Skip to Main content Skip to Navigation

inria-00596236v1  Journal articles
A. A. FallAbderrahman IggidrGauthier SalletJean-Jules Tewa. Epidemiological models and Lyapunov functions
Mathematical Modelling of Natural Phenomena, EDP Sciences, 2007, 2 (1), pp.62 - 83. ⟨10.1051/mmnp:2008011⟩
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
hal-01090879v1  Directions of work or proceedings
Martin AbadiSteve Kremer. Principles of Security and Trust
Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
inria-00099982v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under equational theories
ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
inria-00578884v1  Conference papers
Ryma AbassiFlorent JacquemardMichael RusinowitchSihem Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas
Second International Conference on Communications and Networking (ComNet), Nov 2010, Tozeur, Tunisia. pp.1-8, ⟨10.1109/COMNET.2010.5699810⟩
hal-02921643v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Discovery of Link Keys in RDF Data Based on Pattern Structures: Preliminary Steps
CLA 2020 - The 15th International Conference on Concept Lattices and Their Applications, Jun 2020, Tallinn / Virtual, Estonia
hal-03426543v1  Conference papers
Nacira AbbasAlexandre BazinJérôme DavidAmedeo Napoli. Sandwich: An Algorithm for Discovering Relevant Link Keys in an LKPS Concept Lattice
ICFCA 2021 - 16th international conference on formal concept analysis, Jun 2021, Strasbourg /Virtuel, France. pp.243-251, ⟨10.1007/978-3-030-77867-5_15⟩
hal-01586544v1  Journal articles
Mourad AbbasKamel SmailiDaoud Berkani. Evaluation of Topic Identification Methods on Arabic Corpora
Journal of Digital Information Management, Digital Information Research Foundation, 2011, 9 (5), pp.8 double column
hal-02168775v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Linkex: A Tool for Link Key Discovery Based on Pattern Structures
ICFCA 2019 - workshop on Applications and tools of formal concept analysis, Jun 2019, Frankfurt, Germany. pp.33-38
hal-03482955v1  Conference papers
Nacira AbbasAlexandre BazinJérôme DavidAmedeo Napoli. Non-Redundant Link Keys in RDF Data: Preliminary Steps
FCA4AI 2021 - 9th Workshop on What can FCA do for Artificial Intelligence?, Aug 2021, Montréal/Online, Canada. pp.1-6
hal-00773740v1  Journal articles
Lokman A. Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. Pricing derivatives on graphics processing units using Monte Carlo simulation
Concurrency and Computation: Practice and Experience, Wiley, 2014, 26 (9), pp.1679-1697. ⟨10.1002/cpe.2862⟩
hal-01320646v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Detection of firewall configuration errors with updatable tree
International Journal of Information Security, Springer Verlag, 2016, 15 (3), pp.301-317. ⟨10.1007/s10207-015-0290-0⟩
inria-00100005v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort
Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967. ⟨10.1007/BF03179710⟩
inria-00100006v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Protocol Analysis in Intrusion Detection Using Decision Tree
International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408
inria-00100008v1  Conference papers
Tarek AbbesAlakesh HaloiMichaël Rusinowitch. High Performance Intrusion Detection using Traffic Classification
International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg
inria-00100007v1  Conference papers
Tarek AbbesMichaël Rusinowitch. Fast Multipattern Matching for Intrusion Detection
13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p
inria-00528201v1  Journal articles
Tarek AbbesAdel BouhoulaMichael Rusinowitch. Efficient Decision Tree for Protocol Analysis in Intrusion Detection
International Journal of Security and Networks, Inderscience, 2010, 5 (4), pp.220-235. ⟨10.1504/IJSN.2010.037661⟩
inria-00099496v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Filtrage Efficace Pour la Détection d'Intrusions
Conférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p
inria-00329730v1  Conference papers
Tarek AbbesAdel BouhoulaMichael Rusinowitch. An inference system for detecting firewall filtering rules anomalies
23rd Annual ACM Symposium on Applied Computing - SAC'08, 2008, Fortaleza, Brazil. pp.2122-2128
hal-02388968v1  Conference papers
Ahmad AbboudAli JaberJean-Pierre CancesVahid Meghdadi. CSI map for indoor massive MIMO
2017 Computing Conference, Jul 2017, London, France. pp.1305-1311, ⟨10.1109/SAI.2017.8252259⟩
hal-03036292v1  Poster communications
Ahmad AbboudRémi GarciaAbdelkader LahmadiMichaël RusinowitchAdel Bouhoula. R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks
CNSM 2020 - 16th International Conference on Network and Service Management, Nov 2020, Izmir/Virtual, Turkey
hal-02547097v1  Conference papers
Ahmad AbboudAbdelkader LahmadiMichael RusinowitchMiguel CouceiroAdel Bouhoula et al.  Double Mask: An efficient rule encoding for Software Defined Networking
ICIN 2020 - 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2020, Paris, France. pp.186--193
hal-03036350v1  Conference papers
Ahmad AbboudRémi GarciaAbdelkader LahmadiMichaël RusinowitchAdel Bouhoula. Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Online conference, France