![]() |
| 2007 | ||
|---|---|---|
| 2 | Lamia Hamza, Kamel Adi: Formal Technique for Discovering Complex Attacks in Computer Systems. SoMeT 2007: 185-199 | |
| 2006 | ||
| 1 | EE | Lamia Hamza, Kamel Adi, Karim El Guemhioui: Automatic generation of attack scenarios for intrusion detection systems. AICT/ICIW 2006: 205 |
| 1 | Kamel Adi | [1] [2] |
| 2 | Karim El Guemhioui | [1] |