Kamel Adi

Orcid: 0000-0003-2869-0333

According to our database1, Kamel Adi authored at least 47 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Secure Electric Vehicle Dynamic Charging Based on Smart Contracts.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident Reports.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Mitigating Membership Inference Attacks in Machine Learning as a Service.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
POWoT : a Privacy Ontology for the Web of Things.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2022

2021
A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT.
Proceedings of the 2021 Wireless Days, 2021

Access Pattern Hiding in Searchable Encryption.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

2020
Privacy-aware Authentication Scheme for Electric Vehicle In-motion Wireless Charging.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Semantic Representation Based on Deep Learning for Spam Detection.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

2017
A Supervised Approach for Spam Detection Using Text-Based Semantic Representation.
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017

Compliance Verification Algorithm for Computer Systems Security Policies.
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017

Insider Threat Likelihood Assessment for Flexible Access Control.
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017

2016
Evolutionary Game-Based Defense Mechanism in the MANETs.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2015
Information Flow-Based Security Levels Assessment for Access Control Systems.
Proceedings of the E-Technologies - 6th International Conference, 2015

2014
A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

2013
An access control framework for hybrid policies.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Designing flexible access control models for the cloud.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2012
A Framework for Threat Assessment in Access Control Systems.
Proceedings of the Information Security and Privacy Research, 2012

Self-Certified Based Trust Establishment Scheme in Ad-Hoc Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

CatBAC: A generic framework for designing and validating hybrid access control models.
Proceedings of IEEE International Conference on Communications, 2012

2011
Risk-based decision method for access control systems.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

UACML: Unified Access Control Modeling Language.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach.
Proceedings of the SECRYPT 2010, 2010

Risk analysis in access control systems.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Detecting incompleteness in access control policies using data classification schemes.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Risk management in dynamic role based access control systems.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Risk Analysis in Access Control Systems Based on Trust Theories.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems.
Proceedings of the 2010 International Conference on Security & Management, 2010

Secrecy UML Method for Model Transformations.
Proceedings of the Abstract State Machines, 2010

Inconsistency detection method for access control policies.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Formal Specification and Analysis of Firewalls.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

Typing for Conflict Detection in Access Control Policies.
Proceedings of the E-Technologies: Innovation in an Open World, 2009

Robust Key Management scheme for certification in mobile ad-hoc networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Temporalised Epistemic Logic for Reasoning about Agent-Based Systems.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

Using Edit Automata for Rewriting-Based Security Enforcement.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Formal Reasoning for Security Protocol Correctness.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2008

Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon.
Proceedings of the SECRYPT 2008, 2008

2007
Formal Technique for Discovering Complex Attacks in Computer Systems.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2007

A Formal Approach for Security Policy Enforcement in Concurrent Programs.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
A Calculus for Distributed Firewall Specification and Verification.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

Enforcing Security Policies on Programs.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

Automatic generation of attack scenarios for intrusion detection systems.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
Secrecy Correctness for Security Protocols.
Proceedings of the 1st International Conference on Distributed Frameworks for Multimedia Applications (DFMA 2005), 2005

2000
A New Logic for Electronic Commerce Protocols.
Proceedings of the Algebraic Methodology and Software Technology. 8th International Conference, 2000

1996
Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation.
Proceedings of the Algebraic Methodology and Software Technology, 1996


  Loading...