Kamel Adi
Orcid: 0000-0003-2869-0333
According to our database1,
Kamel Adi
authored at least 66 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on w3.uqo.ca
On csauthors.net:
Bibliography
2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Enhancing Privacy in Machine Learning: A Robust Approach for Preventing Attribute Inference Attacks.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
When Rewards Deceive: Counteracting Reward Poisoning on Online Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident Reports.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
2022
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2022
2021
Proceedings of the 2021 Wireless Days, 2021
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021
2020
Comput. Secur., 2020
Privacy-aware Authentication Scheme for Electric Vehicle In-motion Wireless Charging.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
2019
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority.
Peer-to-Peer Netw. Appl., 2019
A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
2018
Comput. Secur., 2018
2017
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets.
Int. J. Inf. Sec., 2017
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017
2016
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
2015
Comput. Commun., 2015
Proceedings of the E-Technologies - 6th International Conference, 2015
2014
A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
2012
A Quantitative Approach for Intrusions Detection and Prevention based on Statistical N-Gram Models.
Proceedings of the 3rd International Conference on Ambient Systems, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
CatBAC: A generic framework for designing and validating hybrid access control models.
Proceedings of IEEE International Conference on Communications, 2012
2011
J. Symb. Comput., 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
2010
Secur. Commun. Networks, 2010
Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
Detecting incompleteness in access control policies using data classification schemes.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010
Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems.
Proceedings of the 2010 International Conference on Security & Management, 2010
Proceedings of the Abstract State Machines, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009
Proceedings of the E-Technologies: Innovation in an Open World, 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2008
Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon.
Proceedings of the SECRYPT 2008, 2008
2007
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2007
A Formal Approach for Security Policy Enforcement in Concurrent Programs.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
Ann. des Télécommunications, 2006
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
2005
Proceedings of the 1st International Conference on Distributed Frameworks for Multimedia Applications (DFMA 2005), 2005
2003
2001
Proceedings of the Logical Aspects of Cryptographic Protocol Verification, 2001
1996
Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation.
Proceedings of the Algebraic Methodology and Software Technology, 1996