750-049-0-284</ee>
<crossref>conf/somet/2009</crossref>
<url>db/conf/somet/somet2009.html#MejriAF09</url>
</inproceedings>
</r>
<r><article key="journals/jsw/TalbiGM08" mdate="2020-09-15">
<author pid="12/3446">Mehdi Talbi</author>
<author pid="g/MeriamBenGhorbel">Meriam Ben Ghorbel</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Intrusion Detection Prototype Based on ADM-Logic.</title>
<pages>15-22</pages>
<year>2008</year>
<volume>3</volume>
<journal>J. Softw.</journal>
<number>2</number>
<ee type="archive">https://doi.org/10.4304/jsw.3.2.15-22</ee>
<ee>http://www.jsoftware.us/show-57-563-1.html</ee>
<url>db/journals/jsw/jsw3.html#TalbiGM08</url>
</article>
</r>
<r><inproceedings key="conf/icics/TalbiMTBM08" mdate="2025-09-06">
<author pid="12/3446">Mehdi Talbi</author>
<author pid="51/4879">Benjamin Morin</author>
<author pid="44/1997">Val&#233;rie Viet Triem Tong</author>
<author orcid="0000-0003-2920-2338" pid="56/4435">Adel Bouhoula</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.</title>
<pages>403-418</pages>
<year>2008</year>
<booktitle>ICICS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-88625-9_27</ee>
<crossref>conf/icics/2008</crossref>
<url>db/conf/icics/icics2008.html#TalbiMTBM08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secrypt/HoumaniM08" mdate="2009-09-04">
<author pid="15/5776">Hanane Houmani</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy.</title>
<pages>184-189</pages>
<year>2008</year>
<booktitle>SECRYPT</booktitle>
<crossref>conf/secrypt/2008</crossref>
<url>db/conf/secrypt/secrypt2008.html#HoumaniM08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/MejriF08" mdate="2022-10-02">
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0001-5256-210X" pid="49/6628">Hamido Fujita</author>
<title>Enforcing Security Policies Using Algebraic Approach.</title>
<pages>84-98</pages>
<year>2008</year>
<booktitle>SoMeT</booktitle>
<crossref>conf/somet/2008</crossref>
<url>db/conf/somet/somet2008.html#MejriF08</url>
<ee>https://doi.org/10.3233/978-1-58603-916-5-84</ee>
</inproceedings>
</r>
<r><article key="journals/kbs/HoumaniM07" mdate="2020-02-25">
<author pid="15/5776">Hanane Houmani</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Secrecy by interpretation functions.</title>
<pages>617-635</pages>
<year>2007</year>
<volume>20</volume>
<journal>Knowl. Based Syst.</journal>
<number>7</number>
<ee>https://doi.org/10.1016/j.knosys.2007.05.003</ee>
<url>db/journals/kbs/kbs20.html#HoumaniM07</url>
</article>
</r>
<r><article key="journals/kbs/KtariFMG07" mdate="2024-10-06">
<author orcid="0009-0009-7633-9901" pid="76/1268">B&#233;chir Ktari</author>
<author orcid="0000-0001-5256-210X" pid="49/6628">Hamido Fujita</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="81/989">Daniel Godbout</author>
<title>Toward a new software development environment.</title>
<pages>683-693</pages>
<year>2007</year>
<volume>20</volume>
<journal>Knowl. Based Syst.</journal>
<number>7</number>
<ee>https://doi.org/10.1016/j.knosys.2007.05.006</ee>
<ee>https://www.wikidata.org/entity/Q57558476</ee>
<url>db/journals/kbs/kbs20.html#KtariFMG07</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/GhorbelTM07" mdate="2023-03-24">
<author pid="g/MeriamBenGhorbel">Meriam Ben Ghorbel</author>
<author pid="12/3446">Mehdi Talbi</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic.</title>
<pages>206-212</pages>
<year>2007</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1109/ARES.2007.142</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARES.2007.142</ee>
<crossref>conf/IEEEares/2007</crossref>
<url>db/conf/IEEEares/ares2007.html#GhorbelTM07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csreaSAM/LangarMA07" mdate="2007-12-12">
<author pid="29/3084">Mahjoub Langar</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="24/408">Kamel Adi</author>
<title>A Formal Approach for Security Policy Enforcement in Concurrent Programs.</title>
<pages>165-171</pages>
<year>2007</year>
<crossref>conf/csreaSAM/2007</crossref>
<booktitle>Security and Management</booktitle>
<url>db/conf/csreaSAM/csreaSAM2007.html#LangarMA07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secrypt/HoumaniM07" mdate="2009-09-04">
<author pid="15/5776">Hanane Houmani</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Practical and Universal Interpretation Functions for Secrecy.</title>
<pages>157-164</pages>
<year>2007</year>
<booktitle>SECRYPT</booktitle>
<crossref>conf/secrypt/2007</crossref>
<url>db/conf/secrypt/secrypt2007.html#HoumaniM07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/MechriLMFF07" mdate="2012-03-14">
<author pid="44/3369">T. Mechri</author>
<author pid="29/3084">Mahjoub Langar</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="49/6628">Hamido Fujita</author>
<author pid="97/287">Yutaka Funyu</author>
<title>Automatic Enforcement of Security in Computer Networks.</title>
<pages>200-222</pages>
<year>2007</year>
<booktitle>SoMeT</booktitle>
<crossref>conf/somet/2007</crossref>
<url>db/conf/somet/somet2007.html#MechriLMFF07</url>
<ee>http://www.booksonline.iospress.nl/Content/View.aspx?piid=7265</ee>
</inproceedings>
</r>
<r><article key="journals/kbs/FujitaKM06" mdate="2024-10-06">
<author orcid="0000-0001-5256-210X" pid="49/6628">Hamido Fujita</author>
<author orcid="0009-0009-7633-9901" pid="76/1268">B&#233;chir Ktari</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Implementing Lyee-Calculus in Java.</title>
<pages>116-129</pages>
<year>2006</year>
<volume>19</volume>
<journal>Knowl. Based Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.knosys.2005.10.004</ee>
<ee>https://www.wikidata.org/entity/Q57558478</ee>
<url>db/journals/kbs/kbs19.html#FujitaKM06</url>
</article>
</r>
<r><article key="journals/kbs/MbarkiMK06" mdate="2024-10-06">
<author pid="34/311">Mohamed Mbarki</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0009-0009-7633-9901" pid="76/1268">B&#233;chir Ktari</author>
<title>Converting an imperative program to a declarative one.</title>
<pages>130-140</pages>
<year>2006</year>
<volume>19</volume>
<journal>Knowl. Based Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.knosys.2005.10.003</ee>
<url>db/journals/kbs/kbs19.html#MbarkiMK06</url>
</article>
</r>
<r><inproceedings key="conf/somet/Ould-SlimaneMA06" mdate="2012-03-13">
<author pid="92/2437">Hakima Ould-Slimane</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="24/408">Kamel Adi</author>
<title>Enforcing Security Policies on Programs.</title>
<pages>195-207</pages>
<year>2006</year>
<booktitle>SoMeT</booktitle>
<crossref>conf/somet/2006</crossref>
<url>db/conf/somet/somet2006.html#Ould-SlimaneMA06</url>
<ee>http://www.booksonline.iospress.nl/Content/View.aspx?piid=2136</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/GagnonM06" mdate="2012-03-13">
<author pid="41/2632">Fran&#231;ois Gagnon</author>
<author pid="32/720">Mohamed Mejri</author>
<title>A Decision Procedure for Structured Cryptographic Protocols.</title>
<pages>272-286</pages>
<year>2006</year>
<booktitle>SoMeT</booktitle>
<crossref>conf/somet/2006</crossref>
<url>db/conf/somet/somet2006.html#GagnonM06</url>
<ee>http://www.booksonline.iospress.nl/Content/View.aspx?piid=2142</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/GodboutKM06" mdate="2012-03-13">
<author pid="81/989">Daniel Godbout</author>
<author pid="76/1268">B&#233;chir Ktari</author>
<author pid="32/720">Mohamed Mejri</author>
<title>A Formal Translation From an Imperative Language With Array to a Declarative Language.</title>
<pages>319-339</pages>
<year>2006</year>
<booktitle>SoMeT</booktitle>
<crossref>conf/somet/2006</crossref>
<url>db/conf/somet/somet2006.html#GodboutKM06</url>
<ee>http://www.booksonline.iospress.nl/Content/View.aspx?piid=2146</ee>
</inproceedings>
</r>
<r><proceedings key="conf/somet/2006" mdate="2009-02-18">
<editor pid="49/6628">Hamido Fujita</editor>
<editor pid="32/720">Mohamed Mejri</editor>
<title>New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada</title>
<volume>147</volume>
<series href="db/series/faia/index.html">Frontiers in Artificial Intelligence and Applications</series>
<year>2006</year>
<isbn>978-1-58603-673-7</isbn>
<publisher>IOS Press</publisher>
<booktitle>SoMeT</booktitle>
<url>db/conf/somet/somet2006.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/fcs/LangarM05" mdate="2006-02-15">
<author pid="29/3084">Mahjoub Langar</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Formal and Efficient Enforcement of Security Policies.</title>
<pages>143-149</pages>
<year>2005</year>
<crossref>conf/fcs/2005</crossref>
<booktitle>FCS</booktitle>
<url>db/conf/fcs/fcs2005.html#LangarM05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/somet/KtariMGF05" mdate="2012-03-13">
<author pid="76/1268">B&#233;chir Ktari</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="81/989">Daniel Godbout</author>
<author pid="49/6628">Hamido Fujita</author>
<title>LyeeBuilder.</title>
<pages>83-99</pages>
<year>2005</year>
<booktitle>SoMeT</booktitle>
<crossref>conf/somet/2005</crossref>
<url>db/conf/somet/somet2005.html#KtariMGF05</url>
<ee>http://www.booksonline.iospress.nl/Content/View.aspx?piid=1194</ee>
</inproceedings>
</r>
<r><proceedings key="conf/somet/2005" mdate="2009-02-18">
<editor pid="49/6628">Hamido Fujita</editor>
<editor pid="32/720">Mohamed Mejri</editor>
<title>New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2005, September 28-30, 2005, Tokyo, Japan</title>
<volume>129</volume>
<series href="db/series/faia/index.html">Frontiers in Artificial Intelligence and Applications</series>
<year>2005</year>
<publisher>IOS Press</publisher>
<booktitle>SoMeT</booktitle>
<url>db/conf/somet/somet2005.html</url>
</proceedings>
</r>
<r><article key="journals/kbs/FujitaMK04" mdate="2024-10-06">
<author orcid="0000-0001-5256-210X" pid="49/6628">Hamido Fujita</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0009-0009-7633-9901" pid="76/1268">B&#233;chir Ktari</author>
<title>A process algebra to formalize the Lyee methodology.</title>
<pages>263-281</pages>
<year>2004</year>
<volume>17</volume>
<journal>Knowl. Based Syst.</journal>
<number>5-6</number>
<ee>https://doi.org/10.1016/j.knosys.2004.07.006</ee>
<ee>https://www.wikidata.org/entity/Q57558485</ee>
<url>db/journals/kbs/kbs17.html#FujitaMK04</url>
</article>
</r>
<r><inproceedings key="conf/iccsa/Mejri04" mdate="2017-05-24">
<author pid="32/720">Mohamed Mejri</author>
<title>Chaotic Protocols.</title>
<pages>938-948</pages>
<ee>https://doi.org/10.1007/978-3-540-24707-4_106</ee>
<year>2004</year>
<crossref>conf/iccsa/2004-1</crossref>
<booktitle>ICCSA (1)</booktitle>
<url>db/conf/iccsa/iccsa2004-1.html#Mejri04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pst/LacasseMK04" mdate="2006-03-07">
<author pid="30/1536">Alexandre Lacasse</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="76/1268">B&#233;chir Ktari</author>
<title>Formal Implementation of Network Security Policies.</title>
<pages>161-166</pages>
<year>2004</year>
<crossref>conf/pst/2004</crossref>
<booktitle>PST</booktitle>
<ee>http://dev.hil.unb.ca/Texts/PST/pdf/lacasse.pdf</ee>
<url>db/conf/pst/pst2004.html#LacasseMK04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pst/CoutureKMM04" mdate="2006-03-07">
<author pid="76/4683">Mathieu Couture</author>
<author pid="76/1268">B&#233;chir Ktari</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="22/5770">Fr&#233;d&#233;ric Massicotte</author>
<title>A Declarative Approach to Stateful Intrusion Detection and Network Monitoring.</title>
<pages>175-179</pages>
<year>2004</year>
<crossref>conf/pst/2004</crossref>
<booktitle>PST</booktitle>
<ee>http://dev.hil.unb.ca/Texts/PST/pdf/couture.pdf</ee>
<url>db/conf/pst/pst2004.html#CoutureKMM04</url>
</inproceedings>
</r>
<r><article key="journals/kbs/MejriKFE03" mdate="2024-10-06">
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0009-0009-7633-9901" pid="76/1268">B&#233;chir Ktari</author>
<author orcid="0000-0001-5256-210X" pid="49/6628">Hamido Fujita</author>
<author pid="58/1253">M. M. Erhioui</author>
<title>Static analysis of Lyee requirements.</title>
<pages>361-382</pages>
<year>2003</year>
<volume>16</volume>
<journal>Knowl. Based Syst.</journal>
<number>7-8</number>
<ee>https://doi.org/10.1016/j.knosys.2003.08.002</ee>
<url>db/journals/kbs/kbs16.html#MejriKFE03</url>
</article>
</r>
<r><article key="journals/sttt/DebbabiDMM03" mdate="2024-05-07">
<author orcid="0000-0003-3015-3043" pid="d/MDebbabi">Mourad Debbabi</author>
<author pid="79/3117">Nancy A. Durgin</author>
<author pid="32/720">Mohamed Mejri</author>
<author pid="m/JohnCMitchell">John C. Mitchell</author>
<title>Security by typing.</title>
<pages>472-495</pages>
<year>2003</year>
<volume>4</volume>
<journal>Int. J. Softw. Tools Technol. Transf.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s10009-002-0100-7</ee>
<ee>https://www.wikidata.org/entity/Q113445079</ee>
<url>db/journals/sttt/sttt4.html#DebbabiDMM03</url>
</article>
</r>
<r><article key="journals/tcs/AdiDM03" mdate="2025-05-31">
<author orcid="0000-0003-2869-0333" pid="24/408">Kamel Adi</author>
<author orcid="0000-0003-3015-3043" pid="d/MDebbabi">Mourad Debbabi</author>
<author pid="32/720">Mohamed Mejri</author>
<title>A new logic for electronic commerce protocols.</title>
<pages>223-283</pages>
<year>2003</year>
<volume>291</volume>
<journal>Theor. Comput. Sci.</journal>
<number>3</number>
<url>db/journals/tcs/tcs291.html#AdiDM03</url>
<ee type="oa">https://doi.org/10.1016/S0304-3975(02)00364-X</ee>
</article>
</r>
<r><inproceedings key="conf/mfps/DebbabiM03" mdate="2023-08-28">
<author pid="d/MDebbabi">Mourad Debbabi</author>
<author pid="32/720">Mohamed Mejri</author>
<title>Towards the Correctness of Security Protocols.</title>
<pages>55-98</pages>
<year>2003</year>
<booktitle>MFPS</booktitle>
<ee type="oa">https://doi.org/10.1016/S1571-0661(03)50004-4</ee>
<ee>https://www.wikidata.org/entity/Q115012815</ee>
<crossref>conf/mfps/2003</crossref>
<url>db/conf/mfps/mfps2003.html#DebbabiM03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/amast/AdiDM00" mdate="2025-05-31">
<author orcid="0000-0003-2869-0333" pid="24/408">Kamel Adi</author>
<author orcid="0000-0003-3015-3043" pid="d/MDebbabi">Mourad Debbabi</author>
<author pid="32/720">Mohamed Mejri</author>
<title>A New Logic for Electronic Commerce Protocols.</title>
<pages>499-513</pages>
<year>2000</year>
<crossref>conf/amast/2000</crossref>
<booktitle>AMAST</booktitle>
<ee>https://doi.org/10.1007/3-540-45499-3_35</ee>
<url>db/conf/amast/amast2000.html#AdiDM00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsac/DebbabiLM98" mdate="2024-05-07">
<author orcid="0000-0003-3015-3043" pid="d/MDebbabi">Mourad Debbabi</author>
<author pid="27/1336">Y. Legar&#233;</author>
<author pid="32/720">Mohamed Mejri</author>
<title>An Environment for the Specification and Analysis of Cryptoprotocols.</title>
<pages>321-332</pages>
<year>1998</year>
<crossref>conf/acsac/1998</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.1998.738652</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSAC.1998.738652</ee>
<url>db/conf/acsac/acsac1998.html#DebbabiLM98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icfem/DebbabiMTY97" mdate="2023-03-23">
<author pid="d/MDebbabi">Mourad Debbabi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-1030-0918" pid="68/4054">Nadia Tawbi</author>
<author pid="91/1889">I. Yahmadi</author>
<title>Formal Automatic Verification of Authentication Crytographic Protocols.</title>
<pages>50-59</pages>
<year>1997</year>
<crossref>conf/icfem/1997</crossref>
<booktitle>ICFEM</booktitle>
<url>db/conf/icfem/icfem1997.html#DebbabiMTY97</url>
<ee>https://doi.org/10.1109/ICFEM.1997.630399</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICFEM.1997.630399</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/wetice/DebbabiMTY97" mdate="2023-03-23">
<author pid="d/MDebbabi">Mourad Debbabi</author>
<author pid="32/720">Mohamed Mejri</author>
<author orcid="0000-0002-1030-0918" pid="68/4054">Nadia Tawbi</author>
<author pid="91/1889">I. Yahmadi</author>
<title>From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm.</title>
<pages>256-262</pages>
<year>1997</year>
<crossref>conf/wetice/1997</crossref>
<booktitle>WETICE</booktitle>
<ee>https://doi.org/10.1109/ENABL.1997.630823</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ENABL.1997.630823</ee>
<url>db/conf/wetice/wetice1997.html#DebbabiMTY97</url>
</inproceedings>
</r>
<coauthors n="102" nc="8">
<co c="-1"><na f="a/Abdelgalil:Leina" pid="345/9038">Leina Abdelgalil</na></co>
<co c="0"><na f="a/Adi:Kamel" pid="24/408">Kamel Adi</na></co>
<co c="0"><na f="a/Aitsam:Muhammad" pid="310/1672">Muhammad Aitsam</na></co>
<co c="-1"><na f="a/Akaichi:Jalel" pid="54/4115">Jalel Akaichi</na></co>
<co c="0" n="3"><na f="a/Alishahi:Mina" pid="168/2454">Mina Alishahi</na><na>Mina Sheikh Alishahi</na><na>Mina Sheikhalishahi</na></co>
<co c="1"><na f="a/Amarnath:Chandramouli_N=" pid="271/9975">Chandramouli N. Amarnath</na></co>
<co c="3"><na f="a/Arrachid:Khadija" pid="136/4454">Khadija Arrachid</na></co>
<co c="0"><na f="a/Atto:Djibrim_Mahaman_Tahir_M=" pid="431/1396">Djibrim Mahaman Tahir M. Atto</na></co>
<co c="0"><na f="b/Bahroun:Sahbi" pid="42/8844">Sahbi Bahroun</na></co>
<co c="0" n="2"><na f="b/Ben=Ghorbel=Talbi:Meriam" pid="g/MeriamBenGhorbel">Meriam Ben-Ghorbel-Talbi</na><na>Meriam Ben Ghorbel</na></co>
<co c="0"><na f="b/Boileau:Catherine" pid="37/5481">Catherine Boileau</na></co>
<co c="0"><na f="b/Bouhoula:Adel" pid="56/4435">Adel Bouhoula</na></co>
<co c="0"><na f="b/Boumlik:Laila" pid="179/0588">Laila Boumlik</na></co>
<co c="1"><na f="c/Chatterjee:Abhijit" pid="31/928">Abhijit Chatterjee</na></co>
<co c="0"><na f="c/Chehab:Mohamad" pid="273/9104">Mohamad Chehab</na></co>
<co c="0"><na f="c/Couture:Mario" pid="72/11086">Mario Couture</na></co>
<co c="0"><na f="c/Couture:Mathieu" pid="76/4683">Mathieu Couture</na></co>
<co c="0"><na f="d/Debbabi:Mourad" pid="d/MDebbabi">Mourad Debbabi</na></co>
<co c="1"><na f="d/Dharmaraj:Gowsika" pid="379/5378">Gowsika Dharmaraj</na></co>
<co c="5"><na f="d/Diakhame:Mouhamadou_Lamine" pid="406/9905">Mouhamadou Lamine Diakhame</na></co>
<co c="5"><na f="d/Diallo:Ch=eacute=rif" pid="83/7725">Ch&#233;rif Diallo</na></co>
<co c="0"><na f="d/Dorafshanian:Mahboobeh" pid="346/6043">Mahboobeh Dorafshanian</na></co>
<co c="0"><na f="d/Driss:Hadir" pid="431/1847">Hadir Driss</na></co>
<co c="0"><na f="d/Durgin:Nancy_A=" pid="79/3117">Nancy A. Durgin</na></co>
<co c="-1"><na f="e/Elsiddig:Mohammed_Ali" pid="331/5630">Mohammed Ali Elsiddig</na></co>
<co c="0"><na f="e/Erhioui:M=_M=" pid="58/1253">M. M. Erhioui</na></co>
<co c="-1"><na f="f/Fall:Marfall_N=" pid="04/9515">Marfall N. Fall</na></co>
<co c="0"><na f="f/Fattahi:Jaouhar" pid="97/11071">Jaouhar Fattahi</na></co>
<co c="2"><na f="f/Fekih:Chiraz" pid="299/1804">Chiraz Fekih</na></co>
<co c="0"><na f="f/Fkiri:Obeb" pid="387/0545">Obeb Fkiri</na></co>
<co c="0"><na f="f/Frenette:Simon" pid="151/7209">Simon Frenette</na></co>
<co c="0"><na f="f/Fujita:Hamido" pid="49/6628">Hamido Fujita</na></co>
<co c="0"><na f="f/Funyu:Yutaka" pid="97/287">Yutaka Funyu</na></co>
<co c="0"><na f="g/Gagnon:Fran=ccedil=ois" pid="41/2632">Fran&#231;ois Gagnon</na></co>
<co c="0"><na f="g/Ghayoula:Elies" pid="194/9078">Elies Ghayoula</na></co>
<co c="0"><na f="g/Ghayoula:Ridha" pid="05/10597">Ridha Ghayoula</na></co>
<co c="0"><na f="g/Godbout:Daniel" pid="81/989">Daniel Godbout</na></co>
<co c="1"><na f="g/Goteti:Prashant" pid="45/4381">Prashant Goteti</na></co>
<co c="6"><na f="g/Gouissem:Bechir_Ben" pid="216/4230">Bechir Ben Gouissem</na></co>
<co c="0"><na f="h/Hassan:Abubakr" pid="233/8925">Abubakr Hassan</na></co>
<co c="0"><na f="h/Hnich:Brahim" pid="66/5390">Brahim Hnich</na></co>
<co c="0"><na f="h/Houmani:Hanane" pid="15/5776">Hanane Houmani</na></co>
<co c="0"><na f="h/Hounwanou:Honor=eacute=" pid="302/2457">Honor&#233; Hounwanou</na></co>
<co c="0"><na f="i/Ibrahim:Abubakr" pid="355/8531">Abubakr Ibrahim</na></co>
<co c="1"><na f="i/Isenberg:Jackson" pid="412/1741">Jackson Isenberg</na></co>
<co c="0"><na f="j/Jaafar:Fehmi" pid="47/10516">Fehmi Jaafar</na></co>
<co c="0"><na f="j/Jalel:Sawssen" pid="25/10460">Sawssen Jalel</na></co>
<co c="0"><na f="k/Khedher:Abdelkarim" pid="431/1252">Abdelkarim Khedher</na></co>
<co c="1"><na f="k/Komarraju:Suhasini" pid="283/6983">Suhasini Komarraju</na></co>
<co c="0"><na f="k/Ktari:B=eacute=chir" pid="76/1268">B&#233;chir Ktari</na></co>
<co c="0"><na f="l/Lacasse:Alexandre" pid="30/1536">Alexandre Lacasse</na></co>
<co c="0"><na f="l/Ladouceur:Rachel" pid="386/5881">Rachel Ladouceur</na></co>
<co c="0"><na f="l/Lakdher:Baha_Eddine" pid="389/8081">Baha Eddine Lakdher</na></co>
<co c="0"><na f="l/Langar:Mahjoub" pid="29/3084">Mahjoub Langar</na></co>
<co c="3"><na f="l/Lathe:Memel_Emmanuel" pid="136/4464">Memel Emmanuel Lathe</na></co>
<co c="0"><na f="l/Latrach:Lassaad" pid="267/7509">Lassaad Latrach</na></co>
<co c="0"><na f="l/Legar=eacute=:Y=" pid="27/1336">Y. Legar&#233;</na></co>
<co c="0"><na f="l/Logrippo:Luigi" pid="l/LuigiLogrippo">Luigi Logrippo</na></co>
<co c="0"><na f="m/Ma:Ji" pid="253/2346">Ji Ma</na></co>
<co c="1"><na f="m/Ma:Kwondo" pid="304/3493">Kwondo Ma</na></co>
<co c="0"><na f="m/Manai:Elyes" pid="352/3105">Elyes Manai</na></co>
<co c="0"><na f="m/Marra:Antonio_La" pid="192/2137">Antonio La Marra</na></co>
<co c="0"><na f="m/Martinelli:Fabio" pid="m/FMartinelli">Fabio Martinelli</na></co>
<co c="0"><na f="m/Massicotte:Fr=eacute=d=eacute=ric" pid="22/5770">Fr&#233;d&#233;ric Massicotte</na></co>
<co c="0"><na f="m/Mbarki:Mohamed" pid="34/311">Mohamed Mbarki</na></co>
<co c="0"><na f="m/Mbaye:Babacar" pid="208/8892">Babacar Mbaye</na></co>
<co c="0"><na f="m/Mechri:T=" pid="44/3369">T. Mechri</na></co>
<co c="2"><na f="m/Mejri:Aymen" pid="277/9444">Aymen Mejri</na></co>
<co c="2"><na f="m/Mejri:Oumayma" pid="299/1496">Oumayma Mejri</na></co>
<co c="0"><na f="m/Mesghouni:Nadia" pid="59/9714">Nadia Mesghouni</na></co>
<co c="0"><na f="m/Mitchell:John_C=" pid="m/JohnCMitchell">John C. Mitchell</na></co>
<co c="0"><na f="m/Morin:Benjamin" pid="51/4879">Benjamin Morin</na></co>
<co c="0"><na f="m/Mouheb:Djedjiga" pid="94/7340">Djedjiga Mouheb</na></co>
<co c="0"><na f="m/Mourad:Azzam" pid="34/4038">Azzam Mourad</na></co>
<co c="0"><na f="m/Mzoughi:Ghofrane" pid="427/6555">Ghofrane Mzoughi</na></co>
<co c="1"><na f="n/Natarajan:Suriyaprakash" pid="00/5935">Suriyaprakash Natarajan</na></co>
<co c="0"><na f="n/Nuovo:Alessandro_G=_Di" pid="80/2950">Alessandro G. Di Nuovo</na></co>
<co c="0"><na f="o/Omrani:Takwa" pid="203/8380">Takwa Omrani</na></co>
<co c="0"><na f="o/Ould=Slimane:Hakima" pid="92/2437">Hakima Ould-Slimane</na></co>
<co c="0"><na f="p/Poisson:J=eacute=r=eacute=mie" pid="174/4800">J&#233;r&#233;mie Poisson</na></co>
<co c="7"><na f="p/Pradalier:C=eacute=dric" pid="04/6378">C&#233;dric Pradalier</na></co>
<co c="0"><na f="p/Pricop:Emil" pid="141/8033">Emil Pricop</na></co>
<co c="6"><na f="r/Raissi:Khadija" pid="236/7277">Khadija Raissi</na></co>
<co c="1"><na f="r/Rasul:Ashiqur" pid="359/6446">Ashiqur Rasul</na></co>
<co c="7"><na f="r/Richard_0001:Antoine" pid="239/4349-1">Antoine Richard 0001</na></co>
<co c="-1"><na f="s/Sadeghian:Ali" pid="132/8958">Ali Sadeghian</na></co>
<co c="3"><na f="s/Sadio:Etienne_Theodore" pid="136/4470">Etienne Theodore Sadio</na></co>
<co c="0"><na f="s/Saha:Pierre_Fobougong" pid="373/4032">Pierre Fobougong Saha</na></co>
<co c="0"><na f="s/Samoud:Ouejdene" pid="203/8438">Ouejdene Samoud</na></co>
<co c="0"><na f="s/Saracino:Andrea" pid="119/6683">Andrea Saracino</na></co>
<co c="0"><na f="s/Sghaier:Feriel" pid="386/9914">Feriel Sghaier</na></co>
<co c="4"><na f="s/Sta:Hatem_Ben" pid="61/2308">Hatem Ben Sta</na></co>
<co c="4"><na f="s/Sui:Guangye" pid="134/8471">Guangye Sui</na></co>
<co c="0"><na f="t/Talbi:Mehdi" pid="12/3446">Mehdi Talbi</na></co>
<co c="1"><na f="t/Tammana:Akhil" pid="364/7485">Akhil Tammana</na></co>
<co c="0"><na f="t/Tawbi:Nadia" pid="68/4054">Nadia Tawbi</na></co>
<co c="0"><na f="t/Thiombiano:Abdoul_Majid_O=" pid="393/7080">Abdoul Majid O. Thiombiano</na></co>
<co c="0"><na f="t/Tong:Val=eacute=rie_Viet_Triem" pid="44/1997">Val&#233;rie Viet Triem Tong</na></co>
<co c="0"><na f="y/Yahmadi:I=" pid="91/1889">I. Yahmadi</na></co>
<co c="0"><na f="y/Yahyaoui:Hamdi" pid="53/5982">Hamdi Yahyaoui</na></co>
<co c="-1"><na f="y/Yermalovich:Pavel" pid="282/9352">Pavel Yermalovich</na></co>
<co c="0"><na f="z/Ziadia:Marwa" pid="162/4027">Marwa Ziadia</na></co>
</coauthors>
</dblpperson>

