Hamdi Yahyaoui
Professor of Computer Science
2498-5325
Kuwait University
College of Science
Computer Science Department,
P.O. Box 5969
Safat -13060
Education:
Ph.D. in Computer Science
Laval University, Canada2006
M.S. in Computer Science
Laval University, Canada2000
B.S. in Computer Engineering
ENSIAS, Morocco1998
Interests and Research:

Machine Learning

Publications

[1] Hamdi Yahyaoui and Reem Al-Daihani. A novel trend based SAX reduction technique for time series. Expert Syst. Appl., 130:113–123, 2019.

[2] Hamdi Yahyaoui and Hala S. Own. Unsupervised clustering of service performance behaviors. Inf. Sci., 422:558–571, 2018.

[3] Mohamed Mejri and Hamdi Yahyaoui. Formal specification and integration of distributed security policies. Comput. Lang. Syst. Struct., 49:1–35, 2017.

[4] Jumana El-Qurna, Hamdi Yahyaoui, and Mohammed Almulla. A new framework for the verification of service trust behaviors. Knowl. Based Syst., 121:7–22, 2017.

[5] Wei Wan, Jamal Bentahar, Hamdi Yahyaoui, and Abdessamad Ben Hamza. Verifying concurrent probabilistic systems using probabilistic-epistemic logic specifications. Appl. Intell., 45(3):747–776, 2016.

[6] Azzam Mourad, Hanine Tout, Chamseddine Talhi, Hadi Otrok, and Hamdi Yahyaoui. From model-driven specification to design-level set-based anal- ysis of XACML policies. Comput. Electr. Eng., 52:65–79, 2016.

[7] Hamdi Yahyaoui and Aisha Al-Mutairi. A feature-based trust sequence classification algorithm. Inf. Sci., 328:455–484, 2016.

[8] Aisha Al-Mutairi, Hamdi Yahyaoui, and Hazem M. Raafat. Lattice-based ranking for service trust behaviors. Knowl. Based Syst., 102:20–38, 2016.

[9] Mohamed Mejri and Hamdi Yahyaoui. A rewriting system for the assess- ment of XACML policies similarity. CoRR, abs/1605.05887, 2016.

[10] Mohamed Mejri and Hamdi Yahyaoui. Formal specification and integration of distributed security policies. CoRR, abs/1605.06233, 2016.

[11] Hamdi Yahyaoui, Hala S. Own, and Zaki Malik. Modeling and classification of service behaviors. Expert Syst. Appl., 42(21):7610–7619, 2015.

[12] Hala S. Own and Hamdi Yahyaoui. Rough set based classification of real world web services. Inf. Syst. Frontiers, 17(6):1301–1311, 2015.

[13] Mohammed Almulla, Hamdi Yahyaoui, and Kawthar Al-Matori. A new fuzzy hybrid technique for ranking real world web services. Knowl. Based Syst., 77:1–15, 2015.

[14] Zakaria Maamar, Hamdi Yahyaoui, Azzam Mourad, and Mohamed Sellami. Analyzing social web services’ capabilities. In Sumitra Reddy, editor, 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2015, Larnaca, Cyprus, June 15- 17, 2015, pages 122–127. IEEE Computer Society, 2015.

[15] Hamdi Yahyaoui, Mohammed Almulla, and Hala S. Own. A novel non- functional matchmaking approach between fuzzy user queries and real world web services based on rough sets. Future Gener. Comput. Syst., 35:27–38, 2014.

[16] Hamdi Yahyaoui, Mohammed Almulla, and Zakaria Maamar. A fuzzy model for selecting social web services. In Boualem Benatallah, Azer Bestavros, Yannis Manolopoulos, Athena Vakali, and Yanchun Zhang, ed- itors, Web Information Systems Engineering - WISE 2014 - 15th Interna- tional Conference, Thessaloniki, Greece, October 12-14, 2014, Proceedings, Part II, volume 8787 of Lecture Notes in Computer Science, pages 32–46. Springer, 2014.

[17] Jamal Bentahar, Hamdi Yahyaoui, Melissa Kova, and Zakaria Maamar. Symbolic model checking composite web services using operational and control behaviors. Expert Syst. Appl., 40(2):508–522, 2013.

[18] Hamdi Yahyaoui, Zakaria Maamar, Erbin Lim, and Philippe Thiran. To- wards a community-based, social network-driven framework for web ser- vices management. Future Gener. Comput. Syst., 29(6):1363–1377, 2013.

[19] Hamdi Yahyaoui and Sami Zhioua. Bootstrapping trust of web services based on trust patterns and hidden markov models. Knowl. Inf. Syst., 37(2):389–416, 2013.

[20] Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, and Hadi Otrok. A novel aspect-oriented BPEL framework for the dynamic enforcement of web ser- vices security. IJWGS, 8(4):361–385, 2012.

[21] Ali Kanso, Hamdi Yahyaoui, and Mohammed Almulla. Keyed hash function based on a chaotic map. Inf. Sci., 186(1):249–264, 2012.

[22] Hamdi Yahyaoui. A trust-based game theoretical model for web services collaboration. Knowl. Based Syst., 27:162–169, 2012.

[23] Hamdi Yahyaoui, Azzam Mourad, Mohammed Almulla, Lina Yao, and Quan Z. Sheng. A synergy between context-aware policies and AOP to achieve highly adaptable web services. Service Oriented Computing and Applications, 6(4):379–392, 2012.

[24] Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, and Hadi Otrok. Towards a BPEL model-driven approach for web services se- curity. In  Tenth Annual Inter- national Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012, pages 120–127. IEEE Computer Society, 2012.

[25] Mohammed Almulla, Hamdi Yahyaoui, and Kawthar Almatori. Visualiza- tion of real-world web services based on fuzzy logic. In Eighth IEEE World Congress on Services, SERVICES 2012, Honolulu, HI, USA, June 24-29, 2012, pages 330–335. IEEE Computer Society, 2012.

[26] Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, and Lama Baajour. Toward an abstract language on top of XACML for web services security. In 6th In- ternational Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pages 254–259. IEEE, 2011.

[27] Hamdi Yahyaoui and Sami Zhioua. Bootstrapping trust of web services through behavior observation. In Web Engineering - 11th International Conference, ICWE 2011, Paphos, Cyprus, June 20-24, 2011, volume 6757 of Lecture Notes in Computer Science, pages 319–330. Springer, 2011.

[28] Mohammed Almulla, Kawthar Almatori, and Hamdi Yahyaoui. A qos- based fuzzy model for ranking real world web services. In IEEE Interna- tional Conference on Web Services, ICWS 2011, Washington, DC, USA, July 4-9, 2011, pages 203–210. IEEE Computer Society, 2011.

[29] Zakaria Maamar, Noura Faci, Leandro Krug Wives, Hamdi Yahyaoui, and Hakim Hacid. Towards a method for engineering social web services. In Engineering Methods in the Service-Oriented Context - 4th IFIP WG 8.1 Working Conference on Method Engineering, ME 2011, Paris, France, April 20-22, 2011. Proceedings, volume 351 of IFIP Advances in Information and Com- munication Technology, pages 153–167. Springer, 2011.

[30] Zakaria Maamar, Hamdi Yahyaoui, Erbin Lim, and Philippe Thiran. So- cial engineering of communities of web services. In 11th Annual Interna- tional Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pages 100–109. IEEE Computer Society, 2011.

[31] Hamdi Yahyaoui, L. Wang, Azzam Mourad, Mohammed Almulla, and Quan Z. Sheng. Towards context-adaptable web service policies. In Proceedings of the 2nd International Conference on Ambient Systems, Networks and Technologies (ANT 2011), the 8th International Conference on Mobile Web Information Systems (MobiWIS-2011), Niagara Falls, Ontario, Canada, September 19- 21, 2011, volume 5 of Procedia Computer Science, pages 610–617. Elsevier, 2011.

[32] Hamdi Yahyaoui, Zakaria Maamar, and Khouloud Boukadi. A framework to coordinate web services in composition scenarios. IJWGS, 6(2):95–123, 2010.

[33] Quan Z. Sheng, Zakaria Maamar, Hamdi Yahyaoui, Jamal Bentahar, and Khouloud Boukadi. Separating operational and control behaviors: A new approach to web services modeling. IEEE Internet Comput., 14(3):68–76, 2010.

[34] Hamdi Yahyaoui and Mohammed Almulla. Context-based specification of web service policies using WSPL. In Fifth IEEE International Conference on Digital Information Management, ICDIM 2010, July 5-8, 2010, Lake- head University, Thunder Bay, Canada, pages 496–501. IEEE, 2010.

[35] Hamdi Yahyaoui. Trust assessment for web services collaboration. In IEEE International Conference on Web Services, ICWS 2010, Miami, Florida, USA, July 5-10, 2010, pages 315–320. IEEE Computer Society, 2010.

[36] Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, and Hadi Otrok. New approach for the dynamic enforcement of web services security. In Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17- 19, 2010, Ottawa, Ontario, Canada, pages 189–196. IEEE, 2010.

[37] Hadi Otrok, Benwen Zhu, Hamdi Yahyaoui, and Prabir Bhattacharya. An intrusion detection game theoretical model. Inf. Secur. J. A Glob. Per- spect., 18(5):199–212, 2009.

[38] Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Jamal Bentahar, and Khouloud Boukadi. A new approach to model web services’ behaviors based on synchronization. In 23rd International Conference on Advanced Infor- mation Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009, pages 43–49. IEEE Computer Society, 2009.

[39] Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Khouloud Boukadi, and Xitong Li. On the synchronization of web services interactions. In Irfan Awan, Muhammad Younas, Takahiro Hara, and Arjan Durresi, ed- itors, The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009, pages 644–651. IEEE Computer Society, 2009.