Circular antenna array design for breast cancer detection K Ouerghi, N Fadlallah, A Smida, R Ghayoula, J Fattahi, N Boulejfen 2017 Sensors Networks Smart and Emerging Technologies (SENSET), 1-4, 2017 | 41 | 2017 |
Fusion of ANN and SVM classifiers for network attack detection T Omrani, A Dallali, BC Rhaimi, J Fattahi 2017 18th International Conference on Sciences and Techniques of Automatic …, 2017 | 38 | 2017 |
Resilience enhancement of cyber-physical systems: A review SF Mihalache, E Pricop, J Fattahi Power Systems Resilience: Modeling, Analysis and Practice, 269-287, 2019 | 20 | 2019 |
SpaML: a bimodal ensemble learning spam detector based on NLP techniques J Fattahi, M Mejri 2021 IEEE 5th international conference on cryptography, security and privacy …, 2021 | 19 | 2021 |
Dynamic context-aware and limited resources-aware service adaptation for pervasive computing M Miraoui, C Tadj, J Fattahi, CB Amar Advances in Software Engineering 2011, 7-7, 2011 | 18 | 2011 |
Method for authentication of sensors connected on modbus tcp E Pricop, J Fattahi, N Parashiv, F Zamfir, E Ghayoula 2017 4th International Conference on Control, Decision and Information …, 2017 | 16 | 2017 |
Secrecy by Witness-Functions F Jaouhar, M Mohamed, H Hanane Proceedings of the Formal Methods for Security Workshop co-located with the …, 2014 | 14* | 2014 |
Recent developments on industrial control systems resilience E Pricop, J Fattahi, N Dutta, M Ibrahim Springer International Publishing, 2020 | 13 | 2020 |
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications M Ziadia, J Fattahi, M Mejri, E Pricop Information 11 (3), 130, 2020 | 12 | 2020 |
Considerations regarding security issues impact on systems availability E Pricop, SF Mihalache, N Paraschiv, J Fattahi, F Zamfir 2016 8th International Conference on Electronics, Computers and Artificial …, 2016 | 12 | 2016 |
Analyse des protocoles cryptographiques par les fonctions témoins J Fattahi | 12 | 2016 |
Relaxed conditions for secrecy in a role-based specification J Fattahi, M Mejri, H Houmani arXiv preprint arXiv:1801.08410, 2018 | 11 | 2018 |
A slow read attack using cloud D Ameyed, F Jaafar, J Fattahi 2015 7th International Conference on Electronics, Computers and Artificial …, 2015 | 11 | 2015 |
Damaged fingerprint recognition by convolutional long short-term memory networks for forensic purposes J Fattahi, M Mejri 2021 IEEE 5th International Conference on Cryptography, Security and Privacy …, 2021 | 8 | 2021 |
The theory of witness-functions J Fattahi, M Mejri, E Pricop Recent Advances in Systems Safety and Security, 1-19, 2016 | 8 | 2016 |
Innovative fuzzy approach on analyzing industrial control systems security E Pricop, SF Mihalache, J Fattahi Recent Advances in Systems Safety and Security, 223-239, 2016 | 7 | 2016 |
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols J Fattahi, M Mejri, H Houmani arXiv preprint arXiv:1408.2774, 2014 | 6 | 2014 |
New functions for secrecy on real protocols J Fattahi, M Mejri, H Houmani Fourth International Conference on Computer Science, Engineering and …, 2014 | 6 | 2014 |
Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings J Fattahi, M Ziadia, M Mejri New Trends in Intelligent Software Methodologies, Tools and Techniques, 155-165, 2021 | 5* | 2021 |
Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting M Ziadia, M Mejri, J Fattahi New Trends in Intelligent Software Methodologies, Tools and Techniques, 85-98, 2021 | 4* | 2021 |