| 2009 |
34 | | Hakima Ould-Slimane,
Mohamed Mejri,
Kamel Adi:
Using Edit Automata for Rewriting-Based Security Enforcement.
DBSec 2009: 175-190 |
33 | | Mohamed Mejri,
Kamel Adi,
Hamido Fujita:
Formal Specification and Analysis of Firewalls.
SoMeT 2009: 284-293 |
32 | | Mehdi Talbi,
Mohamed Mejri,
Adel Bouhoula:
Specification and evaluation of polymorphic shellcode properties using a new temporal logic.
Journal in Computer Virology 5(3): 171-186 (2009) |
31 | | Hanane Houmani,
Mohamed Mejri,
Hamido Fujita:
Secrecy of cryptographic protocols under equational theory.
Knowl.-Based Syst. 22(3): 160-173 (2009) |
| 2008 |
30 | | Mehdi Talbi,
Benjamin Morin,
Valérie Viet Triem Tong,
Adel Bouhoula,
Mohamed Mejri:
Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
ICICS 2008: 403-418 |
29 | | Hanane Houmani,
Mohamed Mejri:
Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy.
SECRYPT 2008: 184-189 |
28 | | Mohamed Mejri,
Hamido Fujita:
Enforcing Security Policies Using Algebraic Approach.
SoMeT 2008: 84-98 |
27 | | Mehdi Talbi,
Meriam Ben Ghorbel,
Mohamed Mejri:
Intrusion Detection Prototype Based on ADM-Logic.
JSW 3(2): 15-22 (2008) |
| 2007 |
26 | | Meriam Ben Ghorbel,
Mehdi Talbi,
Mohamed Mejri:
Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic.
ARES 2007: 206-212 |
25 | | Hanane Houmani,
Mohamed Mejri:
Practical and Universal Interpretation Functions for Secrecy.
SECRYPT 2007: 157-164 |
24 | | Mahjoub Langar,
Mohamed Mejri,
Kamel Adi:
A Formal Approach for Security Policy Enforcement in Concurrent Programs.
Security and Management 2007: 165-171 |
23 | | T. Mechri,
Mahjoub Langar,
Mohamed Mejri,
Hamido Fujita,
Yutaka Funyu:
Automatic Enforcement of Security in Computer Networks.
SoMeT 2007: 200-222 |
22 | | Hanane Houmani,
Mohamed Mejri:
Secrecy by interpretation functions.
Knowl.-Based Syst. 20(7): 617-635 (2007) |
21 | | Béchir Ktari,
Hamido Fujita,
Mohamed Mejri,
Daniel Godbout:
Toward a new software development environment.
Knowl.-Based Syst. 20(7): 683-693 (2007) |
| 2006 |
20 | | Hamido Fujita,
Mohamed Mejri:
New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada
IOS Press 2006 |
19 | | Hakima Ould-Slimane,
Mohamed Mejri,
Kamel Adi:
Enforcing Security Policies on Programs.
SoMeT 2006: 195-207 |
18 | | François Gagnon,
Mohamed Mejri:
A Decision Procedure for Structured Cryptographic Protocols.
SoMeT 2006: 272-286 |
17 | | Daniel Godbout,
Béchir Ktari,
Mohamed Mejri:
A Formal Translation From an Imperative Language With Array to a Declarative Language.
SoMeT 2006: 319-339 |
16 | | Hamido Fujita,
Béchir Ktari,
Mohamed Mejri:
Implementing Lyee-Calculus in Java.
Knowl.-Based Syst. 19(2): 116-129 (2006) |
15 | | Mohamed Mbarki,
Mohamed Mejri,
Béchir Ktari:
Converting an imperative program to a declarative one.
Knowl.-Based Syst. 19(2): 130-140 (2006) |
| 2005 |
14 | | Hamido Fujita,
Mohamed Mejri:
New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2005, September 28-30, 2005, Tokyo, Japan
IOS Press 2005 |
13 | | Mahjoub Langar,
Mohamed Mejri:
Formal and Efficient Enforcement of Security Policies.
FCS 2005: 143-149 |
12 | | Béchir Ktari,
Mohamed Mejri,
Daniel Godbout,
Hamido Fujita:
LyeeBuilder.
SoMeT 2005: 83-99 |
| 2004 |
11 | | Mohamed Mejri:
Chaotic Protocols.
ICCSA (1) 2004: 938-948 |
10 | | Alexandre Lacasse,
Mohamed Mejri,
Béchir Ktari:
Formal Implementation of Network Security Policies.
PST 2004: 161-166 |
9 | | Mathieu Couture,
Béchir Ktari,
Mohamed Mejri,
Frédéric Massicotte:
A Declarative Approach to Stateful Intrusion Detection and Network Monitoring.
PST 2004: 175-179 |
8 | | Hamido Fujita,
Mohamed Mejri,
Béchir Ktari:
A process algebra to formalize the Lyee methodology.
Knowl.-Based Syst. 17(5-6): 263-281 (2004) |
| 2003 |
7 | | Mohamed Mejri,
Béchir Ktari,
Hamido Fujita,
M. M. Erhioui:
Static analysis of Lyee requirements.
Knowl.-Based Syst. 16(7-8): 361-382 (2003) |
6 | | Mourad Debbabi,
Nancy A. Durgin,
Mohamed Mejri,
John C. Mitchell:
Security by typing.
STTT 4(4): 472-495 (2003) |
5 | | Kamel Adi,
Mourad Debbabi,
Mohamed Mejri:
A new logic for electronic commerce protocols.
Theor. Comput. Sci. 291(3): 223-283 (2003) |
| 2000 |
4 | | Kamel Adi,
Mourad Debbabi,
Mohamed Mejri:
A New Logic for Electronic Commerce Protocols.
AMAST 2000: 499-513 |
| 1998 |
3 | | Mourad Debbabi,
Y. Legaré,
Mohamed Mejri:
An Environment for the Specification and Analysis of Cryptoprotocols.
ACSAC 1998: 321-332 |
| 1997 |
2 | | Mourad Debbabi,
Mohamed Mejri,
Nadia Tawbi,
I. Yahmadi:
Formal Automatic Verification of Authentication Crytographic Protocols.
ICFEM 1997: 50-59 |
1 | | Mourad Debbabi,
Mohamed Mejri,
Nadia Tawbi,
I. Yahmadi:
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm.
WETICE 1997: 256-262 |