Jaouhar Fattahi
Jaouhar Fattahi
PhD, Université Laval; Professeur Associé; Postdoc at Defence Research and Development, Valcartier
Verified email at - Homepage
Cited by
Cited by
Circular antenna array design for breast cancer detection
K Ouerghi, N Fadlallah, A Smida, R Ghayoula, J Fattahi, N Boulejfen
2017 Sensors Networks Smart and Emerging Technologies (SENSET), 1-4, 2017
Fusion of ANN and SVM classifiers for network attack detection
T Omrani, A Dallali, BC Rhaimi, J Fattahi
2017 18th International Conference on Sciences and Techniques of Automatic …, 2017
Resilience enhancement of cyber-physical systems: a review
SF Mihalache, E Pricop, J Fattahi
Power Systems Resilience: Modeling, Analysis and Practice, 269-287, 2019
Dynamic context-aware and limited resources-aware service adaptation for pervasive computing
M Miraoui, C Tadj, J Fattahi, CB Amar
Advances in Software Engineering 2011, 7-7, 2011
SpaML: a bimodal ensemble learning spam detector based on NLP techniques
J Fattahi, M Mejri
2021 IEEE 5th international conference on cryptography, security and privacy …, 2021
Method for authentication of sensors connected on modbus tcp
E Pricop, J Fattahi, N Parashiv, F Zamfir, E Ghayoula
2017 4th International Conference on Control, Decision and Information …, 2017
Recent developments on industrial control systems resilience
E Pricop, J Fattahi, N Dutta, M Ibrahim
Springer International Publishing, 2020
Secrecy by Witness-Functions
F Jaouhar, M Mohamed, H Hanane
Proceedings of the Formal Methods for Security Workshop co-located with the …, 2014
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications
M Ziadia, J Fattahi, M Mejri, E Pricop
Information 11 (3), 130, 2020
Considerations regarding security issues impact on systems availability
E Pricop, SF Mihalache, N Paraschiv, J Fattahi, F Zamfir
2016 8th International Conference on Electronics, Computers and Artificial …, 2016
Analyse des protocoles cryptographiques par les fonctions témoins
J Fattahi
Université Laval, 2016
Relaxed conditions for secrecy in a role-based specification
J Fattahi, M Mejri, H Houmani
arXiv preprint arXiv:1801.08410, 2018
A slow read attack using cloud
D Ameyed, F Jaafar, J Fattahi
2015 7th International Conference on Electronics, Computers and Artificial …, 2015
Damaged fingerprint recognition by convolutional long short-term memory networks for forensic purposes
J Fattahi, M Mejri
2021 IEEE 5th International Conference on Cryptography, Security and Privacy …, 2021
The theory of witness-functions
J Fattahi, M Mejri, E Pricop
Recent Advances in Systems Safety and Security, 1-19, 2016
Innovative fuzzy approach on analyzing industrial control systems security
E Pricop, SF Mihalache, J Fattahi
Recent Advances in Systems Safety and Security, 223-239, 2016
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols
J Fattahi, M Mejri, H Houmani
arXiv preprint arXiv:1408.2774, 2014
New functions for secrecy on real protocols
J Fattahi, M Mejri, H Houmani
Fourth International Conference on Computer Science, Engineering and …, 2014
Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings
J Fattahi, M Ziadia, M Mejri
New Trends in Intelligent Software Methodologies, Tools and Techniques, 155-165, 2021
Radiation pattern synthesis using hybrid fourier-woodward-lawson-neural networks for reliable mimo antenna systems
E Ghayoula, A Bouallegue, R Ghayoula, J Fattahi, E Pricop, JY Chouinard
2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20