Kamel Adi, Ph.D.
Affiliations: | 2002 | Universite Laval (Canada) |
Area:
Computer ScienceGoogle:
"Kamel Adi"Parents
Sign in to add mentorMourad Debbabi | grad student | 2002 | Universite Laval (Canada) | |
(Formal specification and analysis of security protocols.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Saidani N, Adi K, Allili MS. (2020) A semantic-based classification approach for an enhanced spam detection Computers & Security. 94: 101716 |
Hamouid K, Adi K. (2019) Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority Peer-to-Peer Networking and Applications. 12: 1137-1155 |
Bouhaddi M, Radjef MS, Adi K. (2018) An efficient intrusion detection in resource-constrained mobile ad-hoc networks Computers & Security. 76: 156-177 |
Adi K, Hamza L, Pene L. (2018) Automatic security policy enforcement in computer systems Computers & Security. 73: 156-171 |
Boulaiche A, Adi K. (2018) An auto-learning approach for network intrusion detection Telecommunication Systems. 68: 277-294 |
Shaikh RA, Adi K, Logrippo L. (2016) A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets International Journal of Information Security. 1-23 |
Hamouid K, Adi K. (2015) Efficient certificateless web-of-trust model for public-key authentication in MANET Computer Communications. 63: 24-39 |
Boulares S, Adi K, Logrippo L. (2015) Information flow-based security levels assessment for access control systems Lecture Notes in Business Information Processing. 209: 105-121 |
Bouhaddi M, Radjef MS, Adi K. (2015) A game approach for an efficient intrusion detection system in mobile Ad Hoc networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8930: 131-146 |
Khamadja S, Adi K, Logrippo L. (2013) Designing flexible access control models for the cloud Sin 2013 - Proceedings of the 6th International Conference On Security of Information and Networks. 225-232 |