Hiding a fault enabled virus through code construction
Hamadouche, Samiya, Lanet, Jean-Louis, Mezghiche, Mohamed
Published in Journal of Computer Virology and Hacking Techniques (01.06.2020)
Published in Journal of Computer Virology and Hacking Techniques (01.06.2020)
Get full text
Journal Article
Formal verification of a proof procedure for the description logic ALC
Chaabani, Mohamed, Mezghiche, Mohamed, Strecker, Martin
Published in Electronic proceedings in theoretical computer science (30.07.2013)
Published in Electronic proceedings in theoretical computer science (30.07.2013)
Get full text
Journal Article
A stochastic multi-agent approach for medical-image segmentation: Application to tumor segmentation in brain MR images
Bennai, Mohamed T., Guessoum, Zahia, Mazouzi, Smaine, Cormier, Stéphane, Mezghiche, Mohamed
Published in Artificial intelligence in medicine (01.11.2020)
Published in Artificial intelligence in medicine (01.11.2020)
Get full text
Journal Article
Multi-agent medical image segmentation: A survey
Bennai, Mohamed T., Guessoum, Zahia, Mazouzi, Smaine, Cormier, Stéphane, Mezghiche, Mohamed
Published in Computer methods and programs in biomedicine (01.04.2023)
Published in Computer methods and programs in biomedicine (01.04.2023)
Get full text
Journal Article
Bi-Objective Ant Colony Optimization approach to optimize production and maintenance scheduling
Berrichi, A., Yalaoui, F., Amodeo, L., Mezghiche, M.
Published in Computers & operations research (01.09.2010)
Published in Computers & operations research (01.09.2010)
Get full text
Journal Article
Reverse engineering a Java Card memory management algorithm
Mesbah, Abdelhak, Lanet, Jean-Louis, Mezghiche, Mohamed
Published in Computers & security (01.05.2017)
Published in Computers & security (01.05.2017)
Get full text
Journal Article
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM
Mesbah, Abdelhak, Lanet, Jean-Louis, Mezghiche, Mohamed
Published in International journal of information security (01.02.2019)
Published in International journal of information security (01.02.2019)
Get full text
Journal Article
Using structural similarity for clustering XML documents
Aïtelhadj, Ali, Boughanem, Mohand, Mezghiche, Mohamed, Souam, Fatiha
Published in Knowledge and information systems (01.07.2012)
Published in Knowledge and information systems (01.07.2012)
Get full text
Journal Article
Integrating a Formal Development for DSLs into Meta-Modeling
Djeddai, Selma, Strecker, Martin, Mezghiche, Mohamed
Published in Journal on data semantics (01.09.2014)
Published in Journal on data semantics (01.09.2014)
Get full text
Journal Article