Kamel Adi

Orcid: 0000-0003-2869-0333

According to our database1, Kamel Adi authored at least 66 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward the Foundation of Digital Identity Theory.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Enhancing Privacy in Machine Learning: A Robust Approach for Preventing Attribute Inference Attacks.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

When Rewards Deceive: Counteracting Reward Poisoning on Online Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Secure Electric Vehicle Dynamic Charging Based on Smart Contracts.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident Reports.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Mitigating Membership Inference Attacks in Machine Learning as a Service.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
POWoT : a Privacy Ontology for the Web of Things.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2022

2021
A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT.
Proceedings of the 2021 Wireless Days, 2021

Access Pattern Hiding in Searchable Encryption.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

2020
A semantic-based classification approach for an enhanced spam detection.
Comput. Secur., 2020

Privacy-aware Authentication Scheme for Electric Vehicle In-motion Wireless Charging.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority.
Peer-to-Peer Netw. Appl., 2019

A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Semantic Representation Based on Deep Learning for Spam Detection.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

2018
An auto-learning approach for network intrusion detection.
Telecommun. Syst., 2018

An efficient intrusion detection in resource-constrained mobile ad-hoc networks.
Comput. Secur., 2018

Automatic security policy enforcement in computer systems.
Comput. Secur., 2018

2017
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets.
Int. J. Inf. Sec., 2017

A Supervised Approach for Spam Detection Using Text-Based Semantic Representation.
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017

Compliance Verification Algorithm for Computer Systems Security Policies.
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017

Insider Threat Likelihood Assessment for Flexible Access Control.
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017

2016
Evolutionary Game-Based Defense Mechanism in the MANETs.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2015
Efficient certificateless web-of-trust model for public-key authentication in MANET.
Comput. Commun., 2015

Information Flow-Based Security Levels Assessment for Access Control Systems.
Proceedings of the E-Technologies - 6th International Conference, 2015

2014
A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

2013
A framework for risk assessment in access control systems.
Comput. Secur., 2013

An access control framework for hybrid policies.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Designing flexible access control models for the cloud.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2012
A Quantitative Approach for Intrusions Detection and Prevention based on Statistical N-Gram Models.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Dynamic risk-based decision methods for access control systems.
Comput. Secur., 2012

A Framework for Threat Assessment in Access Control Systems.
Proceedings of the Information Security and Privacy Research, 2012

Self-Certified Based Trust Establishment Scheme in Ad-Hoc Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

CatBAC: A generic framework for designing and validating hybrid access control models.
Proceedings of IEEE International Conference on Communications, 2012

2011
Formal enforcement of security policies on concurrent systems.
J. Symb. Comput., 2011

An analytic tableau calculus for a temporalised belief logic.
J. Appl. Log., 2011

Risk-based decision method for access control systems.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

UACML: Unified Access Control Modeling Language.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
Secure and robust threshold key management (SRKM) scheme for <i>ad hoc</i> networks.
Secur. Commun. Networks, 2010

Games for non-repudiation protocol correctness.
Int. J. Wirel. Mob. Comput., 2010

Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach.
Proceedings of the SECRYPT 2010, 2010

Risk analysis in access control systems.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Detecting incompleteness in access control policies using data classification schemes.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Risk management in dynamic role based access control systems.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Risk Analysis in Access Control Systems Based on Trust Theories.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems.
Proceedings of the 2010 International Conference on Security & Management, 2010

Secrecy UML Method for Model Transformations.
Proceedings of the Abstract State Machines, 2010

Inconsistency detection method for access control policies.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Formal Specification and Analysis of Firewalls.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

Typing for Conflict Detection in Access Control Policies.
Proceedings of the E-Technologies: Innovation in an Open World, 2009

Robust Key Management scheme for certification in mobile ad-hoc networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Temporalised Epistemic Logic for Reasoning about Agent-Based Systems.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

Using Edit Automata for Rewriting-Based Security Enforcement.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Formal Reasoning for Security Protocol Correctness.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2008

Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon.
Proceedings of the SECRYPT 2008, 2008

2007
Formal Technique for Discovering Complex Attacks in Computer Systems.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2007

A Formal Approach for Security Policy Enforcement in Concurrent Programs.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Foreword - New technologies in distributed systems.
Ann. des Télécommunications, 2006

A Calculus for Distributed Firewall Specification and Verification.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

Enforcing Security Policies on Programs.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

Automatic generation of attack scenarios for intrusion detection systems.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
Secrecy Correctness for Security Protocols.
Proceedings of the 1st International Conference on Distributed Frameworks for Multimedia Applications (DFMA 2005), 2005

2003
A new logic for electronic commerce protocols.
Theor. Comput. Sci., 2003

2001
Abstract interpretation for proving secrecy properties in security protocols.
Proceedings of the Logical Aspects of Cryptographic Protocol Verification, 2001

1996
Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation.
Proceedings of the Algebraic Methodology and Software Technology, 1996


  Loading...