Adel Bouhoula
Orcid: 0000-0003-2920-2338
According to our database1,
Adel Bouhoula
authored at least 137 papers
between 1992 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT).
Int. J. Inf. Sec., February, 2025
2024
Securing IoMT Applications: A n Approach for Enhancing the Reliability of Security Policies within Cloud Databases.
J. Inf. Sci. Eng., November, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
2023
A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach.
Mob. Networks Appl., February, 2023
A novel multispectral corner detector and a new local descriptor: an application to human posture recognition.
Multim. Tools Appl., 2023
Exploiting scatter matrix on one-class support vector machine based on low variance direction.
Intell. Data Anal., 2023
Towards a Reliable and Smart Approach for Detecting and Resolving Security Violations within SDWN.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Proceedings of the International Wireless Communications and Mobile Computing, 2023
A Comprehensive Study of Intrusion Detection within Internet of Things-based Smart Cities: Synthesis, Analysis and a Novel Approach.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Proceedings of the Computational Collective Intelligence - 15th International Conference, 2023
2022
Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
2021
Cyber-Risk Management within IoMT: a Context-aware Agent-based Framework for a Reliable e-Health System.
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021
Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database Application.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021
A Systematic Approach for IoT Cyber-Attacks Detection in Smart Cities Using Machine Learning Techniques.
Proceedings of the Advanced Information Networking and Applications, 2021
A Novel Face Detection Framework Based on Incremental Learning and Low Variance Directions.
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021
2020
Advanced analysis of the integrity of access control policies: the specific case of databases.
Int. Arab J. Inf. Technol., 2020
Proceedings of the 15th International Joint Conference on Computer Vision, 2020
Proceedings of the 28th International Conference on Software, 2020
Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
Enforcing Risk-Awareness in Access Control Systems: Synthesis, Discussion and Guidelines.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the 23rd Conference on Innovation in Clouds, 2020
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
A Comprehensive Solution for the Analysis, Validation and Optimization of SDN Data-Plane Configurations.
Proceedings of the 16th International Conference on Network and Service Management, 2020
A Formal Approach for Automatic Detection and Correction of SDN Switch Misconfigurations.
Proceedings of the 16th International Conference on Network and Service Management, 2020
Proceedings of the 16th International Conference on Network and Service Management, 2020
2019
Human face detection improvement using incremental learning based on low variance directions.
Signal Image Video Process., 2019
A novel incremental one-class support vector machine based on low variance direction.
Pattern Recognit., 2019
A Novel Multispectral Lab-depth based Edge Detector for Color Images with Occluded Objects.
Proceedings of the 14th International Joint Conference on Computer Vision, 2019
Proceedings of the 2019 International Conference on Software, 2019
Proceedings of the 2019 International Conference on Software, 2019
Poster : Minimizing range rules for packet filtering using a double mask representation.
Proceedings of the 2019 IFIP Networking Conference, 2019
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
2018
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures.
Secur. Commun. Networks, 2018
A Novel Handwritten Digits Recognition Method based on Subclass Low Variances Guided Support Vector Machine.
Proceedings of the 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2018), 2018
Automated and Optimized Formal Approach to Verify SDN Access-Control Misconfigurations.
Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communications, 2018
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018
2017
Proceedings of the SCSS 2017, 2017
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment.
Proceedings of the SCSS 2017, 2017
Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems.
Proceedings of the SCSS 2017, 2017
Proceedings of the Information Systems, 2017
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017
2016
Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.
J. Medical Syst., 2016
Int. J. Inf. Sec., 2016
Int. J. Inf. Sec., 2016
An Accurate FDD-Based Approach for Discovering Distributed Firewalls Misconfigurations.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the 10th International Conference on Informatics and Systems, 2016
Proceedings of the International Conference on Digital Economy, 2016
2015
Int. J. Inf. Sec., 2015
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
Automatic Classification and Detection of Snort Configuration Anomalies - a Formal Approach.
Proceedings of the International Joint Conference, 2015
2014
Secur. Commun. Networks, 2014
Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud.
Proceedings of the SECRYPT 2014, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the IEEE 8th International Conference on Research Challenges in Information Science, 2014
2013
Proceedings of the 21st International Conference on Software, 2013
2012
J. Appl. Log., 2012
A prefix-based approach for managing hybrid specifications in complex packet filtering.
Comput. Networks, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
2011
Trusted intrusion detection architecture for high-speed networks based on traffic classification, load balancing and high availability mechanism.
Secur. Commun. Networks, 2011
Network Security Alerts Management Architecture for Signature-Based Intrusions Detection Systems within a NAT Environment.
J. Netw. Syst. Manag., 2011
Proceedings of the 19th International Conference on Software, 2011
Systematic Deployment of Network Security Policy in Centralized and Distributed Firewalls.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
NAF conversion: An efficient solution for the range matching problem in packet filters.
Proceedings of the 12th IEEE International Conference on High Performance Switching and Routing, 2011
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011
2010
Int. J. Secur. Networks, 2010
Automatic Conformance Verification of Distributed Firewalls to Security Requirements.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the iiWAS'2010, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Specification and evaluation of polymorphic shellcode properties using a new temporal logic.
J. Comput. Virol., 2009
Simultaneous checking of completeness and ground confluence for algebraic specifications.
ACM Trans. Comput. Log., 2009
Rank Functions Based Inference System for Group Key Management Protocols Verification.
Int. J. Netw. Secur., 2009
Int. J. Inf. Sec., 2009
Proceedings of the Trust, 2009
Automatic verification of conformance of firewall configurations to security policies.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the CRiSIS 2009, 2009
Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Int. J. Secur. Networks, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008
Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008
Proceedings of the Automated Reasoning, 4th International Joint Conference, 2008
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008
2007
A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems.
Proceedings of the First International Conference on Emerging Security Information, 2007
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2004
Ann. des Télécommunications, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
2002
2001
2000
Proceedings of the Fifteenth IEEE International Conference on Automated Software Engineering, 2000
1998
Proceedings of the Fundamental Approaches to Software Engineering, 1998
1997
1996
Theor. Comput. Sci., 1996
Proceedings of the Rewriting Techniques and Applications, 7th International Conference, 1996
Proceedings of the PRICAI'96: Topics in Artificial Intelligence, 1996
Proceedings of the Computer Aided Verification, 8th International Conference, 1996
1995
Proceedings of the Algebraic Methodology and Software Technology, 1995
1994
Proceedings of the Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26, 1994
Proceedings of the Algebraic and Logic Programming, 4th International Conference, 1994
1993
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993
1992
Proceedings of the Logic Programming and Automated Reasoning, 1992