< Professeur Mohamed Mejri

Books

  1. H. Fujita, M. Mejri. New Trends in Software Methodologies, Tools and Techniques. IOS Press, Frontiers in Artificial Intelligence and Applications, SoMeT W06, Vol 147, ISBN:1-58603-556-8, November 2006.

  2. H. Fujita, M. Mejri. New Trends in Software Methodologies, Tools and Techniques. IOS Press, Frontiers in Artificial Intelligence and Applications, SoMeT W05, Vol 129, ISBN: 1-58603-556-8, September 2005.

Book Chapter

  • J. Fattahi, M. Mejri and E. Pricop. The Theory of Witness-Functions. In Recent Advances in Systems Sa- fety and Security.Springer International Publishing, Editor Pricop, Emil and Stamatescu, Grigore, pp 1–19, year 2016. isbn=978-3-319-32525-5, doi=10.1007/978-3-319-32525-5_1, url="http ://dx.doi.org/10.1007/978-3-319- 32525-5_1".

  • Patents

      • EP1693745
        • Titre : Software Generation Method
        • Auteurs : Mohamed Mejri (CA), Béchir Ktari (CA) and Hamid Fujita (JP)
        • Numéro : EP1693745
        • Année : August 2006
        • Appliquant : CATENA CORP. (JP)

      • US2007006194, CN1788254
        • Titre : Static Analysis Method Regarding Lyee-Oriented Software
        • Auteurs : Béchir Ktari, (CA) Mohamed Mejri (CA), Mourad Erhioui and Hamid Fujita (JP)
        • Numéro : US2007006194(A1) : janvier 2007, CN1788254(A): juin 2006, EP1637990(A1): mars 2006, KR20050118177(A) : Décembre 2005, AU2003272890(A8) : septembre 2004, AU2003272890(A1) : septembre 2004, CA2518498(A1) : septembre 2004, WO2004081788(A1) : septembre 2004 Year : January 2007
        • Appliquant : CATENA CORP. (JP)

    Journal Papers

    1. Y. Alkhateem and M. Mejri. Crimeware Toolkit Signature Generation and Detection using Machine Learning. International Journal of Current Research (IJCR). Impact Factor : 8.132. 2023.

    2. Y. Alkhateem and M. Mejri. AE-FT : Auto Encoder Fixed-Target Training Features Extraction Approach for Binary Classification Problem. Accepted in the Asian Journal of Research in Computer Science, vol. 15, no. 1, pp. 32-43, 2023.

    3. L. Abdelgalil and M. Mejri. HealthBlock : A Framework for a Collaborative Sharing of Electronic Health Records Based on Blockchain. Accepted in the Journal of Future Internet 15(3), 87. 2023.

    4. M. Elsiddig and M. Mejri. Detection of Suspicious Internet Traffic Based on Differential Analysis and Logical Rules. Accepted in the Journal of Computer Virology and Hacking Techniques (JICV). 18(4): 347-365 (2022).

    5. M. Mejri, H. Yahyaoui, A. Mourad and M. Chehab. A Rewriting System for the Assessment of XACML Policies Relationship. Journal of Computers & Security. 97(3), 20-47, 2020.

    6. P. Yermalovich, M. Mejri. Determining the Probability of Cyberattacks. European Journal of Engineering and Formal Sciences, Vol. 4, No.1, January 2020.

    7. L. Boumlik, M. Mejri, and H. Boucheneb. Toward a Formalization of BPEL 2.0 : An Algebra Approach. Journal of Information, International Journal on Web Service Computing (IJWSC), Vol.11, No.1, March 2020.

    8. M. Ziadia, J. Fattahi, M. Mejri, and E. Pricop,. Smali : an Operational Semantics for Low-level Code Generated from Reverse Engineering Android Applications+. Journal of Information, Advanced Topics in Systems Safety and Security, 2020, 11, 130.

    9. M. Mejri, H. Yahyaoui, A. Mourad, and M. Chehab. A rewriting system for the assessment of XACML policies relationship Journal of Computers & Security. Volume 97, October 2020.

    10. P. Yermalovich, M. Mejri. Determining the Probability of Cyberattacks. European Journal of Engineering and Formal Sciences, Vol. 4, No.1, January 2020.

    11. L. Boumlik, M. Mejri, and H. Boucheneb. Toward a Formalization of BPEL 2.0 : An Algebra Approach. Journal of Information, International Journal on Web Service Computing (IJWSC), Vol.11, No.1, March 2020.

    12. M. Ziadia, J. Fattahi, M. Mejri, and E. Pricop,. Smali : an Operational Semantics for Low-level Code Generated from Reverse Engineering Android Applications+. Journal of Information, Advanced Topics in Systems Safety and Security, 2020, 11, 130.

    13. M. Mejri and H. Yahyaoui. Formal specification and integration of distributed security policies. Journal of Computer Languages, Systems & Structures. Volume 49, Pages 1-35. 2017.

    14. J. Fattahi, M. Mejri, M. Miraoui and H. Houmani. Ensuring Confidentiality in Cryptographic Pro- tocols with the Witness-Functions. International Journal of Computer and Communication Engeneering. 4(4) : 219-233. 2015

    15. J. Fattahi, M. Mejri and H. Houmani. Introduction to the Witness-Functions for Secrecy in Cryptographic Protocols International Journal of Modeling and Optimization, Vol. 5, No. 3, June 2015.

    16. J. Fattahi, M. Mejri and H. Houmani. Relaxed Conditions for Secrecy in a Role-based Specification. The International Journal of Information Security 06/2014; p. 1:33. 2014.

    17. G. Sui and M. Mejri. FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA Algebra with Test. The International Journal of Grid and Utility Computing. IJGUC 4(2/3): 204-211 (2013).

    18. Hanane Houmani and Mohamed Mejri : Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-based Method. Accepted for publication in the Journal of Computer Network and Communication. (2012).

    19. Mahjoub Langar, Mohamed Mejri, Kamel Adi: Formal enforcement of security policies on concurrent systems. J. Symb. Comput. 46(9): 997-1016 (2011)

    20. H. Houmani, M. Mejri and Hamido Fujita. Secrecy under Equational Theory. In the Journal on Knowledge-Based Systems. 22(3): 160-173 (2009), Elsevier, 2009.

    21. M. Talbi, M. Mejri and A. Bouhoula. Specification and Evaluation of Polymorphic Shellcode Properties Using a New Temporal Logic. In the Journal of Computer Virology, 5(3): 171-186. Springer, 2009.

    22. H. Houmani and M. Mejri. Toward an Automatic Verification of Secrecy Without the Perfect Encryption Assumption. In the International Journal of Computers, 3(2): p183-192. North Atlantic University Union (NAUN), 2008.

    23. H. Houmani and M. Mejri. Sufficient Conditions for Secrecy under any Equational Theory. In the International Journal of Security and Its Applications(IJSIA) 2(4): p 99-116, SERSC. 2008.

    24. M. Talbi, M. Ben Ghorbel, M. Mejri. Intusion Detection Prototype Based on ADM-Logic. Journal of Software (JSW), Volume 3, Issue 2, Academy Publisher, 2008.

    25. H. Houmani, M. Mejri. Secrecy by Interpretation Functions. Journal on Knowledge-Based Systems. Special Issue on Techniques to Produce Intelligent Secure Software, Volume 20, Issue 7, Pages 617-635, Elsevier, October 2007.

    26. M. Mbarki, M. Mejri B. Ktari. From Imperative to Declarative Languages: A formal Translation. Journal on Knowledge-Based Systems., Volume 19(2), 130-140, Elsevier, 2006.

    27. H. Fujita, B. Ktari, M. Mejri. Implementing Lyee-Calculus in Java. Journal on Knowledge-Based Systems., Volume 19(2), 116-129, Elsevier, 2006.

    28. H. Fujita, M. Mejri, B. Ktari. A Process Algebra to Formalize the Lyee Methodology. Journal on Knowledge-Based Systems Volume 17, Issues 7-8, December 2004, 363-381. Elsevier, 2004.

    29. M. Debbabi, M. Mejri. Towards the Correctness of Security Protocols. Electronic Notes in Theoretical Computer Science (ENTCS) 83(2004). Elsevier, 2004.

    30. K. Adi, M. Debbabi and M. Mejri. A New Logic for Electronic Commerce Protocols. the International Journal of Theoretical Computer Science (TCS), 291(3): 223-283. Elsevier, 2003.

    31. M. Mejri, B. Ktari, H. Fujita, M. Erhioui. Static Analysis of Lyee Requirements. Journal on Knowledge-Based Systems Volume 16, Issues 7-8, Pages 339-456 (November 2003). Elsevier, 2003.

    32. M. Debbabi, N. Durgin, M. Mejri, and J. Mitchell. Security by Typing. the International Journal on Software Tools For Technology Transfer (STTT); DOI 10.1007/s10009-002-0100-7. Springer Verlag, Online publication: December 17, 2002.

    Conference Papers

    1. A. Ibrahim, M. Mejri adn F. Jaafar. An Explainable Artificial Intelligence Approach fora Trustworthy Spam Detection. The EEE international conference Cyber security and resilience , Venise, Italy, July 2023.

    2. M. Dorafshanian and M. Mejri. Differential Privacy : Toward a Better Tuning of the Privacy Budget Based on Risk. The 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 2023.

    3. J. Fattahi, M. Mejri, M. Ziadia, and R .Ghayoula. SpamDL : a High Performance Deep Learning Spam Detector Using Stanford Global Vectors and Bidirectional Long Short-Term Memory Neural Networks. The 21st International Conference on Intelligent Software Methodologies, Tools, and Techniques. SoMet2022, Sept. 2022, Kitakyushu, Japan.

    4. A. Lecor, D. Ngom, M. Mejri, and S. Mbodji : A New Strategy for Deploying a Wireless Sensor Network Based on a Square-Octagon Pattern to Optimizes the Covered Area. 11th International Conference, CNRIA 2021, Dakar, Senegal, June , 2021.

    5. M. Ziadia and M. Mejri and J. Fattahi. K-Smali : an Executable Semantics for Program Verification of Reversed Android Applications. The 14th International Symposium on Foundations & Practice of Security. FPS2021, Paris, France, December 2021.

    6. M. Ziadia and M. Mejri and J. Fattahi. K-Smali : an Executable Semantics for Program Verification of Reversed Android Applications. The 14th International Symposium on Foundations & Practice of Security. FPS2021, Paris, France, December 2021.

    7. J. Fattahi and M. Ziadia and M. Mejri. Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings. The 20th International Conference on Intelligent Software Methodologies, Tools, and Techniques (Somet 2021). Qintana Roo, Mexico, 2021.

    8. M. Ziadia and M. Mejri and J. Fattahi. Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting. The 20th International Conference on Intelligent Software Methodologies, Tools, and Techniques (Somet 2021). Qintana Roo, Mexico, 2021.

    9. Honoré Hounwanou and Laila Boumlik and Mohamed Mejri. Toward the Formlazation of BPMN via BPEL. The 20th International Conference on

    10. J. Fattahi and M. Mejri. Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes. In 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP 2021). Zhuhai, China , 2021.

    11. J. Fattahi and M. Mejri. SpaML : a Bimodal Ensemble Learning Spam Detector based on NLP Techniquess. In 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP 2021). Zhuhai, China , 2021.

    12. P. Yermalovich and M. Mejri Ontology-Based Model for Security Assessment : Predicting Cyberattacks Through Threat Activity Analysis. 13th International Conference on Security and its Applications (CNSA 2020). Sydney, Australia, March, 2020

    13. L. Boumlik and M. Mejri. Security Enforcement on Web Service Compositions. In 11th IEEE International Workshop on Performance Evaluation of Communications in Distributed Systems and Web based Service Architectures. Barcelona Plaza, Spain, June 2019.

    14. J. Fattahi, M. Mejri and E. Pricop. On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions. IEEE CCECE 2019, The 32nd Canadian Conference on Electrical and Computer Engineering. Edmonton, Canada, May, 2019.

    15. J. Fattahi, M. Couture and M. Mejri. SinCRY : a Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules. SOMET 2018 : The 17th International Conference on Intelligent Software Methodologies, Tools, and Techniques. Spain, September 2018.

    16. P. Yermalovich and M.Mejri Formalization of Attack Prediction Problem. IEEE International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS). St. Petersburg, Russia, 2018.

    17. J. Fattahi, M. Mejri, M. Ziadia, E. Ghayoula, O. Samoud and E. Pricop. Cryptographic Protocol for Multipart Missions Involving Two Independent and Distributed Decision Levels in a Military Context. 2017 IEEE International Conference on Systems, Man, and Cybernetics. IEEE SMC 2017, October 2017.

    18. J. Fattahi, M. Mejri, M. Ziadia, T. Omrani and E. Pricop. Witness-Functions versus Interpretation- Functions for Secrecy in Cryptographic Protocols : What to Choose ?. 2017 IEEE International Conference on Systems, Man, and Cybernetics. IEEE SMC 2017, October 2017.

    19. J. Fattahi, M. Mejri, M. Ziadia, E. Pricop, and O. Samoud. Introduction to SinJAR : a New Tool for Reverse Engineering Java Applications and Tracing its Malicious Actions using Hidden Markov Models. SOMET 2017 : The 16th International Conference on Intelligent Software Methodologies, Tools, and Techniques. Japan, September, 2017.

    20. M. Sheikhalishahi, M. Mejri, N. Tawbi and F. Martinelli. Privacy-aware Data Sharing in a Tree-based Categorical Clustering Algorithm. The 9th International Symposium on Foundations & Practice of Security (FPS 2016). Québec, Canada, October 2016.

    21. J. Fattahi, M. Mejri and E. Pricop. Formal Reasoning on Authentication in Security Protocols.The The 1st IEEE International Workshop on Security and Privacy in Advanced Persistent Threat (SPAPT 2016). Tianjin, China on August 2016,

    22. J. Fattahi, M. Mejri. R. Ghayoula and E. Pricop. Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions.The IEEE International Conference on Systems, Man, and Cybernetics. (IEEE SMC 2016). Budapest, hungary, October 2016,

    23. C. Boileau, F. Gagnon, J. Poisson, S. Frenette and M. Mejri.. A Comparative Study of Android Malware Behavior in Different Contexts. the 7 th International Conference on Data Communication Networking ( DCNET’2016). Lisbon, Portugal, July, 2016.

    24. M. Sheikhalishai, A. Saracino, M. Mejri, N. Tawbi and F. Martinelli.. On the Abstraction of a Categorical Clustering Algorithm. the International Conference on Machine Learning and Data Mining MLDM’2016, New York, USA, 2016.

    25. L.BoumlikandM.Mejri.(2015).TowardtheFormalizationofBPEL.LectureNotesinComputerScience, Springer. FOR-MOVES 2015 : FORmal MOdeling and VErification of Service-based systems (co-located with ICSOC 2015), Goa, Inde.

    26. M. Sheikh Alishahi, M. Mejri and N. Tawbi. ShahiClustering Spam Emails into Campaigns. 1st International Conference on Information Systems Security and Privacy. Loire Valley France, 2015.

    27. J. Fattahi, M. Mejri and H. Houmani Ensuring Confidentiality in Cryptographic Protocols with the Witness-Functions. The 5th International Conference on Networking and Information Technology (ICNIT 2014), Singapore, 2014.

    28.   M. Mejri, E. Theodore Sadio and K. Arrachid. AVTAC : A Framework for Automatic Auditing of Access Control in Windows and Linux Systems. The 13th International Conference on Intelligent Software Methodologies, Tools and Techniques. Langkawi, Malaysia, September 2014.

    29. J. Fattahi, M. Mejri and H. Houmani. Towards New Metrics for Security of Cryptographic Protocols. SCADA Security Conference LATAM, At RIO DE JANEIRO, Brazil, 2014.

    30. J. Fattahi, M. Mejri and H. Houmani Secrecy by Witness-Functions on Increasing Protocols. The 2nd International Workshop on Systems Safety & Security (IWSSS 2014), Bucharest, Romania, 2014.

    31. J. Fattahi, M. Mejri and H. Houmani, New Functions for Secrecy on Real Protocols. The 7th International Conference on Network Security & Applications (CNSA-2014), Chennai, India, Volume: 4, Number 7b, July 2014.

    32. J. Fattahi, M. Mejri and H. Houmani. Introduction to the Witness-Functions for Secrecy in Cryptographic Protocols. International Conference on Networks and Information (ICNI2014), At Nanjing, China, 2014.

    33. J. Fattahi, M. Mejri and H. Houmani. Secrecy by Witness-Functions. Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference, p 34-52, volume 1158. 2014.

    34. J. Fattahi, M. Mejri and H. Houmani. Sufficient Conditions for Secrecy in Cryptographic Protocols. The World Symposium On Computer Networks and Information Security-WSCNIS'2014, At Hammamet, Tunisia, 2014.

    35. M. Mejri, E. Theodore Sadio, K. Arrachid and E. Lathe. Access Control Validation by Ontologies. IEEE 12th International Conference on Intelligent Software Methodologies, Tools and Techniques. Budapest, Hungary, September 2013.

    36. G. Sui and M. Mejri. FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA Algebra with Test NSS2012, The 6th International Conference on Network and System Security. IEEE Computer Society, Wu Yi Shan, China, November, 2012.

    37. G. Sui and M. Mejri and H. B. Sta. FASER (Formal and Automatic Security Enforcement by Rewriting) : An Algebraic Approach 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications (CISDA). IEEE Computational Intelligence Society, Ottawa, Canada, July 2012.

    38. M. Langar, M. Mejri and K. Adi. Formal Approach for Concurrent Systems Verification. SAM'07- The 2007 International Conference on Security and Management. Las Vegas, Nevada, USA, 2010.

    39. M. Langar, M. Mejri and K. Adi. Rewriting-Based Security Enforcement of Concurrent - A Formal Approach. SECRYPT 2010 - International Conference on Security and Cryptography. Athens, Greece, IEEE Computer Society, 2010.

    40. Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo: Risk analysis in access control systems. PST 2010: 160-166

    41. H. Ould-Slimane, M. Mejri and K. Adi. Enforcing More Than Safety Properties: Algebraic Foundations. FCS-PrivMod 2010, Workshop on Foundations of Security and Privacy. Edinburgh, UK, 2010.

    42. H. Ould-Slimane, M. Mejri and K. Adi. Using Edit Automata for Rewriting-Based Security Enforcement. DBSec 2009 (23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security), p 175-190. Montreal Canada 2009.

    43. M. Mejri, K. Adi, H. Fujita. Formal Specification and Analysis of Firewalls. SoMeT 2009 (The 8th International Conference on Software Methodologies, Tools and Techniques), p 284-293. Prague, République Tchèque.

    44. R. Abbassi , M. Mejri and S. Guemara El Fatmi. Specification, Verification and Optimization of a Security Network Configuration. In Proceedings of the Tunisia - Japan Workshop on Symbolic Computation in Software Science, SCSS 2009, Gammarth, Tunisia,

    45. R. Abassi, M. Mejri and S. Gmara. Security Policies Specification and Validation: A process Algebra based Method. E-MEDISYS 2008. Sfax, Tunisia. IEEE Computer Society, October, 2008.

    46. M. Talbi, B. Morin, V. Viet Triem Tong, A. Bouhoula and M. Mejri. Specification of Electronic Voting Protocols Properties using ADM Logic: FOO92 Case Study. ICICS 2008 : 10th International Conference on Information and Communications Security. Birmingham, UK. October, 2008.

    47. M. Mejri and H. Fujita. Automatic Enforcement of Security in Computer Networks. Accepted in SOMET 2008 - The 7th International Conference on Software Methodologies, Tools and Techniques. Sharjah, UAE, November 2008.

    48. H. Houmani and M. Mejri. Ensuring the Correcteness of Cryptographic Protocols with Respect to Secrecy . SECRYPT 2008 - International Conference on Security and Cryptography. Porto, Portogal, IEEE Computer Society, July 2008.

    49. H. Houmani and M. Mejri. Interpretation Functions-Based Method to Verify Secrecy under Equational Theories. In the 10th WSEAS International Conference on Automatic Control and Simulation (ACMOS '08). Istanbul, Turkey, 2008.

    50. H. Houmani and M. Mejri. A Formal Approach for Security Policy Enforcement in Concurrent Programs. In the proceedings of the 2008 International Conference on Information Security and Assurance (ISA 2008). Busan, Korea, 2008.

    51. M. Langar, M. Mejri and K. Adi. A Formal Approach for Security Policy Enforcement in Concurrent Programs. SAM'07- The 2007 International Conference on Security and Management. pp. 165-171, Las Vegas, Nevada, USA, 2007.

    52. M. Ben Gorbel, M. Talbi and M. Mejri. Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. ARES'07 : second International Conference on Availability, Reliability and Security. Vienne, Autriche, IEEE Computer Society, pp. 206-212, April 10-13, 2007.

    53. H. Houmani and M. Mejri. Practical And Universal Interpretation Functions For Secrecy. SECRYPT 2007 - International Conference on Security and Cryptography. Barcelone, Espagne, IEEE Computer Society, July 2007.

    54. T. Mechri, M. Langar, M. Mejri, H. Fujita, and Y. Funyu. Automatic Enforcement of Security in Computer Networks. SOMET 2007 - The 6th International Conference on Software Methodologies, Tools and Techniques. Rome, Italy, November 2007.

    55. M. Langar, M. Mejri and K. Adi. Formal Monitor For Concurrent Programs. Proceedings of the Workshop on Practice and Theory of IT Security (PTITS), Montreal, Canada, May 17, 2006 (PTITS 2006).

    56. H. Oueld-Slimane and M. Mejri. Enforcing Security Policies by Rewriting Programs using Automata. Proceedings of the Workshop on Practice and Theory of IT Security (PTITS), Montreal, Canada, May 17, 2006 (PTITS 2006).

    57. H. Oueld-Slimane, M. Mejri and K. Adi. Enforcing Security Policies on Programs. The 5th International Conference on Software Methodologies, Tools and Techniques (SoMeT 06). Québec, Canada, November 2006.

    58. D. Godbout, B. Ktari and M. Mejri. A Formal Translation from an Imperative Language with Array to a Declarative Language. The 5th International Conference on Software Methodologies, Tools and Techniques (SoMeT 06). Québec, Canada, November 2006.

    59. F. Gangnon and M. Mejri. Decision Procedure for Structured Cryptographic protocols. The 5th International Conference on Software Methodologies, Tools and Techniques (SoMeT 06). Québec, Canada, November 2006.

    60. B. Ktari, M. Mejri, H. Fujita and D. Godbout. LyeeBuilder. The 4th International Conference on Software Methodologies, Tools and Techniques., Tokyo, Japan, September 28-30, 2005.

    61. M. Langar, and M. Mejri. Optimized Enforcement of Security Policies. Foundations of Computer Security (FCS 2005). Chicago, USA, 2005.

    62. M. Langar and M. Mejri. Formal and Efficient Enforcement of Security Policies. The 2005 International Conference on Foundations of Computer Science (FCS05). San Diego, California, USA , 2005.

    63. P. L. Lespérance and M. Mejri. Detecting Variants of Known Attacks Using Temporal Logic. The Workshop on Practice and Theory of Access Control Technologies (WPTACT 2005). Montreal, Canada, 2005.

    64. K. Adi, A. El Kabbal, and M. Mejri. Un système de types pour l'analyse des pare-feux. The 3rd Conference on Security and Network Architectures (SAR05). Batz sur Mer, France, 2005.

    65. M. Mejri. Chaotic Protocols. The International Conference on Computational Science and its Applications (ICCSA 2004). May 14 - May 17, Assisi(PG), Italy, 2004. Lecture Notes in Computer Science, Springer-Verlag, Vol 3043 / 2004, pp. 938 - 948.

    66. A. Lacasse, M. Mejri and B. Ktari. Formal Implementation of Network Security Policies. The Second Annual Conference on Privacy, Security and Trust (PST04). New Brunswick, Canada, October, 2004.

    67. M. Couture, B. Ktari, F. Massicotte and M. Mejri. A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. The Second Annual Conference on Privacy, Security and Trust (PST04). New Brunswick, Canada, October, 2004.

    68. A. Fallah and M. Mejri. Détection d'anomalies de fonctionnement de protocoles cryptographiques. The 3rd Conference on Security and Network Architectures. La Londe, Cote d'Azur (France) June 21-25, 2004

    69. B. Ktari M. Mejri and H. Fujita. From Lyee-Calculus to Java Code. The 3rd International Conference on Software Methodologies, Tools and Techniques (SoMeT 04). Leipzig, Germany, September 2004.

    70. M. Mbarki, M. Mejri and B. Ktari. From Imperative to Declarative Languages: A Formal Translation. The 3rd International Conference on Software Methodologies, Tools and Techniques (SoMeT 04). Leipzig, Germany, September, 2004.

    71. M. Couture, B. Ktari, M. Mejri and F. Massicotte. Détection d'intrusion et acquisition passive d'information. Accepted for Publication in the 3rd Conference on Security and Network Architectures. La Londe, Cote d'Azur (France) June 21-25, 2004

    72. M. Mejri B. Ktari and H. Fujita. Lyee-Calculus : A Formalization of Lyee Methodology. In the Lyee International Workshop , Lyee w03. Stockholm, Sweden , IOS international publisher, Septembre, 2003.

    73. M. Erhioui, B. Ktari and M. Mejri Static Analysis on Lyee Requirement. In the Lyee International Workshop , Lyee w02. Sorbonne, Paris, France, IOS international publisher, October, 2002.

    74. K. Adi, M. Debbabi and M. Mejri. A New Logic for Specifying Security Properties of Electronic Commerce Protocols. In Proceedings LNCS, AMAST'2000, Iowa, USA, Springer Verlag, May, 2000.

    75. M. Debbabi, Y. Légaré, and M. Mejri. An Environment for the Specification and Analysis of Cryptoprotocols. In Proceedings of IEEE Annual Computer Security Application Conference, ACSAC'98, Scottsdale, Arizona, USA, 1998. IEEE Press.

    76. M. Debbabi, M. Mejri, N. Tawbi and I. Yahmadi. Formal Automatic Verification of Authentication Cryptographic Protocols. In Proceedings of the First IEEE International Conference on Formal Engineering Methods, ICFEM'97, Hiroshima International Convention Center, Japan, 12-14 November 1997. IEEE Press.

    77. M. Debbabi, M. Mejri, N. Tawbi and I. Yahmadi. A New Algorithm for the Automatic Verification of Authentication Protocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, DIMACS Center, Core Building, Rutgers University, New Jersey, USA, September 3-5, 1997.

    78. M. Debbabi, M. Mejri, N. Tawbi and I. Yahmadi. From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. In Proceedings of the Second International Workshop on Enterprise Security, Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts, USA, June 18-20, 1997. IEEE Press.