


default search action
Adel Bouhoula
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j39]Sondes Ksibi, Faouzi Jaïdi, Adel Bouhoula:
MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT). Int. J. Inf. Sec. 24(1): 21 (2025) - 2024
- [j38]Sondes Ksibi, Faouzi Jaïdi, Adel Bouhoula:
Securing IoMT Applications: A n Approach for Enhancing the Reliability of Security Policies within Cloud Databases. J. Inf. Sci. Eng. 40(6): 1197-1209 (2024) - [c98]Adel Bouhoula, Miki Hermann:
Primal Grammars Driven Automated Induction. IJCAI 2024: 3259-3269 - 2023
- [j37]Adel Bouhoula, Bruno Buchberger, Tetsuo Ida, Temur Kutsia
:
Preface. Ann. Math. Artif. Intell. 91(5): 563-565 (2023) - [j36]Adel Bouhoula, Bruno Buchberger, Tetsuo Ida, Temur Kutsia:
Correction to: Preface. Ann. Math. Artif. Intell. 91(5): 567 (2023) - [j35]Soumaya Nheri, Riadh Ksantini, Mohamed Bécha Kaâniche
, Adel Bouhoula:
Exploiting scatter matrix on one-class support vector machine based on low variance direction. Intell. Data Anal. 27(6): 1663-1679 (2023) - [j34]Sondes Ksibi, Faouzi Jaïdi
, Adel Bouhoula:
A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach. Mob. Networks Appl. 28(1): 107-127 (2023) - [j33]Safa Mefteh
, Mohamed Bécha Kaâniche
, Riadh Ksantini
, Adel Bouhoula
:
A novel multispectral corner detector and a new local descriptor: an application to human posture recognition. Multim. Tools Appl. 82(19): 28937-28956 (2023) - [c97]Safa Mefteh
, Mohamed Bécha Kaâniche
, Riadh Ksantini
, Adel Bouhoula
:
Learning Human Postures Using Lab-Depth HOG Descriptors. ICCCI 2023: 552-564 - [c96]Mehdi Houichi, Faouzi Jaïdi
, Adel Bouhoula:
A Comprehensive Study of Intrusion Detection within Internet of Things-based Smart Cities: Synthesis, Analysis and a Novel Approach. IWCMC 2023: 505-511 - [c95]Amina Sahbi, Faouzi Jaïdi
, Adel Bouhoula:
Machine Learning Algorithms for Enhancing Intrusion Detection Within SDN/NFV. IWCMC 2023: 602-607 - [c94]Sondes Ksibi, Faouzi Jaïdi
, Adel Bouhoula:
IoMT Security Model based on Machine Learning and Risk Assessment Techniques. IWCMC 2023: 614-619 - [c93]Amina Sahbi, Faouzi Jaïdi
, Adel Bouhoula:
Towards a Reliable and Smart Approach for Detecting and Resolving Security Violations within SDWN. IWCMC 2023: 884-889 - 2022
- [j32]Taha Elamine Hadjadj
, Adel Bouhoula, Rim Tebourbi, Riadh Ksantini:
Optimization of parallel firewalls filtering rules. Int. J. Inf. Sec. 21(2): 323-340 (2022) - [c92]Ahmad Abboud, Rémi Garcia
, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula, Mondher Ayadi:
Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks. NOMS 2022: 1-9 - [c91]Mehdi Houichi, Faouzi Jaïdi
, Adel Bouhoula:
Analysis of Smart Cities Security: Challenges and Advancements. SIN 2022: 1-5 - [c90]Sondes Ksibi, Faouzi Jaïdi
, Adel Bouhoula:
A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment. SIN 2022: 1-7 - [c89]Amina Sahbi, Faouzi Jaïdi
, Adel Bouhoula:
Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal. SIN 2022: 1-7 - 2021
- [c88]Mohamed Khalil Ben Salah, Takoua Kefi-Fatteh, Adel Bouhoula:
A Novel Face Detection Framework Based on Incremental Learning and Low Variance Directions. ADMA 2021: 326-337 - [c87]Mehdi Houichi, Faouzi Jaïdi
, Adel Bouhoula:
A Systematic Approach for IoT Cyber-Attacks Detection in Smart Cities Using Machine Learning Techniques. AINA (2) 2021: 215-228 - [c86]Pierrette Annie Evina, Faouzi Jaïdi, Faten Labbene Ayachi, Adel Bouhoula:
Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database Application. ENASE 2021: 348-355 - [c85]Sondes Ksibi, Faouzi Jaïdi
, Adel Bouhoula:
Cyber-Risk Management within IoMT: a Context-aware Agent-based Framework for a Reliable e-Health System. iiWAS 2021: 547-552 - 2020
- [j31]Faouzi Jaïdi
, Faten Ayachi, Adel Bouhoula:
Advanced analysis of the integrity of access control policies: the specific case of databases. Int. Arab J. Inf. Technol. 17(5): 808-815 (2020) - [c84]Ahmad Abboud, Rémi Garcia
, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula:
R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks. CNSM 2020: 1-4 - [c83]Wejdene Saied, Adel Bouhoula:
A Formal Approach for Automatic Detection and Correction of SDN Switch Misconfigurations. CNSM 2020: 1-5 - [c82]Wejdene Saied, Faouzi Jaïdi
, Adel Bouhoula:
A Comprehensive Solution for the Analysis, Validation and Optimization of SDN Data-Plane Configurations. CNSM 2020: 1-7 - [c81]Sondes Ksibi, Faouzi Jaïdi
, Adel Bouhoula:
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems. ICETE (2) 2020: 652-657 - [c80]Ahmad Abboud, Abdelkader Lahmadi, Michaël Rusinowitch, Miguel Couceiro
, Adel Bouhoula, Mondher Avadi:
Double Mask: An Efficient Rule Encoding for Software Defined Networking. ICIN 2020: 186-193 - [c79]Pierrette Annie Evina, Faouzi Jaïdi
, Faten Labbene Ayachi, Adel Bouhoula:
Enforcing Risk-Awareness in Access Control Systems: Synthesis, Discussion and Guidelines. IWCMC 2020: 433-438 - [c78]Ramtin Aryan, Anis Yazidi, Adel Bouhoula, Paal Einar Engelstad:
Net Auto-Solver: A formal approach for automatic resolution of OpenFlow anomalies. LCN 2020: 357-360 - [c77]Ahmad Abboud, Rémi Garcia
, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula:
Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks. NCA 2020: 1-10 - [c76]Yves Nsoga Nguimbous, Riadh Ksantini, Adel Bouhoula:
A Low Inertia Guided Auto-Encoder for Anomaly Detection in Networks. SoftCOM 2020: 1-6 - [c75]Soumaya Nheri, Riadh Ksantini, Mohamed Bécha Kaâniche
, Adel Bouhoula:
A Novel Dispersion Covariance-guided One-Class Support Vector Machines. VISIGRAPP (4: VISAPP) 2020: 546-553
2010 – 2019
- 2019
- [j30]Takoua Kefi-Fatteh
, Riadh Ksantini, Mohamed Bécha Kaâniche
, Adel Bouhoula:
A novel incremental one-class support vector machine based on low variance direction. Pattern Recognit. 91: 308-321 (2019) - [j29]Takoua Kefi-Fatteh
, Riadh Ksantini, Mohamed Bécha Kaâniche
, Adel Bouhoula:
Human face detection improvement using incremental learning based on low variance directions. Signal Image Video Process. 13(8): 1503-1510 (2019) - [c74]Pierrette Annie Evina, Faten Labbene Ayachi, Faouzi Jaïdi
, Adel Bouhoula:
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement. IWCMC 2019: 1866-1871 - [c73]Ahmad Abboud, Abdelkader Lahmadi, Michaël Rusinowitch, Miguel Couceiro
, Adel Bouhoula:
Poster : Minimizing range rules for packet filtering using a double mask representation. Networking 2019: 1-2 - [c72]Taha Elamine Hadjadj, Rim Tebourbi, Adel Bouhoula, Riadh Ksantini:
Optimization of Parallel Firewalls Filtering Rules. SoftCOM 2019: 1-6 - [c71]Yves Nsoga Nguimbous, Riadh Ksantini, Adel Bouhoula:
Anomaly-based Intrusion Detection Using Auto-encoder. SoftCOM 2019: 1-5 - [c70]Wejdene Saied, Nihel Ben Youssef Ben Souayeh, Amina Saadaoui, Adel Bouhoula:
Deep and Automated SDN Data Plane Analysis. SoftCOM 2019: 1-6 - [c69]Safa Mefteh
, Mohamed Bécha Kaâniche
, Riadh Ksantini, Adel Bouhoula:
A Novel Multispectral Lab-depth based Edge Detector for Color Images with Occluded Objects. VISIGRAPP (4: VISAPP) 2019: 272-279 - 2018
- [j28]Faouzi Jaïdi
, Faten Labbene Ayachi, Adel Bouhoula:
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. Secur. Commun. Networks 2018: 7142170:1-7142170:22 (2018) - [c68]Pierrette Annie Evina, Faten Labbene Ayachi, Faouzi Jaïdi
, Adel Bouhoula:
Anomalies Correlation for Risk-Aware Access Control Enhancement. ENASE 2018: 299-304 - [c67]Amina Saâdaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
Automated and Optimized Formal Approach to Verify SDN Access-Control Misconfigurations. TRIDENTCOM 2018: 96-112 - [c66]Soumaya Nheri, Riadh Ksantini, Mouhamed Bécha Kaâniche
, Adel Bouhoula:
A Novel Handwritten Digits Recognition Method based on Subclass Low Variances Guided Support Vector Machine. VISIGRAPP (4: VISAPP) 2018: 28-36 - 2017
- [j27]Amina Saâdaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
FARE: FDD-based firewall anomalies resolution tool. J. Comput. Sci. 23: 181-191 (2017) - [c65]Takoua Kefi, Riadh Ksantini, Mohamed Bécha Kaâniche
, Adel Bouhoula:
Human Face Detection Improvement Using Incremental Learning Based on Low Variance Directions. ACIVS 2017: 170-179 - [c64]Sirine Sayadi, Tarek Abbes, Adel Bouhoula:
Detection of Covert Channels Over ICMP Protocol. AICCSA 2017: 1247-1252 - [c63]Amina Saâdaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
A New FDD-Based Method for Distributed Firewall Misconfigurations Resolution. EMCIS 2017: 369-383 - [c62]Amina Saâdaoui, Nihel Ben Youssef, Adel Bouhoula:
Automatic detection and correction of firewall misconfigurations- A formal approach. SCSS 2017: 68-76 - [c61]Pierrette Annie Evina, Faten Labbene Ayachi, Faouzi Jaïdi, Adel Bouhoula:
Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems. SCSS 2017: 77-82 - [c60]Faouzi Jaïdi, Faten Labbene Ayachi, Adel Bouhoula:
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment. SCSS 2017: 120-132 - 2016
- [j26]Randa Jabeur Ben Chikha
, Tarek Abbes, Wassim Ben Chikha
, Adel Bouhoula:
Behavior-based approach to detect spam over IP telephony attacks. Int. J. Inf. Sec. 15(2): 131-143 (2016) - [j25]Tarek Abbes
, Adel Bouhoula, Michaël Rusinowitch:
Detection of firewall configuration errors with updatable tree. Int. J. Inf. Sec. 15(3): 301-317 (2016) - [j24]Faouzi Jaïdi
, Faten Labbene Ayachi, Adel Bouhoula:
Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare. J. Medical Syst. 40(12): 262:1-262:9 (2016) - [c59]Randa Jabeur Ben Chikha, Tarek Abbes, Adel Bouhoula:
Risk management for spam over IP telephony using optimal countermeasure. ICDEc 2016: 53-59 - [c58]Randa Jabeur Ben Chikha, Tarek Abbes, Adel Bouhoula:
Risk Management for Spam over IP Telephony using Combined Countermeasures. INFOS 2016: 240-246 - [c57]Anis Yazidi, Adel Bouhoula:
On Assisted Packet Filter Conflicts Resolution: An Iterative Relaxed Approach. LCN 2016: 35-42 - [c56]Takoua Kefi, Riadh Ksantini, Mohamed Bécha Kaâniche
, Adel Bouhoula:
A Novel Incremental Covariance-Guided One-Class Support Vector Machine. ECML/PKDD (2) 2016: 17-32 - [c55]Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
An Accurate FDD-Based Approach for Discovering Distributed Firewalls Misconfigurations. Trustcom/BigDataSE/ISPA 2016: 552-559 - [i4]Takoua Kefi, Riadh Ksantini, Mohamed Bécha Kaâniche
, Adel Bouhoula:
Incremental One-Class Models for Data Classification. CoRR abs/1610.04725 (2016) - 2015
- [j23]Abdeljebar Ameziane El Hassani, Anas Abou El Kalam
, Adel Bouhoula, Ryma Abassi, Abdellah Ait Ouahman:
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity. Int. J. Inf. Sec. 14(4): 367-385 (2015) - [j22]Adel Bouhoula, Bruno Buchberger, Laura Kovács
, Temur Kutsia
:
Special issue on symbolic computation in software science. J. Symb. Comput. 69: 1-2 (2015) - [c54]Amina Saadaoui, Hajar Benmoussa, Adel Bouhoula, Anas Abou El Kalam:
Automatic Classification and Detection of Snort Configuration Anomalies - a Formal Approach. CISIS-ICEUTE 2015: 27-39 - [c53]Maherzia Belaazi, Hanene Boussi Rahmouni
, Adel Bouhoula:
An Ontology Regulating Privacy Oriented Access Controls. CRiSIS 2015: 17-35 - [c52]Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
Automated and Optimized FDD-Based Method to Fix Firewall Misconfigurations. NCA 2015: 63-67 - 2014
- [j21]Abdallah Ghourabi
, Tarek Abbes, Adel Bouhoula:
Characterization of attacks collected from the deployment of Web service honeypot. Secur. Commun. Networks 7(2): 338-351 (2014) - [c51]Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
Formal approach for managing firewall misconfigurations. RCIS 2014: 1-10 - [c50]Abdallah Ghourabi
, Tarek Abbes, Adel Bouhoula:
Behavior Analysis of Web Service Attacks. SEC 2014: 366-379 - [c49]Maherzia Belaazi, Hanene Boussi Rahmouni, Adel Bouhoula:
Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud. SECRYPT 2014: 463-468 - 2013
- [c48]Randa Jabeur Ben Chikha, Tarek Abbes, Adel Bouhoula:
A SPIT detection algorithm based on user's call behavior. SoftCOM 2013: 1-5 - [e1]Adel Bouhoula, Tetsuo Ida, Fairouz Kamareddine:
Proceedings Fourth International Symposium on Symbolic Computation in Software Science, SCSS 2012, Gammarth, Tunisia, 15-17 December 2012. EPTCS 122, 2013 [contents] - 2012
- [j20]Nizar Ben Neji
, Adel Bouhoula:
A prefix-based approach for managing hybrid specifications in complex packet filtering. Comput. Networks 56(13): 3055-3064 (2012) - [j19]Nizar Ben Neji
, Adel Bouhoula:
Managing hybrid packet filter's specifications. Int. J. Secur. Networks 7(2): 73-82 (2012) - [j18]Adel Bouhoula, Florent Jacquemard:
Sufficient completeness verification for conditional and constrained TRS. J. Appl. Log. 10(1): 127-143 (2012) - [c47]Abdallah Ghourabi
, Tarek Abbes, Adel Bouhoula:
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques. CISIS/ICEUTE/SOCO Special Sessions 2012: 1-11 - [c46]Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
Towards Safe and Optimal Network Designs Based on Network Security Requirements. TrustCom 2012: 573-579 - [i3]Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
Formal Checking of Multiple Firewalls. CoRR abs/1207.3691 (2012) - 2011
- [j17]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Network Security Alerts Management Architecture for Signature-Based Intrusions Detection Systems within a NAT Environment. J. Netw. Syst. Manag. 19(4): 472-495 (2011) - [j16]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Trusted intrusion detection architecture for high-speed networks based on traffic classification, load balancing and high availability mechanism. Secur. Commun. Networks 4(4): 384-394 (2011) - [c45]Nihel Ben Youssef, Adel Bouhoula:
A Fully Automatic Approach for Fixing Firewall Misconfigurations. CIT 2011: 461-466 - [c44]Nihel Ben Youssef, Adel Bouhoula:
Dealing with Stateful Firewall Checking. DICTAP (1) 2011: 493-507 - [c43]Nizar Ben Neji
, Adel Bouhoula:
NAF conversion: An efficient solution for the range matching problem in packet filters. HPSR 2011: 24-29 - [c42]Nizar Ben Neji
, Adel Bouhoula, Masato Kimura:
Enabling flexible packet filtering through the K-map priority elimination technique. LCN 2011: 1-8 - [c41]Nizar Ben Neji
, Adel Bouhoula:
Towards safe and optimal filtering rule reordering for complex packet filters. NSS 2011: 153-160 - [c40]Nihel Ben Youssef, Adel Bouhoula:
Systematic Deployment of Network Security Policy in Centralized and Distributed Firewalls. SocialCom/PASSAT 2011: 1214-1219 - [c39]Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:
Design and implementation of Web service honeypot. SoftCOM 2011: 1-5 - 2010
- [j15]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
A delegation model for extended RBAC. Int. J. Inf. Sec. 9(3): 209-236 (2010) - [j14]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
Efficient decision tree for protocol analysis in intrusion detection. Int. J. Secur. Networks 5(4): 220-235 (2010) - [c38]Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene:
Enforcing Access Control to Web Databases. CIT 2010: 612-619 - [c37]Abdallah Ghourabi
, Tarek Abbes, Adel Bouhoula:
Data analyzer based on data mining for Honeypot Router. AICCSA 2010: 1-6 - [c36]Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene Ayachi:
An Access Control Model for Web Databases. DBSec 2010: 287-294 - [c35]Abdallah Ghourabi
, Tarek Abbes, Adel Bouhoula:
Experimental analysis of attacks against web services and countermeasures. iiWAS 2010: 195-201 - [c34]Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene:
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases. SECURWARE 2010: 135-140 - [c33]Nihel Ben Youssef, Adel Bouhoula:
Automatic Conformance Verification of Distributed Firewalls to Security Requirements. SocialCom/PASSAT 2010: 834-841 - [i2]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
Managing Delegation in Access Control Models. CoRR abs/1012.2720 (2010)
2000 – 2009
- 2009
- [j13]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Ensuring security in depth based on heterogeneous network security technologies. Int. J. Inf. Sec. 8(4): 233-246 (2009) - [j12]Amjad Gawanmeh, Adel Bouhoula, Sofiène Tahar:
Rank Functions Based Inference System for Group Key Management Protocols Verification. Int. J. Netw. Secur. 8(2): 187-198 (2009) - [j11]Adel Bouhoula:
Simultaneous checking of completeness and ground confluence for algebraic specifications. ACM Trans. Comput. Log. 10(3): 20:1-20:33 (2009) - [j10]Mehdi Talbi, Mohamed Mejri, Adel Bouhoula:
Specification and evaluation of polymorphic shellcode properties using a new temporal logic. J. Comput. Virol. 5(3): 171-186 (2009) - [c32]Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula:
Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. ARES 2009: 281-288 - [c31]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives. CICS 2009: 107-114 - [c30]Abdallah Ghourabi
, Tarek Abbes, Adel Bouhoula:
Honeypot router for routing protocols protection. CRiSIS 2009: 127-130 - [c29]Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula:
Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol. CSE (2) 2009: 802-808 - [c28]Nihel Ben Youssef, Adel Bouhoula, Florent Jacquemard:
Automatic verification of conformance of firewall configurations to security policies. ISCC 2009: 526-531 - [c27]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
An Extended Role-Based Access Control Model for Delegating Obligations. TrustBus 2009: 127-137 - 2008
- [j9]Adel Bouhoula, Zouheir Trabelsi, Ezedin Barka, Mohammed Anis Benelbahri:
Firewall filtering rules analysis for anomalies detection. Int. J. Secur. Networks 3(3): 161-172 (2008) - [c26]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Collaboration between Security Devices toward improving Network Defense. ACIS-ICIS 2008: 13-18 - [c25]Adel Bouhoula, Florent Jacquemard:
Automated Induction with Constrained Tree Automata. IJCAR 2008: 539-554 - [c24]Soutaro Matsumoto, Adel Bouhoula:
Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements. CISIS 2008: 123-130 - [c23]Nizar Ben Neji
, Adel Bouhoula:
Dynamic Scheme for Packet Classification Using Splay Trees. CISIS 2008: 211-218 - [c22]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
Revocation Schemes for Delegation Licences. ICICS 2008: 190-205 - [c21]Mehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohamed Mejri:
Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study. ICICS 2008: 403-418 - [c20]Nizar Ben Neji
, Adel Bouhoula:
Self-adjusting scheme for high speed routers. LCN 2008: 542-543 - [c19]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
An inference system for detecting firewall filtering rules anomalies. SAC 2008: 2122-2128 - [i1]Adel Bouhoula, Florent Jacquemard:
Automated Induction for Complex Data Structures. CoRR abs/0811.4720 (2008) - 2007
- [c18]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
A Traffic Classification Algorithm for Intrusion Detection. AINA Workshops (1) 2007: 188-193 - [c17]Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
A Stateful Real Time Intrusion Detection System for high-speed network. AINA 2007: 404-411 - [c16]Hédi Hamdi, Mohamed Mosbah
, Adel Bouhoula:
A Domain Specific Language for Securing Distributed Systems. ICSNC 2007: 76 - [c15]Mohammed Anis Benelbahri, Adel Bouhoula:
Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. ISCC 2007: 63-70 - [c14]Hédi Hamdi, Adel Bouhoula, Mohamed Mosbah
:
A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems. SECURWARE 2007: 187-192 - 2004
- [j8]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
On the fly pattern matching for intrusion detection with Snort. Ann. des Télécommunications 59(9-10): 1045-1071 (2004) - [c13]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
Protocol Analysis in Intrusion Detection Using Decision Tree. ITCC (1) 2004: 404-408 - 2002
- [j7]Adel Bouhoula, Michaël Rusinowitch:
Observational proofs by rewriting. Theor. Comput. Sci. 275(1-2): 675-698 (2002) - 2001
- [j6]Adel Bouhoula, Jean-Pierre Jouannaud:
Automata-Driven Automated Induction. Inf. Comput. 169(1): 1-22 (2001) - 2000
- [j5]Adel Bouhoula, Jean-Pierre Jouannaud, José Meseguer:
Specification and proof in membership equational logic. Theor. Comput. Sci. 236(1-2): 35-132 (2000) - [c12]Adel Bouhoula:
Simultaneous Checking of Completeness and Ground Confluence. ASE 2000: 143-
1990 – 1999
- 1998
- [c11]Narjes Berregeb, Adel Bouhoula, Michaël Rusinowitch:
Observational Proofs with Critical Contexts. FASE 1998: 38-53 - 1997
- [j4]Adel Bouhoula:
Automated Theorem Proving by Test Set Induction. J. Symb. Comput. 23(1): 47-77 (1997) - [c10]Adel Bouhoula, Jean-Pierre Jouannaud:
Automata-Driven Automated Induction. LICS 1997: 14-25 - [c9]Adel Bouhoula, Jean-Pierre Jouannaud, José Meseguer:
Specification and Proof in Membership Equational Logic. TAPSOFT 1997: 67-92 - 1996
- [j3]Adel Bouhoula:
Using Induction and Rewriting to Verify and Complete Parameterized Specifications. Theor. Comput. Sci. 170(1-2): 245-276 (1996) - [c8]Narjes Berregeb, Adel Bouhoula, Michaël Rusinowitch:
Automated Verification by Induction with Associative-Commutative Operators. CAV 1996: 220-231 - [c7]Adel Bouhoula:
General Framework for Mechanizing Induction using Test Set. PRICAI 1996: 1-12 - [c6]Narjes Berregeb, Adel Bouhoula, Michaël Rusinowitch:
SPIKE-AC: A System for Proofs by Induction in Associative-Commutative Theories. RTA 1996: 428-431 - 1995
- [j2]Adel Bouhoula, Michaël Rusinowitch:
Implicit Induction in Conditional Theories. J. Autom. Reason. 14(2): 189-235 (1995) - [j1]Adel Bouhoula, Emmanuel Kounalis, Michaël Rusinowitch:
Automated Mathematical Induction. J. Log. Comput. 5(5): 631-668 (1995) - [c5]Adel Bouhoula, Michaël Rusinowitch:
SPIKE: A System for Automatic Inductive Proofs. AMAST 1995: 576-577 - 1994
- [c4]Adel Bouhoula:
Sufficient Completeness and Parameterized Proofs by Induction. ALP 1994: 23-40 - [c3]Adel Bouhoula:
SPIKE: a System for Sufficient Completeness and Parameterized Inductive Proofs. CADE 1994: 836-840 - 1993
- [c2]Adel Bouhoula, Michaël Rusinowitch:
Automatic Case Analysis in Proof by Induction. IJCAI 1993: 88-94 - 1992
- [c1]Adel Bouhoula, Emmanuel Kounalis, Michaël Rusinowitch:
SPIKE, an Automatic Theorem Prover. LPAR 1992: 460-462
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint