BibTeX records: Mourad Debbabi

download as .bib file

@article{DBLP:journals/tdsc/OqailyKMJZPWD24,
  author       = {Momen Oqaily and
                  Mohammad Ekramul Kabir and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {iCAT+: An Interactive Customizable Anonymization Tool Using Automated
                  Translation Through Deep Learning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {2799--2817},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3317806},
  doi          = {10.1109/TDSC.2023.3317806},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OqailyKMJZPWD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/EbtiaRDKGMS24,
  author       = {Afshin Ebtia and
                  Dhiaa Elhak Rebbah and
                  Mourad Debbabi and
                  Marthe Kassouf and
                  Mohsen Ghafouri and
                  Arash Mohammadi and
                  Andrei Soeanu},
  title        = {Spatial-Temporal Data-Driven Model for Load Altering Attack Detection
                  in Smart Power Distribution Networks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {5},
  pages        = {7414--7427},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3359451},
  doi          = {10.1109/TII.2024.3359451},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/EbtiaRDKGMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tim/DumanTWD24,
  author       = {Onur Duman and
                  Azadeh Tabiban and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Measuring and Improving the Security Posture of {IEC} 61850 Substations
                  Against Supply Chain Attacks},
  journal      = {{IEEE} Trans. Instrum. Meas.},
  volume       = {73},
  pages        = {1--20},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIM.2024.3400328},
  doi          = {10.1109/TIM.2024.3400328},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tim/DumanTWD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/SarieddineSTAJA24,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Sadegh Torabi and
                  Ribal Attallah and
                  Danial Jafarigiv and
                  Chadi Assi and
                  Mourad Debbabi},
  editor       = {Jianying Zhou and
                  Tony Q. S. Quek and
                  Debin Gao and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {Uncovering Covert Attacks on {EV} Charging Infrastructure: How {OCPP}
                  Backend Vulnerabilities Could Compromise Your System},
  booktitle    = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3634737.3644999},
  doi          = {10.1145/3634737.3644999},
  timestamp    = {Fri, 16 Aug 2024 09:08:03 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/SarieddineSTAJA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BenahmedQLD24,
  author       = {Sofiane Benahmed and
                  Abdullah Qasem and
                  Anis Lounis and
                  Mourad Debbabi},
  editor       = {Federico Maggi and
                  Manuel Egele and
                  Mathias Payer and
                  Michele Carminati},
  title        = {Modularizing Directed Greybox Fuzzing for Binaries over Multiple {CPU}
                  Architectures},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland,
                  July 17-19, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14828},
  pages        = {84--103},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-64171-8\_5},
  doi          = {10.1007/978-3-031-64171-8\_5},
  timestamp    = {Sat, 20 Jul 2024 14:18:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/BenahmedQLD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LounisADH24,
  author       = {Anis Lounis and
                  Anthony Andreoli and
                  Mourad Debbabi and
                  Aiman Hanna},
  editor       = {Federico Maggi and
                  Manuel Egele and
                  Mathias Payer and
                  Michele Carminati},
  title        = {Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence
                  Semantics},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland,
                  July 17-19, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14828},
  pages        = {395--415},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-64171-8\_21},
  doi          = {10.1007/978-3-031-64171-8\_21},
  timestamp    = {Sat, 20 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/LounisADH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DumanZWD24,
  author       = {Onur Duman and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Federico Maggi and
                  Manuel Egele and
                  Mathias Payer and
                  Michele Carminati},
  title        = {SecMonS: {A} Security Monitoring Framework for {IEC} 61850 Substations
                  Based on Configuration Files and Logs},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland,
                  July 17-19, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14828},
  pages        = {483--502},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-64171-8\_25},
  doi          = {10.1007/978-3-031-64171-8\_25},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/DumanZWD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OqailyPJ0NPD24,
  author       = {Momen Oqaily and
                  Hinddeep Purohit and
                  Yosr Jarraya and
                  Lingyu Wang and
                  Boubakr Nour and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {ChainPatrol: Balancing Attack Detection and Classification with Performance
                  Overhead for Service Function Chains Using Virtual Trailers},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/oqaily},
  timestamp    = {Mon, 22 Jul 2024 17:10:49 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OqailyPJ0NPD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RacheracheSSD23,
  author       = {Badis Racherache and
                  Paria Shirani and
                  Andrei Soeanu and
                  Mourad Debbabi},
  title        = {{CPID:} Insider threat detection using profiling and cyber-persona
                  identification},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103350},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103350},
  doi          = {10.1016/J.COSE.2023.103350},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RacheracheSSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/VahidiGAKMD23,
  author       = {Saghar Vahidi and
                  Mohsen Ghafouri and
                  Minh Au and
                  Marthe Kassouf and
                  Arash Mohammadi and
                  Mourad Debbabi},
  title        = {Security of Wide-Area Monitoring, Protection, and Control {(WAMPAC)}
                  Systems of the Smart Grid: {A} Survey on Challenges and Opportunities},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {25},
  number       = {2},
  pages        = {1294--1335},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMST.2023.3251899},
  doi          = {10.1109/COMST.2023.3251899},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/VahidiGAKMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/NourPD23,
  author       = {Boubakr Nour and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {A Survey on Threat Hunting in Enterprise Networks},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {25},
  number       = {4},
  pages        = {2299--2324},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMST.2023.3299519},
  doi          = {10.1109/COMST.2023.3299519},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/NourPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AlrabaeeDW23,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies,
                  and Features},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {2},
  pages        = {19:1--19:41},
  year         = {2023},
  url          = {https://doi.org/10.1145/3486860},
  doi          = {10.1145/3486860},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/AlrabaeeDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AndreoliLDH23,
  author       = {Anthony Andreoli and
                  Anis Lounis and
                  Mourad Debbabi and
                  Aiman Hanna},
  title        = {On the prevalence of software supply chain attacks: Empirical study
                  and investigative framework},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301508},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301508},
  doi          = {10.1016/J.FSIDI.2023.301508},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AndreoliLDH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/KarbabDD23,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab},
  title        = {SwiftR: Cross-platform ransomware fingerprinting using hierarchical
                  neural networks on hybrid features},
  journal      = {Expert Syst. Appl.},
  volume       = {225},
  pages        = {120017},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2023.120017},
  doi          = {10.1016/J.ESWA.2023.120017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/KarbabDD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SarieddineSJADA23,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Danial Jafarigiv and
                  Ribal Atallah and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A Real-Time Cosimulation Testbed for Electric Vehicle Charging and
                  Smart Grid Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {74--83},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3247374},
  doi          = {10.1109/MSEC.2023.3247374},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SarieddineSJADA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/KaranfilRDKGYH23,
  author       = {Mark Karanfil and
                  Dhiaa Elhak Rebbah and
                  Mourad Debbabi and
                  Marthe Kassouf and
                  Mohsen Ghafouri and
                  El{-}Nasser S. Youssef and
                  Aiman Hanna},
  title        = {Detection of Microgrid Cyberattacks Using Network and System Management},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {14},
  number       = {3},
  pages        = {2390--2405},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSG.2022.3218934},
  doi          = {10.1109/TSG.2022.3218934},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/KaranfilRDKGYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/QasemDLK23,
  author       = {Abdullah Qasem and
                  Mourad Debbabi and
                  Bernard Lebel and
                  Marthe Kassouf},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Binary Function Clone Search in the Presence of Code Obfuscation and
                  Optimization over Multi-CPU Architectures},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {443--456},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3582818},
  doi          = {10.1145/3579856.3582818},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/QasemDLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/OqailyM0KJAPD23,
  author       = {Momen Oqaily and
                  Suryadipta Majumdar and
                  Lingyu Wang and
                  Mohammad Ekramul Kabir and
                  Yosr Jarraya and
                  A. S. M. Asadujjaman and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual
                  Network Function Chains Hosted on Third-Party Clouds},
  booktitle    = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923.3583643},
  doi          = {10.1145/3577923.3583643},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/OqailyM0KJAPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HoqYMSWBPD23,
  author       = {Md. Nazmul Hoq and
                  Jia Wei Yao and
                  Suryadipta Majumdar and
                  Luis Su{\'{a}}rez and
                  Lingyu Wang and
                  Amine Boukhtouta and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Evaluating the Security Posture of 5G Networks by Combining State
                  Auditing and Event Monitoring},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {123--144},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_7},
  doi          = {10.1007/978-3-031-51476-0\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HoqYMSWBPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/NourPQD23,
  author       = {Boubakr Nour and
                  Makan Pourzandi and
                  Rushaan Kamran Qureshi and
                  Mourad Debbabi},
  editor       = {Mohamed Mosbah and
                  Florence S{\`{e}}des and
                  Nadia Tawbi and
                  Toufik Ahmed and
                  Nora Boulahia{-}Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Accurify: Automated New Testflows Generation for Attack Variants in
                  Threat Hunting},
  booktitle    = {Foundations and Practice of Security - 16th International Symposium,
                  {FPS} 2023, Bordeaux, France, December 11-13, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14552},
  pages        = {52--69},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-57540-2\_5},
  doi          = {10.1007/978-3-031-57540-2\_5},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/NourPQD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/ChenYDDK23,
  author       = {Juanwei Chen and
                  Jun Yan and
                  Hang Du and
                  Mourad Debbabi and
                  Marthe Kassouf},
  title        = {Vulnerability Analysis of Virtual Power Plant Voltage Support under
                  Denial-of-Service Attacks},
  booktitle    = {{IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2023, Washington, DC, USA, January 16-19, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISGT51731.2023.10066361},
  doi          = {10.1109/ISGT51731.2023.10066361},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/ChenYDDK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/RahiminejadDGAMD23,
  author       = {Abolfazl Rahiminejad and
                  Onur Duman and
                  Mohsen Ghafouri and
                  Ribal Atallah and
                  Arash Mohammadi and
                  Mourad Debbabi},
  title        = {A Resilience Quantitative Framework for Wide Area Damping Control
                  Against Cyberattacks},
  booktitle    = {{IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2023, Washington, DC, USA, January 16-19, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISGT51731.2023.10066437},
  doi          = {10.1109/ISGT51731.2023.10066437},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/RahiminejadDGAMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/EbtiaRQGJDM23,
  author       = {Afshin Ebtia and
                  Dhiaa Elhak Rebbah and
                  Abdullah Qasem and
                  Mohsen Ghafouri and
                  Danial Jafarigiv and
                  Mourad Debbabi and
                  Arash Mohammadi},
  title        = {Detection of Cyber Attacks on Synchro-Phasor Network Targeting Topology
                  Detection Application of Power Distribution Grids},
  booktitle    = {{IEEE} International Conference on Communications, Control, and Computing
                  Technologies for Smart Grids, SmartGridComm IEEE, Glasgow, United
                  Kingdom, October 31 - November 3, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SmartGridComm57358.2023.10333907},
  doi          = {10.1109/SMARTGRIDCOMM57358.2023.10333907},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/EbtiaRQGJDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vecos/OuchaniMD23,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi},
  editor       = {Belgacem Ben Hedia and
                  Yassine Maleh and
                  Moez Krichen},
  title        = {An Enhanced Interface-Based Probabilistic Compositional Verification
                  Approach},
  booktitle    = {Verification and Evaluation of Computer and Communication Systems
                  - 16th International Conference, VECoS 2023, Marrakech, Morocco, October
                  18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14368},
  pages        = {60--75},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49737-7\_5},
  doi          = {10.1007/978-3-031-49737-7\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vecos/OuchaniMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-12781,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Danial Jafarigiv and
                  Ribal Atallah and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A Real-Time Co-simulation Testbed for {EV} Charging and Smart Grid
                  Security},
  journal      = {CoRR},
  volume       = {abs/2302.12781},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.12781},
  doi          = {10.48550/ARXIV.2302.12781},
  eprinttype    = {arXiv},
  eprint       = {2302.12781},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-12781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-07526,
  author       = {Mohammad Ali Sayed and
                  Mohsen Ghafouri and
                  Ribal Atallah and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Protecting the Future Grid: An Electric Vehicle Robust Mitigation
                  Scheme Against Load Altering Attacks on Power Grids},
  journal      = {CoRR},
  volume       = {abs/2308.07526},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.07526},
  doi          = {10.48550/ARXIV.2308.07526},
  eprinttype    = {arXiv},
  eprint       = {2308.07526},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-07526.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-14471,
  author       = {Mohammad Ali Sayed and
                  Mohsen Ghafouri and
                  Ribal Atallah and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {An Electric Vehicle Control Strategy to Mitigate Load Altering Attacks
                  Against Power Grids},
  journal      = {CoRR},
  volume       = {abs/2310.14471},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.14471},
  doi          = {10.48550/ARXIV.2310.14471},
  eprinttype    = {arXiv},
  eprint       = {2310.14471},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-14471.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChohraSKD22,
  author       = {Aniss Chohra and
                  Paria Shirani and
                  ElMouatez Billah Karbab and
                  Mourad Debbabi},
  title        = {Chameleon: Optimized feature selection using particle swarm optimization
                  and ensemble methods for network anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102684},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102684},
  doi          = {10.1016/J.COSE.2022.102684},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChohraSKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/QasemSDWLA21,
  author       = {Abdullah Qasem and
                  Paria Shirani and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Bernard Lebel and
                  Basile L. Agba},
  title        = {Automatic Vulnerability Detection in Embedded Devices and Firmware:
                  Survey and Layered Taxonomies},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {2},
  pages        = {25:1--25:42},
  year         = {2022},
  url          = {https://doi.org/10.1145/3432893},
  doi          = {10.1145/3432893},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/QasemSDWLA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TorabiBAKBD22,
  author       = {Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  ElMouatez Billah Karbab and
                  Amine Boukhtouta and
                  Mourad Debbabi},
  title        = {Inferring and Investigating IoT-Generated Scanning Campaigns Targeting
                  a Large Network Telescope},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {402--418},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2979183},
  doi          = {10.1109/TDSC.2020.2979183},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/TorabiBAKBD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DumanZWDAL22,
  author       = {Onur Duman and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Ribal F. Atallah and
                  Bernard Lebel},
  title        = {Factor of Security (FoS): Quantifying the Security Effectiveness of
                  Redundant Smart Grid Subsystems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {1018--1035},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3009931},
  doi          = {10.1109/TDSC.2020.3009931},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DumanZWDAL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MajumdarCAMJP0D22,
  author       = {Suryadipta Majumdar and
                  Gagandeep Singh Chawla and
                  Amir Alimohammadifar and
                  Taous Madi and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {ProSAS: Proactive Security Auditing System for Clouds},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2517--2534},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3062204},
  doi          = {10.1109/TDSC.2021.3062204},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MajumdarCAMJP0D22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/AlbarakatiRKKDY22,
  author       = {Abdullah Albarakati and
                  Chantale Robillard and
                  Mark Karanfil and
                  Marthe Kassouf and
                  Mourad Debbabi and
                  Amr M. Youssef and
                  Mohsen Ghafouri and
                  Rachid Hadjidj},
  title        = {Security Monitoring of {IEC} 61850 Substations Using {IEC} 62351-7
                  Network and System Management},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {3},
  pages        = {1641--1653},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3082079},
  doi          = {10.1109/TII.2021.3082079},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/AlbarakatiRKKDY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/Duman0AKD22,
  author       = {Onur Duman and
                  Lingyu Wang and
                  Minh Au and
                  Marthe Kassouf and
                  Mourad Debbabi},
  title        = {Hardening Substations against Supply Chain Attacks Under Operational
                  Constraints},
  booktitle    = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISGT50606.2022.9817488},
  doi          = {10.1109/ISGT50606.2022.9817488},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/Duman0AKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/KaranfilRGKDH22,
  author       = {Mark Karanfil and
                  Dhiaa Elhak Rebbah and
                  Mohsen Ghafouri and
                  Marthe Kassouf and
                  Mourad Debbabi and
                  Aiman Hanna},
  title        = {Security Monitoring of the Microgrid Using {IEC} 62351-7 Network and
                  System Management},
  booktitle    = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISGT50606.2022.9817482},
  doi          = {10.1109/ISGT50606.2022.9817482},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/KaranfilRGKDH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/RahiminejadGA0D22,
  author       = {Abolfazl Rahiminejad and
                  Mohsen Ghafouri and
                  Ribal Atallah and
                  Arash Mohammadi and
                  Mourad Debbabi},
  title        = {A Cyber-Physical Resilience-Based Survivability Metric against Topological
                  Cyberattacks},
  booktitle    = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISGT50606.2022.9817513},
  doi          = {10.1109/ISGT50606.2022.9817513},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/RahiminejadGA0D22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/RebbahEGKAD022,
  author       = {Dhiaa Elhak Rebbah and
                  Afshin Ebtia and
                  Mohsen Ghafouri and
                  Marthe Kassouf and
                  Ribal Atallah and
                  Mourad Debbabi and
                  Arash Mohammadi},
  title        = {Real-Time Co-simulation Platform for Security Analysis of Distribution
                  Automation Systems},
  booktitle    = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISGT50606.2022.9817549},
  doi          = {10.1109/ISGT50606.2022.9817549},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/RebbahEGKAD022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/DuYGZD22,
  author       = {Hang Du and
                  Jun Yan and
                  Mohsen Ghafouri and
                  Rawad Zgheib and
                  Mourad Debbabi},
  title        = {Online Attack-aware Risk Management for PMSG-based Wind Farm Depending
                  on System Strength Evaluation},
  booktitle    = {{IEEE} International Conference on Communications, Control, and Computing
                  Technologies for Smart Grids, SmartGridComm 2022, Singapore, October
                  25-28, 2022},
  pages        = {218--223},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SmartGridComm52983.2022.9961011},
  doi          = {10.1109/SMARTGRIDCOMM52983.2022.9961011},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/DuYGZD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-13046,
  author       = {Meisam Mohammady and
                  Han Wang and
                  Lingyu Wang and
                  Mengyuan Zhang and
                  Yosr Jarraya and
                  Suryadipta Majumdar and
                  Makan Pourzandi and
                  Mourad Debbabi and
                  Yuan Hong},
  title        = {{DPOAD:} Differentially Private Outsourcing of Anomaly Detection through
                  Iterative Sensitivity Learning},
  journal      = {CoRR},
  volume       = {abs/2206.13046},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.13046},
  doi          = {10.48550/ARXIV.2206.13046},
  eprinttype    = {arXiv},
  eprint       = {2206.13046},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-13046.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-10129,
  author       = {Mohammad Ali Sayed and
                  Mohsen Ghafouri and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Dynamic Load Altering {EV} Attacks Against Power Grid Frequency Control},
  journal      = {CoRR},
  volume       = {abs/2207.10129},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.10129},
  doi          = {10.48550/ARXIV.2207.10129},
  eprinttype    = {arXiv},
  eprint       = {2207.10129},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-10129.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/KarbabDDM21,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  title        = {Android Malware Detection using Machine Learning - Data-Driven Fingerprinting
                  and Threat Intelligence},
  series       = {Advances in Information Security},
  volume       = {86},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-74664-3},
  doi          = {10.1007/978-3-030-74664-3},
  isbn         = {978-3-030-74663-6},
  timestamp    = {Mon, 19 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KarbabDDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/TorabiDBAD21,
  author       = {Sadegh Torabi and
                  Mirabelle Dib and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {A Strings-Based Similarity Analysis Approach for Characterizing IoT
                  Malware and Inferring Their Underlying Relationships},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {3},
  number       = {3},
  pages        = {161--165},
  year         = {2021},
  url          = {https://doi.org/10.1109/lnet.2021.3076600},
  doi          = {10.1109/LNET.2021.3076600},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeenl/TorabiDBAD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChawlaZMJPWD21,
  author       = {Gagandeep Singh Chawla and
                  Mengyuan Zhang and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {VMGuard: State-Based Proactive Verification of Virtual Network Isolation
                  With Application to {NFV}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1553--1567},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.3041430},
  doi          = {10.1109/TDSC.2020.3041430},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChawlaZMJPWD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OqailyJMMPWD21,
  author       = {Momen Oqaily and
                  Yosr Jarraya and
                  Meisam Mohammady and
                  Suryadipta Majumdar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {SegGuard: Segmentation-Based Anonymization of Network Data in Clouds
                  for Privacy-Preserving Security Auditing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2486--2505},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2957488},
  doi          = {10.1109/TDSC.2019.2957488},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OqailyJMMPWD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CabanaYDLKAA21,
  author       = {Olivier Cabana and
                  Amr M. Youssef and
                  Mourad Debbabi and
                  Bernard Lebel and
                  Marthe Kassouf and
                  Ribal Atallah and
                  Basile L. Agba},
  title        = {Threat Intelligence Generation Using Network Telescope Data for Industrial
                  Control Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {3355--3370},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3078261},
  doi          = {10.1109/TIFS.2021.3078261},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CabanaYDLKAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MohammadyOWHLPD21,
  author       = {Meisam Mohammady and
                  Momen Oqaily and
                  Lingyu Wang and
                  Yuan Hong and
                  Habib Louafi and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {A Multi-view Approach to Preserve Privacy and Utility in Network Trace
                  Anonymization},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {14:1--14:36},
  year         = {2021},
  url          = {https://doi.org/10.1145/3439732},
  doi          = {10.1145/3439732},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MohammadyOWHLPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AsadujjamanOJMP21,
  author       = {A. S. M. Asadujjaman and
                  Momen Oqaily and
                  Yosr Jarraya and
                  Suryadipta Majumdar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Artificial Packet-Pair Dispersion {(APPD):} {A} Blackbox Approach
                  to Verifying the Integrity of {NFV} Service Chains},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {245--253},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705020},
  doi          = {10.1109/CNS53000.2021.9705020},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AsadujjamanOJMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KarbabD21,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi},
  editor       = {Leyla Bilge and
                  Lorenzo Cavallaro and
                  Giancarlo Pellegrino and
                  Nuno Neves},
  title        = {PetaDroid: Adaptive Android Malware Detection Using Deep Learning},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 18th International Conference, {DIMVA} 2021, Virtual Event, July
                  14-16, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12756},
  pages        = {319--340},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80825-9\_16},
  doi          = {10.1007/978-3-030-80825-9\_16},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/KarbabD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/DuYGZKD21,
  author       = {Hang Du and
                  Jun Yan and
                  Mohsen Ghafouri and
                  Rawad Zgheib and
                  Marthe Kassouf and
                  Mourad Debbabi},
  title        = {Modeling of Cyber Attacks Against Converter-Driven Stability of PMSG-Based
                  Wind Farms with Intentional Subsynchronous Resonance},
  booktitle    = {{IEEE} International Conference on Communications, Control, and Computing
                  Technologies for Smart Grids, SmartGridComm 2021, Aachen, Germany,
                  October 25-28, 2021},
  pages        = {391--397},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SmartGridComm51999.2021.9632318},
  doi          = {10.1109/SMARTGRIDCOMM51999.2021.9632318},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/DuYGZKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13491,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi},
  title        = {Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting
                  using Deep Learning and {NLP} Techniques},
  journal      = {CoRR},
  volume       = {abs/2105.13491},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13491},
  eprinttype    = {arXiv},
  eprint       = {2105.13491},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13491.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-11317,
  author       = {Mohammad Ali Sayed and
                  Ribal Atallah and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {Electric Vehicle Attack Impact on Power Grid Operation},
  journal      = {CoRR},
  volume       = {abs/2111.11317},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.11317},
  eprinttype    = {arXiv},
  eprint       = {2111.11317},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-11317.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/AlrabaeeDSWYRNMHH20,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Paria Shirani and
                  Lingyu Wang and
                  Amr M. Youssef and
                  Ashkan Rahimian and
                  Lina Nouh and
                  Djedjiga Mouheb and
                  He Huang and
                  Aiman Hanna},
  title        = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious
                  Code Fingerprinting},
  series       = {Advances in Information Security},
  volume       = {78},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-34238-8},
  doi          = {10.1007/978-3-030-34238-8},
  isbn         = {978-3-030-34237-1},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/AlrabaeeDSWYRNMHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KarbabDDM20,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  title        = {Scalable and robust unsupervised Android malware fingerprinting using
                  community-based network partitioning},
  journal      = {Comput. Secur.},
  volume       = {96},
  pages        = {101932},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101932},
  doi          = {10.1016/J.COSE.2020.101932},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KarbabDDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KarbabDDM20a,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  title        = {Scalable and robust unsupervised android malware fingerprinting using
                  community-based network partitioning},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101965},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101965},
  doi          = {10.1016/J.COSE.2020.101965},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KarbabDDM20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TorabiBAD20,
  author       = {Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {A Scalable Platform for Enabling the Forensic Investigation of Exploited
                  IoT Devices and Their Generated Unsolicited Activities},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300922},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300922},
  doi          = {10.1016/J.FSIDI.2020.300922},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/TorabiBAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/SoeanuRBBD20,
  author       = {Andrei Soeanu and
                  Sujoy Ray and
                  Jean Berger and
                  Abdeslem Boukhtouta and
                  Mourad Debbabi},
  title        = {Multi-depot vehicle routing problem with risk mitigation: Model and
                  solution algorithm},
  journal      = {Expert Syst. Appl.},
  volume       = {145},
  pages        = {113099},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.eswa.2019.113099},
  doi          = {10.1016/J.ESWA.2019.113099},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/SoeanuRBBD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/PourTBAD20,
  author       = {Morteza Safaei Pour and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet
                  Scanning Activities},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {2},
  number       = {3},
  pages        = {159--163},
  year         = {2020},
  url          = {https://doi.org/10.1109/lnet.2020.2998045},
  doi          = {10.1109/LNET.2020.2998045},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeenl/PourTBAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlrabaeeDW20,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {{CPA:} Accurate Cross-Platform Binary Authorship Characterization
                  Using {LDA}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3051--3066},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980190},
  doi          = {10.1109/TIFS.2020.2980190},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlrabaeeDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/MoussaKHDA20,
  author       = {Bassam Moussa and
                  Marthe Kassouf and
                  Rachid Hadjidj and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {An Extension to the Precision Time Protocol {(PTP)} to Enable the
                  Detection of Cyber Attacks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {1},
  pages        = {18--27},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2943913},
  doi          = {10.1109/TII.2019.2943913},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/MoussaKHDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/MoussaAKDA20,
  author       = {Bassam Moussa and
                  Abdullah Albarakati and
                  Marthe Kassouf and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Exploiting the Vulnerability of Relative Data Alignment in Phasor
                  Data Concentrators to Time Synchronization Attacks},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {11},
  number       = {3},
  pages        = {2541--2551},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSG.2019.2957150},
  doi          = {10.1109/TSG.2019.2957150},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/MoussaAKDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/AkaberMGAAAD20,
  author       = {Parisa Akaber and
                  Bassam Moussa and
                  Mohsen Ghafouri and
                  Ribal Atallah and
                  Basile L. Agba and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {CASeS: Concurrent Contingency Analysis-Based Security Metric Deployment
                  for the Smart Grid},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {11},
  number       = {3},
  pages        = {2676--2687},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSG.2019.2959937},
  doi          = {10.1109/TSG.2019.2959937},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/AkaberMGAAAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/GhafouriAKDAY20,
  author       = {Mohsen Ghafouri and
                  Minh Au and
                  Marthe Kassouf and
                  Mourad Debbabi and
                  Chadi Assi and
                  Jun Yan},
  title        = {Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring
                  of Smart Grids},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {11},
  number       = {6},
  pages        = {5227--5238},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSG.2020.3004303},
  doi          = {10.1109/TSG.2020.3004303},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/GhafouriAKDAY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohammadyXHZ0PD20,
  author       = {Meisam Mohammady and
                  Shangyu Xie and
                  Yuan Hong and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {{R2DP:} {A} Universal and Automated Approach to Optimizing the Randomization
                  Mechanisms of Differential Privacy for Utility Metrics with No Known
                  Optimal Distributions},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {677--696},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417259},
  doi          = {10.1145/3372297.3417259},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MohammadyXHZ0PD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/OqailyTJMZP0D20,
  author       = {Alaa Oqaily and
                  Sudershan Lakshmanan Thirunavukkarasu and
                  Yosr Jarraya and
                  Suryadipta Majumdar and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization
                  {(NFV)} Stack},
  booktitle    = {12th {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2020, Bangkok, Thailand, December 14-17, 2020},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CloudCom49646.2020.00003},
  doi          = {10.1109/CLOUDCOM49646.2020.00003},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/OqailyTJMZP0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TabibanJZP0D20,
  author       = {Azadeh Tabiban and
                  Yosr Jarraya and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Catching Falling Dominoes: Cloud Management-Level Provenance Analysis
                  with Application to OpenStack},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162251},
  doi          = {10.1109/CNS48642.2020.9162251},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TabibanJZP0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-06075,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  title        = {Android Malware Clustering using Community Detection on Android Packages
                  Similarity Network},
  journal      = {CoRR},
  volume       = {abs/2005.06075},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.06075},
  eprinttype    = {arXiv},
  eprint       = {2005.06075},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-06075.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-09451,
  author       = {Meisam Mohammady and
                  Shangyu Xie and
                  Yuan Hong and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {R\({}^{\mbox{2}}\)DP: {A} Universal and Automated Approach to Optimizing
                  the Randomization Mechanisms of Differential Privacy for Utility Metrics
                  with No Known Optimal Distributions},
  journal      = {CoRR},
  volume       = {abs/2009.09451},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.09451},
  eprinttype    = {arXiv},
  eprint       = {2009.09451},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-09451.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/MajumdarMWTOAJPWD19,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Azadeh Tabiban and
                  Momen Oqaily and
                  Amir Alimohammadifar and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Cloud Security Auditing},
  series       = {Advances in Information Security},
  volume       = {76},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23128-6},
  doi          = {10.1007/978-3-030-23128-6},
  isbn         = {978-3-030-23127-9},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/MajumdarMWTOAJPWD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/IqbalFDBM19,
  author       = {Farkhund Iqbal and
                  Benjamin C. M. Fung and
                  Mourad Debbabi and
                  Rabia Batool and
                  Andrew Marrington},
  title        = {Wordnet-Based Criminal Networks Mining for Cybercrime Investigation},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {22740--22755},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2891694},
  doi          = {10.1109/ACCESS.2019.2891694},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/IqbalFDBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeDW19,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {On the feasibility of binary authorship characterization},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S3--S11},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.028},
  doi          = {10.1016/J.DIIN.2019.01.028},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarbabD19,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi},
  title        = {MalDy: Portable, data-driven malware detection using natural language
                  processing and machine learning techniques on behavioral analysis
                  reports},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S77--S87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.017},
  doi          = {10.1016/J.DIIN.2019.01.017},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarbabD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AfifyRSADA19,
  author       = {Badr Afify and
                  Sujoy Ray and
                  Andrei Soeanu and
                  Anjali Awasthi and
                  Mourad Debbabi and
                  Mohamad Allouche},
  title        = {Evolutionary learning algorithm for reliable facility location under
                  disruption},
  journal      = {Expert Syst. Appl.},
  volume       = {115},
  pages        = {223--244},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.eswa.2018.07.045},
  doi          = {10.1016/J.ESWA.2018.07.045},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AfifyRSADA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/MoussaRZKDA19,
  author       = {Bassam Moussa and
                  Chantale Robillard and
                  Alf Zugenmaier and
                  Marthe Kassouf and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Securing the Precision Time Protocol {(PTP)} Against Fake Timestamps},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {23},
  number       = {2},
  pages        = {278--281},
  year         = {2019},
  url          = {https://doi.org/10.1109/LCOMM.2018.2883287},
  doi          = {10.1109/LCOMM.2018.2883287},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/MoussaRZKDA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MajumdarTJOAP0D19,
  author       = {Suryadipta Majumdar and
                  Azadeh Tabiban and
                  Yosr Jarraya and
                  Momen Oqaily and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Learning probabilistic dependencies among events for proactive security
                  auditing in clouds},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {165--202},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-181137},
  doi          = {10.3233/JCS-181137},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MajumdarTJOAP0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AlrabaeeSWDH19,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Aiman Hanna},
  title        = {Decoupling coding habits from functionality for effective binary authorship
                  attribution},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {6},
  pages        = {613--648},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-191292},
  doi          = {10.3233/JCS-191292},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AlrabaeeSWDH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/AkaberMDA19,
  author       = {Parisa Akaber and
                  Bassam Moussa and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Automated Post-Failure Service Restoration in Smart Grid Through Network
                  Reconfiguration in the Presence of Energy Storage Systems},
  journal      = {{IEEE} Syst. J.},
  volume       = {13},
  number       = {3},
  pages        = {3358--3367},
  year         = {2019},
  url          = {https://doi.org/10.1109/JSYST.2019.2892581},
  doi          = {10.1109/JSYST.2019.2892581},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/AkaberMDA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/Bou-HarbHDA19,
  author       = {Elias Bou{-}Harb and
                  Martin Hus{\'{a}}k and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Big Data Sanitization and Cyber Situational Awareness: {A} Network
                  Telescope Perspective},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {5},
  number       = {4},
  pages        = {439--453},
  year         = {2019},
  url          = {https://doi.org/10.1109/TBDATA.2017.2723398},
  doi          = {10.1109/TBDATA.2017.2723398},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/Bou-HarbHDA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MadiJAMWPWD18,
  author       = {Taous Madi and
                  Yosr Jarraya and
                  Amir Alimohammadifar and
                  Suryadipta Majumdar and
                  Yushun Wang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{ISOTOP:} Auditing Virtual Networks Isolation Across Cloud Layers
                  in OpenStack},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {1:1--1:35},
  year         = {2019},
  url          = {https://doi.org/10.1145/3267339},
  doi          = {10.1145/3267339},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MadiJAMWPWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/KatebATADA19,
  author       = {Reem Kateb and
                  Parisa Akaber and
                  Mosaddek Hossain Kamal Tushar and
                  Abdullah Albarakati and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Enhancing {WAMS} Communication Network Against Delay Attacks},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {10},
  number       = {3},
  pages        = {2738--2751},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSG.2018.2809958},
  doi          = {10.1109/TSG.2018.2809958},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/KatebATADA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/Thirunavukkarasu19,
  author       = {Sudershan Lakshmanan Thirunavukkarasu and
                  Mengyuan Zhang and
                  Alaa Oqaily and
                  Gagandeep Singh Chawla and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {Modeling {NFV} Deployment to Identify the Cross-Level Inconsistency
                  Vulnerabilities},
  booktitle    = {2019 {IEEE} International Conference on Cloud Computing Technology
                  and Science (CloudCom), Sydney, Australia, December 11-13, 2019},
  pages        = {167--174},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CloudCom.2019.00034},
  doi          = {10.1109/CLOUDCOM.2019.00034},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/Thirunavukkarasu19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/MajumdarTMOJP0D19,
  author       = {Suryadipta Majumdar and
                  Azadeh Tabiban and
                  Meisam Mohammady and
                  Alaa Oqaily and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Multi-Level Proactive Security Auditing for Clouds},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937641},
  doi          = {10.1109/DSC47296.2019.8937641},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/MajumdarTMOJP0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/CabanaYDLKA19,
  author       = {Olivier Cabana and
                  Amr M. Youssef and
                  Mourad Debbabi and
                  Bernard Lebel and
                  Marthe Kassouf and
                  Basile L. Agba},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting
                  Industrial Control Systems},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_5},
  doi          = {10.1007/978-3-030-22038-9\_5},
  timestamp    = {Sun, 04 Aug 2024 19:42:33 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/CabanaYDLKA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlrabaeeK0D19,
  author       = {Saed Alrabaee and
                  ElMouatez Billah Karbab and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {BinEye: Towards Efficient Binary Authorship Characterization Using
                  Deep Learning},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {47--67},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_3},
  doi          = {10.1007/978-3-030-29962-0\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AlrabaeeK0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MajumdarTMOJP0D19,
  author       = {Suryadipta Majumdar and
                  Azadeh Tabiban and
                  Meisam Mohammady and
                  Alaa Oqaily and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Proactivizer: Transforming Existing Verification Tools into Efficient
                  Solutions for Runtime Security Enforcement},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {239--262},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_12},
  doi          = {10.1007/978-3-030-29962-0\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MajumdarTMOJP0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/OqailyJZ0PD19,
  author       = {Momen Oqaily and
                  Yosr Jarraya and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {iCAT: An Interactive Customizable Anonymization Tool},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {658--680},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_32},
  doi          = {10.1007/978-3-030-29959-0\_32},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/OqailyJZ0PD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/AlbarakatiRKKHD19,
  author       = {Abdullah Albarakati and
                  Chantale Robillard and
                  Mark Karanfil and
                  Marthe Kassouf and
                  Rachid Hadjidj and
                  Mourad Debbabi and
                  Amr M. Youssef},
  title        = {Security Monitoring of {IEC} 61850 Substations Using {IEC} 62351-7
                  Network and System Management\({}^{\mbox{1}}\)},
  booktitle    = {2019 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing,
                  China, October 21-23, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SmartGridComm.2019.8909710},
  doi          = {10.1109/SMARTGRIDCOMM.2019.8909710},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/AlbarakatiRKKHD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/DumanGKA0D19,
  author       = {Onur Duman and
                  Mohsen Ghafouri and
                  Marthe Kassouf and
                  Ribal Atallah and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Modeling Supply Chain Attacks in {IEC} 61850 Substations},
  booktitle    = {2019 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing,
                  China, October 21-23, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SmartGridComm.2019.8909818},
  doi          = {10.1109/SMARTGRIDCOMM.2019.8909818},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/DumanGKA0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2018,
  editor       = {Nur Zincir{-}Heywood and
                  Guillaume Bonfante and
                  Mourad Debbabi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Foundations and Practice of Security - 11th International Symposium,
                  {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11358},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-18419-3},
  doi          = {10.1007/978-3-030-18419-3},
  isbn         = {978-3-030-18418-6},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/TorabiBAD18,
  author       = {Sadegh Torabi and
                  Amine Boukhtouta and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {Detecting Internet Abuse by Analyzing Passive {DNS} Traffic: {A} Survey
                  of Implemented Systems},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {20},
  number       = {4},
  pages        = {3389--3415},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMST.2018.2849614},
  doi          = {10.1109/COMST.2018.2849614},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/TorabiBAD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/SoeanuRBD18,
  author       = {Andrei Soeanu and
                  Sujoy Ray and
                  Jean Berger and
                  Mourad Debbabi},
  title        = {Efficient sensor network management for asset localization},
  journal      = {Comput. Oper. Res.},
  volume       = {99},
  pages        = {148--165},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cor.2018.06.001},
  doi          = {10.1016/J.COR.2018.06.001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cor/SoeanuRBD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BordjibaKD18,
  author       = {Houssem Eddine Bordjiba and
                  ElMouatez Billah Karbab and
                  Mourad Debbabi},
  title        = {Data-driven approach for automatic telephony threat analysis and campaign
                  detection},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S131--S141},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.016},
  doi          = {10.1016/J.DIIN.2018.01.016},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BordjibaKD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarbabDDM18,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  title        = {MalDozer: Automatic framework for android malware detection using
                  deep learning},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S48--S59},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.007},
  doi          = {10.1016/J.DIIN.2018.01.007},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarbabDDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bou-HarbAD18,
  author       = {Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {CSC-Detector: {A} System to Infer Large-Scale Probing Campaigns},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {3},
  pages        = {364--377},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2593441},
  doi          = {10.1109/TDSC.2016.2593441},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Bou-HarbAD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MajumdarMWJPWD18,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {User-Level Runtime Security Auditing for the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1185--1199},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779444},
  doi          = {10.1109/TIFS.2017.2779444},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MajumdarMWJPWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/MoussaADA18,
  author       = {Bassam Moussa and
                  Parisa Akaber and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Critical Links Identification for Selective Outages in Interdependent
                  Power-Communication Networks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {14},
  number       = {2},
  pages        = {472--483},
  year         = {2018},
  url          = {https://doi.org/10.1109/TII.2017.2742527},
  doi          = {10.1109/TII.2017.2742527},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/MoussaADA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlrabaeeSWD18,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {\emph{FOSSIL}: {A} Resilient and Efficient System for Identifying
                  {FOSS} Functions in Malware Binaries},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {8:1--8:34},
  year         = {2018},
  url          = {https://doi.org/10.1145/3175492},
  doi          = {10.1145/3175492},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AlrabaeeSWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/KatebTAD18,
  author       = {Reem Kateb and
                  Mosaddek Hossain Kamal Tushar and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement
                  Systems},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {9},
  number       = {1},
  pages        = {25--34},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSG.2016.2542859},
  doi          = {10.1109/TSG.2016.2542859},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/KatebTAD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/MoussaDA18,
  author       = {Bassam Moussa and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A Detection and Mitigation Model for {PTP} Delay Attack in an {IEC}
                  61850 Substation},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {9},
  number       = {5},
  pages        = {3954--3965},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSG.2016.2644618},
  doi          = {10.1109/TSG.2016.2644618},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/MoussaDA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KarbabD18,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {20:1--20:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3230870},
  doi          = {10.1145/3230833.3230870},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KarbabD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Mohammady0HLPD18,
  author       = {Meisam Mohammady and
                  Lingyu Wang and
                  Yuan Hong and
                  Habib Louafi and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Preserving Both Privacy and Utility in Network Trace Anonymization},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {459--474},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243809},
  doi          = {10.1145/3243734.3243809},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Mohammady0HLPD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/MadiZJAP0D18,
  author       = {Taous Madi and
                  Mengyuan Zhang and
                  Yosr Jarraya and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in
                  Public Cloud},
  booktitle    = {2018 {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018},
  pages        = {163--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CloudCom2018.2018.00042},
  doi          = {10.1109/CLOUDCOM2018.2018.00042},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/MadiZJAP0D18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TabibanM0D18,
  author       = {Azadeh Tabiban and
                  Suryadipta Majumdar and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{PERMON:} An OpenStack Middleware for Runtime Security Policy Enforcement
                  in Clouds},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433180},
  doi          = {10.1109/CNS.2018.8433180},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TabibanM0D18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ShiraniCALD0H18,
  author       = {Paria Shirani and
                  Leo Collard and
                  Basile L. Agba and
                  Bernard Lebel and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Aiman Hanna},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {{BINARM:} Scalable and Efficient Detection of Vulnerabilities in Firmware
                  Images of Intelligent Electronic Devices},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {114--138},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_6},
  doi          = {10.1007/978-3-319-93411-2\_6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ShiraniCALD0H18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/TorabiBAGBD18,
  author       = {Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mario Galluscio and
                  Amine Boukhtouta and
                  Mourad Debbabi},
  title        = {Inferring, Characterizing, and Investigating Internet-Scale Malicious
                  IoT Device Activities: {A} Network Telescope Perspective},
  booktitle    = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28,
                  2018},
  pages        = {562--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSN.2018.00064},
  doi          = {10.1109/DSN.2018.00064},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/TorabiBAGBD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlrabaeeS0DH18,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Aiman Hanna},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {On Leveraging Coding Habits for Effective Binary Authorship Attribution},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {26--47},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_2},
  doi          = {10.1007/978-3-319-99073-6\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AlrabaeeS0DH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Alimohammadifar18,
  author       = {Amir Alimohammadifar and
                  Suryadipta Majumdar and
                  Taous Madi and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Stealthy Probing-Based Verification {(SPV):} An Active Approach to
                  Defending Software Defined Networks Against Topology Poisoning Attacks},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {463--484},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_23},
  doi          = {10.1007/978-3-319-98989-1\_23},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Alimohammadifar18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/MajumdarMJP0D18,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Nur Zincir{-}Heywood and
                  Guillaume Bonfante and
                  Mourad Debbabi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Cloud Security Auditing: Major Approaches and Existing Challenges},
  booktitle    = {Foundations and Practice of Security - 11th International Symposium,
                  {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11358},
  pages        = {61--77},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-18419-3\_5},
  doi          = {10.1007/978-3-030-18419-3\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/MajumdarMJP0D18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/ChohraDS18,
  author       = {Aniss Chohra and
                  Mourad Debbabi and
                  Paria Shirani},
  editor       = {Nur Zincir{-}Heywood and
                  Guillaume Bonfante and
                  Mourad Debbabi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Daedalus: Network Anomaly Detection on {IDS} Stream Logs},
  booktitle    = {Foundations and Practice of Security - 11th International Symposium,
                  {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11358},
  pages        = {95--111},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-18419-3\_7},
  doi          = {10.1007/978-3-030-18419-3\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/ChohraDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/AlbarakatiMDYAK18,
  author       = {Abdullah Albarakati and
                  Bassam Moussa and
                  Mourad Debbabi and
                  Amr M. Youssef and
                  Basile L. Agba and
                  Marthe Kassouf},
  title        = {OpenStack-Based Evaluation Framework for Smart Grid Cyber Security},
  booktitle    = {2018 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2018, Aalborg,
                  Denmark, October 29-31, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartGridComm.2018.8587420},
  doi          = {10.1109/SMARTGRIDCOMM.2018.8587420},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/AlbarakatiMDYAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-08893,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi},
  title        = {Automatic Investigation Framework for Android Malware Cyber-Infrastructures},
  journal      = {CoRR},
  volume       = {abs/1806.08893},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.08893},
  eprinttype    = {arXiv},
  eprint       = {1806.08893},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-08893.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-00118,
  author       = {Serguei A. Mokhov and
                  Miao Song and
                  Jashanjot Singh and
                  Joey Paquet and
                  Mourad Debbabi and
                  Sudhir P. Mudur},
  title        = {Toward Multimodal Interaction in Scalable Visual Digital Evidence
                  Visualization Using Computer Vision Techniques and {ISS}},
  journal      = {CoRR},
  volume       = {abs/1808.00118},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.00118},
  eprinttype    = {arXiv},
  eprint       = {1808.00118},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-00118.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-10464,
  author       = {Meisam Mohammady and
                  Lingyu Wang and
                  Yuan Hong and
                  Habib Louafi and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {Preserving Both Privacy and Utility in Network Trace Anonymization},
  journal      = {CoRR},
  volume       = {abs/1810.10464},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.10464},
  eprinttype    = {arXiv},
  eprint       = {1810.10464},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-10464.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-10327,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi},
  title        = {Portable, Data-Driven Malware Detection using Language Processing
                  and Machine Learning Techniques on Behavioral Analysis Reports},
  journal      = {CoRR},
  volume       = {abs/1812.10327},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.10327},
  eprinttype    = {arXiv},
  eprint       = {1812.10327},
  timestamp    = {Wed, 02 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-10327.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeSPWD17,
  author       = {Saed Alrabaee and
                  Noman Saleem and
                  Stere Preda and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Corrigendum to 'OBA2: An Onion approach to Binary code Authorship
                  Attribution' [Digit Investig 11 {(2014)} {S94-S103]}},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {89},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.004},
  doi          = {10.1016/J.DIIN.2017.02.004},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeSPWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/Bou-HarbDA17,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet
                  Takedowns},
  journal      = {{IEEE} Netw.},
  volume       = {31},
  number       = {1},
  pages        = {18--26},
  year         = {2017},
  url          = {https://doi.org/10.1109/MNET.2016.1500116NM},
  doi          = {10.1109/MNET.2016.1500116NM},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/Bou-HarbDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tlsdkcs/AljumahPD17,
  author       = {Feras Aljumah and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {Privacy-Preserving Querying on Privately Encrypted Data in the Cloud},
  journal      = {Trans. Large Scale Data Knowl. Centered Syst.},
  volume       = {35},
  pages        = {50--73},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-56121-8\_3},
  doi          = {10.1007/978-3-662-56121-8\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tlsdkcs/AljumahPD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ScellerKDI17,
  author       = {Quentin Le Sceller and
                  ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Farkhund Iqbal},
  title        = {{SONAR:} Automatic Detection of Cyber Security Events over the Twitter
                  Stream},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {23:1--23:11},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3098992},
  doi          = {10.1145/3098954.3098992},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ScellerKDI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangYD17,
  author       = {He Huang and
                  Amr M. Youssef and
                  Mourad Debbabi},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {155--166},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052974},
  doi          = {10.1145/3052973.3052974},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangYD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/Shirani0D17,
  author       = {Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Michalis Polychronakis and
                  Michael Meier},
  title        = {BinShape: Scalable and Robust Binary Library Function Identification
                  Using Function Shape},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July
                  6-7, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10327},
  pages        = {301--324},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60876-1\_14},
  doi          = {10.1007/978-3-319-60876-1\_14},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/Shirani0D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MajumdarJOAPWD17,
  author       = {Suryadipta Majumdar and
                  Yosr Jarraya and
                  Momen Oqaily and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {LeaPS: Learning-Based Proactive Security Auditing for Clouds},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {265--285},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_15},
  doi          = {10.1007/978-3-319-66399-9\_15},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MajumdarJOAPWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globalsip/KatebATDA17,
  author       = {Reem Kateb and
                  Parisa Akaber and
                  Mosaddek Hossain Kamal Tushar and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Delay aware measurements gathering in {WAMS} communication network},
  booktitle    = {2017 {IEEE} Global Conference on Signal and Information Processing,
                  GlobalSIP 2017, Montreal, QC, Canada, November 14-16, 2017},
  pages        = {1090--1094},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GlobalSIP.2017.8309129},
  doi          = {10.1109/GLOBALSIP.2017.8309129},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globalsip/KatebATDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangMMJAP0D17,
  author       = {Yushun Wang and
                  Taous Madi and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level
                  Network Isolation},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/tenantguard-scalable-runtime-verification-cloud-wide-vm-level-network-isolation/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangMMJAP0D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NouhRMDH17,
  author       = {Lina Nouh and
                  Ashkan Rahimian and
                  Djedjiga Mouheb and
                  Mourad Debbabi and
                  Aiman Hanna},
  editor       = {Sabrina De Capitani di Vimercati and
                  Fabio Martinelli},
  title        = {BinSign: Fingerprinting Binary Functions to Support Automated Analysis
                  of Code Executables},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11
                  International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {502},
  pages        = {341--355},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58469-0\_23},
  doi          = {10.1007/978-3-319-58469-0\_23},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NouhRMDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/DumanZ0D17,
  author       = {Onur Duman and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Measuring the security posture of {IEC} 61850 substations with redundancy
                  against zero day attacks},
  booktitle    = {2017 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2017, Dresden, Germany, October 23-27, 2017},
  pages        = {108--114},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SmartGridComm.2017.8340727},
  doi          = {10.1109/SMARTGRIDCOMM.2017.8340727},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/DumanZ0D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AlrabaeeSD017,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {On the Feasibility of Malware Authorship Attribution},
  journal      = {CoRR},
  volume       = {abs/1701.02711},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.02711},
  eprinttype    = {arXiv},
  eprint       = {1701.02711},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AlrabaeeSD017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KarbabDAM17,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Saed Alrabaee and
                  Djedjiga Mouheb},
  title        = {DySign: Dynamic Fingerprinting for the Automatic Detection of Android
                  Malware},
  journal      = {CoRR},
  volume       = {abs/1702.05699},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.05699},
  eprinttype    = {arXiv},
  eprint       = {1702.05699},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KarbabDAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-08996,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  title        = {Android Malware Detection using Deep Learning on {API} Method Sequences},
  journal      = {CoRR},
  volume       = {abs/1712.08996},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.08996},
  eprinttype    = {arXiv},
  eprint       = {1712.08996},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-08996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Bou-HarbDA16,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A novel cyber security capability: Inferring Internet-scale infections
                  by correlating malware and probing activities},
  journal      = {Comput. Networks},
  volume       = {94},
  pages        = {327--343},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2015.11.004},
  doi          = {10.1016/J.COMNET.2015.11.004},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/Bou-HarbDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/FachkhaD16,
  author       = {Claude Fachkha and
                  Mourad Debbabi},
  title        = {Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {18},
  number       = {2},
  pages        = {1197--1227},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMST.2015.2497690},
  doi          = {10.1109/COMST.2015.2497690},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/FachkhaD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/MoussaDA16,
  author       = {Bassam Moussa and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Security Assessment of Time Synchronization Mechanisms for the Smart
                  Grid},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {18},
  number       = {3},
  pages        = {1952--1973},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMST.2016.2525014},
  doi          = {10.1109/COMST.2016.2525014},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/MoussaDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Alrabaee0D16,
  author       = {Saed Alrabaee and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {\emph{BinGold}: Towards robust binary analysis by extracting the semantics
                  of binary code as semantic flow graphs (SFGs)},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S11--S22},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.002},
  doi          = {10.1016/J.DIIN.2016.04.002},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Alrabaee0D16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarbabDM16,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Djedjiga Mouheb},
  title        = {Fingerprinting Android packaging: Generating DNAs for malware detection},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S33--S45},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.013},
  doi          = {10.1016/J.DIIN.2016.04.013},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarbabDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/SoeanuDABL16,
  author       = {Andrei Soeanu and
                  Mourad Debbabi and
                  Mohamad Allouche and
                  Micheline B{\'{e}}langer and
                  Nicholas L{\'{e}}chevin},
  title        = {Hierarchy aware distributed plan execution monitoring},
  journal      = {Expert Syst. Appl.},
  volume       = {43},
  pages        = {66--81},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.eswa.2015.08.040},
  doi          = {10.1016/J.ESWA.2015.08.040},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/SoeanuDABL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isse/MouhebANDWP16,
  author       = {Djedjiga Mouheb and
                  Dima Alhadidi and
                  Mariam Nouh and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  title        = {Aspect-oriented modeling framework for security hardening},
  journal      = {Innov. Syst. Softw. Eng.},
  volume       = {12},
  number       = {1},
  pages        = {41--67},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11334-015-0263-5},
  doi          = {10.1007/S11334-015-0263-5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isse/MouhebANDWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/RayDALB16,
  author       = {Sujoy Ray and
                  Mourad Debbabi and
                  Mohamad Khaled Allouche and
                  Nicolas L{\'{e}}chevin and
                  Micheline B{\'{e}}langer},
  title        = {Energy-Efficient Monitor Deployment in Collaborative Distributed Setting},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {12},
  number       = {1},
  pages        = {112--123},
  year         = {2016},
  url          = {https://doi.org/10.1109/TII.2015.2500163},
  doi          = {10.1109/TII.2015.2500163},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/RayDALB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BoukhtoutaMLDP16,
  author       = {Amine Boukhtouta and
                  Serguei A. Mokhov and
                  Nour{-}Eddine Lakhdari and
                  Mourad Debbabi and
                  Joey Paquet},
  title        = {Network malware classification comparison using {DPI} and flow packet
                  headers},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {12},
  number       = {2},
  pages        = {69--100},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11416-015-0247-x},
  doi          = {10.1007/S11416-015-0247-X},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BoukhtoutaMLDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KarbabDDM16,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Cypider: building community-based cyber-defense infrastructure for
                  android malware detection},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {348--362},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991124},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KarbabDDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MajumdarJMAPWD16,
  author       = {Suryadipta Majumdar and
                  Yosr Jarraya and
                  Taous Madi and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Proactive Verification of Security Compliance for Clouds Through Pre-computation:
                  Application to OpenStack},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {47--66},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_3},
  doi          = {10.1007/978-3-319-45744-4\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MajumdarJMAPWD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/AlrabaeeSDW16,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Mourad Debbabi and
                  Lingyu Wang},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lingyu Wang and
                  Nora Cuppens{-}Boulahia and
                  Nadia Tawbi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {On the Feasibility of Malware Authorship Attribution},
  booktitle    = {Foundations and Practice of Security - 9th International Symposium,
                  {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10128},
  pages        = {256--272},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51966-1\_17},
  doi          = {10.1007/978-3-319-51966-1\_17},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/AlrabaeeSDW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KarbabDAM16,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Saed Alrabaee and
                  Djedjiga Mouheb},
  title        = {DySign: dynamic fingerprinting for the automatic detection of android
                  malware},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {139--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888739},
  doi          = {10.1109/MALWARE.2016.7888739},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/KarbabDAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/AkaberMDA16,
  author       = {Parisa Akaber and
                  Bassam Moussa and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Cascading link failure analysis in interdependent networks for maximal
                  outages in smart grid},
  booktitle    = {2016 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2016, Sydney, Australia, November 6-9, 2016},
  pages        = {429--434},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SmartGridComm.2016.7778799},
  doi          = {10.1109/SMARTGRIDCOMM.2016.7778799},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/AkaberMDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/MouhebDPWNZATL15,
  author       = {Djedjiga Mouheb and
                  Mourad Debbabi and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mariam Nouh and
                  Raha Ziarati and
                  Dima Alhadidi and
                  Chamseddine Talhi and
                  Vitor Lima},
  title        = {Aspect-Oriented Security Hardening of {UML} Design Models},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16106-8},
  doi          = {10.1007/978-3-319-16106-8},
  isbn         = {978-3-319-16105-1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/MouhebDPWNZATL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JarrayaESDP15,
  author       = {Yosr Jarraya and
                  Arash Eghtesadi and
                  Sahba Sadri and
                  Mourad Debbabi and
                  Makan Pourzandi},
  title        = {Verification of firewall reconfiguration for virtual machines migrations
                  in the cloud},
  journal      = {Comput. Networks},
  volume       = {93},
  pages        = {480--491},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comnet.2015.10.008},
  doi          = {10.1016/J.COMNET.2015.10.008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/JarrayaESDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/FachkhaBD15,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Mourad Debbabi},
  title        = {Inferring distributed reflection denial of service attacks from darknet},
  journal      = {Comput. Commun.},
  volume       = {62},
  pages        = {59--71},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comcom.2015.01.016},
  doi          = {10.1016/J.COMCOM.2015.01.016},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/FachkhaBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/OuchaniD15,
  author       = {Samir Ouchani and
                  Mourad Debbabi},
  title        = {Specification, verification, and quantification of security in model-based
                  systems},
  journal      = {Computing},
  volume       = {97},
  number       = {7},
  pages        = {691--711},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00607-015-0445-x},
  doi          = {10.1007/S00607-015-0445-X},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/OuchaniD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DinhAFMD15,
  author       = {Son Dinh and
                  Taher Azeb and
                  Francis Fortin and
                  Djedjiga Mouheb and
                  Mourad Debbabi},
  title        = {Spam campaign detection, analysis, and investigation},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S12--S21},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.006},
  doi          = {10.1016/J.DIIN.2015.01.006},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DinhAFMD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeSWD15,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{SIGMA:} {A} Semantic Integrated Graph Matching Approach for identifying
                  reused functions in binary code},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S61--S71},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.011},
  doi          = {10.1016/J.DIIN.2015.01.011},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeSWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RahimianSAWD15,
  author       = {Ashkan Rahimian and
                  Paria Shirani and
                  Saed Alrabaee and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {BinComp: {A} stratified approach to compiler provenance Attribution},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S146--S155},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.015},
  doi          = {10.1016/J.DIIN.2015.05.015},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RahimianSAWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BoukhtoutaMDAIB15,
  author       = {Amine Boukhtouta and
                  Djedjiga Mouheb and
                  Mourad Debbabi and
                  Omar Alfandi and
                  Farkhund Iqbal and
                  May El Barachi},
  title        = {Graph-theoretic characterization of cyber-threat infrastructures},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S3--S15},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.002},
  doi          = {10.1016/J.DIIN.2015.05.002},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FarhadiFFCPD15,
  author       = {Mohammad Reza Farhadi and
                  Benjamin C. M. Fung and
                  Yin Bun Fung and
                  Philippe Charland and
                  Stere Preda and
                  Mourad Debbabi},
  title        = {Scalable code clone search for malware analysis},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {46--60},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.06.001},
  doi          = {10.1016/J.DIIN.2015.06.001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FarhadiFFCPD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/SoeanuDAMABL15,
  author       = {Andrei Soeanu and
                  Mourad Debbabi and
                  Dima Alhadidi and
                  Makram Makkawi and
                  Mohamad Khaled Allouche and
                  Micheline B{\'{e}}langer and
                  Nicolas L{\'{e}}chevin},
  title        = {Transportation risk analysis using probabilistic model checking},
  journal      = {Expert Syst. Appl.},
  volume       = {42},
  number       = {9},
  pages        = {4410--4421},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.eswa.2014.12.052},
  doi          = {10.1016/J.ESWA.2014.12.052},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/SoeanuDAMABL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DingFD15,
  author       = {Steven H. H. Ding and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {A Visualizable Evidence-Driven Approach for Authorship Attribution},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {12:1--12:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699910},
  doi          = {10.1145/2699910},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DingFD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/FachkhaBD15,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Mourad Debbabi},
  title        = {On the inference and prediction of DDoS campaigns},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {15},
  number       = {6},
  pages        = {1066--1078},
  year         = {2015},
  url          = {https://doi.org/10.1002/wcm.2510},
  doi          = {10.1002/WCM.2510},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/FachkhaBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Bou-HarbDA15,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A Time Series Approach for Inferring Orchestrated Probing Campaigns
                  by Analyzing Darknet Traffic},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {180--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.9},
  doi          = {10.1109/ARES.2015.9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Bou-HarbDA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/MajumdarMWJPWD15,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Security Compliance Auditing of Identity and Access Management in
                  the Cloud: Application to OpenStack},
  booktitle    = {7th {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December
                  3, 2015},
  pages        = {58--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CloudCom.2015.80},
  doi          = {10.1109/CLOUDCOM.2015.80},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/MajumdarMWJPWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/SadriJED15,
  author       = {Sahba Sadri and
                  Yosr Jarraya and
                  Arash Eghtesadi and
                  Mourad Debbabi},
  title        = {Towards migrating security policies of virtual machines in Software
                  Defined Networks},
  booktitle    = {Proceedings of the 1st {IEEE} Conference on Network Softwarization,
                  NetSoft 2015, London, United Kingdom, April 13-17, 2015},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NETSOFT.2015.7116165},
  doi          = {10.1109/NETSOFT.2015.7116165},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/SadriJED15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/MoussaDA15,
  author       = {Bassam Moussa and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A detection and mitigation model for {PTP} delay attack in a smart
                  grid substation},
  booktitle    = {2015 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2015, Miami, FL, USA, November 2-5, 2015},
  pages        = {497--502},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SmartGridComm.2015.7436349},
  doi          = {10.1109/SMARTGRIDCOMM.2015.7436349},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/MoussaDA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/MokhovPD15,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Olga Baysal and
                  Latifa Guerrouj},
  title        = {{MARFCAT:} Fast code analysis for defects and vulnerabilities},
  booktitle    = {1st {IEEE} International Workshop on Software Analytics, {SWAN} 2015,
                  Montreal, QC, Canada, March 2, 2015},
  pages        = {35--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SWAN.2015.7070488},
  doi          = {10.1109/SWAN.2015.7070488},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcre/MokhovPD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bou-HarbDA14,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {On fingerprinting probing activities},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {35--48},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.005},
  doi          = {10.1016/J.COSE.2014.02.005},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bou-HarbDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/Bou-HarbDA14,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Cyber Scanning: {A} Comprehensive Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {16},
  number       = {3},
  pages        = {1496--1519},
  year         = {2014},
  url          = {https://doi.org/10.1109/SURV.2013.102913.00020},
  doi          = {10.1109/SURV.2013.102913.00020},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/Bou-HarbDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/JarrayaMD14,
  author       = {Yosr Jarraya and
                  Taous Madi and
                  Mourad Debbabi},
  title        = {A Survey and a Layered Taxonomy of Software-Defined Networking},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {16},
  number       = {4},
  pages        = {1955--1980},
  year         = {2014},
  url          = {https://doi.org/10.1109/COMST.2014.2320094},
  doi          = {10.1109/COMST.2014.2320094},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/JarrayaMD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeSPWD14,
  author       = {Saed Alrabaee and
                  Noman Saleem and
                  Stere Preda and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{OBA2:} An Onion approach to Binary code Authorship Attribution},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S94--S103},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.012},
  doi          = {10.1016/J.DIIN.2014.03.012},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeSPWD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Bou-HarbLBD14,
  author       = {Elias Bou{-}Harb and
                  Nour{-}Eddine Lakhdari and
                  Hamad Binsalleeh and
                  Mourad Debbabi},
  title        = {Multidimensional investigation of source port 0 probing},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S114--S123},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.012},
  doi          = {10.1016/J.DIIN.2014.05.012},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Bou-HarbLBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/OuchaniMD14,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi},
  title        = {A formal verification framework for SysML activity diagrams},
  journal      = {Expert Syst. Appl.},
  volume       = {41},
  number       = {6},
  pages        = {2713--2728},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.eswa.2013.10.064},
  doi          = {10.1016/J.ESWA.2013.10.064},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/OuchaniMD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/OuchaniMD14,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi},
  title        = {A property-based abstraction framework for SysML activity diagrams},
  journal      = {Knowl. Based Syst.},
  volume       = {56},
  pages        = {328--343},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.knosys.2013.11.016},
  doi          = {10.1016/J.KNOSYS.2013.11.016},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/OuchaniMD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/RaySBD14,
  author       = {Sujoy Ray and
                  Andrei Soeanu and
                  Jean Berger and
                  Mourad Debbabi},
  title        = {The multi-depot split-delivery vehicle routing problem: Model and
                  solution algorithm},
  journal      = {Knowl. Based Syst.},
  volume       = {71},
  pages        = {238--265},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.knosys.2014.08.006},
  doi          = {10.1016/J.KNOSYS.2014.08.006},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/RaySBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/JarrayaD14,
  author       = {Yosr Jarraya and
                  Mourad Debbabi},
  title        = {Quantitative and qualitative analysis of SysML activity diagrams},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {16},
  number       = {4},
  pages        = {399--419},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10009-014-0305-6},
  doi          = {10.1007/S10009-014-0305-6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/JarrayaD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohammedAFD14,
  author       = {Noman Mohammed and
                  Dima Alhadidi and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {Secure Two-Party Differentially Private Data Release for Vertically
                  Partitioned Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {59--71},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.22},
  doi          = {10.1109/TDSC.2013.22},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MohammedAFD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuWCRZD14,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Pengsu Cheng and
                  Kui Ren and
                  Shunzhi Zhu and
                  Mourad Debbabi},
  title        = {{PPTP:} Privacy-Preserving Traffic Padding in Web-Based Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {538--552},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2302308},
  doi          = {10.1109/TDSC.2014.2302308},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuWCRZD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ai/MokhovPD14,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Marina Sokolova and
                  Peter van Beek},
  title        = {The Use of {NLP} Techniques in Static Code Analysis to Detect Weaknesses
                  and Vulnerabilities},
  booktitle    = {Advances in Artificial Intelligence - 27th Canadian Conference on
                  Artificial Intelligence, Canadian {AI} 2014, Montr{\'{e}}al,
                  QC, Canada, May 6-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8436},
  pages        = {326--332},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06483-3\_33},
  doi          = {10.1007/978-3-319-06483-3\_33},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ai/MokhovPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c3s2e/MokhovAPD14,
  author       = {Serguei A. Mokhov and
                  Michael J. Assels and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Bipin C. Desai},
  title        = {Toward Automated {MAC} Spoofer Investigations},
  booktitle    = {International C* Conference on Computer Science {\&} Software
                  Engineering, {C3S2E} '14, Montreal, QC, Canada - August 03 - 05, 2014},
  pages        = {27:1--27:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2641483.2641540},
  doi          = {10.1145/2641483.2641540},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c3s2e/MokhovAPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BaroutiAAD14,
  author       = {Samira Barouti and
                  Feras Aljumah and
                  Dima Alhadidi and
                  Mourad Debbabi},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Secure and Privacy-Preserving Querying of Personal Health Records
                  in the Cloud},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_6},
  doi          = {10.1007/978-3-662-43936-4\_6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BaroutiAAD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/MokhovAPD14,
  author       = {Serguei A. Mokhov and
                  Michael J. Assels and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood and
                  Philip W. L. Fong},
  title        = {Automating {MAC} Spoofer Evidence Gathering and Encoding for Investigations},
  booktitle    = {Foundations and Practice of Security - 7th International Symposium,
                  {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8930},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17040-4\_11},
  doi          = {10.1007/978-3-319-17040-4\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/MokhovAPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/EghtesadiJDP14,
  author       = {Arash Eghtesadi and
                  Yosr Jarraya and
                  Mourad Debbabi and
                  Makan Pourzandi},
  title        = {Preservation of Security Configurations in the Cloud},
  booktitle    = {2014 {IEEE} International Conference on Cloud Engineering, Boston,
                  MA, USA, March 11-14, 2014},
  pages        = {17--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IC2E.2014.14},
  doi          = {10.1109/IC2E.2014.14},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic2e/EghtesadiJDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Bou-HarbFDA14,
  author       = {Elias Bou{-}Harb and
                  Claude Fachkha and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Inferring internet-scale infections by correlating malware and probing
                  activities},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {640--646},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883391},
  doi          = {10.1109/ICC.2014.6883391},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Bou-HarbFDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KaraBMYD14,
  author       = {A. Mert Kara and
                  Hamad Binsalleeh and
                  Mohammad Mannan and
                  Amr M. Youssef and
                  Mourad Debbabi},
  title        = {Detection of malicious payload distribution channels in {DNS}},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {853--858},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883426},
  doi          = {10.1109/ICC.2014.6883426},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KaraBMYD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Bou-HarbDA14,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Behavioral analytics for inferring large-scale orchestrated probing
                  events},
  booktitle    = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada,
                  April 27 - May 2, 2014},
  pages        = {506--511},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFCOMW.2014.6849283},
  doi          = {10.1109/INFCOMW.2014.6849283},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/Bou-HarbDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/BinsalleehKYD14,
  author       = {Hamad Binsalleeh and
                  A. Mert Kara and
                  Amr M. Youssef and
                  Mourad Debbabi},
  editor       = {Mohamad Badra and
                  Omar Alfandi},
  title        = {Characterization of Covert Channels in {DNS}},
  booktitle    = {6th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NTMS.2014.6814008},
  doi          = {10.1109/NTMS.2014.6814008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/BinsalleehKYD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/BoukhtoutaLD14,
  author       = {Amine Boukhtouta and
                  Nour{-}Eddine Lakhdari and
                  Mourad Debbabi},
  editor       = {Mohamad Badra and
                  Omar Alfandi},
  title        = {Inferring Malware Family through Application Protocol Sequences Signature},
  booktitle    = {6th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NTMS.2014.6814026},
  doi          = {10.1109/NTMS.2014.6814026},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/BoukhtoutaLD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/FachkhaBD14,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Mourad Debbabi},
  editor       = {Mohamad Badra and
                  Omar Alfandi},
  title        = {Fingerprinting Internet {DNS} Amplification DDoS Activities},
  booktitle    = {6th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NTMS.2014.6814019},
  doi          = {10.1109/NTMS.2014.6814019},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/FachkhaBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FarhadiFCD14,
  author       = {Mohammad Reza Farhadi and
                  Benjamin C. M. Fung and
                  Philippe Charland and
                  Mourad Debbabi},
  title        = {BinClone: Detecting Code Clones in Malware},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {78--87},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.21},
  doi          = {10.1109/SERE.2014.21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/FarhadiFCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2013,
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-05302-8},
  doi          = {10.1007/978-3-319-05302-8},
  isbn         = {978-3-319-05301-1},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RahimianZPD14,
  author       = {Ashkan Rahimian and
                  Raha Ziarati and
                  Stere Preda and
                  Mourad Debbabi},
  title        = {On the Reverse Engineering of the Citadel Botnet},
  journal      = {CoRR},
  volume       = {abs/1406.5569},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.5569},
  eprinttype    = {arXiv},
  eprint       = {1406.5569},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RahimianZPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/Bou-HarbFPDA13,
  author       = {Elias Bou{-}Harb and
                  Claude Fachkha and
                  Makan Pourzandi and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Communication security for smart grid distribution networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {51},
  number       = {1},
  pages        = {42--49},
  year         = {2013},
  url          = {https://doi.org/10.1109/MCOM.2013.6400437},
  doi          = {10.1109/MCOM.2013.6400437},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/Bou-HarbFPDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Bou-HarbDA13,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A systematic approach for detecting and clustering distributed cyber
                  scanning},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {18},
  pages        = {3826--3839},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2013.09.008},
  doi          = {10.1016/J.COMNET.2013.09.008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/Bou-HarbDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/IqbalBFD13,
  author       = {Farkhund Iqbal and
                  Hamad Binsalleeh and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {A unified data mining solution for authorship analysis in anonymous
                  textual communications},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {98--112},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2011.03.006},
  doi          = {10.1016/J.INS.2011.03.006},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/IqbalBFD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/AlhadidiMKD13,
  author       = {Dima Alhadidi and
                  Azzam Mourad and
                  Hakim Idrissi Kaitouni and
                  Mourad Debbabi},
  title        = {Common weaving approach in mainstream languages for software security
                  hardening},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {10},
  pages        = {2654--2674},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2013.05.044},
  doi          = {10.1016/J.JSS.2013.05.044},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/AlhadidiMKD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Bou-HarbPDA13,
  author       = {Elias Bou{-}Harb and
                  Makan Pourzandi and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A secure, efficient, and cost-effective distributed architecture for
                  spam mitigation on {LTE} 4G mobile networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1478--1489},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.413},
  doi          = {10.1002/SEC.413},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Bou-HarbPDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Bou-HarbDA13,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A Statistical Approach for Fingerprinting Probing Activities},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {21--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.9},
  doi          = {10.1109/ARES.2013.9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Bou-HarbDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/SoeanuRDAB13,
  author       = {Andrei Soeanu and
                  Sujoy Ray and
                  Mourad Debbabi and
                  Mohamad Allouche and
                  Jean Berger},
  editor       = {Elhadi M. Shakshuki and
                  Karim Djouani and
                  Michael Sheng and
                  Mohamed F. Younis and
                  Eduardo Vaz and
                  Wayne Groszko},
  title        = {Gossiping Based Distributed Plan Monitoring},
  booktitle    = {Proceedings of the 4th International Conference on Ambient Systems,
                  Networks and Technologies {(ANT} 2013), the 3rd International Conference
                  on Sustainable Energy Information Technology (SEIT-2013), Halifax,
                  Nova Scotia, Canada, June 25-28, 2013},
  series       = {Procedia Computer Science},
  volume       = {19},
  pages        = {72--79},
  publisher    = {Elsevier},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.procs.2013.06.015},
  doi          = {10.1016/J.PROCS.2013.06.015},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/SoeanuRDAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/BoukhtoutaLMD13,
  author       = {Amine Boukhtouta and
                  Nour{-}Eddine Lakhdari and
                  Serguei A. Mokhov and
                  Mourad Debbabi},
  editor       = {Elhadi M. Shakshuki and
                  Karim Djouani and
                  Michael Sheng and
                  Mohamed F. Younis and
                  Eduardo Vaz and
                  Wayne Groszko},
  title        = {Towards Fingerprinting Malicious Traffic},
  booktitle    = {Proceedings of the 4th International Conference on Ambient Systems,
                  Networks and Technologies {(ANT} 2013), the 3rd International Conference
                  on Sustainable Energy Information Technology (SEIT-2013), Halifax,
                  Nova Scotia, Canada, June 25-28, 2013},
  series       = {Procedia Computer Science},
  volume       = {19},
  pages        = {548--555},
  publisher    = {Elsevier},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.procs.2013.06.073},
  doi          = {10.1016/J.PROCS.2013.06.073},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/BoukhtoutaLMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/JarrayaRSDAB13,
  author       = {Yosr Jarraya and
                  Sujoy Ray and
                  Andrei Soeanu and
                  Mourad Debbabi and
                  Mohamad Allouche and
                  Jean Berger},
  editor       = {Elhadi M. Shakshuki and
                  Karim Djouani and
                  Michael Sheng and
                  Mohamed F. Younis and
                  Eduardo Vaz and
                  Wayne Groszko},
  title        = {Towards a Distributed Plan Execution Monitoring Framework},
  booktitle    = {Proceedings of the 4th International Conference on Ambient Systems,
                  Networks and Technologies {(ANT} 2013), the 3rd International Conference
                  on Sustainable Energy Information Technology (SEIT-2013), Halifax,
                  Nova Scotia, Canada, June 25-28, 2013},
  series       = {Procedia Computer Science},
  volume       = {19},
  pages        = {1034--1039},
  publisher    = {Elsevier},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.procs.2013.06.144},
  doi          = {10.1016/J.PROCS.2013.06.144},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/JarrayaRSDAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/BaroutiAD13,
  author       = {Samira Barouti and
                  Dima Alhadidi and
                  Mourad Debbabi},
  title        = {Symmetrically-Private Database Search in Cloud Computing},
  booktitle    = {{IEEE} 5th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5,
                  2013, Volume 1},
  pages        = {671--678},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CloudCom.2013.95},
  doi          = {10.1109/CLOUDCOM.2013.95},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/BaroutiAD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/LiuWRD13,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Kui Ren and
                  Mourad Debbabi},
  title        = {Background Knowledge-Resistant Traffic Padding for Preserving User
                  Privacy in Web-Based Applications},
  booktitle    = {{IEEE} 5th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5,
                  2013, Volume 1},
  pages        = {679--686},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CloudCom.2013.96},
  doi          = {10.1109/CLOUDCOM.2013.96},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/LiuWRD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdl/OuchaniMD13,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi},
  title        = {A formal verification framework for Bluespec System Verilog},
  booktitle    = {Proceedings of the 2013 Forum on specification and Design Languages,
                  {FDL} 2013, Paris, France, September 24-26, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6646644/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdl/OuchaniMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/RahimianZPD13,
  author       = {Ashkan Rahimian and
                  Raha Ziarati and
                  Stere Preda and
                  Mourad Debbabi},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {On the Reverse Engineering of the Citadel Botnet},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {408--425},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_25},
  doi          = {10.1007/978-3-319-05302-8\_25},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/RahimianZPD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his2/AljumahLPD13,
  author       = {Feras Aljumah and
                  Raymond Hei Man Leung and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Guangyan Huang and
                  Xiaohui Liu and
                  Jing He and
                  Frank Klawonn and
                  Guiqing Yao},
  title        = {Emergency Mobile Access to Personal Health Records Stored on an Untrusted
                  Cloud},
  booktitle    = {Health Information Science - Second International Conference, {HIS}
                  2013, London, UK, March 25-27, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7798},
  pages        = {30--41},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37899-7\_3},
  doi          = {10.1007/978-3-642-37899-7\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/his2/AljumahLPD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/Bou-HarbDA13,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  editor       = {Roberto Saracco and
                  Khaled Ben Letaief and
                  Mario Gerla and
                  Sergio Palazzo and
                  Luigi Atzori},
  title        = {On detecting and clustering distributed cyber scanning},
  booktitle    = {2013 9th International Wireless Communications and Mobile Computing
                  Conference, {IWCMC} 2013, Sardinia, Italy, July 1-5, 2013},
  pages        = {926--933},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IWCMC.2013.6583681},
  doi          = {10.1109/IWCMC.2013.6583681},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/Bou-HarbDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/FachkhaBD13,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Mourad Debbabi},
  title        = {Towards a Forecasting Model for Distributed Denial of Service Activities},
  booktitle    = {2013 {IEEE} 12th International Symposium on Network Computing and
                  Applications, Cambridge, MA, USA, August 22-24, 2013},
  pages        = {110--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/NCA.2013.13},
  doi          = {10.1109/NCA.2013.13},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nca/FachkhaBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/OuchaniMD13,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi},
  title        = {A probabilistic verification framework of SysML activity diagrams},
  booktitle    = {{IEEE} 12th International Conference on Intelligent Software Methodologies,
                  Tools and Techniques, SoMeT 2013, Budapest, Hungary, September 22-24,
                  2013},
  pages        = {165--170},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SoMeT.2013.6645657},
  doi          = {10.1109/SOMET.2013.6645657},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/somet/OuchaniMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/OuchaniMD13,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi},
  title        = {A Security Risk Assessment Framework for SysML Activity Diagrams},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {227--236},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.11},
  doi          = {10.1109/SERE.2013.11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/OuchaniMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/MouhebZD13,
  author       = {Djedjiga Mouheb and
                  Raha Ziarati and
                  Mourad Debbabi},
  title        = {Aspect-Oriented Semantic Framework for Executable Models},
  booktitle    = {Seventh International Symposium on Theoretical Aspects of Software
                  Engineering, {TASE} 2013, 1-3 July 2013, Birmingham, {UK}},
  pages        = {63--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TASE.2013.17},
  doi          = {10.1109/TASE.2013.17},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tase/MouhebZD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FachkhaBD13,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Mourad Debbabi},
  title        = {Fingerprinting Internet {DNS} Amplification DDoS Activities},
  journal      = {CoRR},
  volume       = {abs/1310.4216},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.4216},
  eprinttype    = {arXiv},
  eprint       = {1310.4216},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FachkhaBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/OuchaniJMD12,
  author       = {Samir Ouchani and
                  Yosr Jarraya and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi},
  title        = {Probabilistic Attack Scenarios to Evaluate Policies over Communication
                  Protocols},
  journal      = {J. Softw.},
  volume       = {7},
  number       = {7},
  pages        = {1488--1495},
  year         = {2012},
  url          = {https://doi.org/10.4304/jsw.7.7.1488-1495},
  doi          = {10.4304/JSW.7.7.1488-1495},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/OuchaniJMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/DasPD12,
  author       = {Swagata Das and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {On {SPIM} detection in {LTE} networks},
  booktitle    = {25th {IEEE} Canadian Conference on Electrical and Computer Engineering,
                  {CCECE} 2012, Montreal, QC, Canada, April 29 - May 2, 2012},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCECE.2012.6334959},
  doi          = {10.1109/CCECE.2012.6334959},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccece/DasPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/SoeanuRDBBG12,
  author       = {Andrei Soeanu and
                  Sujoy Ray and
                  Mourad Debbabi and
                  Jean Berger and
                  Abdeslem Boukhtouta and
                  Ahmed Ghanmi},
  title        = {Model checking based service delivery planning},
  booktitle    = {25th {IEEE} Canadian Conference on Electrical and Computer Engineering,
                  {CCECE} 2012, Montreal, QC, Canada, April 29 - May 2, 2012},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCECE.2012.6334956},
  doi          = {10.1109/CCECE.2012.6334956},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccece/SoeanuRDBBG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/FachkhaBBDID12,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Amine Boukhtouta and
                  Son Dinh and
                  Farkhund Iqbal and
                  Mourad Debbabi},
  editor       = {Fabio Martinelli and
                  Jean{-}Louis Lanet and
                  William M. Fitzgerald and
                  Simon N. Foley},
  title        = {Investigating the dark cyberspace: Profiling, threat-based analysis
                  and correlation},
  booktitle    = {7th International Conference on Risks and Security of Internet and
                  Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CRISIS.2012.6378947},
  doi          = {10.1109/CRISIS.2012.6378947},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/FachkhaBBDID12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/JarrayaEDZP12,
  author       = {Yosr Jarraya and
                  Arash Eghtesadi and
                  Mourad Debbabi and
                  Ying Zhang and
                  Makan Pourzandi},
  editor       = {Waleed W. Smari and
                  Geoffrey Charles Fox},
  title        = {Cloud calculus: Security verification in elastic cloud computing platform},
  booktitle    = {2012 International Conference on Collaboration Technologies and Systems,
                  {CTS} 2012, Denver, CO, USA, May 21-25, 2012},
  pages        = {447--454},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CTS.2012.6261089},
  doi          = {10.1109/CTS.2012.6261089},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/JarrayaEDZP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/RahimianCPD12,
  author       = {Ashkan Rahimian and
                  Philippe Charland and
                  Stere Preda and
                  Mourad Debbabi},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ali Miri and
                  Nadia Tawbi},
  title        = {RESource: {A} Framework for Online Matching of Assembly with Open
                  Source Code},
  booktitle    = {Foundations and Practice of Security - 5th International Symposium,
                  {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7743},
  pages        = {211--226},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37119-6\_14},
  doi          = {10.1007/978-3-642-37119-6\_14},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/RahimianCPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Bou-HarbDA12,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A first look on the effects and mitigation of VoIP {SPIT} flooding
                  in 4G mobile networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {982--987},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364233},
  doi          = {10.1109/ICC.2012.6364233},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Bou-HarbDA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/SoeanuRDBB12,
  author       = {Andrei Soeanu and
                  Sujoy Ray and
                  Mourad Debbabi and
                  Jean Berger and
                  Abdeslem Boukhtouta},
  editor       = {Manuel Gra{\~{n}}a and
                  Carlos Toro and
                  Jorge Posada and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {A Learning Based Evolutionary Algorithm For Distributed Multi-Depot
                  {VRP}},
  booktitle    = {Advances in Knowledge-Based and Intelligent Information and Engineering
                  Systems - 16th Annual {KES} Conference, San Sebastian, Spain, 10-12
                  September 2012},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {243},
  pages        = {49--58},
  publisher    = {{IOS} Press},
  year         = {2012},
  url          = {https://doi.org/10.3233/978-1-61499-105-2-49},
  doi          = {10.3233/978-1-61499-105-2-49},
  timestamp    = {Sun, 04 Aug 2024 19:26:36 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/SoeanuRDBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/LiuWRCD12,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Kui Ren and
                  Pengsu Cheng and
                  Mourad Debbabi},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {k-Indistinguishable Traffic Padding in Web Applications},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {79--99},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_5},
  doi          = {10.1007/978-3-642-31680-7\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/LiuWRCD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/AlhadidiMFD12,
  author       = {Dima Alhadidi and
                  Noman Mohammed and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {Secure Distributed Framework for Achieving {\(\epsilon\)}-Differential
                  Privacy},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {120--139},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_7},
  doi          = {10.1007/978-3-642-31680-7\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/AlhadidiMFD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SalehSRDBB12,
  author       = {Mohamed Mostafa Saleh and
                  Andrei Soeanu and
                  Sujoy Ray and
                  Mourad Debbabi and
                  Jean Berger and
                  Abdeslem Boukhtouta},
  editor       = {Sascha Ossowski and
                  Paola Lecca},
  title        = {Mechanism design for decentralized vehicle routing problem},
  booktitle    = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012,
                  Riva, Trento, Italy, March 26-30, 2012},
  pages        = {749--754},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2245276.2245419},
  doi          = {10.1145/2245276.2245419},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SalehSRDBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HoumaniD12,
  author       = {Hanane Houmani and
                  Mourad Debbabi},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Formal Analysis of the {TLS} Handshake Protocol},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {192--205},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/HoumaniD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sefm/OuchaniMD12,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi},
  editor       = {George Eleftherakis and
                  Mike Hinchey and
                  Mike Holcombe},
  title        = {Efficient Probabilistic Abstraction for SysML Activity Diagrams},
  booktitle    = {Software Engineering and Formal Methods - 10th International Conference,
                  {SEFM} 2012, Thessaloniki, Greece, October 1-5, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7504},
  pages        = {263--277},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33826-7\_18},
  doi          = {10.1007/978-3-642-33826-7\_18},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sefm/OuchaniMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/OuchaniMD12,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi},
  editor       = {Hamido Fujita and
                  Roberto Revetria},
  title        = {A Probabilistic Verification Framework for SysML Activity Diagrams},
  booktitle    = {New Trends in Software Methodologies, Tools and Techniques - Proceedings
                  of the Eleventh SoMeT '12, Genoa, Italy, September 26-28, 2012},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {246},
  pages        = {108--123},
  publisher    = {{IOS} Press},
  year         = {2012},
  url          = {https://doi.org/10.3233/978-1-61499-125-0-108},
  doi          = {10.3233/978-1-61499-125-0-108},
  timestamp    = {Tue, 09 Jul 2024 18:22:51 +0200},
  biburl       = {https://dblp.org/rec/conf/somet/OuchaniMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/MouhebZD12,
  author       = {Djedjiga Mouheb and
                  Raha Ziarati and
                  Mourad Debbabi},
  editor       = {Hamido Fujita and
                  Roberto Revetria},
  title        = {Continuation/Frame-based Semantics for Aspect Matching and Weaving},
  booktitle    = {New Trends in Software Methodologies, Tools and Techniques - Proceedings
                  of the Eleventh SoMeT '12, Genoa, Italy, September 26-28, 2012},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {246},
  pages        = {146--161},
  publisher    = {{IOS} Press},
  year         = {2012},
  url          = {https://doi.org/10.3233/978-1-61499-125-0-146},
  doi          = {10.3233/978-1-61499-125-0-146},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/somet/MouhebZD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/JarrayaEDZP12,
  author       = {Yosr Jarraya and
                  Arash Eghtesadi and
                  Mourad Debbabi and
                  Ying Zhang and
                  Makan Pourzandi},
  editor       = {Andr{\'{e}}a W. Richa and
                  Christian Scheideler},
  title        = {Formal Verification of Security Preservation for Migrating Virtual
                  Machines in the Cloud},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 14th
                  International Symposium, {SSS} 2012, Toronto, Canada, October 1-4,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7596},
  pages        = {111--125},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33536-5\_12},
  doi          = {10.1007/978-3-642-33536-5\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/JarrayaEDZP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/JarrayaD12,
  author       = {Yosr Jarraya and
                  Mourad Debbabi},
  editor       = {Tiziana Margaria and
                  Zongyan Qiu and
                  Hongli Yang},
  title        = {Formal Specification and Probabilistic Verification of SysML Activity
                  Diagrams},
  booktitle    = {Sixth International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2012, 4-6 July 2012, Beijing, China},
  pages        = {17--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TASE.2012.34},
  doi          = {10.1109/TASE.2012.34},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tase/JarrayaD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/IqbalFD12,
  author       = {Farkhund Iqbal and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {Mining Criminal Networks from Chat Log},
  booktitle    = {2012 {IEEE/WIC/ACM} International Conferences on Web Intelligence,
                  {WI} 2012, Macau, China, December 4-7, 2012},
  pages        = {332--337},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/WI-IAT.2012.68},
  doi          = {10.1109/WI-IAT.2012.68},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/webi/IqbalFD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-3718,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi and
                  Yankui Sun},
  title        = {{MARFCAT:} Transitioning to Binary and Larger Data Sets of {SATE}
                  {IV}},
  journal      = {CoRR},
  volume       = {abs/1207.3718},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.3718},
  eprinttype    = {arXiv},
  eprint       = {1207.3718},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-3718.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohammedOWDB11,
  author       = {Noman Mohammed and
                  Hadi Otrok and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {Mechanism Design-Based Secure Leader Election Model for Intrusion
                  Detection in {MANET}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {1},
  pages        = {89--103},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2009.22},
  doi          = {10.1109/TDSC.2009.22},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MohammedOWDB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vldb/MohammedFD11,
  author       = {Noman Mohammed and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {Anonymity meets game theory: secure data integration with malicious
                  participants},
  journal      = {{VLDB} J.},
  volume       = {20},
  number       = {4},
  pages        = {567--588},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00778-010-0214-6},
  doi          = {10.1007/S00778-010-0214-6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vldb/MohammedFD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ical/SoeanuRDBBG11,
  author       = {Andrei Soeanu and
                  Sujoy Ray and
                  Mourad Debbabi and
                  Jean Berger and
                  Abdeslem Boukhtouta and
                  Ahmed Ghanmi},
  title        = {A decentralized heuristic for multi-depot split-delivery vehicle routing
                  problem},
  booktitle    = {{IEEE} International Conference on Automation and Logistics, {ICAL}
                  2011, Chongqing, China, 15-16 August, 2011},
  pages        = {70--75},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICAL.2011.6024686},
  doi          = {10.1109/ICAL.2011.6024686},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ical/SoeanuRDBBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MokhovPD11,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Reasoning About a Simulated Printer Case Investigation with Forensic
                  Lucid},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_23},
  doi          = {10.1007/978-3-642-35515-8\_23},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MokhovPD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MokhovPD11,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  title        = {On the need for data flow graph visualization of Forensic Lucid programs
                  and encoded evidence, and their evaluation by {GIPSY}},
  booktitle    = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011,
                  19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {120--123},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/PST.2011.5971973},
  doi          = {10.1109/PST.2011.5971973},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/MokhovPD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/LiuWCD11,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Pengsu Cheng and
                  Mourad Debbabi},
  editor       = {Yan Chen and
                  Jaideep Vaidya},
  title        = {Privacy-preserving traffic padding in web-based applications},
  booktitle    = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic
                  society, {WPES} 2011, Chicago, IL, USA, October 17, 2011},
  pages        = {131--136},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046556.2046573},
  doi          = {10.1145/2046556.2046573},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/LiuWCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0025738,
  author       = {Mourad Debbabi and
                  Fawzi Hassa{\"{\i}}ne and
                  Yosr Jarraya and
                  Andrei Soeanu and
                  Luay Alawneh},
  title        = {Verification and Validation in Systems Engineering - Assessing {UML}
                  / SysML Design Models},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15228-3},
  doi          = {10.1007/978-3-642-15228-3},
  isbn         = {978-3-642-15227-6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0025738.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IqbalBFD10,
  author       = {Farkhund Iqbal and
                  Hamad Binsalleeh and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {Mining writeprints from anonymous e-mails for forensic investigation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {56--64},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.03.003},
  doi          = {10.1016/J.DIIN.2010.03.003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/IqbalBFD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/CharpentierDAMBBHHKLLTYY10,
  author       = {Robert Charpentier and
                  Mourad Debbabi and
                  Dima Alhadidi and
                  Azzam Mourad and
                  Nadia Belblidia and
                  Amine Boukhtouta and
                  Aiman Hanna and
                  Rachid Hadjidj and
                  Hakim Idrissi Kaitouni and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Hai Zhou Ling and
                  Syrine Tlili and
                  Xiaochun Yang and
                  Zhenrong Yang},
  title        = {Security Evaluation and Hardening of Free and Open Source Software
                  {(FOSS)}},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {33},
  year         = {2010},
  url          = {https://doi.org/10.14279/tuj.eceasst.33.452},
  doi          = {10.14279/TUJ.ECEASST.33.452},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/CharpentierDAMBBHHKLLTYY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/SalehD10,
  author       = {Mohamed Mostafa Saleh and
                  Mourad Debbabi},
  title        = {A game-theoretic framework for specification and verification of cryptographic
                  protocols},
  journal      = {Formal Aspects Comput.},
  volume       = {22},
  number       = {5},
  pages        = {585--609},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00165-009-0129-4},
  doi          = {10.1007/S00165-009-0129-4},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/SalehD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/RachediBOMD10,
  author       = {Abderrezak Rachedi and
                  Abderrahim Benslimane and
                  Hadi Otrok and
                  Noman Mohammed and
                  Mourad Debbabi},
  title        = {A Secure Mechanism Design-Based and Game Theoretical Model for MANETs},
  journal      = {Mob. Networks Appl.},
  volume       = {15},
  number       = {2},
  pages        = {191--204},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11036-009-0164-7},
  doi          = {10.1007/S11036-009-0164-7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/RachediBOMD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuRWD10,
  author       = {Bo Zhu and
                  Kui Ren and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{PCM:} a privacy-preserving detection mechanism in mobile \emph{ad
                  hoc} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {167--184},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.122},
  doi          = {10.1002/SEC.122},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuRWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c3s2e/MokhovVPD10,
  author       = {Serguei A. Mokhov and
                  Emil Vassev and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Bipin C. Desai and
                  Carson Kai{-}Sang Leung and
                  Sudhir P. Mudur},
  title        = {Towards a self-forensics property in the {ASSL} toolset},
  booktitle    = {Canadian Conference on Computer Science {\&} Software Engineering,
                  {C3S2E} 2010, Montreal, Quebec, Canada, May 19-20, 2010, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {108--113},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1822327.1822342},
  doi          = {10.1145/1822327.1822342},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c3s2e/MokhovVPD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/NouhZMADWP10,
  author       = {Mariam Nouh and
                  Raha Ziarati and
                  Djedjiga Mouheb and
                  Dima Alhadidi and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Joanna W. Ng and
                  Christian Couturier and
                  Hausi A. M{\"{u}}ller and
                  Arthur G. Ryman and
                  Anatol W. Kark},
  title        = {Aspect weaver: a model transformation approach for {UML} models},
  booktitle    = {Proceedings of the 2010 conference of the Centre for Advanced Studies
                  on Collaborative Research, November 1-4, 2010, Toronto, Ontario, Canada},
  pages        = {139--153},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1923947.1923962},
  doi          = {10.1145/1923947.1923962},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cascon/NouhZMADWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/SinhaBBD10,
  author       = {Prosenjit Sinha and
                  Amine Boukhtouta and
                  Victor Heber Belarde and
                  Mourad Debbabi},
  title        = {Insights from the analysis of the Mariposa botnet},
  booktitle    = {CRiSIS 2010, Proceedings of the Fifth International Conference on
                  Risks and Security of Internet and Systems, Montreal, QC, Canada,
                  October 10-13, 2010},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CRISIS.2010.5764915},
  doi          = {10.1109/CRISIS.2010.5764915},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/SinhaBBD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/facs2/MouhebANDWP10,
  author       = {Djedjiga Mouheb and
                  Dima Alhadidi and
                  Mariam Nouh and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Lu{\'{\i}}s Soares Barbosa and
                  Markus Lumpe},
  title        = {Aspect Weaving in {UML} Activity Diagrams: {A} Semantic and Algorithmic
                  Framework},
  booktitle    = {Formal Aspects of Component Software - 7th International Workshop,
                  {FACS} 2010, Guimar{\~{a}}es, Portugal, October 14-16, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6921},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27269-1\_11},
  doi          = {10.1007/978-3-642-27269-1\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/facs2/MouhebANDWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BinsalleehOBSYDW10,
  author       = {Hamad Binsalleeh and
                  Thomas C. Ormerod and
                  Amine Boukhtouta and
                  Prosenjit Sinha and
                  Amr M. Youssef and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {On the analysis of the Zeus botnet crimeware toolkit},
  booktitle    = {Eighth Annual Conference on Privacy, Security and Trust, {PST} 2010,
                  August 17-19, 2010, Ottawa, Ontario, Canada},
  pages        = {31--38},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/PST.2010.5593240},
  doi          = {10.1109/PST.2010.5593240},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/BinsalleehOBSYDW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MokhovPD10,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Towards Automatic Deduction and Event Reconstruction Using Forensic
                  Lucid and Probabilities to Encode the {IDS} Evidence},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {508--509},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_36},
  doi          = {10.1007/978-3-642-15512-3\_36},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MokhovPD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/IqbalKFD10,
  author       = {Farkhund Iqbal and
                  Liaquat A. Khan and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {e-mail authorship verification for forensic investigation},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1591--1598},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774428},
  doi          = {10.1145/1774088.1774428},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/IqbalKFD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/OrmerodWDYBBS10,
  author       = {Thomas C. Ormerod and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Amr M. Youssef and
                  Hamad Binsalleeh and
                  Amine Boukhtouta and
                  Prosenjit Sinha},
  editor       = {Reijo Savola and
                  Masaru Takesue and
                  Rainer Falk and
                  Manuela Popescu},
  title        = {Defaming Botnet Toolkits: {A} Bottom-Up Approach to Mitigating the
                  Threat},
  booktitle    = {Fourth International Conference on Emerging Security Information Systems
                  and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010},
  pages        = {195--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SECURWARE.2010.39},
  doi          = {10.1109/SECURWARE.2010.39},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securware/OrmerodWDYBBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/OuchaniMDP10,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi and
                  Makan Pourzandi},
  editor       = {Roger Y. Lee and
                  Olga Ormandjieva and
                  Alain Abran and
                  Constantinos Constantinides},
  title        = {Verification of the Correctness in Composed {UML} Behavioural Diagrams},
  booktitle    = {Software Engineering Research, Management and Applications 2010 [selected
                  papers from the 8th {ACIS} International Conference on Software Engineering
                  Research, Management and Applications, {SERA} 2010, Montreal, Canada,
                  May 24-26, 2010]},
  series       = {Studies in Computational Intelligence},
  volume       = {296},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13273-5\_11},
  doi          = {10.1007/978-3-642-13273-5\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/OuchaniMDP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/MouhebTNLDWP10,
  author       = {Djedjiga Mouheb and
                  Chamseddine Talhi and
                  Mariam Nouh and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Roger Y. Lee and
                  Olga Ormandjieva and
                  Alain Abran and
                  Constantinos Constantinides},
  title        = {Aspect-Oriented Modeling for Representing and Integrating Security
                  Concerns in {UML}},
  booktitle    = {Software Engineering Research, Management and Applications 2010 [selected
                  papers from the 8th {ACIS} International Conference on Software Engineering
                  Research, Management and Applications, {SERA} 2010, Montreal, Canada,
                  May 24-26, 2010]},
  series       = {Studies in Computational Intelligence},
  volume       = {296},
  pages        = {197--213},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13273-5\_13},
  doi          = {10.1007/978-3-642-13273-5\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/MouhebTNLDWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1009-5423,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  title        = {The Need to Support of Data Flow Graph Visualization of Forensic Lucid
                  Programs, Forensic Evidence, and their Evaluation by {GIPSY}},
  journal      = {CoRR},
  volume       = {abs/1009.5423},
  year         = {2010},
  url          = {http://arxiv.org/abs/1009.5423},
  eprinttype    = {arXiv},
  eprint       = {1009.5423},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1009-5423.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AlhadidiBDB09,
  author       = {Dima Alhadidi and
                  Nadia Belblidia and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {lambda{\_}SAOP: {A} Security {AOP} Calculus},
  journal      = {Comput. J.},
  volume       = {52},
  number       = {7},
  pages        = {824--849},
  year         = {2009},
  url          = {https://doi.org/10.1093/comjnl/bxn065},
  doi          = {10.1093/COMJNL/BXN065},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/AlhadidiBDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MouradSLD09,
  author       = {Azzam Mourad and
                  Andrei Soeanu and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  title        = {New aspect-oriented constructs for security hardening concerns},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {6},
  pages        = {341--358},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2009.02.003},
  doi          = {10.1016/J.COSE.2009.02.003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MouradSLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HadjidjDLISB09,
  author       = {Rachid Hadjidj and
                  Mourad Debbabi and
                  Hakim Lounis and
                  Farkhund Iqbal and
                  Adam Szporer and
                  Djamel Benredjem},
  title        = {Towards an integrated e-mail forensic analysis framework},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {124--137},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.01.004},
  doi          = {10.1016/J.DIIN.2009.01.004},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HadjidjDLISB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HejaziTD09,
  author       = {Seyed Mahmood Hejazi and
                  Chamseddine Talhi and
                  Mourad Debbabi},
  title        = {Extraction of forensically sensitive information from windows physical
                  memory},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S121--S131},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.003},
  doi          = {10.1016/J.DIIN.2009.06.003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HejaziTD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eis/IssaADR09,
  author       = {Hassan Issa and
                  Chadi Assi and
                  Mourad Debbabi and
                  Sujoy Ray},
  title        = {QoS-aware middleware for web services composition: a qualitative approach},
  journal      = {Enterp. Inf. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {449--470},
  year         = {2009},
  url          = {https://doi.org/10.1080/17517570903042754},
  doi          = {10.1080/17517570903042754},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eis/IssaADR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgs/JarrayaSADH09,
  author       = {Yosr Jarraya and
                  Andrei Soeanu and
                  Luay Alawneh and
                  Mourad Debbabi and
                  Fawzi Hassa{\"{\i}}ne},
  title        = {Synergistic verification and validation of systems and software engineering
                  models},
  journal      = {Int. J. Gen. Syst.},
  volume       = {38},
  number       = {7},
  pages        = {719--746},
  year         = {2009},
  url          = {https://doi.org/10.1080/03081070903029253},
  doi          = {10.1080/03081070903029253},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijgs/JarrayaSADH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BoukhtoutaAD09,
  author       = {Amine Boukhtouta and
                  Dima Alhadidi and
                  Mourad Debbabi},
  title        = {Capturing Returned Computable Values in AspectJ for Security Hardening},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {2},
  pages        = {87--98},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550902791432},
  doi          = {10.1080/19393550902791432},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BoukhtoutaAD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/TliliD09,
  author       = {Syrine Tlili and
                  Mourad Debbabi},
  title        = {Interprocedural and Flow-Sensitive Type Analysis for Memory and Type
                  Safety of {C} Code},
  journal      = {J. Autom. Reason.},
  volume       = {42},
  number       = {2-4},
  pages        = {265--300},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10817-009-9121-1},
  doi          = {10.1007/S10817-009-9121-1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/TliliD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/TalhiMLDWP09,
  author       = {Chamseddine Talhi and
                  Djedjiga Mouheb and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  title        = {Usability of Security Specification Approaches for {UML} Design: {A}
                  Survey},
  journal      = {J. Object Technol.},
  volume       = {8},
  number       = {6},
  pages        = {102--122},
  year         = {2009},
  url          = {https://doi.org/10.5381/jot.2009.8.6.a1},
  doi          = {10.5381/JOT.2009.8.6.A1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/TalhiMLDWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/MouradLSD09,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Andrei Soeanu and
                  Mourad Debbabi},
  title        = {Nouveaux points de coupure et primitives pour les pr{\'{e}}occupations
                  de renforcement de s{\'{e}}curit{\'{e}}},
  journal      = {Tech. Sci. Informatiques},
  volume       = {28},
  number       = {5},
  pages        = {611--644},
  year         = {2009},
  url          = {https://doi.org/10.3166/tsi.28.611-644},
  doi          = {10.3166/TSI.28.611-644},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/MouradLSD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BoukhtoutaAD09,
  author       = {Amine Boukhtouta and
                  Dima Alhadidi and
                  Mourad Debbabi},
  title        = {A Practical Framework for the Dataflow Pointcut in AspectJ},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {835--840},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.86},
  doi          = {10.1109/ARES.2009.86},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BoukhtoutaAD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aosd/MouhebTLD0P09,
  author       = {Djedjiga Mouheb and
                  Chamseddine Talhi and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Omar Aldawud and
                  Walter Cazzola and
                  Thomas Cottenier and
                  Jeff Gray and
                  J{\"{o}}rg Kienzle and
                  Dominik Stein},
  title        = {Weaving security aspects into {UML} 2.0 design models},
  booktitle    = {Proceedings of the 13th workshop on Aspect-oriented modeling, {AOM}
                  '09, Charlottesville, Virginia, USA, March 2, 2009},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1509297.1509300},
  doi          = {10.1145/1509297.1509300},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aosd/MouhebTLD0P09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aosd/AlhadidiBBDB09,
  author       = {Dima Alhadidi and
                  Amine Boukhtouta and
                  Nadia Belblidia and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  editor       = {Kevin J. Sullivan and
                  Ana Moreira and
                  Christa Schwanninger and
                  Jeff Gray},
  title        = {The dataflow pointcut: a formal and practical framework},
  booktitle    = {Proceedings of the 8th International Conference on Aspect-Oriented
                  Software Development, {AOSD} 2009, Charlottesville, Virginia, USA,
                  March 2-6, 2009},
  pages        = {15--26},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1509239.1509244},
  doi          = {10.1145/1509239.1509244},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aosd/AlhadidiBBDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/MohammedFD09,
  author       = {Noman Mohammed and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  editor       = {David Wai{-}Lok Cheung and
                  Il{-}Yeol Song and
                  Wesley W. Chu and
                  Xiaohua Hu and
                  Jimmy Lin},
  title        = {Walking in the crowd: anonymizing trajectory data for pattern analysis},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Information and Knowledge
                  Management, {CIKM} 2009, Hong Kong, China, November 2-6, 2009},
  pages        = {1441--1444},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1645953.1646140},
  doi          = {10.1145/1645953.1646140},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/MohammedFD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/JarrayaDB09,
  author       = {Yosr Jarraya and
                  Mourad Debbabi and
                  Jamal Bentahar},
  title        = {On the Meaning of SysML Activity Diagrams},
  booktitle    = {16th Annual {IEEE} International Conference and Workshop on the Engineering
                  of Computer Based Systems, {ECBS} 2009, San Francisco, California,
                  USA, 14-16 April 2009},
  pages        = {95--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECBS.2009.25},
  doi          = {10.1109/ECBS.2009.25},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecbs/JarrayaDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hsc/MokhovPD09,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Joseph S. Gauthier},
  title        = {Reasoning About a Simulated Printer Case Investigation with Forensic
                  Lucid (abstract)},
  booktitle    = {The Huntsville Simulation Conference - {HSC} 2009, Huntsville, AL,
                  USA, October 27-29, 2009. Proceedings},
  pages        = {45},
  publisher    = {The Society for Modeling and Simulation International {(SCS)}},
  year         = {2009},
  timestamp    = {Wed, 01 Dec 2010 07:09:59 +0100},
  biburl       = {https://dblp.org/rec/conf/hsc/MokhovPD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hsc/MokhovPD09a,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Joseph S. Gauthier},
  title        = {Towards Automated Deduction in Blackmail Case Analysis with Forensic
                  Lucid},
  booktitle    = {The Huntsville Simulation Conference - {HSC} 2009, Huntsville, AL,
                  USA, October 27-29, 2009. Proceedings},
  pages        = {326--333},
  publisher    = {The Society for Modeling and Simulation International {(SCS)}},
  year         = {2009},
  timestamp    = {Tue, 30 Nov 2010 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hsc/MokhovPD09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/HannaLYD09,
  author       = {Aiman Hanna and
                  Hai Zhou Ling and
                  Xiaochun Yang and
                  Mourad Debbabi},
  editor       = {Robert Meersman and
                  Tharam S. Dillon and
                  Pilar Herrero},
  title        = {A Synergy between Static and Dynamic Analysis for the Detection of
                  Software Security Vulnerabilities},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated
                  International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura,
                  Portugal, November 1-6, 2009, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5871},
  pages        = {815--832},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05151-7\_5},
  doi          = {10.1007/978-3-642-05151-7\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/HannaLYD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/TliliYHD09,
  author       = {Syrine Tlili and
                  Xiaochun Yang and
                  Rachid Hadjidj and
                  Mourad Debbabi},
  editor       = {Robert Meersman and
                  Tharam S. Dillon and
                  Pilar Herrero},
  title        = {Verification of {CERT} Secure Coding Rules: Case Studies},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated
                  International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura,
                  Portugal, November 1-6, 2009, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5871},
  pages        = {913--930},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05151-7\_12},
  doi          = {10.1007/978-3-642-05151-7\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/TliliYHD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/MouhebTMLDWP09,
  author       = {Djedjiga Mouheb and
                  Chamseddine Talhi and
                  Azzam Mourad and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Hamido Fujita and
                  Vladim{\'{\i}}r Mar{\'{\i}}k},
  title        = {An Aspect-Oriented Approach for Software Security Hardening: from
                  Design to Implementation},
  booktitle    = {New Trends in Software Methodologies, Tools and Techniques - Proceedings
                  of the Eighth SoMeT 2009, September 23-25, 2009, Prague, Czech Republic},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {199},
  pages        = {203--222},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-60750-049-0-203},
  doi          = {10.3233/978-1-60750-049-0-203},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/somet/MouhebTMLDWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/LimaTMDWP09,
  author       = {Vitor Lima and
                  Chamseddine Talhi and
                  Djedjiga Mouheb and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Ralf Huuck and
                  Gerwin Klein and
                  Bastian Schlich},
  title        = {Formal Verification and Validation of {UML} 2.0 Sequence Diagrams
                  using Source and Destination of Messages},
  booktitle    = {Proceedings of the 4th International Workshop on Systems Software
                  Verification, {SSV} 2009, Aachen, Germany, June 22-24, 2009},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {254},
  pages        = {143--160},
  publisher    = {Elsevier},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.entcs.2009.09.064},
  doi          = {10.1016/J.ENTCS.2009.09.064},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/LimaTMDWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0906-0049,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  title        = {Towards Automated Deduction in Blackmail Case Analysis with Forensic
                  Lucid},
  journal      = {CoRR},
  volume       = {abs/0906.0049},
  year         = {2009},
  url          = {http://arxiv.org/abs/0906.0049},
  eprinttype    = {arXiv},
  eprint       = {0906.0049},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0906-0049.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0906-5181,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  title        = {Reasoning About an {ACME} Printer Case Investigation with Forensic
                  Lucid},
  journal      = {CoRR},
  volume       = {abs/0906.5181},
  year         = {2009},
  url          = {http://arxiv.org/abs/0906.5181},
  eprinttype    = {arXiv},
  eprint       = {0906.5181},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0906-5181.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/OtrokMWDB08,
  author       = {Hadi Otrok and
                  Noman Mohammed and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {A game-theoretic intrusion detection model for mobile ad hoc networks},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {4},
  pages        = {708--721},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2007.10.024},
  doi          = {10.1016/J.COMCOM.2007.10.024},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/OtrokMWDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/OtrokMADB08,
  author       = {Hadi Otrok and
                  Mona Mehrandish and
                  Chadi Assi and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {Game theoretic models for detecting network intrusions},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {10},
  pages        = {1934--1944},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2007.12.028},
  doi          = {10.1016/J.COMCOM.2007.12.028},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/OtrokMADB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MouradLD08,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  title        = {An aspect-oriented approach for the systematic security hardening
                  of code},
  journal      = {Comput. Secur.},
  volume       = {27},
  number       = {3-4},
  pages        = {101--114},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.cose.2008.04.003},
  doi          = {10.1016/J.COSE.2008.04.003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MouradLD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IqbalHFD08,
  author       = {Farkhund Iqbal and
                  Rachid Hadjidj and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {A novel approach of mining write-prints for authorship attribution
                  in e-mail forensics},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S42--S51},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.001},
  doi          = {10.1016/J.DIIN.2008.05.001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/IqbalHFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/TalhiTD08,
  author       = {Chamseddine Talhi and
                  Nadia Tawbi and
                  Mourad Debbabi},
  title        = {Execution monitoring enforcement under memory-limitation constraints},
  journal      = {Inf. Comput.},
  volume       = {206},
  number       = {2-4},
  pages        = {158--184},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ic.2007.07.009},
  doi          = {10.1016/J.IC.2007.07.009},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/TalhiTD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MouradLD08,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  title        = {A High-level Aspect-oriented-based Framework for Software Security
                  Hardening},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {17},
  number       = {2},
  pages        = {56--74},
  year         = {2008},
  url          = {https://doi.org/10.1080/19393550801911230},
  doi          = {10.1080/19393550801911230},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/MouradLD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/AlhadidiDB08,
  author       = {Dima Alhadidi and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {New AspectJ Pointcuts for Integer Overflow and Underflow Detection},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {17},
  number       = {5{\&}6},
  pages        = {278--287},
  year         = {2008},
  url          = {https://doi.org/10.1080/19393550802492479},
  doi          = {10.1080/19393550802492479},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/AlhadidiDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/HejaziDT08,
  author       = {Seyed Mahmood Hejazi and
                  Mourad Debbabi and
                  Chamseddine Talhi},
  title        = {Automated Windows Memory File Extraction for Cyber Forensics Investigation},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {3},
  pages        = {117--131},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802552829},
  doi          = {10.1080/15567280802552829},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/HejaziDT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TliliD08,
  author       = {Syrine Tlili and
                  Mourad Debbabi},
  title        = {Type and Effect Annotations for Safe Memory Access in {C}},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {302--309},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.18},
  doi          = {10.1109/ARES.2008.18},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TliliD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/TliliD08,
  author       = {Syrine Tlili and
                  Mourad Debbabi},
  title        = {A novel flow-sensitive type and effect analysis for securing {C} code},
  booktitle    = {The 6th {ACS/IEEE} International Conference on Computer Systems and
                  Applications, {AICCSA} 2008, Doha, Qatar, March 31 - April 4, 2008},
  pages        = {661--668},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/AICCSA.2008.4493600},
  doi          = {10.1109/AICCSA.2008.4493600},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aiccsa/TliliD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/TliliYLD08,
  author       = {Syrine Tlili and
                  Zhenrong Yang and
                  Hai Zhou Ling and
                  Mourad Debbabi},
  editor       = {Jos{\'{e}} Meseguer and
                  Grigore Rosu},
  title        = {A Hybrid Approach for Safe Memory Management in {C}},
  booktitle    = {Algebraic Methodology and Software Technology, 12th International
                  Conference, {AMAST} 2008, Urbana, IL, USA, July 28-31, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5140},
  pages        = {377--391},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79980-1\_28},
  doi          = {10.1007/978-3-540-79980-1\_28},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amast/TliliYLD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HannaLFD08,
  author       = {Aiman Hanna and
                  Hai Zhou Ling and
                  Jason Furlong and
                  Mourad Debbabi},
  editor       = {Vijay Atluri},
  title        = {Towards Automation of Testing High-Level Security Properties},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {268--282},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_21},
  doi          = {10.1007/978-3-540-70567-3\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HannaLFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/MokhovD08,
  author       = {Serguei A. Mokhov and
                  Mourad Debbabi},
  editor       = {Oliver G{\"{o}}bel and
                  Sandra Frings and
                  Detlef G{\"{u}}nther and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {File Type Analysis Using Signal Processing Techniques and Machine
                  Learning vs. File Unix Utility for Forensic Analysis},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2008, Conference
                  Proceedings, September 23-25, 2008, Mannheim, Germany},
  series       = {{LNI}},
  volume       = {{P-140}},
  pages        = {73--85},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/23599},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/MokhovD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/MokhovPD08,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Oliver G{\"{o}}bel and
                  Sandra Frings and
                  Detlef G{\"{u}}nther and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {Formally Specifying Operational Semantics and Language Constructs
                  of Forensic Lucid},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2008, Conference
                  Proceedings, September 23-25, 2008, Mannheim, Germany},
  series       = {{LNI}},
  volume       = {{P-140}},
  pages        = {197--216},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/23592},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/MokhovPD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FungWWD08,
  author       = {Benjamin C. M. Fung and
                  Ke Wang and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {A framework for privacy-preserving cluster analysis},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {46--51},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565028},
  doi          = {10.1109/ISI.2008.4565028},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FungWWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MouradAD08,
  author       = {Azzam Mourad and
                  Dima Alhadidi and
                  Mourad Debbabi},
  editor       = {Larry Korba and
                  Stephen Marsh and
                  Reihaneh Safavi{-}Naini},
  title        = {Cross-Language Weaving Approach Targeting Software Security Hardening},
  booktitle    = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008,
                  October 1-3, 2008, Fredericton, New Brunswick, Canada},
  pages        = {87--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PST.2008.22},
  doi          = {10.1109/PST.2008.22},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/MouradAD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HadjidjYTD08,
  author       = {Rachid Hadjidj and
                  Xiaochun Yang and
                  Syrine Tlili and
                  Mourad Debbabi},
  editor       = {Larry Korba and
                  Stephen Marsh and
                  Reihaneh Safavi{-}Naini},
  title        = {Model-Checking for Software Vulnerabilities Detection with Multi-Language
                  Support},
  booktitle    = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008,
                  October 1-3, 2008, Fredericton, New Brunswick, Canada},
  pages        = {133--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PST.2008.21},
  doi          = {10.1109/PST.2008.21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/HadjidjYTD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qsic/HannaLFYD08,
  author       = {Aiman Hanna and
                  Hai Zhou Ling and
                  Jason Furlong and
                  Zhenrong Yang and
                  Mourad Debbabi},
  editor       = {Hong Zhu},
  title        = {Targeting Security Vulnerabilities: From Specification to Detection
                  (Short Paper)},
  booktitle    = {Proceedings of the Eighth International Conference on Quality Software,
                  {QSIC} 2008, 12-13 August 2008, Oxford, {UK}},
  pages        = {97--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/QSIC.2008.35},
  doi          = {10.1109/QSIC.2008.35},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qsic/HannaLFYD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MouradAD08,
  author       = {Azzam Mourad and
                  Dima Alhadidi and
                  Mourad Debbabi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Towards Language-Independent Approach for Security Concerns Weaving},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {460--465},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MouradAD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/MohammedOWDB08,
  author       = {Noman Mohammed and
                  Hadi Otrok and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion
                  Detection in {MANET}},
  booktitle    = {{WCNC} 2008, {IEEE} Wireless Communications {\&} Networking Conference,
                  March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings},
  pages        = {2816--2821},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/WCNC.2008.493},
  doi          = {10.1109/WCNC.2008.493},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/MohammedOWDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/RachediBOMD08,
  author       = {Abderrezak Rachedi and
                  Abderrahim Benslimane and
                  Hadi Otrok and
                  Noman Mohammed and
                  Mourad Debbabi},
  title        = {A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks},
  booktitle    = {{IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2008, Avignon, France, 12-14
                  October 2008, Proceedings},
  pages        = {417--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WiMob.2008.77},
  doi          = {10.1109/WIMOB.2008.77},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wimob/RachediBOMD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/OtrokMWDB08,
  author       = {Hadi Otrok and
                  Noman Mohammed and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {A Moderate to Robust Game Theoretical Model for Intrusion Detection
                  in MANETs},
  booktitle    = {{IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2008, Avignon, France, 12-14
                  October 2008, Proceedings},
  pages        = {608--612},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WiMob.2008.21},
  doi          = {10.1109/WIMOB.2008.21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wimob/OtrokMWDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/AssiBDMO08,
  author       = {Chadi Assi and
                  Prabir Bhattacharya and
                  Mourad Debbabi and
                  Mona Mehrandish and
                  Hadi Otrok},
  title        = {Mobile Security: Game Theory},
  booktitle    = {Encyclopedia of Wireless and Mobile Communications},
  year         = {2008},
  url          = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043182},
  doi          = {10.1081/E-EWMC-120043182},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/AssiBDMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/DebbabiLMT08,
  author       = {Mourad Debbabi and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Azzam Mourad and
                  Syrine Tlili},
  title        = {Wireless Applications: Middleware Security},
  booktitle    = {Encyclopedia of Wireless and Mobile Communications},
  year         = {2008},
  url          = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043598},
  doi          = {10.1081/E-EWMC-120043598},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/DebbabiLMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArastehDSS07,
  author       = {Ali Reza Arasteh and
                  Mourad Debbabi and
                  Assaad Sakha and
                  Mohamed Mostafa Saleh},
  title        = {Analyzing multiple logs for forensic evidence},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {82--91},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.013},
  doi          = {10.1016/J.DIIN.2007.06.013},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ArastehDSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArastehD07,
  author       = {Ali Reza Arasteh and
                  Mourad Debbabi},
  title        = {Forensic memory analysis: From stack and code to execution history},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {114--125},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.010},
  doi          = {10.1016/J.DIIN.2007.06.010},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ArastehD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/BelblidiaD07,
  author       = {Nadia Belblidia and
                  Mourad Debbabi},
  title        = {A Dynamic Operational Semantics for {JVML}},
  journal      = {J. Object Technol.},
  volume       = {6},
  number       = {3},
  pages        = {71--100},
  year         = {2007},
  url          = {https://doi.org/10.5381/jot.2007.6.3.a2},
  doi          = {10.5381/JOT.2007.6.3.A2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/BelblidiaD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/DebbabiF07,
  author       = {Mourad Debbabi and
                  M. Fourati},
  title        = {A Formal Type System for Java},
  journal      = {J. Object Technol.},
  volume       = {6},
  number       = {8},
  pages        = {117--184},
  year         = {2007},
  url          = {https://doi.org/10.5381/jot.2007.6.8.a3},
  doi          = {10.5381/JOT.2007.6.8.A3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/DebbabiF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/BenssamBBDRS07,
  author       = {Ali Benssam and
                  Jean Berger and
                  Abdeslem Boukhtouta and
                  Mourad Debbabi and
                  Sujoy Ray and
                  Abderrazak Sahi},
  title        = {What middleware for network centric operations?},
  journal      = {Knowl. Based Syst.},
  volume       = {20},
  number       = {3},
  pages        = {255--265},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.knosys.2006.05.020},
  doi          = {10.1016/J.KNOSYS.2006.05.020},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/BenssamBBDRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/SalehASD07,
  author       = {Mohamed Mostafa Saleh and
                  Ali Reza Arasteh and
                  Assaad Sakha and
                  Mourad Debbabi},
  title        = {Forensic analysis of logs: Modeling and verification},
  journal      = {Knowl. Based Syst.},
  volume       = {20},
  number       = {7},
  pages        = {671--682},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.knosys.2007.05.002},
  doi          = {10.1016/J.KNOSYS.2007.05.002},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/SalehASD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangHD07,
  author       = {Zhenrong Yang and
                  Aiman Hanna and
                  Mourad Debbabi},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Team Edit Automata for Testing Security Property},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {235--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.45},
  doi          = {10.1109/IAS.2007.45},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangHD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SalehD07,
  author       = {Mohamed Mostafa Saleh and
                  Mourad Debbabi},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Modeling Security Protocols as Games},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {253--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.44},
  doi          = {10.1109/IAS.2007.44},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SalehD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/MouradLD07,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  title        = {Towards an Aspect Oriented Approach for the Security Hardening of
                  Code},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {595--600},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.355},
  doi          = {10.1109/AINAW.2007.355},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/MouradLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsr/OtrokPDB07,
  author       = {Hadi Otrok and
                  Joey Paquet and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {Testing Intrusion Detection Systems in {MANET:} {A} Comprehensive
                  Study},
  booktitle    = {Fifth Annual Conference on Communication Networks and Services Research
                  {(CNSR} 2007), 14-17 May 2006, Fredericton, New Brunswick, Canada},
  pages        = {364--371},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CNSR.2007.62},
  doi          = {10.1109/CNSR.2007.62},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsr/OtrokPDB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/JarrayaSDH07,
  author       = {Yosr Jarraya and
                  Andrei Soeanu and
                  Mourad Debbabi and
                  Fawzi Hassa{\"{\i}}ne},
  title        = {Automatic Verification and Performance Analysis of Time-Constrained
                  SysML Activity Diagrams},
  booktitle    = {14th Annual {IEEE} International Conference and Workshop on Engineering
                  of Computer Based Systems {(ECBS} 2007), 26-29 March 2007, Tucson,
                  Arizona, {USA}},
  pages        = {515--522},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ECBS.2007.22},
  doi          = {10.1109/ECBS.2007.22},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecbs/JarrayaSDH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/OtrokDAB07,
  author       = {Hadi Otrok and
                  Mourad Debbabi and
                  Chadi Assi and
                  Prabir Bhattacharya},
  title        = {A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks},
  booktitle    = {27th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada},
  pages        = {86},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICDCSW.2007.91},
  doi          = {10.1109/ICDCSW.2007.91},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcsw/OtrokDAB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/MouradLD07,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  editor       = {Joaquim Filipe and
                  Mohammad S. Obaidat},
  title        = {A Security Hardening Language Based on Aspect-Orientation},
  booktitle    = {E-business and Telecommunications - 4th International Conference,
                  {ICETE} 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {23},
  pages        = {254--266},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88653-2\_19},
  doi          = {10.1007/978-3-540-88653-2\_19},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/MouradLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/LaverdiereMSD07,
  author       = {Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Azzam Mourad and
                  Andrei Soeanu and
                  Mourad Debbabi},
  editor       = {Sandro Etalle and
                  Stephen Marsh},
  title        = {Control Flow Based Pointcuts for Security Hardening Concerns},
  booktitle    = {Trust Management - Proceedings of {IFIPTM} 2007: Joint iTrust and
                  {PST} Conferences on Privacy, Trust Management and Security, July
                  30- August 2, 2007, Moncton, New Brunswick, Canada},
  series       = {{IFIP}},
  volume       = {238},
  pages        = {301--316},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-73655-6\_20},
  doi          = {10.1007/978-0-387-73655-6\_20},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/LaverdiereMSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qsic/YahyaouiDT07,
  author       = {Hamdi Yahyaoui and
                  Mourad Debbabi and
                  Nadia Tawbi},
  title        = {A Denotational Semantic Model for Validating {JVML/CLDC} Optimizations
                  under Isabelle/HOL},
  booktitle    = {Seventh International Conference on Quality Software {(QSIC} 2007),
                  11-12 October 2007, Portland, Oregon, {USA}},
  pages        = {348--355},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.ieeecomputersociety.org/10.1109/QSIC.2007.2},
  doi          = {10.1109/QSIC.2007.2},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qsic/YahyaouiDT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MouradLD07,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A High-Level Aspect-Oriented based Language for Software Security
                  Hardening},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {363--370},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MouradLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sefm/AlhadidiBDB07,
  author       = {Dima Alhadidi and
                  Nadia Belblidia and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {An {AOP} Extended Lambda-Calculus},
  booktitle    = {Fifth {IEEE} International Conference on Software Engineering and
                  Formal Methods {(SEFM} 2007), 10-14 September 2007, London, England,
                  {UK}},
  pages        = {183--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SEFM.2007.5},
  doi          = {10.1109/SEFM.2007.5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sefm/AlhadidiBDB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sefm/SalehD07,
  author       = {Mohamed Mostafa Saleh and
                  Mourad Debbabi},
  title        = {Verifying Security Properties of Cryptoprotocols: {A} Novel Approach},
  booktitle    = {Fifth {IEEE} International Conference on Software Engineering and
                  Formal Methods {(SEFM} 2007), 10-14 September 2007, London, England,
                  {UK}},
  pages        = {349--360},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SEFM.2007.46},
  doi          = {10.1109/SEFM.2007.46},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sefm/SalehD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/MouradLD07,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  editor       = {Mariemma Inmaculada Yag{\"{u}}e del Valle and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {New Primitives to {AOP} Weaving Capabilities for Security Hardening
                  Concerns},
  booktitle    = {Security in Information Systems, Proceedings of the 5th International
                  Workshop on Security in Information Systems, {WOSIS} 2007, In conjunction
                  with {ICEIS} 2007, Funchal, Madeira, Portugal, June 2007},
  pages        = {123--130},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Tue, 17 Mar 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sis/MouradLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/OtrokMWDB07,
  author       = {Hadi Otrok and
                  Noman Mohammed and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {An Efficient and Truthful Leader {IDS} Election Mechanism for {MANET}},
  booktitle    = {Third {IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2007, White Plains, New York,
                  USA, 8-10 October 2007, Proceedings},
  pages        = {78},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.ieeecomputersociety.org/10.1109/WIMOB.2007.19},
  doi          = {10.1109/WIMOB.2007.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/OtrokMWDB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/DebabbiSTZ06,
  author       = {Mourad Debbabi and
                  Mohamed Mostafa Saleh and
                  Chamseddine Talhi and
                  Sami Zhioua},
  title        = {Security Evaluation of {J2ME} {CLDC} Embedded Java Platform},
  journal      = {J. Object Technol.},
  volume       = {5},
  number       = {2},
  pages        = {125--154},
  year         = {2006},
  url          = {https://doi.org/10.5381/jot.2006.5.2.a2},
  doi          = {10.5381/JOT.2006.5.2.A2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/DebabbiSTZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/DebbabiGMY06,
  author       = {Mourad Debbabi and
                  Abdelouahed Gherbi and
                  Azzam Mourad and
                  Hamdi Yahyaoui},
  title        = {A selective dynamic compiler for embedded Java virtual machines targeting
                  {ARM} processors},
  journal      = {Sci. Comput. Program.},
  volume       = {59},
  number       = {1-2},
  pages        = {38--63},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.scico.2005.03.008},
  doi          = {10.1016/J.SCICO.2005.03.008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/DebbabiGMY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acst/AlawnehDHS06,
  author       = {Luay Alawneh and
                  Mourad Debbabi and
                  Fawzi Hassa{\"{\i}}ne and
                  Andrei Soeanu},
  editor       = {Sartaj Sahni},
  title        = {On the verification and validation of uml structural and behavioral
                  diagrams},
  booktitle    = {{IASTED} International Conference on Advances in Computer Science
                  and Technology, January 23-25, 2006, Puerto Vallarta, Mexico},
  pages        = {304--309},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Thu, 25 Jan 2007 12:46:30 +0100},
  biburl       = {https://dblp.org/rec/conf/acst/AlawnehDHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/VenkataiahgariAD06,
  author       = {Anil Kumar Venkataiahgari and
                  J. William Atwood and
                  Mourad Debbabi},
  title        = {A Survey of Secure {B2C} Commerce for Multicast Services},
  booktitle    = {Proceedings of the Canadian Conference on Electrical and Computer
                  Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre,
                  Ottawa, Canada},
  pages        = {288--293},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CCECE.2006.277329},
  doi          = {10.1109/CCECE.2006.277329},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccece/VenkataiahgariAD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/BelblidiaDHY06,
  author       = {Nadia Belblidia and
                  Mourad Debbabi and
                  Aiman Hanna and
                  Zhenrong Yang},
  title        = {{AOP} Extension for Security Testing of Programs},
  booktitle    = {Proceedings of the Canadian Conference on Electrical and Computer
                  Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre,
                  Ottawa, Canada},
  pages        = {647--650},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CCECE.2006.277318},
  doi          = {10.1109/CCECE.2006.277318},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccece/BelblidiaDHY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/LaverdiereMHD06,
  author       = {Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Azzam Mourad and
                  Aiman Hanna and
                  Mourad Debbabi},
  title        = {Security Design Patterns: Survey and Evaluation},
  booktitle    = {Proceedings of the Canadian Conference on Electrical and Computer
                  Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre,
                  Ottawa, Canada},
  pages        = {1605--1608},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CCECE.2006.277727},
  doi          = {10.1109/CCECE.2006.277727},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccece/LaverdiereMHD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/VenkataiahgariDA06,
  author       = {Anil Kumar Venkataiahgari and
                  Mourad Debbabi and
                  J. William Atwood},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {Secure E-commerce Protection Profile},
  booktitle    = {Proceedings of the 2006 International Conference on Security {\&}
                  Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {279--285},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Wed, 06 Dec 2006 10:51:51 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/VenkataiahgariDA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/AlawnehDJSH06,
  author       = {Luay Alawneh and
                  Mourad Debbabi and
                  Yosr Jarraya and
                  Andrei Soeanu and
                  Fawzi Hassa{\"{\i}}ne},
  title        = {A Unified Approach for Verification and Validation of Systems and
                  Software Engineering Models},
  booktitle    = {13th Annual {IEEE} International Conference and Workshop on Engineering
                  of Computer Based Systems {(ECBS} 2006), 27-30 March 2006, Potsdam,
                  Germany},
  pages        = {409--418},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ECBS.2006.17},
  doi          = {10.1109/ECBS.2006.17},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecbs/AlawnehDJSH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MehrandishODAB06,
  author       = {Mona Mehrandish and
                  Hadi Otrok and
                  Mourad Debbabi and
                  Chadi Assi and
                  Prabir Bhattacharya},
  title        = {A Game Theoretic Approach to Detect Network Intrusions: The Cooperative
                  Intruders Scenario},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
                  '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GLOCOM.2006.293},
  doi          = {10.1109/GLOCOM.2006.293},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/MehrandishODAB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iastedSE/AlawnehDHJSS06,
  author       = {Luay Alawneh and
                  Mourad Debbabi and
                  Fawzi Hassa{\"{\i}}ne and
                  Yosr Jarraya and
                  Payam Shahi and
                  Andrei Soeanu},
  editor       = {Peter Kokol},
  title        = {Towards a Unified Paradigm for Verification and Validation of Systems
                  Engineering Design Models},
  booktitle    = {Proceedings of the {IASTED} International Conference on Software Engineering,
                  February 14-16, 2006, Innsbruck, Austria},
  pages        = {282--287},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Wed, 08 Nov 2006 11:18:50 +0100},
  biburl       = {https://dblp.org/rec/conf/iastedSE/AlawnehDHJSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MehrandishAD06,
  author       = {Mona Mehrandish and
                  Chadi M. Assi and
                  Mourad Debbabi},
  title        = {A Game Theoretic Model to Handle Network Intrusions over Multiple
                  Packets},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {2189--2194},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.255095},
  doi          = {10.1109/ICC.2006.255095},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MehrandishAD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/IssaAD06,
  author       = {Hassan Issa and
                  Chadi Assi and
                  Mourad Debbabi},
  editor       = {Paolo Bellavista and
                  Chi{-}Ming Chen and
                  Antonio Corradi and
                  Mahmoud Daneshmand},
  title        = {QoS-Aware Middleware for Web Services Composition - {A} Qualitative
                  Approach},
  booktitle    = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy},
  pages        = {359--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCC.2006.135},
  doi          = {10.1109/ISCC.2006.135},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/IssaAD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jmlc/BelblidiaD06,
  author       = {Nadia Belblidia and
                  Mourad Debbabi},
  editor       = {David E. Lightfoot and
                  Clemens A. Szyperski},
  title        = {Towards a Formal Semantics for AspectJ Weaving},
  booktitle    = {Modular Programming Languages, 7th Joint Modular Languages Conference,
                  {JMLC} 2006, Oxford, UK, September 13-15, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4228},
  pages        = {155--171},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11860990\_11},
  doi          = {10.1007/11860990\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/jmlc/BelblidiaD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/TalhiTD06,
  author       = {Chamseddine Talhi and
                  Nadia Tawbi and
                  Mourad Debbabi},
  title        = {Execution monitoring enforcement for limited-memory systems},
  booktitle    = {Proceedings of the 2006 International Conference on Privacy, Security
                  and Trust: Bridge the Gap Between {PST} Technologies and Business
                  Services, {PST} 2006, Markham, Ontario, Canada, October 30 - November
                  1, 2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {380},
  pages        = {38},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1501434.1501480},
  doi          = {10.1145/1501434.1501480},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/TalhiTD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MouradLD06,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  title        = {Security hardening of open source software},
  booktitle    = {Proceedings of the 2006 International Conference on Privacy, Security
                  and Trust: Bridge the Gap Between {PST} Technologies and Business
                  Services, {PST} 2006, Markham, Ontario, Canada, October 30 - November
                  1, 2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {380},
  pages        = {43},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1501434.1501486},
  doi          = {10.1145/1501434.1501486},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/MouradLD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AlHadidiBD06,
  author       = {Dima Alhadidi and
                  Nadia Belblidia and
                  Mourad Debbabi},
  title        = {Security crosscutting concerns and AspectJ},
  booktitle    = {Proceedings of the 2006 International Conference on Privacy, Security
                  and Trust: Bridge the Gap Between {PST} Technologies and Business
                  Services, {PST} 2006, Markham, Ontario, Canada, October 30 - November
                  1, 2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {380},
  pages        = {45},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1501434.1501488},
  doi          = {10.1145/1501434.1501488},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AlHadidiBD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sefm/BelblidiaD06,
  author       = {Nadia Belblidia and
                  Mourad Debbabi},
  title        = {Formalizing AspectJ Weaving for Static Pointcuts},
  booktitle    = {Fourth {IEEE} International Conference on Software Engineering and
                  Formal Methods {(SEFM} 2006), 11-15 September 2006, Pune, India},
  pages        = {50--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SEFM.2006.19},
  doi          = {10.1109/SEFM.2006.19},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sefm/BelblidiaD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/ArastehDS06,
  author       = {Ali Reza Arasteh and
                  Mourad Debbabi and
                  Assaad Sakha},
  editor       = {Hamido Fujita and
                  Mohamed Mejri},
  title        = {A Formal Approach for the Forensic Analysis of Logs},
  booktitle    = {New Trends in Software Methodologies, Tools and Techniques - Proceedings
                  of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {147},
  pages        = {159--176},
  publisher    = {{IOS} Press},
  year         = {2006},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=2134},
  timestamp    = {Tue, 13 Mar 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/somet/ArastehDS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/DebbabiSTZ06,
  author       = {Mourad Debbabi and
                  Mohamed Mostafa Saleh and
                  Chamseddine Talhi and
                  Sami Zhioua},
  editor       = {Hamido Fujita and
                  Mohamed Mejri},
  title        = {Common Criteria Approach to {J2ME} {CLDC} Security Requirements},
  booktitle    = {New Trends in Software Methodologies, Tools and Techniques - Proceedings
                  of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {147},
  pages        = {177--194},
  publisher    = {{IOS} Press},
  year         = {2006},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=2135},
  timestamp    = {Sat, 14 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/somet/DebbabiSTZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/VenkataiahgariAD06,
  author       = {Anil Kumar Venkataiahgari and
                  J. William Atwood and
                  Mourad Debbabi},
  title        = {Secure E-Commerce Transactions for Multicast Services},
  booktitle    = {Eighth {IEEE} International Conference on E-Commerce Technology {(CEC}
                  2006) / Third {IEEE} International Conference on Enterprise Computing,
                  E-Commerce and E-Services {(EEE} 2006) and Workshops, 26-29 June 2006,
                  Palo Alto, California, {USA}},
  pages        = {18},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CEC-EEE.2006.77},
  doi          = {10.1109/CEC-EEE.2006.77},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wecwis/VenkataiahgariAD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/DebbabiMTY05,
  author       = {Mourad Debbabi and
                  Azzam Mourad and
                  Chamseddine Talhi and
                  Hamdi Yahyaoui},
  title        = {Accelerating embedded Java for mobile devices},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {43},
  number       = {9},
  pages        = {80--85},
  year         = {2005},
  url          = {https://doi.org/10.1109/MCOM.2005.1509971},
  doi          = {10.1109/MCOM.2005.1509971},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/DebbabiMTY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/DebbabiGKTYZT05,
  author       = {Mourad Debbabi and
                  Abdelouahed Gherbi and
                  Lamia Ketari and
                  Chamseddine Talhi and
                  Hamdi Yahyaoui and
                  Sami Zhioua and
                  Nadia Tawbi},
  title        = {E-Bunny: {A} Dynamic Compiler for Embedded Java Virtual Machines},
  journal      = {J. Object Technol.},
  volume       = {4},
  number       = {1},
  pages        = {83--108},
  year         = {2005},
  url          = {https://doi.org/10.5381/jot.2005.4.1.a2},
  doi          = {10.5381/JOT.2005.4.1.A2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/DebbabiGKTYZT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DebbabiSTZ05,
  author       = {Mourad Debbabi and
                  Mohamed Mostafa Saleh and
                  Chamseddine Talhi and
                  Sami Zhioua},
  title        = {Java for Mobile Devices: {A} Security Study},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {235--244},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.34},
  doi          = {10.1109/CSAC.2005.34},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DebbabiSTZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/DebbabiSTZ05,
  author       = {Mourad Debbabi and
                  Mohamed Mostafa Saleh and
                  Chamseddine Talhi and
                  Sami Zhioua},
  title        = {Security Analysis of Mobile Java},
  booktitle    = {16th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2005), 22-26 August 2005, Copenhagen, Denmark},
  pages        = {231--235},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/DEXA.2005.172},
  doi          = {10.1109/DEXA.2005.172},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexaw/DebbabiSTZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/DebbabiS05,
  author       = {Mourad Debbabi and
                  Mohamed Mostafa Saleh},
  editor       = {Kung{-}Kiu Lau and
                  Richard Banach},
  title        = {Game Semantics Model for Security Protocols},
  booktitle    = {Formal Methods and Software Engineering, 7th International Conference
                  on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November
                  1-4, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3785},
  pages        = {125--140},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11576280\_10},
  doi          = {10.1007/11576280\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/DebbabiS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/DebbabiSTZ05,
  author       = {Mourad Debbabi and
                  Mohamed Mostafa Saleh and
                  Chamseddine Talhi and
                  Sami Zhioua},
  title        = {Security Analysis of Wireless Java},
  booktitle    = {Third Annual Conference on Privacy, Security and Trust, October 12-14,
                  2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada,
                  Proceedings},
  year         = {2005},
  url          = {http://www.lib.unb.ca/Texts/PST/2005/pdf/debbabi.pdf},
  timestamp    = {Sat, 14 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/DebbabiSTZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/DebbabiMT05,
  author       = {Mourad Debbabi and
                  Azzam Mourad and
                  Nadia Tawbi},
  editor       = {Hisham Haddad and
                  Lorie M. Liebrock and
                  Andrea Omicini and
                  Roger L. Wainwright},
  title        = {Armed E-Bunny: a selective dynamic compiler for embedded Java virtual
                  machine targeting {ARM} processors},
  booktitle    = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
                  Santa Fe, New Mexico, USA, March 13-17, 2005},
  pages        = {874--878},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1066677.1066876},
  doi          = {10.1145/1066677.1066876},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/DebbabiMT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/DebbabiR04,
  author       = {Mourad Debbabi and
                  Mahfuzur Rahman},
  title        = {The war of presence and instant messaging: right protocols and APIs},
  booktitle    = {1st {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2004, Las Vegas, NV, USA, January 5-8, 2004},
  pages        = {341--346},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/CCNC.2004.1286884},
  doi          = {10.1109/CCNC.2004.1286884},
  timestamp    = {Fri, 26 Jun 2020 14:31:37 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/DebbabiR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pppj/DebbabiGKTTYZ04,
  author       = {Mourad Debbabi and
                  Abdelouahed Gherbi and
                  Lamia Ketari and
                  Chamseddine Talhi and
                  Nadia Tawbi and
                  Hamdi Yahyaoui and
                  Sami Zhioua},
  editor       = {John Waldron},
  title        = {A dynamic compiler for embedded Java virtual machines},
  booktitle    = {Proceedings of the 3rd International Symposium on Principles and Practice
                  of Programming in Java, {PPPJ} 2004, Las Vegas, Nevada, USA, June
                  16-18, 2004},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {91},
  pages        = {100--106},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://dl.acm.org/citation.cfm?id=1071584},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pppj/DebbabiGKTTYZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pppj/DebbabiGKTYZ04,
  author       = {Mourad Debbabi and
                  Abdelouahed Gherbi and
                  Lamia Ketari and
                  Chamseddine Talhi and
                  Hamdi Yahyaoui and
                  Sami Zhioua},
  editor       = {John Waldron},
  title        = {a synergy between efficient interpretation and fast selective dynamic
                  compilation for the acceleration of embedded Java virtual machines},
  booktitle    = {Proceedings of the 3rd International Symposium on Principles and Practice
                  of Programming in Java, {PPPJ} 2004, Las Vegas, Nevada, USA, June
                  16-18, 2004},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {91},
  pages        = {107--113},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://dl.acm.org/citation.cfm?id=1071585},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pppj/DebbabiGKTYZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/DebbabiDMM03,
  author       = {Mourad Debbabi and
                  Nancy A. Durgin and
                  Mohamed Mejri and
                  John C. Mitchell},
  title        = {Security by typing},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {4},
  number       = {4},
  pages        = {472--495},
  year         = {2003},
  url          = {https://doi.org/10.1007/s10009-002-0100-7},
  doi          = {10.1007/S10009-002-0100-7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/DebbabiDMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AdiDM03,
  author       = {Kamel Adi and
                  Mourad Debbabi and
                  Mohamed Mejri},
  title        = {A new logic for electronic commerce protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {291},
  number       = {3},
  pages        = {223--283},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0304-3975(02)00364-X},
  doi          = {10.1016/S0304-3975(02)00364-X},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/AdiDM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/DebbabiEKTYZ03,
  author       = {Mourad Debbabi and
                  M. M. Erhioui and
                  Lamia Ketari and
                  Nadia Tawbi and
                  Hamdi Yahyaoui and
                  Sami Zhioua},
  editor       = {Peter M. A. Sloot and
                  David Abramson and
                  Alexander V. Bogdanov and
                  Jack J. Dongarra and
                  Albert Y. Zomaya and
                  Yuri E. Gorbachev},
  title        = {Method Call Acceleration in Embedded Java Virtual Machines},
  booktitle    = {Computational Science - {ICCS} 2003, International Conference, Melbourne,
                  Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2659},
  pages        = {750--759},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44863-2\_73},
  doi          = {10.1007/3-540-44863-2\_73},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/DebbabiEKTYZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfps/DebbabiM03,
  author       = {Mourad Debbabi and
                  Mohamed Mejri},
  editor       = {Stephen D. Brookes and
                  Prakash Panangaden},
  title        = {Towards the Correctness of Security Protocols},
  booktitle    = {Proceedings of 19th Conference on the Mathematical Foundations of
                  Programming Semantics, {MFPS} 2003, Universit{\'{e}} de Montr{\'{e}}al,
                  QC, Canada, March 19-22, 2003},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {83},
  pages        = {55--98},
  publisher    = {Elsevier},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1571-0661(03)50004-4},
  doi          = {10.1016/S1571-0661(03)50004-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mfps/DebbabiM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fasec/DebbabiDFMPT02,
  author       = {Mourad Debbabi and
                  Jos{\'{e}}e Desharnais and
                  M. Fourati and
                  E. Menif and
                  Fr{\'{e}}d{\'{e}}ric Painchaud and
                  Nadia Tawbi},
  editor       = {Ali E. Abdallah and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Secure Self-certified Code for Java},
  booktitle    = {Formal Aspects of Security, First International Conference, FASec
                  2002, London, UK, December 16-18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2629},
  pages        = {133--151},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-40981-6\_12},
  doi          = {10.1007/978-3-540-40981-6\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fasec/DebbabiDFMPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AdiD01,
  author       = {Kamel Adi and
                  Mourad Debbabi},
  editor       = {Jean Goubault{-}Larrecq},
  title        = {Abstract interpretation for proving secrecy properties in security
                  protocols},
  booktitle    = {Logical Aspects of Cryptographic Protocol Verification, {LACPV} 2001,
                  in connection with {CAV} 2001, Paris, France, July 23, 2001},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {55},
  number       = {1},
  pages        = {25--50},
  publisher    = {Elsevier},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0661(04)00243-9},
  doi          = {10.1016/S1571-0661(04)00243-9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/AdiD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/DoyonD00,
  author       = {Stephane Doyon and
                  Mourad Debbabi},
  title        = {On object initialization in the Java bytecode},
  journal      = {Comput. Commun.},
  volume       = {23},
  number       = {17},
  pages        = {1594--1605},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0140-3664(00)00245-0},
  doi          = {10.1016/S0140-3664(00)00245-0},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/DoyonD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/AdiDM00,
  author       = {Kamel Adi and
                  Mourad Debbabi and
                  Mohamed Mejri},
  editor       = {Teodor Rus},
  title        = {A New Logic for Electronic Commerce Protocols},
  booktitle    = {Algebraic Methodology and Software Technology. 8th International Conference,
                  {AMAST} 2000, Iowa City, Iowa, USA, May 20-27, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1816},
  pages        = {499--513},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45499-3\_35},
  doi          = {10.1007/3-540-45499-3\_35},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amast/AdiDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lmo/DebbabiF00,
  author       = {Mourad Debbabi and
                  M. Fourati},
  editor       = {Christophe Dony and
                  Houari A. Sahraoui},
  title        = {Sur la s{\'{e}}mantique statique de Java},
  booktitle    = {Actes des journ{\'{e}}es Langages et Mod{\`{e}}les {\`{a}} Objets,
                  LMO'2000. Mont Saint-Hilaire, Qu{\'{e}}bec, Canada, 25-28 janvier},
  pages        = {167--182},
  publisher    = {Herm{\`{e}}s},
  year         = {2000},
  timestamp    = {Thu, 05 Jul 2018 08:01:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lmo/DebbabiF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/DoyonD00,
  author       = {Stephane Doyon and
                  Mourad Debbabi},
  editor       = {Barrett R. Bryant and
                  Janice H. Carroll and
                  Ernesto Damiani and
                  Hisham Haddad and
                  Dave Oppenheim},
  title        = {Verifying Object Initialization in the Java Bytecode Language},
  booktitle    = {Applied Computing 2000, Proceedings of the 2000 {ACM} Symposium on
                  Applied Computing, Villa Olmo, Via Cantoni 1, 22100 Como, Italy, March
                  19-21, 2000. Volume 2},
  pages        = {821--830},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/338407.338573},
  doi          = {10.1145/338407.338573},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/DoyonD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/DebbabiGKMT00,
  author       = {Mourad Debbabi and
                  E. Giasson and
                  B{\'{e}}chir Ktari and
                  Fr{\'{e}}d{\'{e}}ric Michaud and
                  Nadia Tawbi},
  title        = {Secure Self-Certified {COTS}},
  booktitle    = {9th {IEEE} International Workshops on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises {(WETICE} 2000), 4-16 June 2000, Gaithersburg,
                  MD, {USA}},
  pages        = {183--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ENABL.2000.883726},
  doi          = {10.1109/ENABL.2000.883726},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wetice/DebbabiGKMT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/PainchaudD00,
  author       = {Fr{\'{e}}d{\'{e}}ric Painchaud and
                  Mourad Debbabi},
  title        = {On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier},
  booktitle    = {9th {IEEE} International Workshops on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises {(WETICE} 2000), 4-16 June 2000, Gaithersburg,
                  MD, {USA}},
  pages        = {189--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ENABL.2000.883727},
  doi          = {10.1109/ENABL.2000.883727},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wetice/PainchaudD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/Al-SalqanSWD99,
  author       = {Yahya Y. Al{-}Salqan and
                  Nahid Shahmehri and
                  Wu Wen and
                  Mourad Debbabi},
  title        = {Final Summary Report on Enterprise Security},
  booktitle    = {8th Workshop on Enabling Technologies {(WETICE} '99), Infrastructure
                  for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA,
                  Proceedings},
  pages        = {134},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ENABL.1999.805188},
  doi          = {10.1109/ENABL.1999.805188},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wetice/Al-SalqanSWD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/BergeronDEK99,
  author       = {J. Bergeron and
                  Mourad Debbabi and
                  M. M. Erhioui and
                  B{\'{e}}chir Ktari},
  title        = {Static Analysis of Binary Code to Isolate Malicious Behaviors},
  booktitle    = {8th Workshop on Enabling Technologies {(WETICE} '99), Infrastructure
                  for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA,
                  Proceedings},
  pages        = {184--189},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ENABL.1999.805197},
  doi          = {10.1109/ENABL.1999.805197},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wetice/BergeronDEK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DebbabiLM98,
  author       = {Mourad Debbabi and
                  Y. Legar{\'{e}} and
                  Mohamed Mejri},
  title        = {An Environment for the Specification and Analysis of Cryptoprotocols},
  booktitle    = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
                  7-11 December 1998, Scottsdale, AZ, {USA}},
  pages        = {321--332},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSAC.1998.738652},
  doi          = {10.1109/CSAC.1998.738652},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DebbabiLM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/DebbabiBK98,
  author       = {Mourad Debbabi and
                  Abdelkader Benzakour and
                  B{\'{e}}chir Ktari},
  editor       = {Armando Martin Haeberer},
  title        = {A Synergy Between Model-Checking and Type Inference for the Verification
                  of Value-Passing Higher-Order Processes},
  booktitle    = {Algebraic Methodology and Software Technology, 7th International Conference,
                  {AMAST} '98, Amazonia, Brasil, January 4-8, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1548},
  pages        = {214--230},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49253-4\_17},
  doi          = {10.1007/3-540-49253-4\_17},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amast/DebbabiBK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jflp/DebbabiAF97,
  author       = {Mourad Debbabi and
                  Zahia A{\"{\i}}doud and
                  Ali Faour},
  title        = {On the Inference od Structured Recursive Effects with Subtyping},
  journal      = {J. Funct. Log. Program.},
  volume       = {1997},
  number       = {5},
  year         = {1997},
  url          = {http://danae.uni-muenster.de/lehre/kuchen/JFLP/articles/1997/A97-05/A97-05.html},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jflp/DebbabiAF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/Debbabi97,
  author       = {Mourad Debbabi},
  title        = {A Model-Based Concurrent Specification Language Over {CML:} Semantic
                  Foundations},
  journal      = {Parallel Process. Lett.},
  volume       = {7},
  number       = {3},
  pages        = {329--356},
  year         = {1997},
  url          = {https://doi.org/10.1142/S0129626497000346},
  doi          = {10.1142/S0129626497000346},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppl/Debbabi97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/DebbabiMTY97,
  author       = {Mourad Debbabi and
                  Mohamed Mejri and
                  Nadia Tawbi and
                  I. Yahmadi},
  title        = {Formal Automatic Verification of Authentication Crytographic Protocols},
  booktitle    = {First {IEEE} International Conference on Formal Engineering Methods,
                  {ICFEM} 1997, Hiroshima, Japan, November 12-14, 1997, Proceedings},
  pages        = {50--59},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ICFEM.1997.630399},
  doi          = {10.1109/ICFEM.1997.630399},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfem/DebbabiMTY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/DebbabiMTY97,
  author       = {Mourad Debbabi and
                  Mohamed Mejri and
                  Nadia Tawbi and
                  I. Yahmadi},
  title        = {From Protocol Specifications to Flaws and Attack Scenarios: An Automatic
                  and Formal Algorithm},
  booktitle    = {6th Workshop on Enabling Technologies {(WET-ICE} '97), Infrastructure
                  for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA,
                  USA, Proceedings},
  pages        = {256--262},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ENABL.1997.630823},
  doi          = {10.1109/ENABL.1997.630823},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/DebbabiMTY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifl/DebbabiFT96,
  author       = {Mourad Debbabi and
                  Ali Faour and
                  Nadia Tawbi},
  editor       = {Werner E. Kluge},
  title        = {A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order
                  Concurrent Programs},
  booktitle    = {Implementation of Functional Languages, 8th International Workshop,
                  IFL'96, Bad Godesberg, Germany, September 16-18, 1996, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1268},
  pages        = {247--266},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-63237-9\_29},
  doi          = {10.1007/3-540-63237-9\_29},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifl/DebbabiFT96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/Debbabi95,
  author       = {Mourad Debbabi},
  editor       = {Hamid R. Arabnia},
  title        = {A Concurrent, Specification Language over {CML}},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 1995, November 3-4,
                  1995, Georgia, {USA}},
  pages        = {541--550},
  publisher    = {{CSREA} Press},
  year         = {1995},
  timestamp    = {Mon, 09 Nov 2009 13:57:16 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/Debbabi95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/BolignanoD94,
  author       = {Dominique Bolignano and
                  Mourad Debbabi},
  editor       = {Masami Hagiya and
                  John C. Mitchell},
  title        = {A Semantic Theory for Concurrent {ML}},
  booktitle    = {Theoretical Aspects of Computer Software, International Conference
                  {TACS} '94, Sendai, Japan, April 19-22, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {789},
  pages        = {766--785},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-57887-0\_124},
  doi          = {10.1007/3-540-57887-0\_124},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/BolignanoD94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/BolignanoD93,
  author       = {Dominique Bolignano and
                  Mourad Debbabi},
  editor       = {Maurice Nivat and
                  Charles Rattray and
                  Teodor Rus and
                  Giuseppe Scollo},
  title        = {A Coherent Type System for a Concurrent, Functional and Imperative
                  Programming Language},
  booktitle    = {Algebraic Methodology and Software Technology {(AMAST} '93), Proceedings
                  of the Third International Conference on Methodology and Software
                  Technology, University of Twente, Enschede, The Netherlands, 21-25
                  June, 1993},
  series       = {Workshops in Computing},
  pages        = {153--162},
  publisher    = {Springer},
  year         = {1993},
  timestamp    = {Tue, 18 Feb 2003 11:00:12 +0100},
  biburl       = {https://dblp.org/rec/conf/amast/BolignanoD93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icci/BolignanoD93,
  author       = {Dominique Bolignano and
                  Mourad Debbabi},
  editor       = {Osman Abou{-}Rabia and
                  Carl K. Chang and
                  Waldemar W. Koczkodaj},
  title        = {A Denotational Model for the Integration of Concurrent, Functional,
                  and Imperative Programming},
  booktitle    = {Computing and Information - ICCI'93, Fifth International Conference
                  on Computing and Information, Sudbury, Ontario, Canada, May 27-29,
                  1993, Proceedings},
  pages        = {244--250},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  timestamp    = {Thu, 21 Mar 2002 14:11:16 +0100},
  biburl       = {https://dblp.org/rec/conf/icci/BolignanoD93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/BolignanoD92,
  author       = {Dominique Bolignano and
                  Mourad Debbabi},
  editor       = {Toshihide Ibaraki and
                  Yasuyoshi Inagaki and
                  Kazuo Iwama and
                  Takao Nishizeki and
                  Masafumi Yamashita},
  title        = {Higher Order Communication Processes with Value-Passing, Assignment
                  and Return of Results},
  booktitle    = {Algorithms and Computation, Third International Symposium, {ISAAC}
                  '92, Nagoya, Japan, December 16-18, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {650},
  pages        = {319--331},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-56279-6\_85},
  doi          = {10.1007/3-540-56279-6\_85},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/BolignanoD92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}