Adel Bouhoula
Adel Bouhoula
Professor of Computer Science, Formal Methods and Cybersecurity. Arabian Gulf University
Verified email at agu.edu.bh - Homepage
Title
Cited by
Cited by
Year
Specification and proof in membership equational logic
A Bouhoula, JP Jouannaud, J Meseguer
Theoretical Computer Science 236 (1-2), 35-132, 2000
2972000
Implicit induction in conditional theories
A Bouhoula, M Rusinowitch
Journal of automated reasoning 14 (2), 189-235, 1995
1541995
Protocol analysis in intrusion detection using decision tree
T Abbes, A Bouhoula, M Rusinowitch
International Conference on Information Technology: Coding and Computing …, 2004
1332004
Automated mathematical induction
A Bouhoula, E Kounalis, M Rusinowitch
Journal of Logic and Computation 5 (5), 631-668, 1995
1121995
Automated theorem proving by test set induction
A Bouhoula
Journal of Symbolic Computation 23 (1), 47-77, 1997
801997
SPIKE, an automatic theorem prover
A Bouhoula, E Kounalis, M Rusinowitch
International Conference on Logic for Programming Artificial Intelligence …, 1992
531992
Automata-driven automated induction
A Bouhoula, JP Jouannaud
Proceedings of Twelfth Annual IEEE Symposium on Logic in Computer Science, 14-25, 1997
50*1997
Using induction and rewriting to verify and complete parameterized specifications
A Bouhoula
Theoretical Computer Science 170 (1-2), 245-276, 1996
49*1996
Automatic case analysis in proof by induction
A Bouhoula, M Rusinowitch
IJCAI, 88-94, 1993
471993
Specification and proof in membership equational logic
A Bouhoula, JP Jouannaud, J Meseguer
Colloquium on Trees in Algebra and Programming, 67-92, 1997
431997
Managing delegation in access control models
MB Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia, A Bouhoula
Advanced Computing and Communications, 2007. ADCOM 2007. International …, 2007
412007
An inference system for detecting firewall filtering rules anomalies
T Abbes, A Bouhoula, M Rusinowitch
Proceedings of the 2008 ACM symposium on Applied computing, 2122-2128, 2008
402008
Automatic verification of conformance of firewall configurations to security policies
NB Youssef, A Bouhoula, F Jacquemard
2009 IEEE Symposium on Computers and Communications, 526-531, 2009
372009
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity
AA El Hassani, A Abou El Kalam, A Bouhoula, R Abassi, AA Ouahman
International Journal of Information Security 14 (4), 367-385, 2015
362015
Automated induction with constrained tree automata
A Bouhoula, F Jacquemard
International Joint Conference on Automated Reasoning, 539-554, 2008
36*2008
Misbehavior detection using implicit trust relations in the AODV routing protocol
MA Ayachi, C Bidan, T Abbes, A Bouhoula
2009 International Conference on Computational Science and Engineering 2 …, 2009
342009
Observational proofs with critical contexts
N Berregeb, A Bouhoula, M Rusinowitch
International Conference on Fundamental Approaches to Software Engineering …, 1998
341998
Efficient decision tree for protocol analysis in intrusion detection
T Abbes, A Bouhoula, M Rusinowitch
International Journal of Security and Networks 5 (4), 220-235, 2010
302010
A delegation model for extended RBAC
M Ben-Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia, A Bouhoula
International journal of information security 9 (3), 209-236, 2010
292010
Tuple based approach for anomalies detection within firewall filtering rules
MA Benelbahri, A Bouhoula
2007 12th IEEE Symposium on Computers and Communications, 63-70, 2007
272007
The system can't perform the operation now. Try again later.
Articles 1–20