{"id":25,"date":"2022-02-06T18:23:52","date_gmt":"2022-02-06T18:23:52","guid":{"rendered":"https:\/\/lrsi.uqo.ca\/?page_id=25"},"modified":"2022-02-15T16:56:44","modified_gmt":"2022-02-15T16:56:44","slug":"publications","status":"publish","type":"page","link":"https:\/\/lrsi.uqo.ca\/index.php\/publications\/","title":{"rendered":"Production scientifique"},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><strong>Publications scientifiques r\u00e9centes<\/strong> <\/p>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-4d539fbe068b893fac2245adc3a0c480 is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<div class=\"wp-block-file\"><a href=\"https:\/\/lrsi.uqo.ca\/wp-content\/uploads\/2022\/02\/APH_SE.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-2c527319-3f2d-4e9c-9771-d393af1a7e60\">Download<\/a><\/div>\n\n\n\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"access-pattern-hiding-in-searchable-encryption\" style=\"font-style:normal;font-weight:600\"><strong>Access Pattern Hiding in Searchable Encryption<\/strong><\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"><em>Fateh Boucenna,&nbsp;Omar Nouali,&nbsp;Kamel Adi<\/em>. <\/p>\n\n\n\n<p>FiCloud&nbsp;2021:&nbsp;107-114<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-680cb1d09b2c101029be0d6ac611d1bf is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<div class=\"wp-block-file\"><a href=\"https:\/\/lrsi.uqo.ca\/wp-content\/uploads\/2022\/02\/1-s2.0-S0167404820300043-main.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-96e3ba6d-ca4d-463e-9b31-bd048cce6dd6\">Download<\/a><\/div>\n\n\n\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"a-semantic-based-classification-approach-for-an-enhanced-spam-detection-1\" style=\"font-style:normal;font-weight:600\"><strong>A semantic-based classification approach for an enhanced spam detection<\/strong><\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"><em>Nadjate Saidani,&nbsp;Kamel Adi,&nbsp;Mohand Sa\u00efd.<\/em> <\/p>\n\n\n\n<p>Computer and Security journal&nbsp;94:&nbsp;101716&nbsp;(2020)<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-d98583daa89e733622785b474f14b079 is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<div class=\"wp-block-file\"><a href=\"https:\/\/lrsi.uqo.ca\/wp-content\/uploads\/2022\/02\/21_JISA.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-0392624a-4cce-4458-9be0-e77976595915\">Download<\/a><\/div>\n\n\n\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"multi-level-models-for-data-security-in-networks-and-in-the-internet-of-things\" style=\"font-style:normal;font-weight:600\">Multi-level models for data security in networks and in the Internet of things<\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\">Luigi Logrippo<\/p>\n\n\n\n<p>Journal of Information Security and Applications, <a href=\"https:\/\/dblp.org\/db\/journals\/istr\/istr58.html#Logrippo21\">58<\/a>:&nbsp;102778&nbsp;(2021)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-52433219f6db3826f2089b23e174763a is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<div class=\"wp-block-file\"><a href=\"https:\/\/lrsi.uqo.ca\/wp-content\/uploads\/2022\/02\/1-s2.0-S0167404820300043-main.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-37ee8788-f922-4db6-a3f9-b71a80b1447b\">Download<\/a><\/div>\n\n\n\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"a-semantic-based-classification-approach-for-an-enhanced-spam-detection-1\" style=\"font-style:normal;font-weight:600\"><strong><strong>A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT<\/strong><\/strong><\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"><em><em>Khaled Hamouid,&nbsp;Mawloud Omar,&nbsp;Kamel Adi<\/em>. <\/em> <\/p>\n\n\n\n<p>WD&nbsp;2021:&nbsp;1-6<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-da59b2cd8635ffb27318d0ac7f206a32 is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<div class=\"wp-block-file\"><a href=\"https:\/\/lrsi.uqo.ca\/wp-content\/uploads\/2022\/02\/1-s2.0-S0167404817302286-main.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-411bc1f8-d77c-4627-aa5d-90fd03ef1fb9\">Download<\/a><\/div>\n\n\n\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"automatic-security-policy-enforcement-in-computer-systems\" style=\"font-style:normal;font-weight:600\">Automatic security policy enforcement in computer systems.<\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"><em>Kamel Adi,&nbsp;Lamia Hamza,&nbsp;Liviu Pene<\/em>. <\/p>\n\n\n\n<p>Computer and Security journal.&nbsp;73:&nbsp;156-171&nbsp;(2018).<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-070e867ca822bc0fda07f3b0b4d0414a is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<div class=\"wp-block-file\"><a href=\"https:\/\/lrsi.uqo.ca\/wp-content\/uploads\/2022\/02\/COSE18.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-4ce058a3-3fc8-46fa-a6a9-652760ddfda5\">Download<\/a><\/div>\n\n\n\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"secure-and-reliable-certification-management-scheme-for-large-scale-manets-based-on-a-distributed-anonymous-authority\" style=\"font-style:normal;font-weight:600\">An efficient intrusion detection in resource-constrained mobile ad-hoc networks.<\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"><em>Myria Bouhaddi,&nbsp;Mohammed Said Radjef,&nbsp;Kamel Adi.<\/em> <\/p>\n\n\n\n<p>Computer and Security journal&nbsp;76:&nbsp;156-177&nbsp;(2018).<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-0271994eb2e811991b96ebaa88c88e6c is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<div class=\"wp-block-file\"><a href=\"https:\/\/lrsi.uqo.ca\/wp-content\/uploads\/2022\/02\/paper2.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-693f5035-7c31-4ca5-8d8c-65f11c79c9e3\">Download<\/a><\/div>\n\n\n\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"secure-and-reliable-certification-management-scheme-for-large-scale-manets-based-on-a-distributed-anonymous-authority-1\" style=\"font-style:normal;font-weight:600\">Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority.<\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"><em>Khaled Hamouid,&nbsp;Kamel Adi.<\/em> <\/p>\n\n\n\n<p>Peer-to-Peer Netw. Appl.&nbsp;12(5):&nbsp;1137-1155&nbsp;(2019).<\/p>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-75907f27fe6b723fcaa2517f1e1156de is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<div class=\"wp-block-file\"><a href=\"https:\/\/lrsi.uqo.ca\/wp-content\/uploads\/2022\/02\/vanet-10.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-3b43d5b7-d0c7-4839-90a8-7a887a3bb1ee\">Download<\/a><\/div>\n\n\n\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"privacy-aware-authentication-scheme-for-electric-vehicle-in-motion-wireless-charging\" style=\"font-style:normal;font-weight:600\"><strong>Privacy-aware Authentication Scheme for Electric Vehicle In-motion Wireless Charging.<\/strong><\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"><em>Khaled Hamouid,&nbsp;Kamel Adi.<\/em> <\/p>\n\n\n\n<p><a href=\"https:\/\/dblp.org\/db\/conf\/isncc\/isncc2020.html#HamouidA20\">ISNCC&nbsp;2020<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-c0094c4b6505e0e8b594cebf168da619 is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<div class=\"wp-block-file\"><a href=\"https:\/\/lrsi.uqo.ca\/wp-content\/uploads\/2022\/02\/fault-model-driven-testing.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-942171a2-ad08-4bed-9e0a-6ea6db6b020b\">Download<\/a><\/div>\n\n\n\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"fault-model-driven-testing-from-fsm-with-symbolic-inputs\" style=\"font-style:normal;font-weight:600\">Fault Model Driven Testing from FSM with Symbolic Inputs<\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"><em>O. Nguena Timo\u00a0\u00b7\u00a0A. Petrenko\u00a0\u00b7\u00a0S. Ramesh.<\/em> <\/p>\n\n\n\n<p>Software Quality Journal\u00a0<a href=\"https:\/\/dblp.org\/db\/journals\/sqj\/sqj27.html#TimoPR19\">27(2)<\/a>:\u00a0501-527(2019)<\/p>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-a7aadf9ac90f0e6c3f6b9d03ee090b76 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<div class=\"wp-block-file\"><a href=\"https:\/\/lrsi.uqo.ca\/wp-content\/uploads\/2022\/02\/mining_oracle.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-acc9a4b4-5b96-4b53-bb35-d11aa4657e00\">Download<\/a><\/div>\n\n\n\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"mining-precise-test-oracle-modelled-by-fsm\" style=\"font-style:normal;font-weight:600\">Mining Precise Test Oracle Modelled by FSM<\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"><em>O. Nguena Timo.<\/em> <\/p>\n\n\n\n<p>33rd IFIP WG 6.1 ICTSS (2021)<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-vivid-cyan-blue-background-color has-vivid-cyan-blue-color is-style-wide\"\/>\n\n\n\n<p class=\"has-black-color has-white-background-color has-text-color has-background has-medium-font-size\"><strong>Liste compl\u00e8te des publications<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link\" href=\"https:\/\/scholar.google.ca\/citations?user=bs9ovDkAAAAJ&amp;hl=en\" target=\"_blank\" rel=\"noreferrer noopener\">Kamel Adi<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/scholar.google.ca\/citations?user=T4Gt7h4AAAAJ&amp;hl=en\" target=\"_blank\" rel=\"noreferrer noopener\">Luigi Logrippo<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/scholar.google.ca\/citations?user=kKoW6NcAAAAJ&amp;hl=fr\" target=\"_blank\" rel=\"noreferrer noopener\">Omer Nguena Timo<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Publications scientifiques r\u00e9centes Access Pattern Hiding in Searchable Encryption Fateh Boucenna,&nbsp;Omar Nouali,&nbsp;Kamel Adi. FiCloud&nbsp;2021:&nbsp;107-114 A semantic-based classification approach for an enhanced spam detection Nadjate Saidani,&nbsp;Kamel Adi,&nbsp;Mohand Sa\u00efd. Computer and Security journal&nbsp;94:&nbsp;101716&nbsp;(2020) Multi-level models for data security in networks and in the Internet of things Luigi Logrippo Journal of Information Security and Applications, 58:&nbsp;102778&nbsp;(2021) A Privacy-Preserving &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/lrsi.uqo.ca\/index.php\/publications\/\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Production scientifique&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/pages\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":46,"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":385,"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/pages\/25\/revisions\/385"}],"wp:attachment":[{"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/media?parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}