The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Adel Bouhoula: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sourour Meharouech, Adel Bouhoula, Tarek Abbes
    A Stateful Real Time Intrusion Detection System for high-speed network. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:404-411 [Conf]
  2. Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch
    A Traffic Classification Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:188-193 [Conf]
  3. Adel Bouhoula
    Sufficient Completeness and Parameterized Proofs by Induction. [Citation Graph (0, 0)][DBLP]
    ALP, 1994, pp:23-40 [Conf]
  4. Adel Bouhoula, Michaël Rusinowitch
    SPIKE: A System for Automatic Inductive Proofs. [Citation Graph (0, 0)][DBLP]
    AMAST, 1995, pp:576-577 [Conf]
  5. Adel Bouhoula
    SPIKE: a System for Sufficient Completeness and Parameterized Inductive Proofs. [Citation Graph (0, 0)][DBLP]
    CADE, 1994, pp:836-840 [Conf]
  6. Narjes Berregeb, Adel Bouhoula, Michaël Rusinowitch
    Automated Verification by Induction with Associative-Commutative Operators. [Citation Graph (0, 0)][DBLP]
    CAV, 1996, pp:220-231 [Conf]
  7. Narjes Berregeb, Adel Bouhoula, Michaël Rusinowitch
    Observational Proofs with Critical Contexts. [Citation Graph (0, 0)][DBLP]
    FASE, 1998, pp:38-53 [Conf]
  8. Adel Bouhoula, Michaël Rusinowitch
    Automatic Case Analysis in Proof by Induction. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1993, pp:88-94 [Conf]
  9. Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch
    Protocol Analysis in Intrusion Detection Using Decision Tree. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:404-408 [Conf]
  10. Adel Bouhoula
    Simultaneous Checking of Completeness and Ground Confluence. [Citation Graph (0, 0)][DBLP]
    ASE, 2000, pp:143-0 [Conf]
  11. Adel Bouhoula, Jean-Pierre Jouannaud
    Automata-Driven Automated Induction. [Citation Graph (0, 0)][DBLP]
    LICS, 1997, pp:14-25 [Conf]
  12. Adel Bouhoula, Emmanuel Kounalis, Michaël Rusinowitch
    SPIKE, an Automatic Theorem Prover. [Citation Graph (0, 0)][DBLP]
    LPAR, 1992, pp:460-462 [Conf]
  13. Adel Bouhoula
    General Framework for Mechanizing Induction using Test Set. [Citation Graph (0, 0)][DBLP]
    PRICAI, 1996, pp:1-12 [Conf]
  14. Narjes Berregeb, Adel Bouhoula, Michaël Rusinowitch
    SPIKE-AC: A System for Proofs by Induction in Associative-Commutative Theories. [Citation Graph (0, 0)][DBLP]
    RTA, 1996, pp:428-431 [Conf]
  15. Adel Bouhoula, Jean-Pierre Jouannaud, José Meseguer
    Specification and Proof in Membership Equational Logic. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1997, pp:67-92 [Conf]
  16. Adel Bouhoula, Jean-Pierre Jouannaud
    Automata-Driven Automated Induction. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:169, n:1, pp:1-22 [Journal]
  17. Adel Bouhoula, Michaël Rusinowitch
    Implicit Induction in Conditional Theories. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 1995, v:14, n:2, pp:189-235 [Journal]
  18. Adel Bouhoula
    Automated Theorem Proving by Test Set Induction. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1997, v:23, n:1, pp:47-77 [Journal]
  19. Adel Bouhoula, Emmanuel Kounalis, Michaël Rusinowitch
    Automated Mathematical Induction. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 1995, v:5, n:5, pp:631-668 [Journal]
  20. Adel Bouhoula
    Using Induction and Rewriting to Verify and Complete Parameterized Specifications. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1996, v:170, n:1-2, pp:245-276 [Journal]
  21. Adel Bouhoula, Jean-Pierre Jouannaud, José Meseguer
    Specification and proof in membership equational logic. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:236, n:1-2, pp:35-132 [Journal]
  22. Adel Bouhoula, Michaël Rusinowitch
    Observational proofs by rewriting. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:275, n:1-2, pp:675-698 [Journal]

  23. Collaboration between Security Devices toward improving Network Defense. [Citation Graph (, )][DBLP]


  24. Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. [Citation Graph (, )][DBLP]


  25. Enforcing Access Control to Web Databases. [Citation Graph (, )][DBLP]


  26. Automated Induction with Constrained Tree Automata. [Citation Graph (, )][DBLP]


  27. An Access Control Model for Web Databases. [Citation Graph (, )][DBLP]


  28. Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study. [Citation Graph (, )][DBLP]


  29. Revocation Schemes for Delegation Licences. [Citation Graph (, )][DBLP]


  30. Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. [Citation Graph (, )][DBLP]


  31. Automatic verification of conformance of firewall configurations to security policies. [Citation Graph (, )][DBLP]


  32. Self-adjusting scheme for high speed routers. [Citation Graph (, )][DBLP]


  33. An inference system for detecting firewall filtering rules anomalies. [Citation Graph (, )][DBLP]


  34. An Extended Role-Based Access Control Model for Delegating Obligations. [Citation Graph (, )][DBLP]


  35. A Domain Specific Language for Securing Distributed Systems. [Citation Graph (, )][DBLP]


  36. Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol. [Citation Graph (, )][DBLP]


  37. A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems. [Citation Graph (, )][DBLP]


  38. Honeypot router for routing protocols protection. [Citation Graph (, )][DBLP]


  39. Automated Induction for Complex Data Structures [Citation Graph (, )][DBLP]


Search in 0.065secs, Finished in 0.067secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002