Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli:
Fast and Effective Clustering of Spam Emails Based on Structural Similarity.Foundations and Practice of Security, FPS 2015 : 195-211, PDF. Bibtex.
Raphaël Khoury and Nadia Tawbi: Equivalence-preserving corrective enforcement of security properties.
International Journal of Information and Computer Security Volume 7, number 2/3/4: 113-139 (2015), PDF. Bibtex.
A. Bedford, J. Desharnais, T. G. Godonou and N. Tawbi. Enforcing information flow by combining static and dynamic analysis, International Symposim on Foundations & Practice of Security (FPS'2013).PDF. bibtex .
J. Desharnais, E. P. Kanyabwero and N. Tawbi. Enforcing information flow policies by a three-valued analysis, International Conference "Mathematical Methods, Models and Architectures for Computer Network Security" (MMM-ACNS 2012). Full version with proofs . bibtex .
R. Khoury, and N. Tawbi. Corrective Enforcement: A new Paradigm of Security Policy Enforcement by Monitors. ACM Transactions on Information and System Security (2012). PDF . bibtex .
R. Khoury, and N. Tawbi. Which security policies are enforceable by runtime monitors? A survey. Computer Science Review 6 (2012) pp 27-45. PDF , bibtex .
F. Lemay, R. Khoury and N. Tawbi. Optimized Inlining of Runtime Monitors. NordSec 2011. PDF , bibtex .
H. Chabot, R. Khoury, and N. Tawbi. Extending the Enforcement Power of Truncation Monitors Using Static Analysis. Computers & Security (2011). PDF , bibtex .
R. Khoury, and N. Tawbi. Corrective Enforcement of Security Policies. In Proceedings of the The 7th International Workshop on Formal Aspects of Security & Trust. September 2010. PDF , bibtex .
R. Khoury, and N. Tawbi. Using Equivalence Relations for Corrective Enforcement of Security Policies . In Proceedings of the 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Lecture Notes in Computer Science, volume 6258. September 2010. PDF , bibtex .
H. Chabot, R. Khoury, and N. Tawbi. Generating in-line monitors for Rabin automata . In Proceedings of The 14th Nordic Conference on Secure IT Systems. October 2009. PDF , bibtex .
N. Tawbi C. Talhi and M. Debbabi. Execution monitoring enforcement under memory-limitations constraints. Information and Computation, 2008. PDF , bibtex .