Circular antenna array design for breast cancer detection K Ouerghi, N Fadlallah, A Smida, R Ghayoula, J Fattahi, N Boulejfen 2017 Sensors Networks Smart and Emerging Technologies (SENSET), 1-4, 2017 | 45 | 2017 |
Fusion of ANN and SVM classifiers for network attack detection T Omrani, A Dallali, BC Rhaimi, J Fattahi 2017 18th International Conference on Sciences and Techniques of Automatic …, 2017 | 37 | 2017 |
SpaML: a bimodal ensemble learning spam detector based on NLP techniques J Fattahi, M Mejri 2021 IEEE 5th international conference on cryptography, security and privacy …, 2021 | 27 | 2021 |
Resilience enhancement of cyber-physical systems: A review SF Mihalache, E Pricop, J Fattahi Power Systems Resilience: Modeling, Analysis and Practice, 269-287, 2019 | 25 | 2019 |
Method for authentication of sensors connected on modbus tcp E Pricop, J Fattahi, N Parashiv, F Zamfir, E Ghayoula 2017 4th International Conference on Control, Decision and Information …, 2017 | 18 | 2017 |
Dynamic Context‐Aware and Limited Resources‐Aware Service Adaptation for Pervasive Computing M Miraoui, C Tadj, J Fattahi, C Ben Amar Advances in Software Engineering 2011 (1), 649563, 2011 | 17 | 2011 |
Damaged fingerprint recognition by convolutional long short-term memory networks for forensic purposes J Fattahi, M Mejri 2021 IEEE 5th International Conference on Cryptography, Security and Privacy …, 2021 | 15 | 2021 |
Recent developments on industrial control systems resilience E Pricop, J Fattahi, N Dutta, M Ibrahim Springer International Publishing, 2020 | 14 | 2020 |
Secrecy by Witness-Functions F Jaouhar, M Mohamed, H Hanane Proceedings of the Formal Methods for Security Workshop co-located with the …, 2014 | 14* | 2014 |
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications M Ziadia, J Fattahi, M Mejri, E Pricop Information 11 (3), 130, 2020 | 13 | 2020 |
Considerations regarding security issues impact on systems availability E Pricop, SF Mihalache, N Paraschiv, J Fattahi, F Zamfir 2016 8th International Conference on Electronics, Computers and Artificial …, 2016 | 12 | 2016 |
Analyse des protocoles cryptographiques par les fonctions témoins J Fattahi | 12 | 2016 |
A slow read attack using cloud D Ameyed, F Jaafar, J Fattahi 2015 7th International Conference on Electronics, Computers and Artificial …, 2015 | 12 | 2015 |
Relaxed conditions for secrecy in a role-based specification J Fattahi, M Mejri, H Houmani arXiv preprint arXiv:1801.08410, 2018 | 11 | 2018 |
Cyber Racism Detection Using Bidirectional Gated Recurrent Units and Word Embeddings J Fattahi, M Ziadia, M Mejri New Trends in Intelligent Software Methodologies, Tools and Techniques, 155-165, 2021 | 8 | 2021 |
The theory of witness-functions J Fattahi, M Mejri, E Pricop Recent Advances in Systems Safety and Security, 1-19, 2016 | 8 | 2016 |
Innovative fuzzy approach on analyzing industrial control systems security E Pricop, SF Mihalache, J Fattahi Recent Advances in Systems Safety and Security, 223-239, 2016 | 7 | 2016 |
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols J Fattahi, M Mejri, H Houmani arXiv preprint arXiv:1408.2774, 2014 | 6 | 2014 |
New functions for secrecy on real protocols J Fattahi, M Mejri, H Houmani Fourth International Conference on Computer Science, Engineering and …, 2014 | 6 | 2014 |
FPGA implementation of SIMON-128 cryptographic algorithm using Artix-7 R Ghayoula, J Fattahi, A Smida, I El Gmati, E Pricop, M Ziadia 2022 14th International Conference on Electronics, Computers and Artificial …, 2022 | 5 | 2022 |