Livres

  1. H. Fujita, M. Mejri. New Trends in Software Methodologies, Tools and Techniques. IOS Press, Frontiers in Artificial Intelligence and Applications, SoMeT W06, Vol 147, ISBN:1-58603-556-8, November 2006.

  2. H. Fujita, M. Mejri. New Trends in Software Methodologies, Tools and Techniques. IOS Press, Frontiers in Artificial Intelligence and Applications, SoMeT W05, Vol 129, ISBN: 1-58603-556-8, September 2005.

Chapitre dans un livre

  • J. Fattahi, M. Mejri and E. Pricop. The Theory of Witness-Functions. In Recent Advances in Systems Sa- fety and Security.Springer International Publishing, Editor Pricop, Emil and Stamatescu, Grigore, pp 1–19, year 2016. isbn=978-3-319-32525-5, doi=10.1007/978-3-319-32525-5_1, url="http ://dx.doi.org/10.1007/978-3-319- 32525-5_1".

  • Brevets

      • EP1693745
        • Titre : Software Generation Method
        • Auteurs : Mohamed Mejri (CA), Béchir Ktari (CA) and Hamid Fujita (JP)
        • Numéro : EP1693745
        • Année : August 2006
        • Appliquant : CATENA CORP. (JP)

      • US2007006194, CN1788254
        • Titre : Static Analysis Method Regarding Lyee-Oriented Software
        • Auteurs : Béchir Ktari, (CA) Mohamed Mejri (CA), Mourad Erhioui and Hamid Fujita (JP)
        • Numéro : US2007006194(A1) : janvier 2007, CN1788254(A): juin 2006, EP1637990(A1): mars 2006, KR20050118177(A) : Décembre 2005, AU2003272890(A8) : septembre 2004, AU2003272890(A1) : septembre 2004, CA2518498(A1) : septembre 2004, WO2004081788(A1) : septembre 2004 Year : January 2007
        • Appliquant : CATENA CORP. (JP)

    Revues avec comité de lecture

    1. J. Fattahi, M. Mejri, M. Miraoui and H. Houmani. Ensuring Confidentiality in Cryptographic Pro- tocols with the Witness-Functions. International Journal of Computer and Communication Engeneering. 4(4) : 219-233. 2015

    2. J. Fattahi, M. Mejri and H. Houmani. Introduction to the Witness-Functions for Secrecy in Cryptographic Protocols International Journal of Modeling and Optimization, Vol. 5, No. 3, June 2015.

    3. J. Fattahi, M. Mejri and H. Houmani. Relaxed Conditions for Secrecy in a Role-based Specification. The International Journal of Information Security 06/2014; p. 1:33. 2014.

    4. G. Sui and M. Mejri. FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA Algebra with Test. The International Journal of Grid and Utility Computing. IJGUC 4(2/3): 204-211 (2013).

    5. Hanane Houmani and Mohamed Mejri : Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-based Method. Accepted for publication in the Journal of Computer Network and Communication. (2012).

    6. Mahjoub Langar, Mohamed Mejri, Kamel Adi: Formal enforcement of security policies on concurrent systems. J. Symb. Comput. 46(9): 997-1016 (2011)

    7. H. Houmani, M. Mejri and Hamido Fujita. Secrecy under Equational Theory. In the Journal on Knowledge-Based Systems. 22(3): 160-173 (2009), Elsevier, 2009.

    8. M. Talbi, M. Mejri and A. Bouhoula. Specification and Evaluation of Polymorphic Shellcode Properties Using a New Temporal Logic. In the Journal of Computer Virology, 5(3): 171-186. Springer, 2009.

    9. H. Houmani and M. Mejri. Toward an Automatic Verification of Secrecy Without the Perfect Encryption Assumption. In the International Journal of Computers, 3(2): p183-192. North Atlantic University Union (NAUN), 2008.

    10. H. Houmani and M. Mejri. Sufficient Conditions for Secrecy under any Equational Theory. In the International Journal of Security and Its Applications(IJSIA) 2(4): p 99-116, SERSC. 2008.

    11. M. Talbi, M. Ben Ghorbel, M. Mejri. Intusion Detection Prototype Based on ADM-Logic. Journal of Software (JSW), Volume 3, Issue 2, Academy Publisher, 2008.

    12. H. Houmani, M. Mejri. Secrecy by Interpretation Functions. Journal on Knowledge-Based Systems. Special Issue on Techniques to Produce Intelligent Secure Software, Volume 20, Issue 7, Pages 617-635, Elsevier, October 2007.

    13. M. Mbarki, M. Mejri B. Ktari. From Imperative to Declarative Languages: A formal Translation. Journal on Knowledge-Based Systems., Volume 19(2), 130-140, Elsevier, 2006.

    14. H. Fujita, B. Ktari, M. Mejri. Implementing Lyee-Calculus in Java. Journal on Knowledge-Based Systems., Volume 19(2), 116-129, Elsevier, 2006.

    15. H. Fujita, M. Mejri, B. Ktari. A Process Algebra to Formalize the Lyee Methodology. Journal on Knowledge-Based Systems Volume 17, Issues 7-8, December 2004, 363-381. Elsevier, 2004.

    16. M. Debbabi, M. Mejri. Towards the Correctness of Security Protocols. Electronic Notes in Theoretical Computer Science (ENTCS) 83(2004). Elsevier, 2004.

    17. K. Adi, M. Debbabi and M. Mejri. A New Logic for Electronic Commerce Protocols. the International Journal of Theoretical Computer Science (TCS), 291(3): 223-283. Elsevier, 2003.

    18. M. Mejri, B. Ktari, H. Fujita, M. Erhioui. Static Analysis of Lyee Requirements. Journal on Knowledge-Based Systems Volume 16, Issues 7-8, Pages 339-456 (November 2003). Elsevier, 2003.

    19. M. Debbabi, N. Durgin, M. Mejri, and J. Mitchell. Security by Typing. the International Journal on Software Tools For Technology Transfer (STTT); DOI 10.1007/s10009-002-0100-7. Springer Verlag, Online publication: December 17, 2002.

    Conférences avec comité de lecture

    1. M. Sheikhalishahi, M. Mejri, N. Tawbi and F. Martinelli. Privacy-aware Data Sharing in a Tree-based Categorical Clustering Algorithm. The 9th International Symposium on Foundations & Practice of Security (FPS 2016). Québec, Canada, October 2016.

    2. J. Fattahi, M. Mejri and E. Pricop. Formal Reasoning on Authentication in Security Protocols.The The 1st IEEE International Workshop on Security and Privacy in Advanced Persistent Threat (SPAPT 2016). Tianjin, China on August 2016,

    3. J. Fattahi, M. Mejri. R. Ghayoula and E. Pricop. Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions.The IEEE International Conference on Systems, Man, and Cybernetics. (IEEE SMC 2016). Budapest, hungary, October 2016,

    4. C. Boileau, F. Gagnon, J. Poisson, S. Frenette and M. Mejri.. A Comparative Study of Android Malware Behavior in Different Contexts. the 7 th International Conference on Data Communication Networking ( DCNET’2016). Lisbon, Portugal, July, 2016.

    5. M. Sheikhalishai, A. Saracino, M. Mejri, N. Tawbi and F. Martinelli.. On the Abstraction of a Categorical Clustering Algorithm. the International Conference on Machine Learning and Data Mining MLDM’2016, New York, USA, 2016.

    6. L.BoumlikandM.Mejri.(2015).TowardtheFormalizationofBPEL.LectureNotesinComputerScience, Springer. FOR-MOVES 2015 : FORmal MOdeling and VErification of Service-based systems (co-located with ICSOC 2015), Goa, Inde.

    7. M. Sheikh Alishahi, M. Mejri and N. Tawbi. ShahiClustering Spam Emails into Campaigns. 1st International Conference on Information Systems Security and Privacy. Loire Valley France, 2015.

    8. J. Fattahi, M. Mejri and H. Houmani Ensuring Confidentiality in Cryptographic Protocols with the Witness-Functions. The 5th International Conference on Networking and Information Technology (ICNIT 2014), Singapore, 2014.

    9.   M. Mejri, E. Theodore Sadio and K. Arrachid. AVTAC : A Framework for Automatic Auditing of Access Control in Windows and Linux Systems. The 13th International Conference on Intelligent Software Methodologies, Tools and Techniques. Langkawi, Malaysia, September 2014.

    10. J. Fattahi, M. Mejri and H. Houmani. Towards New Metrics for Security of Cryptographic Protocols. SCADA Security Conference LATAM, At RIO DE JANEIRO, Brazil, 2014.

    11. J. Fattahi, M. Mejri and H. Houmani Secrecy by Witness-Functions on Increasing Protocols. The 2nd International Workshop on Systems Safety & Security (IWSSS 2014), Bucharest, Romania, 2014.

    12. J. Fattahi, M. Mejri and H. Houmani, New Functions for Secrecy on Real Protocols. The 7th International Conference on Network Security & Applications (CNSA-2014), Chennai, India, Volume: 4, Number 7b, July 2014.

    13. J. Fattahi, M. Mejri and H. Houmani. Introduction to the Witness-Functions for Secrecy in Cryptographic Protocols. International Conference on Networks and Information (ICNI2014), At Nanjing, China, 2014.

    14. J. Fattahi, M. Mejri and H. Houmani. Secrecy by Witness-Functions. Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference, p 34-52, volume 1158. 2014.

    15. J. Fattahi, M. Mejri and H. Houmani. Sufficient Conditions for Secrecy in Cryptographic Protocols. The World Symposium On Computer Networks and Information Security-WSCNIS'2014, At Hammamet, Tunisia, 2014.

    16. M. Mejri, E. Theodore Sadio, K. Arrachid and E. Lathe. Access Control Validation by Ontologies. IEEE 12th International Conference on Intelligent Software Methodologies, Tools and Techniques. Budapest, Hungary, September 2013.

    17. G. Sui and M. Mejri. FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA Algebra with Test NSS2012, The 6th International Conference on Network and System Security. IEEE Computer Society, Wu Yi Shan, China, November, 2012.

    18. G. Sui and M. Mejri and H. B. Sta. FASER (Formal and Automatic Security Enforcement by Rewriting) : An Algebraic Approach 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications (CISDA). IEEE Computational Intelligence Society, Ottawa, Canada, July 2012.

    19. M. Langar, M. Mejri and K. Adi. Formal Approach for Concurrent Systems Verification. SAM'07- The 2007 International Conference on Security and Management. Las Vegas, Nevada, USA, 2010.

    20. M. Langar, M. Mejri and K. Adi. Rewriting-Based Security Enforcement of Concurrent - A Formal Approach. SECRYPT 2010 - International Conference on Security and Cryptography. Athens, Greece, IEEE Computer Society, 2010.

    21. Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo: Risk analysis in access control systems. PST 2010: 160-166

    22. H. Ould-Slimane, M. Mejri and K. Adi. Enforcing More Than Safety Properties: Algebraic Foundations. FCS-PrivMod 2010, Workshop on Foundations of Security and Privacy. Edinburgh, UK, 2010.

    23. H. Ould-Slimane, M. Mejri and K. Adi. Using Edit Automata for Rewriting-Based Security Enforcement. DBSec 2009 (23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security), p 175-190. Montreal Canada 2009.

    24. M. Mejri, K. Adi, H. Fujita. Formal Specification and Analysis of Firewalls. SoMeT 2009 (The 8th International Conference on Software Methodologies, Tools and Techniques), p 284-293. Prague, République Tchèque.

    25. R. Abbassi , M. Mejri and S. Guemara El Fatmi. Specification, Verification and Optimization of a Security Network Configuration. In Proceedings of the Tunisia - Japan Workshop on Symbolic Computation in Software Science, SCSS 2009, Gammarth, Tunisia,

    26. R. Abassi, M. Mejri and S. Gmara. Security Policies Specification and Validation: A process Algebra based Method. E-MEDISYS 2008. Sfax, Tunisia. IEEE Computer Society, October, 2008.

    27. M. Talbi, B. Morin, V. Viet Triem Tong, A. Bouhoula and M. Mejri. Specification of Electronic Voting Protocols Properties using ADM Logic: FOO92 Case Study. ICICS 2008 : 10th International Conference on Information and Communications Security. Birmingham, UK. October, 2008.

    28. M. Mejri and H. Fujita. Automatic Enforcement of Security in Computer Networks. Accepted in SOMET 2008 - The 7th International Conference on Software Methodologies, Tools and Techniques. Sharjah, UAE, November 2008.

    29. H. Houmani and M. Mejri. Ensuring the Correcteness of Cryptographic Protocols with Respect to Secrecy . SECRYPT 2008 - International Conference on Security and Cryptography. Porto, Portogal, IEEE Computer Society, July 2008.

    30. H. Houmani and M. Mejri. Interpretation Functions-Based Method to Verify Secrecy under Equational Theories. In the 10th WSEAS International Conference on Automatic Control and Simulation (ACMOS '08). Istanbul, Turkey, 2008.

    31. H. Houmani and M. Mejri. A Formal Approach for Security Policy Enforcement in Concurrent Programs. In the proceedings of the 2008 International Conference on Information Security and Assurance (ISA 2008). Busan, Korea, 2008.

    32. M. Langar, M. Mejri and K. Adi. A Formal Approach for Security Policy Enforcement in Concurrent Programs. SAM'07- The 2007 International Conference on Security and Management. pp. 165-171, Las Vegas, Nevada, USA, 2007.

    33. M. Ben Gorbel, M. Talbi and M. Mejri. Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. ARES'07 : second International Conference on Availability, Reliability and Security. Vienne, Autriche, IEEE Computer Society, pp. 206-212, April 10-13, 2007.

    34. H. Houmani and M. Mejri. Practical And Universal Interpretation Functions For Secrecy. SECRYPT 2007 - International Conference on Security and Cryptography. Barcelone, Espagne, IEEE Computer Society, July 2007.

    35. T. Mechri, M. Langar, M. Mejri, H. Fujita, and Y. Funyu. Automatic Enforcement of Security in Computer Networks. SOMET 2007 - The 6th International Conference on Software Methodologies, Tools and Techniques. Rome, Italy, November 2007.

    36. M. Langar, M. Mejri and K. Adi. Formal Monitor For Concurrent Programs. Proceedings of the Workshop on Practice and Theory of IT Security (PTITS), Montreal, Canada, May 17, 2006 (PTITS 2006).

    37. H. Oueld-Slimane and M. Mejri. Enforcing Security Policies by Rewriting Programs using Automata. Proceedings of the Workshop on Practice and Theory of IT Security (PTITS), Montreal, Canada, May 17, 2006 (PTITS 2006).

    38. H. Oueld-Slimane, M. Mejri and K. Adi. Enforcing Security Policies on Programs. The 5th International Conference on Software Methodologies, Tools and Techniques (SoMeT 06). Québec, Canada, November 2006.

    39. D. Godbout, B. Ktari and M. Mejri. A Formal Translation from an Imperative Language with Array to a Declarative Language. The 5th International Conference on Software Methodologies, Tools and Techniques (SoMeT 06). Québec, Canada, November 2006.

    40. F. Gangnon and M. Mejri. Decision Procedure for Structured Cryptographic protocols. The 5th International Conference on Software Methodologies, Tools and Techniques (SoMeT 06). Québec, Canada, November 2006.

    41. B. Ktari, M. Mejri, H. Fujita and D. Godbout. LyeeBuilder. The 4th International Conference on Software Methodologies, Tools and Techniques., Tokyo, Japan, September 28-30, 2005.

    42. M. Langar, and M. Mejri. Optimized Enforcement of Security Policies. Foundations of Computer Security (FCS 2005). Chicago, USA, 2005.

    43. M. Langar and M. Mejri. Formal and Efficient Enforcement of Security Policies. The 2005 International Conference on Foundations of Computer Science (FCS05). San Diego, California, USA , 2005.

    44. P. L. Lespérance and M. Mejri. Detecting Variants of Known Attacks Using Temporal Logic. The Workshop on Practice and Theory of Access Control Technologies (WPTACT 2005). Montreal, Canada, 2005.

    45. K. Adi, A. El Kabbal, and M. Mejri. Un système de types pour l'analyse des pare-feux. The 3rd Conference on Security and Network Architectures (SAR05). Batz sur Mer, France, 2005.

    46. M. Mejri. Chaotic Protocols. The International Conference on Computational Science and its Applications (ICCSA 2004). May 14 - May 17, Assisi(PG), Italy, 2004. Lecture Notes in Computer Science, Springer-Verlag, Vol 3043 / 2004, pp. 938 - 948.

    47. A. Lacasse, M. Mejri and B. Ktari. Formal Implementation of Network Security Policies. The Second Annual Conference on Privacy, Security and Trust (PST04). New Brunswick, Canada, October, 2004.

    48. M. Couture, B. Ktari, F. Massicotte and M. Mejri. A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. The Second Annual Conference on Privacy, Security and Trust (PST04). New Brunswick, Canada, October, 2004.

    49. A. Fallah and M. Mejri. Détection d'anomalies de fonctionnement de protocoles cryptographiques. The 3rd Conference on Security and Network Architectures. La Londe, Cote d'Azur (France) June 21-25, 2004

    50. B. Ktari M. Mejri and H. Fujita. From Lyee-Calculus to Java Code. The 3rd International Conference on Software Methodologies, Tools and Techniques (SoMeT 04). Leipzig, Germany, September 2004.

    51. M. Mbarki, M. Mejri and B. Ktari. From Imperative to Declarative Languages: A Formal Translation. The 3rd International Conference on Software Methodologies, Tools and Techniques (SoMeT 04). Leipzig, Germany, September, 2004.

    52. M. Couture, B. Ktari, M. Mejri and F. Massicotte. Détection d'intrusion et acquisition passive d'information. Accepted for Publication in the 3rd Conference on Security and Network Architectures. La Londe, Cote d'Azur (France) June 21-25, 2004

    53. M. Mejri B. Ktari and H. Fujita. Lyee-Calculus : A Formalization of Lyee Methodology. In the Lyee International Workshop , Lyee w03. Stockholm, Sweden , IOS international publisher, Septembre, 2003.

    54. M. Erhioui, B. Ktari and M. Mejri Static Analysis on Lyee Requirement. In the Lyee International Workshop , Lyee w02. Sorbonne, Paris, France, IOS international publisher, October, 2002.

    55. K. Adi, M. Debbabi and M. Mejri. A New Logic for Specifying Security Properties of Electronic Commerce Protocols. In Proceedings LNCS, AMAST'2000, Iowa, USA, Springer Verlag, May, 2000.

    56. M. Debbabi, Y. Légaré, and M. Mejri. An Environment for the Specification and Analysis of Cryptoprotocols. In Proceedings of IEEE Annual Computer Security Application Conference, ACSAC'98, Scottsdale, Arizona, USA, 1998. IEEE Press.

    57. M. Debbabi, M. Mejri, N. Tawbi and I. Yahmadi. Formal Automatic Verification of Authentication Cryptographic Protocols. In Proceedings of the First IEEE International Conference on Formal Engineering Methods, ICFEM'97, Hiroshima International Convention Center, Japan, 12-14 November 1997. IEEE Press.

    58. M. Debbabi, M. Mejri, N. Tawbi and I. Yahmadi. A New Algorithm for the Automatic Verification of Authentication Protocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, DIMACS Center, Core Building, Rutgers University, New Jersey, USA, September 3-5, 1997.

    59. M. Debbabi, M. Mejri, N. Tawbi and I. Yahmadi. From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. In Proceedings of the Second International Workshop on Enterprise Security, Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts, USA, June 18-20, 1997. IEEE Press.