Follow
Mohamed Mejri
Mohamed Mejri
Université Laval
No verified email
Title
Cited by
Cited by
Year
GDVAN: a new greedy behavior attack detection algorithm for VANETs
MN Mejri, J Ben-Othman
IEEE Transactions on Mobile Computing 16 (3), 759-771, 2016
812016
A new logic for electronic commerce protocols
K Adi, M Debbabi, M Mejri
Theoretical Computer Science 291 (3), 223-283, 2003
612003
Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks
MN Mejri, J Ben-Othman
2014 IEEE Global Communications Conference, 5032-5037, 2014
462014
Formal automatic verification of authentication cryptographic protocols
M Debbabi, M Mejri, N Tawbi, I Yahmadi
First IEEE International Conference on Formal Engineering Methods, 50-59, 1997
401997
A new group Diffie-Hellman key generation proposal for secure VANET communications
MN Mejri, N Achir, M Hamdi
2016 13th IEEE annual consumer communications & networking conference (CCNC …, 2016
322016
A new security games based reaction algorithm against DOS attacks in VANETs
MN Mejri, N Achir, M Hamdi
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016
322016
A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios
M Debbabi, M Mejri, N Tawbi, I Yahmadi
DIMACS Workshop on Design and Formal Verifictaion of Security Protocols, 1997
321997
Risk analysis in access control systems
J Ma, K Adi, M Mejri, L Logrippo
2010 Eighth International Conference on Privacy, Security and Trust, 160-166, 2010
302010
Entropy as a new metric for denial of service attack detection in vehicular ad-hoc networks
MN Mejri, J Ben-Othman
Proceedings of the 17th ACM international conference on Modeling, analysis …, 2014
292014
Fast and effective clustering of spam emails based on structural similarity
M Sheikhalishahi, A Saracino, M Mejri, N Tawbi, F Martinelli
International Symposium on Foundations and Practice of Security, 195-211, 2015
272015
Recent advances in cryptographic solutions for vehicular networks
MN Mejri, M Hamdi
2015 international symposium on networks, computers and communications …, 2015
222015
Formal analysis of set and nsl protocols using the interpretation functions-based method
H Houmani, M Mejri
Journal of Computer Networks and Communications 2012, 2012
222012
Practical and universal interpretation functions for secrecy
H Houmani, M Mejri
International Conference on Security and Cryptography 2, 157-164, 2007
222007
Formal enforcement of security policies on concurrent systems
M Langar, M Mejri, K Adi
Journal of Symbolic Computation 46 (9), 997-1016, 2011
212011
Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy.
H Houmani, M Mejri
SECRYPT, 184-189, 2008
202008
Clustering spam emails into campaigns
MS Alishahi, M Mejri, N Tawbi
2015 International Conference on Information Systems Security and Privacy …, 2015
192015
Security by typing
M Debbabi, N Durgin, M Mejri, JC Mitchell
International Journal on Software Tools for Technology Transfer 4, 472-495, 2003
192003
An environment for the specification and analysis of cryptoprotocols
M Debbabi, Y Legaré, M Mejri
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
191998
SpaML: a bimodal ensemble learning spam detector based on NLP techniques
J Fattahi, M Mejri
2021 IEEE 5th international conference on cryptography, security and privacy …, 2021
182021
Secrecy of cryptographic protocols under equational theory
H Houmani, M Mejri, H Fujita
Knowledge-Based Systems 22 (3), 160-173, 2009
182009
The system can't perform the operation now. Try again later.
Articles 1–20