[go: up one dir, main page]

Follow
Adel Bouhoula
Adel Bouhoula
Professor of Computer Science, Formal Methods and Cybersecurity. Arabian Gulf University
Verified email at agu.edu.bh - Homepage
Title
Cited by
Cited by
Year
Specification and proof in membership equational logic
A Bouhoula, JP Jouannaud, J Meseguer
Theoretical Computer Science 236 (1-2), 35-132, 2000
3502000
Implicit induction in conditional theories
A Bouhoula, M Rusinowitch
Journal of automated reasoning 14 (2), 189-235, 1995
1651995
Protocol analysis in intrusion detection using decision tree
T Abbes, A Bouhoula, M Rusinowitch
International Conference on Information Technology: Coding and Computing …, 2004
1332004
Automated mathematical induction
A Bouhoula, E Kounalis, M Rusinowitch
Journal of Logic and Computation 5 (5), 631-668, 1995
1171995
Automated theorem proving by test set induction
A Bouhoula
Journal of Symbolic Computation 23 (1), 47-77, 1997
871997
A comprehensive study of security and cyber-security risk management within e-Health systems: Synthesis, analysis and a novel quantified approach
S Ksibi, F Jaidi, A Bouhoula
Mobile Networks and Applications 28 (1), 107-127, 2023
752023
SPIKE, an automatic theorem prover
A Bouhoula, E Kounalis, M Rusinowitch
International Conference on Logic for Programming Artificial Intelligence …, 1992
571992
Using induction and rewriting to verify and complete parameterized specifications
A Bouhoula
Theoretical Computer Science 170 (1-2), 245-276, 1996
56*1996
Automatic case analysis in proof by induction
A Bouhoula, M Rusinowitch
IJCAI, 88-94, 1993
551993
Specification and proof in membership equational logic
A Bouhoula, JP Jouannaud, J Meseguer
Colloquium on Trees in Algebra and Programming, 67-92, 1997
521997
Efficient decision tree for protocol analysis in intrusion detection
T Abbes, A Bouhoula, M Rusinowitch
International Journal of Security and Networks 5 (4), 220-235, 2010
502010
An inference system for detecting firewall filtering rules anomalies
T Abbes, A Bouhoula, M Rusinowitch
Proceedings of the 2008 ACM symposium on Applied computing, 2122-2128, 2008
442008
Managing delegation in access control models
MB Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia, A Bouhoula
Advanced Computing and Communications, 2007. ADCOM 2007. International …, 2007
442007
Automatic verification of conformance of firewall configurations to security policies
NB Youssef, A Bouhoula, F Jacquemard
2009 ieee symposium on computers and communications, 526-531, 2009
422009
Automated induction with constrained tree automata
A Bouhoula, F Jacquemard
International Joint Conference on Automated Reasoning, 539-554, 2008
41*2008
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity
A Ameziane El Hassani, A Abou El Kalam, A Bouhoula, R Abassi, ...
International Journal of Information Security 14 (4), 367-385, 2015
402015
Misbehavior detection using implicit trust relations in the AODV routing protocol
MA Ayachi, C Bidan, T Abbes, A Bouhoula
2009 International Conference on Computational Science and Engineering 2 …, 2009
382009
Detection of firewall configuration errors with updatable tree
T Abbes, A Bouhoula, M Rusinowitch
International Journal of Information Security 15 (3), 301-317, 2016
372016
Observational proofs with critical contexts
N Berregeb, A Bouhoula, M Rusinowitch
International Conference on Fundamental Approaches to Software Engineering …, 1998
361998
Unlocking the Potential of Artificial Intelligence for Sustainable Water Management Focusing Operational Applications.
D Jayakumar, A Bouhoula, WK Al-Zubari
Water (20734441) 16 (22), 2024
352024
The system can't perform the operation now. Try again later.
Articles 1–20