default search action
Kamel Adi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c52]Myria Bouhaddi, Kamel Adi:
When Rewards Deceive: Counteracting Reward Poisoning on Online Deep Reinforcement Learning. CSR 2024: 38-44 - [c51]Myria Bouhaddi, Kamel Adi:
Enhancing Privacy in Machine Learning: A Robust Approach for Preventing Attribute Inference Attacks. SECRYPT 2024: 224-236 - [c50]Pierre Fobougong Saha, Mohamed Mejri, Kamel Adi:
Toward the Foundation of Digital Identity Theory. SECRYPT 2024: 812-819 - 2023
- [c49]Myria Bouhaddi, Kamel Adi:
Mitigating Membership Inference Attacks in Machine Learning as a Service. CSR 2023: 262-268 - [c48]Mohamed El Amine Bekhouche, Kamel Adi:
A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident Reports. FPS (1) 2023: 219-232 - [c47]Karima Massmi, Khaled Hamouid, Kamel Adi:
Secure Electric Vehicle Dynamic Charging Based on Smart Contracts. ISNCC 2023: 1-6 - [c46]Myria Bouhaddi, Kamel Adi:
Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning. SECRYPT 2023: 870-875 - 2022
- [c45]Yacine Sam, Kamel Adi, Nasredine Cheniki, Noé Breton:
POWoT : a Privacy Ontology for the Web of Things. WI/IAT 2022: 119-126 - 2021
- [c44]Fateh Boucenna, Omar Nouali, Kamel Adi, Samir Kechid:
Access Pattern Hiding in Searchable Encryption. FiCloud 2021: 107-114 - [c43]Khaled Hamouid, Mawloud Omar, Kamel Adi:
A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT. WD 2021: 1-6 - 2020
- [j15]Nadjate Saidani, Kamel Adi, Mohand Saïd Allili:
A semantic-based classification approach for an enhanced spam detection. Comput. Secur. 94: 101716 (2020) - [c42]Khaled Hamouid, Kamel Adi:
Privacy-aware Authentication Scheme for Electric Vehicle In-motion Wireless Charging. ISNCC 2020: 1-6
2010 – 2019
- 2019
- [j14]Khaled Hamouid, Kamel Adi:
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority. Peer-to-Peer Netw. Appl. 12(5): 1137-1155 (2019) - [c41]Nadjate Saidani, Kamel Adi, Mohand Saïd Allili:
Semantic Representation Based on Deep Learning for Spam Detection. FPS 2019: 72-81 - [c40]Lalia Saoudi, Kamel Adi, Younes Boudraa:
A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications. FPS 2019: 379-386 - 2018
- [j13]Kamel Adi, Lamia Hamza, Liviu Pene:
Automatic security policy enforcement in computer systems. Comput. Secur. 73: 156-171 (2018) - [j12]Myria Bouhaddi, Mohammed Said Radjef, Kamel Adi:
An efficient intrusion detection in resource-constrained mobile ad-hoc networks. Comput. Secur. 76: 156-177 (2018) - [j11]Ammar Boulaiche, Kamel Adi:
An auto-learning approach for network intrusion detection. Telecommun. Syst. 68(2): 277-294 (2018) - 2017
- [j10]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets. Int. J. Inf. Sec. 16(1): 91-113 (2017) - [c39]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Insider Threat Likelihood Assessment for Flexible Access Control. MCETECH 2017: 77-95 - [c38]Liviu Pene, Lamia Hamza, Kamel Adi:
Compliance Verification Algorithm for Computer Systems Security Policies. MCETECH 2017: 96-115 - [c37]Nadjate Saidani, Kamel Adi, Mouhand Saïd Allili:
A Supervised Approach for Spam Detection Using Text-Based Semantic Representation. MCETECH 2017: 136-148 - 2016
- [c36]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach. FPS 2016: 135-142 - [c35]Myria Bouhaddi, Kamel Adi, Mohammed Said Radjef:
Evolutionary Game-Based Defense Mechanism in the MANETs. SIN 2016: 88-95 - 2015
- [j9]Khaled Hamouid, Kamel Adi:
Efficient certificateless web-of-trust model for public-key authentication in MANET. Comput. Commun. 63: 24-39 (2015) - [c34]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Information Flow-Based Security Levels Assessment for Access Control Systems. MCETECH 2015: 105-121 - 2014
- [c33]Myria Bouhaddi, Mohammed Said Radjef, Kamel Adi:
A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks. FPS 2014: 131-146 - 2013
- [j8]Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A framework for risk assessment in access control systems. Comput. Secur. 39: 86-103 (2013) - [c32]Salim Khamadja, Kamel Adi, Luigi Logrippo:
Designing flexible access control models for the cloud. SIN 2013: 225-232 - [c31]Salim Khamadja, Kamel Adi, Luigi Logrippo:
An access control framework for hybrid policies. SIN 2013: 282-286 - 2012
- [j7]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
Dynamic risk-based decision methods for access control systems. Comput. Secur. 31(4): 447-464 (2012) - [c30]Bernard Stepien, Hemanth Khambhammettu, Kamel Adi, Luigi Logrippo:
CatBAC: A generic framework for designing and validating hybrid access control models. ICC 2012: 6721-6726 - [c29]Khaled Hamouid, Kamel Adi:
Self-Certified Based Trust Establishment Scheme in Ad-Hoc Networks. NTMS 2012: 1-7 - [c28]Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A Framework for Threat Assessment in Access Control Systems. SEC 2012: 187-198 - [c27]Ammar Boulaiche, Hatem Bouzayani, Kamel Adi:
A Quantitative Approach for Intrusions Detection and Prevention based on Statistical N-Gram Models. ANT/MobiWIS 2012: 450-457 - 2011
- [j6]Ji Ma, Mehmet A. Orgun, Kamel Adi:
An analytic tableau calculus for a temporalised belief logic. J. Appl. Log. 9(4): 289-304 (2011) - [j5]Mahjoub Langar, Mohamed Mejri, Kamel Adi:
Formal enforcement of security policies on concurrent systems. J. Symb. Comput. 46(9): 997-1016 (2011) - [c26]Nadera Slimani, Hemanth Khambhammettu, Kamel Adi, Luigi Logrippo:
UACML: Unified Access Control Modeling Language. NTMS 2011: 1-8 - [c25]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk-based decision method for access control systems. PST 2011: 189-192 - 2010
- [j4]Kamel Adi, Liviu Pene, L. Sullivan:
Games for non-repudiation protocol correctness. Int. J. Wirel. Mob. Comput. 4(4): 305-313 (2010) - [j3]Khaled Hamouid, Kamel Adi:
Secure and robust threshold key management (SRKM) scheme for ad hoc networks. Secur. Commun. Networks 3(6): 517-534 (2010) - [c24]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Inconsistency detection method for access control policies. IAS 2010: 204-209 - [c23]Waël Hassan, Nadera Slimani, Kamel Adi, Luigi Logrippo:
Secrecy UML Method for Model Transformations. ASM 2010: 400 - [c22]Mahjoub Langar, Mohamed Mejri, Kamel Adi:
Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems. Security and Management 2010: 400-405 - [c21]Ji Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski:
Risk Analysis in Access Control Systems Based on Trust Theories. Web Intelligence/IAT Workshops 2010: 415-418 - [c20]Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk management in dynamic role based access control systems. ICDIM 2010: 1-8 - [c19]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Detecting incompleteness in access control policies using data classification schemes. ICDIM 2010: 417-422 - [c18]Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo:
Risk analysis in access control systems. PST 2010: 160-166 - [c17]Mahjoub Langar, Mohamed Mejri, Kamel Adi:
Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach. SECRYPT 2010: 66-74
2000 – 2009
- 2009
- [c16]Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi:
Using Edit Automata for Rewriting-Based Security Enforcement. DBSec 2009: 175-190 - [c15]Ji Ma, Mehmet A. Orgun, Abdul Sattar, Kamel Adi:
Temporalised Epistemic Logic for Reasoning about Agent-Based Systems. Web Intelligence/IAT Workshops 2009: 474-477 - [c14]Khaled Hamouid, Kamel Adi:
Robust Key Management scheme for certification in mobile ad-hoc networks. ISCC 2009: 355-360 - [c13]Kamel Adi, Yacine Bouzida, Ikhlass Hattak, Luigi Logrippo, Serge Mankovski:
Typing for Conflict Detection in Access Control Policies. MCETECH 2009: 212-226 - [c12]Mohamed Mejri, Kamel Adi, Hamido Fujita:
Formal Specification and Analysis of Firewalls. SoMeT 2009: 284-293 - 2008
- [c11]Ammar Boulaiche, Kamel Adi:
Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon. SECRYPT 2008: 65-71 - [c10]Kamel Adi, Liviu Pene:
Formal Reasoning for Security Protocol Correctness. SoMeT 2008: 63-83 - 2007
- [c9]Mahjoub Langar, Mohamed Mejri, Kamel Adi:
A Formal Approach for Security Policy Enforcement in Concurrent Programs. Security and Management 2007: 165-171 - [c8]Lamia Hamza, Kamel Adi:
Formal Technique for Discovering Complex Attacks in Computer Systems. SoMeT 2007: 185-199 - 2006
- [j2]Kamel Adi, Daniel Amyot, Luigi Logrippo:
Foreword - New technologies in distributed systems. Ann. des Télécommunications 61(11-12): 1226-1228 (2006) - [c7]Lamia Hamza, Kamel Adi, Karim El Guemhioui:
Automatic generation of attack scenarios for intrusion detection systems. AICT/ICIW 2006: 205 - [c6]Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi:
Enforcing Security Policies on Programs. SoMeT 2006: 195-207 - [c5]Liviu Pene, Kamel Adi:
A Calculus for Distributed Firewall Specification and Verification. SoMeT 2006: 301-315 - 2005
- [c4]Kamel Adi, Liviu Pene:
Secrecy Correctness for Security Protocols. DFMA 2005: 22-29 - 2003
- [j1]Kamel Adi, Mourad Debbabi, Mohamed Mejri:
A new logic for electronic commerce protocols. Theor. Comput. Sci. 291(3): 223-283 (2003) - 2001
- [c3]Kamel Adi, Mourad Debbabi:
Abstract interpretation for proving secrecy properties in security protocols. LACPV@CAV 2001: 25-50 - 2000
- [c2]Kamel Adi, Mourad Debbabi, Mohamed Mejri:
A New Logic for Electronic Commerce Protocols. AMAST 2000: 499-513
1990 – 1999
- 1996
- [c1]Didier Bert, Rachid Echahed, Kamel Adi:
Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation. AMAST 1996: 629-632
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint