default search action
Nadia Tawbi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Youcef Korichi, Josée Desharnais, Sébastien Gambs, Nadia Tawbi:
Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation. ESORICS (4) 2024: 271-290 - [e4]Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquín García-Alfaro:
Foundations and Practice of Security - 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14551, Springer 2024, ISBN 978-3-031-57536-5 [contents] - [e3]Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquín García-Alfaro:
Foundations and Practice of Security - 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14552, Springer 2024, ISBN 978-3-031-57539-6 [contents] - 2023
- [c31]Simon Bertrand, Josée Desharnais, Nadia Tawbi:
Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture Models. PST 2023: 1-10 - 2022
- [i1]Simon Bertrand, Nadia Tawbi, Josée Desharnais:
Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture Models. CoRR abs/2211.14437 (2022) - 2020
- [j9]Mina Sheikhalishahi, Andrea Saracino, Fabio Martinelli, Antonio La Marra, Mohammed Mejri, Nadia Tawbi:
Digital Waste Disposal: an automated framework for analysis of spam emails. Int. J. Inf. Sec. 19(5): 499-522 (2020) - [c30]Souad El Hatib, Loïc Ricaud, Josée Desharnais, Nadia Tawbi:
Toward Semantic-Based Android Malware Detection Using Model Checking and Machine Learning. CRiSIS 2020: 289-307
2010 – 2019
- 2019
- [c29]Elisavet Kozyri, Fred B. Schneider, Andrew Bedford, Josée Desharnais, Nadia Tawbi:
Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement. CSF 2019: 351-366 - 2017
- [j8]Andrew Bedford, Stephen Chong, Josée Desharnais, Elisavet Kozyri, Nadia Tawbi:
A progress-sensitive flow-sensitive inlined information-flow control monitor (extended version). Comput. Secur. 71: 114-131 (2017) - [e2]Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquín García-Alfaro:
Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10128, Springer 2017, ISBN 978-3-319-51965-4 [contents] - 2016
- [c28]Hossam S. Hassanein, Nadia Tawbi:
Keynote I and Keynote II. FNC/MobiSPC 2016: 7 - [c27]Andrew Bedford, Sébastien Garvin, Josée Desharnais, Nadia Tawbi, Hana Ajakan, Frédéric Audet, Bernard Lebel:
Andrana: Quick and Accurate Malware Detection for Android. FPS 2016: 20-35 - [c26]Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli:
Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm. FPS 2016: 161-178 - [c25]Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi:
On the Abstraction of a Categorical Clustering Algorithm. MLDM 2016: 659-675 - [c24]Andrew Bedford, Stephen Chong, Josée Desharnais, Nadia Tawbi:
A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor. SEC 2016: 352-366 - 2015
- [j7]Raphaël Khoury, Nadia Tawbi:
Equivalence-preserving corrective enforcement of security properties. Int. J. Inf. Comput. Secur. 7(2/3/4): 113-139 (2015) - [c23]Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli:
Fast and Effective Clustering of Spam Emails Based on Structural Similarity. FPS 2015: 195-211 - [c22]Mina Sheikh Alishahi, Mohamed Mejri, Nadia Tawbi:
Clustering Spam Emails into Campaigns. ICISSP 2015: 90-97 - [c21]Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli:
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns. STM 2015: 3-19 - 2013
- [j6]Frédéric Cuppens, Nora Cuppens-Boulahia, Ernesto Damiani, Radu State, Joaquín García-Alfaro, Nadia Tawbi:
Editorial. J. Inf. Secur. Appl. 18(1): 1 (2013) - [c20]Andrew Bedford, Josée Desharnais, Théophane G. Godonou, Nadia Tawbi:
Enforcing Information Flow by Combining Static and Dynamic Analysis. FPS 2013: 83-101 - [e1]Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi:
Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7743, Springer 2013, ISBN 978-3-642-37118-9 [contents] - 2012
- [j5]Raphaël Khoury, Nadia Tawbi:
Which security policies are enforceable by runtime monitors? A survey. Comput. Sci. Rev. 6(1): 27-45 (2012) - [j4]Raphaël Khoury, Nadia Tawbi:
Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors. ACM Trans. Inf. Syst. Secur. 15(2): 10:1-10:27 (2012) - [c19]Josée Desharnais, Erwanne P. Kanyabwero, Nadia Tawbi:
Enforcing Information Flow Policies by a Three-Valued Analysis. MMM-ACNS 2012: 114-129 - 2011
- [j3]Hugues Chabot, Raphaël Khoury, Nadia Tawbi:
Extending the enforcement power of truncation monitors using static analysis. Comput. Secur. 30(4): 194-207 (2011) - [c18]Frédérick Lemay, Raphaël Khoury, Nadia Tawbi:
Optimized Inlining of Runtime Monitors. NordSec 2011: 149-161 - 2010
- [c17]Raphaël Khoury, Nadia Tawbi:
Corrective Enforcement of Security Policies. Formal Aspects in Security and Trust 2010: 176-190 - [c16]Raphaël Khoury, Nadia Tawbi:
Using Equivalence Relations for Corrective Enforcement of Security Policies. MMM-ACNS 2010: 139-154
2000 – 2009
- 2009
- [c15]Hugues Chabot, Raphaël Khoury, Nadia Tawbi:
Generating In-Line Monitors for Rabin Automata. NordSec 2009: 287-301 - 2008
- [j2]Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi:
Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2-4): 158-184 (2008) - 2007
- [c14]Hamdi Yahyaoui, Mourad Debbabi, Nadia Tawbi:
A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL. QSIC 2007: 348-355 - 2006
- [c13]Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi:
Execution monitoring enforcement for limited-memory systems. PST 2006: 38 - 2005
- [j1]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi:
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. J. Object Technol. 4(1): 83-108 (2005) - [c12]Mourad Debbabi, Azzam Mourad, Nadia Tawbi:
Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. SAC 2005: 874-878 - 2004
- [c11]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua:
A dynamic compiler for embedded Java virtual machines. PPPJ 2004: 100-106 - 2003
- [c10]Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua:
Method Call Acceleration in Embedded Java Virtual Machines. International Conference on Computational Science 2003: 750-759 - 2002
- [c9]Mourad Debbabi, Josée Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi:
Secure Self-certified Code for Java. FASec 2002: 133-151 - 2000
- [c8]Mourad Debbabi, E. Giasson, Béchir Ktari, Frédéric Michaud, Nadia Tawbi:
Secure Self-Certified COTS. WETICE 2000: 183-188
1990 – 1999
- 1997
- [c7]Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi:
Formal Automatic Verification of Authentication Crytographic Protocols. ICFEM 1997: 50-59 - [c6]Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi:
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. WETICE 1997: 256-262 - 1996
- [c5]Ghassan Chehaibar, Hubert Garavel, Laurent Mounier, Nadia Tawbi, Ferruccio Zulian:
Specification and Verification of the PowerScaleTM Bus Arbitration Protocol: An Industrial Experiment with LOTOS. FORTE 1996: 435-450 - [c4]Mourad Debbabi, Ali Faour, Nadia Tawbi:
A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs. Implementation of Functional Languages 1996: 247-266 - 1994
- [c3]Nadia Tawbi:
Estimation of Nested Loops Execution Time by Integer Arithmetic in Convex Polyhedra. IPPS 1994: 217-221 - 1992
- [c2]Nadia Tawbi, Paul Feautrier:
Processor allocation and loop scheduling on multiprocessor computers. ICS 1992: 63-71 - 1991
- [c1]B. Dehbonei, Christophe Laurent, Nadia Tawbi, R. S. Kulkarni:
PMACS: An Environment for Parallel Programming. IPPS 1991: 638-641
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint