Mohamed Mejri, Ph.D.
Affiliations: | 2001 | Universite Laval (Canada) |
Area:
Computer ScienceGoogle:
"Mohamed Mejri"Parents
Sign in to add mentorMourad Debbabi | grad student | 2001 | Universite Laval (Canada) | |
(From type theory to the verification of security protocols.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Yermalovich P, Mejri M. (2020) Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis International Journal of Network Security & Its Applications. 12: 1-22 |
Ziadia M, Fattahi J, Mejri M, et al. (2020) Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications Information-An International Interdisciplinary Journal. 11: 130 |
Mejri M, Yahyaoui H, Mourad A, et al. (2020) A rewriting system for the assessment of XACML policies relationship Computers & Security. 97: 101957 |
Mejri M, Yahyaoui H. (2017) Formal specification and integration of distributed security policies Computer Languages, Systems & Structures. 49: 1-35 |
Sui G, Mejri M. (2016) Security enforcement by rewriting: An algebraic approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9482: 311-321 |
Fattahi J, Mejri M, Houmani H. (2015) Introduction to the Witness-Functions for Secrecy in Cryptographic Protocols International Journal of Modeling and Optimization. 5: 186-191 |
Fattahi J, Mejri M, Houmani H. (2015) Secrecy by witness-functions on increasing protocols Proceedings of the 2014 6th International Conference On Electronics, Computers and Artificial Intelligence, Ecai 2014. 1-6 |
Ziadia M, Mejri M. (2015) Formal enforcement of security policies on parallel systems with risk integration Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9084: 133-148 |
Arrachid K, Mejri M, Sadio ET. (2014) AVTAC : A framework for automatic auditing of access control in windows and linux systems Frontiers in Artificial Intelligence and Applications. 265: 672-691 |
Sui G, Mejri M. (2013) FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test International Journal of Grid and Utility Computing. 4: 204-211 |