Follow
Jaouhar Fattahi
Jaouhar Fattahi
PhD, Université Laval; Professeur Associé. Postdoc at Defence Research and Development, Valcartier
Verified email at ulaval.ca - Homepage
Title
Cited by
Cited by
Year
Fusion of ANN and SVM classifiers for network attack detection
T Omrani, A Dallali, BC Rhaimi, J Fattahi
2017 18th International Conference on Sciences and Techniques of Automatic …, 2017
322017
Circular antenna array design for breast cancer detection
K Ouerghi, N Fadlallah, A Smida, R Ghayoula, J Fattahi, N Boulejfen
2017 Sensors Networks Smart and Emerging Technologies (SENSET), 1-4, 2017
242017
Dynamic context-aware and limited resources-aware service adaptation for pervasive computing
M Miraoui, C Tadj, J Fattahi, C Ben Amar
Advances in Software Engineering 2011, 2011
182011
Secrecy by Witness-Functions
F Jaouhar, M Mohamed, H Hanane
Proceedings of the Formal Methods for Security Workshop co-located with the …, 2014
14*2014
Method for authentication of sensors connected on modbus tcp
E Pricop, J Fattahi, N Parashiv, F Zamfir, E Ghayoula
2017 4th International Conference on Control, Decision and Information …, 2017
132017
Resilience enhancement of cyber-physical systems: A review
SF Mihalache, E Pricop, J Fattahi
Power Systems Resilience, 269-287, 2019
122019
SpaML: a bimodal ensemble learning spam detector based on NLP techniques
J Fattahi, M Mejri
2021 IEEE 5th International Conference on Cryptography, Security and Privacy …, 2021
112021
Relaxed conditions for secrecy in a role-based specification
J Fattahi, M Mejri, H Houmani
arXiv preprint arXiv:1801.08410, 2018
112018
Considerations regarding security issues impact on systems availability
E Pricop, SF Mihalache, N Paraschiv, J Fattahi, F Zamfir
2016 8th International Conference on Electronics, Computers and Artificial …, 2016
92016
Analyse des protocoles cryptographiques par les fonctions témoins
J Fattahi
92016
A slow read attack using cloud
D Ameyed, F Jaafar, J Fattahi
2015 7th International Conference on Electronics, Computers and Artificial …, 2015
92015
Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes
J Fattahi, M Mejri
2021 IEEE 5th International Conference on Cryptography, Security and Privacy …, 2021
72021
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications
M Ziadia, J Fattahi, M Mejri, E Pricop
Information 11 (3), 130, 2020
72020
Recent Developments on Industrial Control Systems Resilience
E Pricop
Springer International Publishing, 2020
72020
The theory of witness-functions
J Fattahi, M Mejri, E Pricop
Recent Advances in Systems Safety and Security, 1-19, 2016
72016
Innovative fuzzy approach on analyzing industrial control systems security
E Pricop, SF Mihalache, J Fattahi
Recent Advances in Systems Safety and Security, 223-239, 2016
72016
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols
J Fattahi, M Mejri, H Houmani
arXiv preprint arXiv:1408.2774, 2014
62014
New functions for secrecy on real protocols
J Fattahi, M Mejri, H Houmani
Fourth International Conference on Computer Science, Engineering and …, 2014
62014
Introduction to the witness-functions for secrecy in cryptographic protocols
J Fattahi, M Mejri, H Houmani
International Journal of Modeling and Optimization 5 (3), 186, 2015
52015
Radiation pattern synthesis using hybrid fourier-woodward-lawson-neural networks for reliable mimo antenna systems
E Ghayoula, A Bouallegue, R Ghayoula, J Fattahi, E Pricop, JY Chouinard
2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2017
42017
The system can't perform the operation now. Try again later.
Articles 1–20