default search action
BibTeX records: Mourad Debbabi
@article{DBLP:journals/tdsc/OqailyKMJZPWD24, author = {Momen Oqaily and Mohammad Ekramul Kabir and Suryadipta Majumdar and Yosr Jarraya and Mengyuan Zhang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {2799--2817}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3317806}, doi = {10.1109/TDSC.2023.3317806}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OqailyKMJZPWD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/EbtiaRDKGMS24, author = {Afshin Ebtia and Dhiaa Elhak Rebbah and Mourad Debbabi and Marthe Kassouf and Mohsen Ghafouri and Arash Mohammadi and Andrei Soeanu}, title = {Spatial-Temporal Data-Driven Model for Load Altering Attack Detection in Smart Power Distribution Networks}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {20}, number = {5}, pages = {7414--7427}, year = {2024}, url = {https://doi.org/10.1109/TII.2024.3359451}, doi = {10.1109/TII.2024.3359451}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/EbtiaRDKGMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tim/DumanTWD24, author = {Onur Duman and Azadeh Tabiban and Lingyu Wang and Mourad Debbabi}, title = {Measuring and Improving the Security Posture of {IEC} 61850 Substations Against Supply Chain Attacks}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {73}, pages = {1--20}, year = {2024}, url = {https://doi.org/10.1109/TIM.2024.3400328}, doi = {10.1109/TIM.2024.3400328}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tim/DumanTWD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/SarieddineSTAJA24, author = {Khaled Sarieddine and Mohammad Ali Sayed and Sadegh Torabi and Ribal Attallah and Danial Jafarigiv and Chadi Assi and Mourad Debbabi}, editor = {Jianying Zhou and Tony Q. S. Quek and Debin Gao and Alvaro A. C{\'{a}}rdenas}, title = {Uncovering Covert Attacks on {EV} Charging Infrastructure: How {OCPP} Backend Vulnerabilities Could Compromise Your System}, booktitle = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3634737.3644999}, doi = {10.1145/3634737.3644999}, timestamp = {Fri, 16 Aug 2024 09:08:03 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/SarieddineSTAJA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BenahmedQLD24, author = {Sofiane Benahmed and Abdullah Qasem and Anis Lounis and Mourad Debbabi}, editor = {Federico Maggi and Manuel Egele and Mathias Payer and Michele Carminati}, title = {Modularizing Directed Greybox Fuzzing for Binaries over Multiple {CPU} Architectures}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14828}, pages = {84--103}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-64171-8\_5}, doi = {10.1007/978-3-031-64171-8\_5}, timestamp = {Sat, 20 Jul 2024 14:18:50 +0200}, biburl = {https://dblp.org/rec/conf/dimva/BenahmedQLD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/LounisADH24, author = {Anis Lounis and Anthony Andreoli and Mourad Debbabi and Aiman Hanna}, editor = {Federico Maggi and Manuel Egele and Mathias Payer and Michele Carminati}, title = {Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence Semantics}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14828}, pages = {395--415}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-64171-8\_21}, doi = {10.1007/978-3-031-64171-8\_21}, timestamp = {Sat, 20 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/LounisADH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DumanZWD24, author = {Onur Duman and Mengyuan Zhang and Lingyu Wang and Mourad Debbabi}, editor = {Federico Maggi and Manuel Egele and Mathias Payer and Michele Carminati}, title = {SecMonS: {A} Security Monitoring Framework for {IEC} 61850 Substations Based on Configuration Files and Logs}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14828}, pages = {483--502}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-64171-8\_25}, doi = {10.1007/978-3-031-64171-8\_25}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DumanZWD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OqailyPJ0NPD24, author = {Momen Oqaily and Hinddeep Purohit and Yosr Jarraya and Lingyu Wang and Boubakr Nour and Makan Pourzandi and Mourad Debbabi}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/oqaily}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/OqailyPJ0NPD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RacheracheSSD23, author = {Badis Racherache and Paria Shirani and Andrei Soeanu and Mourad Debbabi}, title = {{CPID:} Insider threat detection using profiling and cyber-persona identification}, journal = {Comput. Secur.}, volume = {132}, pages = {103350}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103350}, doi = {10.1016/J.COSE.2023.103350}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RacheracheSSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/VahidiGAKMD23, author = {Saghar Vahidi and Mohsen Ghafouri and Minh Au and Marthe Kassouf and Arash Mohammadi and Mourad Debbabi}, title = {Security of Wide-Area Monitoring, Protection, and Control {(WAMPAC)} Systems of the Smart Grid: {A} Survey on Challenges and Opportunities}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {25}, number = {2}, pages = {1294--1335}, year = {2023}, url = {https://doi.org/10.1109/COMST.2023.3251899}, doi = {10.1109/COMST.2023.3251899}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/VahidiGAKMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/NourPD23, author = {Boubakr Nour and Makan Pourzandi and Mourad Debbabi}, title = {A Survey on Threat Hunting in Enterprise Networks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {25}, number = {4}, pages = {2299--2324}, year = {2023}, url = {https://doi.org/10.1109/COMST.2023.3299519}, doi = {10.1109/COMST.2023.3299519}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/NourPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AlrabaeeDW23, author = {Saed Alrabaee and Mourad Debbabi and Lingyu Wang}, title = {A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {2}, pages = {19:1--19:41}, year = {2023}, url = {https://doi.org/10.1145/3486860}, doi = {10.1145/3486860}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/AlrabaeeDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AndreoliLDH23, author = {Anthony Andreoli and Anis Lounis and Mourad Debbabi and Aiman Hanna}, title = {On the prevalence of software supply chain attacks: Empirical study and investigative framework}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301508}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301508}, doi = {10.1016/J.FSIDI.2023.301508}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AndreoliLDH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/KarbabDD23, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab}, title = {SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features}, journal = {Expert Syst. Appl.}, volume = {225}, pages = {120017}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.120017}, doi = {10.1016/J.ESWA.2023.120017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/KarbabDD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SarieddineSJADA23, author = {Khaled Sarieddine and Mohammad Ali Sayed and Danial Jafarigiv and Ribal Atallah and Mourad Debbabi and Chadi Assi}, title = {A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {74--83}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3247374}, doi = {10.1109/MSEC.2023.3247374}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SarieddineSJADA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/KaranfilRDKGYH23, author = {Mark Karanfil and Dhiaa Elhak Rebbah and Mourad Debbabi and Marthe Kassouf and Mohsen Ghafouri and El{-}Nasser S. Youssef and Aiman Hanna}, title = {Detection of Microgrid Cyberattacks Using Network and System Management}, journal = {{IEEE} Trans. Smart Grid}, volume = {14}, number = {3}, pages = {2390--2405}, year = {2023}, url = {https://doi.org/10.1109/TSG.2022.3218934}, doi = {10.1109/TSG.2022.3218934}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/KaranfilRDKGYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/QasemDLK23, author = {Abdullah Qasem and Mourad Debbabi and Bernard Lebel and Marthe Kassouf}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {443--456}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3582818}, doi = {10.1145/3579856.3582818}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/QasemDLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/OqailyM0KJAPD23, author = {Momen Oqaily and Suryadipta Majumdar and Lingyu Wang and Mohammad Ekramul Kabir and Yosr Jarraya and A. S. M. Asadujjaman and Makan Pourzandi and Mourad Debbabi}, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds}, booktitle = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, pages = {79--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923.3583643}, doi = {10.1145/3577923.3583643}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/OqailyM0KJAPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HoqYMSWBPD23, author = {Md. Nazmul Hoq and Jia Wei Yao and Suryadipta Majumdar and Luis Su{\'{a}}rez and Lingyu Wang and Amine Boukhtouta and Makan Pourzandi and Mourad Debbabi}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {123--144}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_7}, doi = {10.1007/978-3-031-51476-0\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HoqYMSWBPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/NourPQD23, author = {Boubakr Nour and Makan Pourzandi and Rushaan Kamran Qureshi and Mourad Debbabi}, editor = {Mohamed Mosbah and Florence S{\`{e}}des and Nadia Tawbi and Toufik Ahmed and Nora Boulahia{-}Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting}, booktitle = {Foundations and Practice of Security - 16th International Symposium, {FPS} 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14552}, pages = {52--69}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-57540-2\_5}, doi = {10.1007/978-3-031-57540-2\_5}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/NourPQD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/ChenYDDK23, author = {Juanwei Chen and Jun Yan and Hang Du and Mourad Debbabi and Marthe Kassouf}, title = {Vulnerability Analysis of Virtual Power Plant Voltage Support under Denial-of-Service Attacks}, booktitle = {{IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2023, Washington, DC, USA, January 16-19, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISGT51731.2023.10066361}, doi = {10.1109/ISGT51731.2023.10066361}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isgt/ChenYDDK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/RahiminejadDGAMD23, author = {Abolfazl Rahiminejad and Onur Duman and Mohsen Ghafouri and Ribal Atallah and Arash Mohammadi and Mourad Debbabi}, title = {A Resilience Quantitative Framework for Wide Area Damping Control Against Cyberattacks}, booktitle = {{IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2023, Washington, DC, USA, January 16-19, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISGT51731.2023.10066437}, doi = {10.1109/ISGT51731.2023.10066437}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isgt/RahiminejadDGAMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/EbtiaRQGJDM23, author = {Afshin Ebtia and Dhiaa Elhak Rebbah and Abdullah Qasem and Mohsen Ghafouri and Danial Jafarigiv and Mourad Debbabi and Arash Mohammadi}, title = {Detection of Cyber Attacks on Synchro-Phasor Network Targeting Topology Detection Application of Power Distribution Grids}, booktitle = {{IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm IEEE, Glasgow, United Kingdom, October 31 - November 3, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SmartGridComm57358.2023.10333907}, doi = {10.1109/SMARTGRIDCOMM57358.2023.10333907}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/EbtiaRQGJDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vecos/OuchaniMD23, author = {Samir Ouchani and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi}, editor = {Belgacem Ben Hedia and Yassine Maleh and Moez Krichen}, title = {An Enhanced Interface-Based Probabilistic Compositional Verification Approach}, booktitle = {Verification and Evaluation of Computer and Communication Systems - 16th International Conference, VECoS 2023, Marrakech, Morocco, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14368}, pages = {60--75}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49737-7\_5}, doi = {10.1007/978-3-031-49737-7\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vecos/OuchaniMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-12781, author = {Khaled Sarieddine and Mohammad Ali Sayed and Danial Jafarigiv and Ribal Atallah and Mourad Debbabi and Chadi Assi}, title = {A Real-Time Co-simulation Testbed for {EV} Charging and Smart Grid Security}, journal = {CoRR}, volume = {abs/2302.12781}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.12781}, doi = {10.48550/ARXIV.2302.12781}, eprinttype = {arXiv}, eprint = {2302.12781}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-12781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-07526, author = {Mohammad Ali Sayed and Mohsen Ghafouri and Ribal Atallah and Mourad Debbabi and Chadi Assi}, title = {Protecting the Future Grid: An Electric Vehicle Robust Mitigation Scheme Against Load Altering Attacks on Power Grids}, journal = {CoRR}, volume = {abs/2308.07526}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.07526}, doi = {10.48550/ARXIV.2308.07526}, eprinttype = {arXiv}, eprint = {2308.07526}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-07526.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-14471, author = {Mohammad Ali Sayed and Mohsen Ghafouri and Ribal Atallah and Mourad Debbabi and Chadi Assi}, title = {An Electric Vehicle Control Strategy to Mitigate Load Altering Attacks Against Power Grids}, journal = {CoRR}, volume = {abs/2310.14471}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.14471}, doi = {10.48550/ARXIV.2310.14471}, eprinttype = {arXiv}, eprint = {2310.14471}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-14471.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChohraSKD22, author = {Aniss Chohra and Paria Shirani and ElMouatez Billah Karbab and Mourad Debbabi}, title = {Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection}, journal = {Comput. Secur.}, volume = {117}, pages = {102684}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102684}, doi = {10.1016/J.COSE.2022.102684}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChohraSKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/QasemSDWLA21, author = {Abdullah Qasem and Paria Shirani and Mourad Debbabi and Lingyu Wang and Bernard Lebel and Basile L. Agba}, title = {Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {2}, pages = {25:1--25:42}, year = {2022}, url = {https://doi.org/10.1145/3432893}, doi = {10.1145/3432893}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/QasemSDWLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TorabiBAKBD22, author = {Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and ElMouatez Billah Karbab and Amine Boukhtouta and Mourad Debbabi}, title = {Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {402--418}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2979183}, doi = {10.1109/TDSC.2020.2979183}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/TorabiBAKBD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DumanZWDAL22, author = {Onur Duman and Mengyuan Zhang and Lingyu Wang and Mourad Debbabi and Ribal F. Atallah and Bernard Lebel}, title = {Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {1018--1035}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3009931}, doi = {10.1109/TDSC.2020.3009931}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DumanZWDAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MajumdarCAMJP0D22, author = {Suryadipta Majumdar and Gagandeep Singh Chawla and Amir Alimohammadifar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {ProSAS: Proactive Security Auditing System for Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2517--2534}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3062204}, doi = {10.1109/TDSC.2021.3062204}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MajumdarCAMJP0D22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/AlbarakatiRKKDY22, author = {Abdullah Albarakati and Chantale Robillard and Mark Karanfil and Marthe Kassouf and Mourad Debbabi and Amr M. Youssef and Mohsen Ghafouri and Rachid Hadjidj}, title = {Security Monitoring of {IEC} 61850 Substations Using {IEC} 62351-7 Network and System Management}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {3}, pages = {1641--1653}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3082079}, doi = {10.1109/TII.2021.3082079}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/AlbarakatiRKKDY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/Duman0AKD22, author = {Onur Duman and Lingyu Wang and Minh Au and Marthe Kassouf and Mourad Debbabi}, title = {Hardening Substations against Supply Chain Attacks Under Operational Constraints}, booktitle = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISGT50606.2022.9817488}, doi = {10.1109/ISGT50606.2022.9817488}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isgt/Duman0AKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/KaranfilRGKDH22, author = {Mark Karanfil and Dhiaa Elhak Rebbah and Mohsen Ghafouri and Marthe Kassouf and Mourad Debbabi and Aiman Hanna}, title = {Security Monitoring of the Microgrid Using {IEC} 62351-7 Network and System Management}, booktitle = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISGT50606.2022.9817482}, doi = {10.1109/ISGT50606.2022.9817482}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isgt/KaranfilRGKDH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/RahiminejadGA0D22, author = {Abolfazl Rahiminejad and Mohsen Ghafouri and Ribal Atallah and Arash Mohammadi and Mourad Debbabi}, title = {A Cyber-Physical Resilience-Based Survivability Metric against Topological Cyberattacks}, booktitle = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISGT50606.2022.9817513}, doi = {10.1109/ISGT50606.2022.9817513}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isgt/RahiminejadGA0D22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/RebbahEGKAD022, author = {Dhiaa Elhak Rebbah and Afshin Ebtia and Mohsen Ghafouri and Marthe Kassouf and Ribal Atallah and Mourad Debbabi and Arash Mohammadi}, title = {Real-Time Co-simulation Platform for Security Analysis of Distribution Automation Systems}, booktitle = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISGT50606.2022.9817549}, doi = {10.1109/ISGT50606.2022.9817549}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isgt/RebbahEGKAD022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/DuYGZD22, author = {Hang Du and Jun Yan and Mohsen Ghafouri and Rawad Zgheib and Mourad Debbabi}, title = {Online Attack-aware Risk Management for PMSG-based Wind Farm Depending on System Strength Evaluation}, booktitle = {{IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2022, Singapore, October 25-28, 2022}, pages = {218--223}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SmartGridComm52983.2022.9961011}, doi = {10.1109/SMARTGRIDCOMM52983.2022.9961011}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/DuYGZD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-13046, author = {Meisam Mohammady and Han Wang and Lingyu Wang and Mengyuan Zhang and Yosr Jarraya and Suryadipta Majumdar and Makan Pourzandi and Mourad Debbabi and Yuan Hong}, title = {{DPOAD:} Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning}, journal = {CoRR}, volume = {abs/2206.13046}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.13046}, doi = {10.48550/ARXIV.2206.13046}, eprinttype = {arXiv}, eprint = {2206.13046}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-13046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-10129, author = {Mohammad Ali Sayed and Mohsen Ghafouri and Mourad Debbabi and Chadi Assi}, title = {Dynamic Load Altering {EV} Attacks Against Power Grid Frequency Control}, journal = {CoRR}, volume = {abs/2207.10129}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.10129}, doi = {10.48550/ARXIV.2207.10129}, eprinttype = {arXiv}, eprint = {2207.10129}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-10129.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/KarbabDDM21, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, title = {Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence}, series = {Advances in Information Security}, volume = {86}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-74664-3}, doi = {10.1007/978-3-030-74664-3}, isbn = {978-3-030-74663-6}, timestamp = {Mon, 19 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KarbabDDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/TorabiDBAD21, author = {Sadegh Torabi and Mirabelle Dib and Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships}, journal = {{IEEE} Netw. Lett.}, volume = {3}, number = {3}, pages = {161--165}, year = {2021}, url = {https://doi.org/10.1109/lnet.2021.3076600}, doi = {10.1109/LNET.2021.3076600}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeenl/TorabiDBAD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChawlaZMJPWD21, author = {Gagandeep Singh Chawla and Mengyuan Zhang and Suryadipta Majumdar and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to {NFV}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1553--1567}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.3041430}, doi = {10.1109/TDSC.2020.3041430}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChawlaZMJPWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OqailyJMMPWD21, author = {Momen Oqaily and Yosr Jarraya and Meisam Mohammady and Suryadipta Majumdar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2486--2505}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2957488}, doi = {10.1109/TDSC.2019.2957488}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OqailyJMMPWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CabanaYDLKAA21, author = {Olivier Cabana and Amr M. Youssef and Mourad Debbabi and Bernard Lebel and Marthe Kassouf and Ribal Atallah and Basile L. Agba}, title = {Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {3355--3370}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3078261}, doi = {10.1109/TIFS.2021.3078261}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CabanaYDLKAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MohammadyOWHLPD21, author = {Meisam Mohammady and Momen Oqaily and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi}, title = {A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {14:1--14:36}, year = {2021}, url = {https://doi.org/10.1145/3439732}, doi = {10.1145/3439732}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MohammadyOWHLPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AsadujjamanOJMP21, author = {A. S. M. Asadujjaman and Momen Oqaily and Yosr Jarraya and Suryadipta Majumdar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Artificial Packet-Pair Dispersion {(APPD):} {A} Blackbox Approach to Verifying the Integrity of {NFV} Service Chains}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {245--253}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705020}, doi = {10.1109/CNS53000.2021.9705020}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AsadujjamanOJMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KarbabD21, author = {ElMouatez Billah Karbab and Mourad Debbabi}, editor = {Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves}, title = {PetaDroid: Adaptive Android Malware Detection Using Deep Learning}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, {DIMVA} 2021, Virtual Event, July 14-16, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12756}, pages = {319--340}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80825-9\_16}, doi = {10.1007/978-3-030-80825-9\_16}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/KarbabD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/DuYGZKD21, author = {Hang Du and Jun Yan and Mohsen Ghafouri and Rawad Zgheib and Marthe Kassouf and Mourad Debbabi}, title = {Modeling of Cyber Attacks Against Converter-Driven Stability of PMSG-Based Wind Farms with Intentional Subsynchronous Resonance}, booktitle = {{IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2021, Aachen, Germany, October 25-28, 2021}, pages = {391--397}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SmartGridComm51999.2021.9632318}, doi = {10.1109/SMARTGRIDCOMM51999.2021.9632318}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/DuYGZKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13491, author = {ElMouatez Billah Karbab and Mourad Debbabi}, title = {Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and {NLP} Techniques}, journal = {CoRR}, volume = {abs/2105.13491}, year = {2021}, url = {https://arxiv.org/abs/2105.13491}, eprinttype = {arXiv}, eprint = {2105.13491}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13491.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-11317, author = {Mohammad Ali Sayed and Ribal Atallah and Chadi Assi and Mourad Debbabi}, title = {Electric Vehicle Attack Impact on Power Grid Operation}, journal = {CoRR}, volume = {abs/2111.11317}, year = {2021}, url = {https://arxiv.org/abs/2111.11317}, eprinttype = {arXiv}, eprint = {2111.11317}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-11317.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/AlrabaeeDSWYRNMHH20, author = {Saed Alrabaee and Mourad Debbabi and Paria Shirani and Lingyu Wang and Amr M. Youssef and Ashkan Rahimian and Lina Nouh and Djedjiga Mouheb and He Huang and Aiman Hanna}, title = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting}, series = {Advances in Information Security}, volume = {78}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-34238-8}, doi = {10.1007/978-3-030-34238-8}, isbn = {978-3-030-34237-1}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/AlrabaeeDSWYRNMHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KarbabDDM20, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, title = {Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning}, journal = {Comput. Secur.}, volume = {96}, pages = {101932}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101932}, doi = {10.1016/J.COSE.2020.101932}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KarbabDDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KarbabDDM20a, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, title = {Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning}, journal = {Comput. Secur.}, volume = {97}, pages = {101965}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101965}, doi = {10.1016/J.COSE.2020.101965}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KarbabDDM20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TorabiBAD20, author = {Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300922}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300922}, doi = {10.1016/J.FSIDI.2020.300922}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TorabiBAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/SoeanuRBBD20, author = {Andrei Soeanu and Sujoy Ray and Jean Berger and Abdeslem Boukhtouta and Mourad Debbabi}, title = {Multi-depot vehicle routing problem with risk mitigation: Model and solution algorithm}, journal = {Expert Syst. Appl.}, volume = {145}, pages = {113099}, year = {2020}, url = {https://doi.org/10.1016/j.eswa.2019.113099}, doi = {10.1016/J.ESWA.2019.113099}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/SoeanuRBBD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/PourTBAD20, author = {Morteza Safaei Pour and Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities}, journal = {{IEEE} Netw. Lett.}, volume = {2}, number = {3}, pages = {159--163}, year = {2020}, url = {https://doi.org/10.1109/lnet.2020.2998045}, doi = {10.1109/LNET.2020.2998045}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeenl/PourTBAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlrabaeeDW20, author = {Saed Alrabaee and Mourad Debbabi and Lingyu Wang}, title = {{CPA:} Accurate Cross-Platform Binary Authorship Characterization Using {LDA}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3051--3066}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980190}, doi = {10.1109/TIFS.2020.2980190}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlrabaeeDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/MoussaKHDA20, author = {Bassam Moussa and Marthe Kassouf and Rachid Hadjidj and Mourad Debbabi and Chadi Assi}, title = {An Extension to the Precision Time Protocol {(PTP)} to Enable the Detection of Cyber Attacks}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {1}, pages = {18--27}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2943913}, doi = {10.1109/TII.2019.2943913}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/MoussaKHDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/MoussaAKDA20, author = {Bassam Moussa and Abdullah Albarakati and Marthe Kassouf and Mourad Debbabi and Chadi Assi}, title = {Exploiting the Vulnerability of Relative Data Alignment in Phasor Data Concentrators to Time Synchronization Attacks}, journal = {{IEEE} Trans. Smart Grid}, volume = {11}, number = {3}, pages = {2541--2551}, year = {2020}, url = {https://doi.org/10.1109/TSG.2019.2957150}, doi = {10.1109/TSG.2019.2957150}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/MoussaAKDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/AkaberMGAAAD20, author = {Parisa Akaber and Bassam Moussa and Mohsen Ghafouri and Ribal Atallah and Basile L. Agba and Chadi Assi and Mourad Debbabi}, title = {CASeS: Concurrent Contingency Analysis-Based Security Metric Deployment for the Smart Grid}, journal = {{IEEE} Trans. Smart Grid}, volume = {11}, number = {3}, pages = {2676--2687}, year = {2020}, url = {https://doi.org/10.1109/TSG.2019.2959937}, doi = {10.1109/TSG.2019.2959937}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/AkaberMGAAAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/GhafouriAKDAY20, author = {Mohsen Ghafouri and Minh Au and Marthe Kassouf and Mourad Debbabi and Chadi Assi and Jun Yan}, title = {Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids}, journal = {{IEEE} Trans. Smart Grid}, volume = {11}, number = {6}, pages = {5227--5238}, year = {2020}, url = {https://doi.org/10.1109/TSG.2020.3004303}, doi = {10.1109/TSG.2020.3004303}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/GhafouriAKDAY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohammadyXHZ0PD20, author = {Meisam Mohammady and Shangyu Xie and Yuan Hong and Mengyuan Zhang and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {{R2DP:} {A} Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {677--696}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417259}, doi = {10.1145/3372297.3417259}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MohammadyXHZ0PD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/OqailyTJMZP0D20, author = {Alaa Oqaily and Sudershan Lakshmanan Thirunavukkarasu and Yosr Jarraya and Suryadipta Majumdar and Mengyuan Zhang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization {(NFV)} Stack}, booktitle = {12th {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2020, Bangkok, Thailand, December 14-17, 2020}, pages = {33--40}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CloudCom49646.2020.00003}, doi = {10.1109/CLOUDCOM49646.2020.00003}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/OqailyTJMZP0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TabibanJZP0D20, author = {Azadeh Tabiban and Yosr Jarraya and Mengyuan Zhang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162251}, doi = {10.1109/CNS48642.2020.9162251}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TabibanJZP0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-06075, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, title = {Android Malware Clustering using Community Detection on Android Packages Similarity Network}, journal = {CoRR}, volume = {abs/2005.06075}, year = {2020}, url = {https://arxiv.org/abs/2005.06075}, eprinttype = {arXiv}, eprint = {2005.06075}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-06075.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-09451, author = {Meisam Mohammady and Shangyu Xie and Yuan Hong and Mengyuan Zhang and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, title = {R\({}^{\mbox{2}}\)DP: {A} Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions}, journal = {CoRR}, volume = {abs/2009.09451}, year = {2020}, url = {https://arxiv.org/abs/2009.09451}, eprinttype = {arXiv}, eprint = {2009.09451}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-09451.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/MajumdarMWTOAJPWD19, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Azadeh Tabiban and Momen Oqaily and Amir Alimohammadifar and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Cloud Security Auditing}, series = {Advances in Information Security}, volume = {76}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23128-6}, doi = {10.1007/978-3-030-23128-6}, isbn = {978-3-030-23127-9}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/MajumdarMWTOAJPWD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/IqbalFDBM19, author = {Farkhund Iqbal and Benjamin C. M. Fung and Mourad Debbabi and Rabia Batool and Andrew Marrington}, title = {Wordnet-Based Criminal Networks Mining for Cybercrime Investigation}, journal = {{IEEE} Access}, volume = {7}, pages = {22740--22755}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2891694}, doi = {10.1109/ACCESS.2019.2891694}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/IqbalFDBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeDW19, author = {Saed Alrabaee and Mourad Debbabi and Lingyu Wang}, title = {On the feasibility of binary authorship characterization}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S3--S11}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.028}, doi = {10.1016/J.DIIN.2019.01.028}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarbabD19, author = {ElMouatez Billah Karbab and Mourad Debbabi}, title = {MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S77--S87}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.017}, doi = {10.1016/J.DIIN.2019.01.017}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarbabD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/AfifyRSADA19, author = {Badr Afify and Sujoy Ray and Andrei Soeanu and Anjali Awasthi and Mourad Debbabi and Mohamad Allouche}, title = {Evolutionary learning algorithm for reliable facility location under disruption}, journal = {Expert Syst. Appl.}, volume = {115}, pages = {223--244}, year = {2019}, url = {https://doi.org/10.1016/j.eswa.2018.07.045}, doi = {10.1016/J.ESWA.2018.07.045}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/AfifyRSADA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/MoussaRZKDA19, author = {Bassam Moussa and Chantale Robillard and Alf Zugenmaier and Marthe Kassouf and Mourad Debbabi and Chadi Assi}, title = {Securing the Precision Time Protocol {(PTP)} Against Fake Timestamps}, journal = {{IEEE} Commun. Lett.}, volume = {23}, number = {2}, pages = {278--281}, year = {2019}, url = {https://doi.org/10.1109/LCOMM.2018.2883287}, doi = {10.1109/LCOMM.2018.2883287}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/MoussaRZKDA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MajumdarTJOAP0D19, author = {Suryadipta Majumdar and Azadeh Tabiban and Yosr Jarraya and Momen Oqaily and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Learning probabilistic dependencies among events for proactive security auditing in clouds}, journal = {J. Comput. Secur.}, volume = {27}, number = {2}, pages = {165--202}, year = {2019}, url = {https://doi.org/10.3233/JCS-181137}, doi = {10.3233/JCS-181137}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MajumdarTJOAP0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AlrabaeeSWDH19, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi and Aiman Hanna}, title = {Decoupling coding habits from functionality for effective binary authorship attribution}, journal = {J. Comput. Secur.}, volume = {27}, number = {6}, pages = {613--648}, year = {2019}, url = {https://doi.org/10.3233/JCS-191292}, doi = {10.3233/JCS-191292}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AlrabaeeSWDH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/AkaberMDA19, author = {Parisa Akaber and Bassam Moussa and Mourad Debbabi and Chadi Assi}, title = {Automated Post-Failure Service Restoration in Smart Grid Through Network Reconfiguration in the Presence of Energy Storage Systems}, journal = {{IEEE} Syst. J.}, volume = {13}, number = {3}, pages = {3358--3367}, year = {2019}, url = {https://doi.org/10.1109/JSYST.2019.2892581}, doi = {10.1109/JSYST.2019.2892581}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/AkaberMDA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/Bou-HarbHDA19, author = {Elias Bou{-}Harb and Martin Hus{\'{a}}k and Mourad Debbabi and Chadi Assi}, title = {Big Data Sanitization and Cyber Situational Awareness: {A} Network Telescope Perspective}, journal = {{IEEE} Trans. Big Data}, volume = {5}, number = {4}, pages = {439--453}, year = {2019}, url = {https://doi.org/10.1109/TBDATA.2017.2723398}, doi = {10.1109/TBDATA.2017.2723398}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/Bou-HarbHDA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MadiJAMWPWD18, author = {Taous Madi and Yosr Jarraya and Amir Alimohammadifar and Suryadipta Majumdar and Yushun Wang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {{ISOTOP:} Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {1:1--1:35}, year = {2019}, url = {https://doi.org/10.1145/3267339}, doi = {10.1145/3267339}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MadiJAMWPWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/KatebATADA19, author = {Reem Kateb and Parisa Akaber and Mosaddek Hossain Kamal Tushar and Abdullah Albarakati and Mourad Debbabi and Chadi Assi}, title = {Enhancing {WAMS} Communication Network Against Delay Attacks}, journal = {{IEEE} Trans. Smart Grid}, volume = {10}, number = {3}, pages = {2738--2751}, year = {2019}, url = {https://doi.org/10.1109/TSG.2018.2809958}, doi = {10.1109/TSG.2018.2809958}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/KatebATADA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/Thirunavukkarasu19, author = {Sudershan Lakshmanan Thirunavukkarasu and Mengyuan Zhang and Alaa Oqaily and Gagandeep Singh Chawla and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, title = {Modeling {NFV} Deployment to Identify the Cross-Level Inconsistency Vulnerabilities}, booktitle = {2019 {IEEE} International Conference on Cloud Computing Technology and Science (CloudCom), Sydney, Australia, December 11-13, 2019}, pages = {167--174}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CloudCom.2019.00034}, doi = {10.1109/CLOUDCOM.2019.00034}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/Thirunavukkarasu19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MajumdarTMOJP0D19, author = {Suryadipta Majumdar and Azadeh Tabiban and Meisam Mohammady and Alaa Oqaily and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Multi-Level Proactive Security Auditing for Clouds}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937641}, doi = {10.1109/DSC47296.2019.8937641}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/MajumdarTMOJP0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/CabanaYDLKA19, author = {Olivier Cabana and Amr M. Youssef and Mourad Debbabi and Bernard Lebel and Marthe Kassouf and Basile L. Agba}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {89--108}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_5}, doi = {10.1007/978-3-030-22038-9\_5}, timestamp = {Sun, 04 Aug 2024 19:42:33 +0200}, biburl = {https://dblp.org/rec/conf/dimva/CabanaYDLKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AlrabaeeK0D19, author = {Saed Alrabaee and ElMouatez Billah Karbab and Lingyu Wang and Mourad Debbabi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {47--67}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_3}, doi = {10.1007/978-3-030-29962-0\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AlrabaeeK0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MajumdarTMOJP0D19, author = {Suryadipta Majumdar and Azadeh Tabiban and Meisam Mohammady and Alaa Oqaily and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {239--262}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_12}, doi = {10.1007/978-3-030-29962-0\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MajumdarTMOJP0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OqailyJZ0PD19, author = {Momen Oqaily and Yosr Jarraya and Mengyuan Zhang and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {iCAT: An Interactive Customizable Anonymization Tool}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {658--680}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_32}, doi = {10.1007/978-3-030-29959-0\_32}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/OqailyJZ0PD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/AlbarakatiRKKHD19, author = {Abdullah Albarakati and Chantale Robillard and Mark Karanfil and Marthe Kassouf and Rachid Hadjidj and Mourad Debbabi and Amr M. Youssef}, title = {Security Monitoring of {IEC} 61850 Substations Using {IEC} 62351-7 Network and System Management\({}^{\mbox{1}}\)}, booktitle = {2019 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing, China, October 21-23, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SmartGridComm.2019.8909710}, doi = {10.1109/SMARTGRIDCOMM.2019.8909710}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/AlbarakatiRKKHD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/DumanGKA0D19, author = {Onur Duman and Mohsen Ghafouri and Marthe Kassouf and Ribal Atallah and Lingyu Wang and Mourad Debbabi}, title = {Modeling Supply Chain Attacks in {IEC} 61850 Substations}, booktitle = {2019 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing, China, October 21-23, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SmartGridComm.2019.8909818}, doi = {10.1109/SMARTGRIDCOMM.2019.8909818}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/DumanGKA0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fps/2018, editor = {Nur Zincir{-}Heywood and Guillaume Bonfante and Mourad Debbabi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Foundations and Practice of Security - 11th International Symposium, {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11358}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-18419-3}, doi = {10.1007/978-3-030-18419-3}, isbn = {978-3-030-18418-6}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/TorabiBAD18, author = {Sadegh Torabi and Amine Boukhtouta and Chadi Assi and Mourad Debbabi}, title = {Detecting Internet Abuse by Analyzing Passive {DNS} Traffic: {A} Survey of Implemented Systems}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {20}, number = {4}, pages = {3389--3415}, year = {2018}, url = {https://doi.org/10.1109/COMST.2018.2849614}, doi = {10.1109/COMST.2018.2849614}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/TorabiBAD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/SoeanuRBD18, author = {Andrei Soeanu and Sujoy Ray and Jean Berger and Mourad Debbabi}, title = {Efficient sensor network management for asset localization}, journal = {Comput. Oper. Res.}, volume = {99}, pages = {148--165}, year = {2018}, url = {https://doi.org/10.1016/j.cor.2018.06.001}, doi = {10.1016/J.COR.2018.06.001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cor/SoeanuRBD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BordjibaKD18, author = {Houssem Eddine Bordjiba and ElMouatez Billah Karbab and Mourad Debbabi}, title = {Data-driven approach for automatic telephony threat analysis and campaign detection}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S131--S141}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.016}, doi = {10.1016/J.DIIN.2018.01.016}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BordjibaKD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarbabDDM18, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, title = {MalDozer: Automatic framework for android malware detection using deep learning}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S48--S59}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.007}, doi = {10.1016/J.DIIN.2018.01.007}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarbabDDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bou-HarbAD18, author = {Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {CSC-Detector: {A} System to Infer Large-Scale Probing Campaigns}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {364--377}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2593441}, doi = {10.1109/TDSC.2016.2593441}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bou-HarbAD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MajumdarMWJPWD18, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {User-Level Runtime Security Auditing for the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1185--1199}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779444}, doi = {10.1109/TIFS.2017.2779444}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MajumdarMWJPWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/MoussaADA18, author = {Bassam Moussa and Parisa Akaber and Mourad Debbabi and Chadi Assi}, title = {Critical Links Identification for Selective Outages in Interdependent Power-Communication Networks}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {14}, number = {2}, pages = {472--483}, year = {2018}, url = {https://doi.org/10.1109/TII.2017.2742527}, doi = {10.1109/TII.2017.2742527}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/MoussaADA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlrabaeeSWD18, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi}, title = {\emph{FOSSIL}: {A} Resilient and Efficient System for Identifying {FOSS} Functions in Malware Binaries}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {8:1--8:34}, year = {2018}, url = {https://doi.org/10.1145/3175492}, doi = {10.1145/3175492}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AlrabaeeSWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/KatebTAD18, author = {Reem Kateb and Mosaddek Hossain Kamal Tushar and Chadi Assi and Mourad Debbabi}, title = {Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement Systems}, journal = {{IEEE} Trans. Smart Grid}, volume = {9}, number = {1}, pages = {25--34}, year = {2018}, url = {https://doi.org/10.1109/TSG.2016.2542859}, doi = {10.1109/TSG.2016.2542859}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/KatebTAD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/MoussaDA18, author = {Bassam Moussa and Mourad Debbabi and Chadi Assi}, title = {A Detection and Mitigation Model for {PTP} Delay Attack in an {IEC} 61850 Substation}, journal = {{IEEE} Trans. Smart Grid}, volume = {9}, number = {5}, pages = {3954--3965}, year = {2018}, url = {https://doi.org/10.1109/TSG.2016.2644618}, doi = {10.1109/TSG.2016.2644618}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/MoussaDA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KarbabD18, author = {ElMouatez Billah Karbab and Mourad Debbabi}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {20:1--20:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3230870}, doi = {10.1145/3230833.3230870}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KarbabD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Mohammady0HLPD18, author = {Meisam Mohammady and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Preserving Both Privacy and Utility in Network Trace Anonymization}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {459--474}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243809}, doi = {10.1145/3243734.3243809}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Mohammady0HLPD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/MadiZJAP0D18, author = {Taous Madi and Mengyuan Zhang and Yosr Jarraya and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud}, booktitle = {2018 {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018}, pages = {163--170}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CloudCom2018.2018.00042}, doi = {10.1109/CLOUDCOM2018.2018.00042}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/MadiZJAP0D18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TabibanM0D18, author = {Azadeh Tabiban and Suryadipta Majumdar and Lingyu Wang and Mourad Debbabi}, title = {{PERMON:} An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433180}, doi = {10.1109/CNS.2018.8433180}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TabibanM0D18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ShiraniCALD0H18, author = {Paria Shirani and Leo Collard and Basile L. Agba and Bernard Lebel and Mourad Debbabi and Lingyu Wang and Aiman Hanna}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {{BINARM:} Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {114--138}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_6}, doi = {10.1007/978-3-319-93411-2\_6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ShiraniCALD0H18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/TorabiBAGBD18, author = {Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mario Galluscio and Amine Boukhtouta and Mourad Debbabi}, title = {Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: {A} Network Telescope Perspective}, booktitle = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28, 2018}, pages = {562--573}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSN.2018.00064}, doi = {10.1109/DSN.2018.00064}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/TorabiBAGBD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AlrabaeeS0DH18, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi and Aiman Hanna}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {On Leveraging Coding Habits for Effective Binary Authorship Attribution}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {26--47}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_2}, doi = {10.1007/978-3-319-99073-6\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AlrabaeeS0DH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Alimohammadifar18, author = {Amir Alimohammadifar and Suryadipta Majumdar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Stealthy Probing-Based Verification {(SPV):} An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {463--484}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_23}, doi = {10.1007/978-3-319-98989-1\_23}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Alimohammadifar18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/MajumdarMJP0D18, author = {Suryadipta Majumdar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Nur Zincir{-}Heywood and Guillaume Bonfante and Mourad Debbabi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Cloud Security Auditing: Major Approaches and Existing Challenges}, booktitle = {Foundations and Practice of Security - 11th International Symposium, {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11358}, pages = {61--77}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-18419-3\_5}, doi = {10.1007/978-3-030-18419-3\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/MajumdarMJP0D18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/ChohraDS18, author = {Aniss Chohra and Mourad Debbabi and Paria Shirani}, editor = {Nur Zincir{-}Heywood and Guillaume Bonfante and Mourad Debbabi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Daedalus: Network Anomaly Detection on {IDS} Stream Logs}, booktitle = {Foundations and Practice of Security - 11th International Symposium, {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11358}, pages = {95--111}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-18419-3\_7}, doi = {10.1007/978-3-030-18419-3\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/ChohraDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/AlbarakatiMDYAK18, author = {Abdullah Albarakati and Bassam Moussa and Mourad Debbabi and Amr M. Youssef and Basile L. Agba and Marthe Kassouf}, title = {OpenStack-Based Evaluation Framework for Smart Grid Cyber Security}, booktitle = {2018 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018, Aalborg, Denmark, October 29-31, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartGridComm.2018.8587420}, doi = {10.1109/SMARTGRIDCOMM.2018.8587420}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/AlbarakatiMDYAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-08893, author = {ElMouatez Billah Karbab and Mourad Debbabi}, title = {Automatic Investigation Framework for Android Malware Cyber-Infrastructures}, journal = {CoRR}, volume = {abs/1806.08893}, year = {2018}, url = {http://arxiv.org/abs/1806.08893}, eprinttype = {arXiv}, eprint = {1806.08893}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-08893.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-00118, author = {Serguei A. Mokhov and Miao Song and Jashanjot Singh and Joey Paquet and Mourad Debbabi and Sudhir P. Mudur}, title = {Toward Multimodal Interaction in Scalable Visual Digital Evidence Visualization Using Computer Vision Techniques and {ISS}}, journal = {CoRR}, volume = {abs/1808.00118}, year = {2018}, url = {http://arxiv.org/abs/1808.00118}, eprinttype = {arXiv}, eprint = {1808.00118}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-00118.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-10464, author = {Meisam Mohammady and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi}, title = {Preserving Both Privacy and Utility in Network Trace Anonymization}, journal = {CoRR}, volume = {abs/1810.10464}, year = {2018}, url = {http://arxiv.org/abs/1810.10464}, eprinttype = {arXiv}, eprint = {1810.10464}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-10464.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-10327, author = {ElMouatez Billah Karbab and Mourad Debbabi}, title = {Portable, Data-Driven Malware Detection using Language Processing and Machine Learning Techniques on Behavioral Analysis Reports}, journal = {CoRR}, volume = {abs/1812.10327}, year = {2018}, url = {http://arxiv.org/abs/1812.10327}, eprinttype = {arXiv}, eprint = {1812.10327}, timestamp = {Wed, 02 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-10327.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeSPWD17, author = {Saed Alrabaee and Noman Saleem and Stere Preda and Lingyu Wang and Mourad Debbabi}, title = {Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 {(2014)} {S94-S103]}}, journal = {Digit. Investig.}, volume = {21}, pages = {89}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.004}, doi = {10.1016/J.DIIN.2017.02.004}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeSPWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/Bou-HarbDA17, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns}, journal = {{IEEE} Netw.}, volume = {31}, number = {1}, pages = {18--26}, year = {2017}, url = {https://doi.org/10.1109/MNET.2016.1500116NM}, doi = {10.1109/MNET.2016.1500116NM}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/Bou-HarbDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tlsdkcs/AljumahPD17, author = {Feras Aljumah and Makan Pourzandi and Mourad Debbabi}, title = {Privacy-Preserving Querying on Privately Encrypted Data in the Cloud}, journal = {Trans. Large Scale Data Knowl. Centered Syst.}, volume = {35}, pages = {50--73}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-56121-8\_3}, doi = {10.1007/978-3-662-56121-8\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tlsdkcs/AljumahPD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ScellerKDI17, author = {Quentin Le Sceller and ElMouatez Billah Karbab and Mourad Debbabi and Farkhund Iqbal}, title = {{SONAR:} Automatic Detection of Cyber Security Events over the Twitter Stream}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {23:1--23:11}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098992}, doi = {10.1145/3098954.3098992}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ScellerKDI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangYD17, author = {He Huang and Amr M. Youssef and Mourad Debbabi}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {155--166}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052974}, doi = {10.1145/3052973.3052974}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HuangYD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/Shirani0D17, author = {Paria Shirani and Lingyu Wang and Mourad Debbabi}, editor = {Michalis Polychronakis and Michael Meier}, title = {BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {301--324}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_14}, doi = {10.1007/978-3-319-60876-1\_14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/Shirani0D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MajumdarJOAPWD17, author = {Suryadipta Majumdar and Yosr Jarraya and Momen Oqaily and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {LeaPS: Learning-Based Proactive Security Auditing for Clouds}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {265--285}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_15}, doi = {10.1007/978-3-319-66399-9\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MajumdarJOAPWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globalsip/KatebATDA17, author = {Reem Kateb and Parisa Akaber and Mosaddek Hossain Kamal Tushar and Mourad Debbabi and Chadi Assi}, title = {Delay aware measurements gathering in {WAMS} communication network}, booktitle = {2017 {IEEE} Global Conference on Signal and Information Processing, GlobalSIP 2017, Montreal, QC, Canada, November 14-16, 2017}, pages = {1090--1094}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GlobalSIP.2017.8309129}, doi = {10.1109/GLOBALSIP.2017.8309129}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globalsip/KatebATDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangMMJAP0D17, author = {Yushun Wang and Taous Madi and Suryadipta Majumdar and Yosr Jarraya and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/tenantguard-scalable-runtime-verification-cloud-wide-vm-level-network-isolation/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangMMJAP0D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NouhRMDH17, author = {Lina Nouh and Ashkan Rahimian and Djedjiga Mouheb and Mourad Debbabi and Aiman Hanna}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {341--355}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_23}, doi = {10.1007/978-3-319-58469-0\_23}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/NouhRMDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/DumanZ0D17, author = {Onur Duman and Mengyuan Zhang and Lingyu Wang and Mourad Debbabi}, title = {Measuring the security posture of {IEC} 61850 substations with redundancy against zero day attacks}, booktitle = {2017 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017}, pages = {108--114}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SmartGridComm.2017.8340727}, doi = {10.1109/SMARTGRIDCOMM.2017.8340727}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/DumanZ0D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AlrabaeeSD017, author = {Saed Alrabaee and Paria Shirani and Mourad Debbabi and Lingyu Wang}, title = {On the Feasibility of Malware Authorship Attribution}, journal = {CoRR}, volume = {abs/1701.02711}, year = {2017}, url = {http://arxiv.org/abs/1701.02711}, eprinttype = {arXiv}, eprint = {1701.02711}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AlrabaeeSD017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KarbabDAM17, author = {ElMouatez Billah Karbab and Mourad Debbabi and Saed Alrabaee and Djedjiga Mouheb}, title = {DySign: Dynamic Fingerprinting for the Automatic Detection of Android Malware}, journal = {CoRR}, volume = {abs/1702.05699}, year = {2017}, url = {http://arxiv.org/abs/1702.05699}, eprinttype = {arXiv}, eprint = {1702.05699}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KarbabDAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-08996, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, title = {Android Malware Detection using Deep Learning on {API} Method Sequences}, journal = {CoRR}, volume = {abs/1712.08996}, year = {2017}, url = {http://arxiv.org/abs/1712.08996}, eprinttype = {arXiv}, eprint = {1712.08996}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-08996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Bou-HarbDA16, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities}, journal = {Comput. Networks}, volume = {94}, pages = {327--343}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2015.11.004}, doi = {10.1016/J.COMNET.2015.11.004}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Bou-HarbDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/FachkhaD16, author = {Claude Fachkha and Mourad Debbabi}, title = {Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {18}, number = {2}, pages = {1197--1227}, year = {2016}, url = {https://doi.org/10.1109/COMST.2015.2497690}, doi = {10.1109/COMST.2015.2497690}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/FachkhaD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/MoussaDA16, author = {Bassam Moussa and Mourad Debbabi and Chadi Assi}, title = {Security Assessment of Time Synchronization Mechanisms for the Smart Grid}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {18}, number = {3}, pages = {1952--1973}, year = {2016}, url = {https://doi.org/10.1109/COMST.2016.2525014}, doi = {10.1109/COMST.2016.2525014}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/MoussaDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Alrabaee0D16, author = {Saed Alrabaee and Lingyu Wang and Mourad Debbabi}, title = {\emph{BinGold}: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S11--S22}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.002}, doi = {10.1016/J.DIIN.2016.04.002}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Alrabaee0D16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarbabDM16, author = {ElMouatez Billah Karbab and Mourad Debbabi and Djedjiga Mouheb}, title = {Fingerprinting Android packaging: Generating DNAs for malware detection}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S33--S45}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.013}, doi = {10.1016/J.DIIN.2016.04.013}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarbabDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/SoeanuDABL16, author = {Andrei Soeanu and Mourad Debbabi and Mohamad Allouche and Micheline B{\'{e}}langer and Nicholas L{\'{e}}chevin}, title = {Hierarchy aware distributed plan execution monitoring}, journal = {Expert Syst. Appl.}, volume = {43}, pages = {66--81}, year = {2016}, url = {https://doi.org/10.1016/j.eswa.2015.08.040}, doi = {10.1016/J.ESWA.2015.08.040}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/SoeanuDABL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isse/MouhebANDWP16, author = {Djedjiga Mouheb and Dima Alhadidi and Mariam Nouh and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, title = {Aspect-oriented modeling framework for security hardening}, journal = {Innov. Syst. Softw. Eng.}, volume = {12}, number = {1}, pages = {41--67}, year = {2016}, url = {https://doi.org/10.1007/s11334-015-0263-5}, doi = {10.1007/S11334-015-0263-5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isse/MouhebANDWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/RayDALB16, author = {Sujoy Ray and Mourad Debbabi and Mohamad Khaled Allouche and Nicolas L{\'{e}}chevin and Micheline B{\'{e}}langer}, title = {Energy-Efficient Monitor Deployment in Collaborative Distributed Setting}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {12}, number = {1}, pages = {112--123}, year = {2016}, url = {https://doi.org/10.1109/TII.2015.2500163}, doi = {10.1109/TII.2015.2500163}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/RayDALB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BoukhtoutaMLDP16, author = {Amine Boukhtouta and Serguei A. Mokhov and Nour{-}Eddine Lakhdari and Mourad Debbabi and Joey Paquet}, title = {Network malware classification comparison using {DPI} and flow packet headers}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {12}, number = {2}, pages = {69--100}, year = {2016}, url = {https://doi.org/10.1007/s11416-015-0247-x}, doi = {10.1007/S11416-015-0247-X}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BoukhtoutaMLDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KarbabDDM16, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Cypider: building community-based cyber-defense infrastructure for android malware detection}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {348--362}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991124}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KarbabDDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MajumdarJMAPWD16, author = {Suryadipta Majumdar and Yosr Jarraya and Taous Madi and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {47--66}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_3}, doi = {10.1007/978-3-319-45744-4\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MajumdarJMAPWD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/AlrabaeeSDW16, author = {Saed Alrabaee and Paria Shirani and Mourad Debbabi and Lingyu Wang}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {On the Feasibility of Malware Authorship Attribution}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {256--272}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_17}, doi = {10.1007/978-3-319-51966-1\_17}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/AlrabaeeSDW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KarbabDAM16, author = {ElMouatez Billah Karbab and Mourad Debbabi and Saed Alrabaee and Djedjiga Mouheb}, title = {DySign: dynamic fingerprinting for the automatic detection of android malware}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {139--146}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888739}, doi = {10.1109/MALWARE.2016.7888739}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/KarbabDAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/AkaberMDA16, author = {Parisa Akaber and Bassam Moussa and Mourad Debbabi and Chadi Assi}, title = {Cascading link failure analysis in interdependent networks for maximal outages in smart grid}, booktitle = {2016 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2016, Sydney, Australia, November 6-9, 2016}, pages = {429--434}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/SmartGridComm.2016.7778799}, doi = {10.1109/SMARTGRIDCOMM.2016.7778799}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/AkaberMDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/MouhebDPWNZATL15, author = {Djedjiga Mouheb and Mourad Debbabi and Makan Pourzandi and Lingyu Wang and Mariam Nouh and Raha Ziarati and Dima Alhadidi and Chamseddine Talhi and Vitor Lima}, title = {Aspect-Oriented Security Hardening of {UML} Design Models}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16106-8}, doi = {10.1007/978-3-319-16106-8}, isbn = {978-3-319-16105-1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/MouhebDPWNZATL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JarrayaESDP15, author = {Yosr Jarraya and Arash Eghtesadi and Sahba Sadri and Mourad Debbabi and Makan Pourzandi}, title = {Verification of firewall reconfiguration for virtual machines migrations in the cloud}, journal = {Comput. Networks}, volume = {93}, pages = {480--491}, year = {2015}, url = {https://doi.org/10.1016/j.comnet.2015.10.008}, doi = {10.1016/J.COMNET.2015.10.008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/JarrayaESDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/FachkhaBD15, author = {Claude Fachkha and Elias Bou{-}Harb and Mourad Debbabi}, title = {Inferring distributed reflection denial of service attacks from darknet}, journal = {Comput. Commun.}, volume = {62}, pages = {59--71}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.01.016}, doi = {10.1016/J.COMCOM.2015.01.016}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/FachkhaBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/OuchaniD15, author = {Samir Ouchani and Mourad Debbabi}, title = {Specification, verification, and quantification of security in model-based systems}, journal = {Computing}, volume = {97}, number = {7}, pages = {691--711}, year = {2015}, url = {https://doi.org/10.1007/s00607-015-0445-x}, doi = {10.1007/S00607-015-0445-X}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/OuchaniD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DinhAFMD15, author = {Son Dinh and Taher Azeb and Francis Fortin and Djedjiga Mouheb and Mourad Debbabi}, title = {Spam campaign detection, analysis, and investigation}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S12--S21}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.006}, doi = {10.1016/J.DIIN.2015.01.006}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DinhAFMD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeSWD15, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi}, title = {{SIGMA:} {A} Semantic Integrated Graph Matching Approach for identifying reused functions in binary code}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S61--S71}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.011}, doi = {10.1016/J.DIIN.2015.01.011}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeSWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RahimianSAWD15, author = {Ashkan Rahimian and Paria Shirani and Saed Alrabaee and Lingyu Wang and Mourad Debbabi}, title = {BinComp: {A} stratified approach to compiler provenance Attribution}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S146--S155}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.015}, doi = {10.1016/J.DIIN.2015.05.015}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RahimianSAWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BoukhtoutaMDAIB15, author = {Amine Boukhtouta and Djedjiga Mouheb and Mourad Debbabi and Omar Alfandi and Farkhund Iqbal and May El Barachi}, title = {Graph-theoretic characterization of cyber-threat infrastructures}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S3--S15}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.002}, doi = {10.1016/J.DIIN.2015.05.002}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FarhadiFFCPD15, author = {Mohammad Reza Farhadi and Benjamin C. M. Fung and Yin Bun Fung and Philippe Charland and Stere Preda and Mourad Debbabi}, title = {Scalable code clone search for malware analysis}, journal = {Digit. Investig.}, volume = {15}, pages = {46--60}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.06.001}, doi = {10.1016/J.DIIN.2015.06.001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FarhadiFFCPD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/SoeanuDAMABL15, author = {Andrei Soeanu and Mourad Debbabi and Dima Alhadidi and Makram Makkawi and Mohamad Khaled Allouche and Micheline B{\'{e}}langer and Nicolas L{\'{e}}chevin}, title = {Transportation risk analysis using probabilistic model checking}, journal = {Expert Syst. Appl.}, volume = {42}, number = {9}, pages = {4410--4421}, year = {2015}, url = {https://doi.org/10.1016/j.eswa.2014.12.052}, doi = {10.1016/J.ESWA.2014.12.052}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/SoeanuDAMABL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DingFD15, author = {Steven H. H. Ding and Benjamin C. M. Fung and Mourad Debbabi}, title = {A Visualizable Evidence-Driven Approach for Authorship Attribution}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {3}, pages = {12:1--12:30}, year = {2015}, url = {https://doi.org/10.1145/2699910}, doi = {10.1145/2699910}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DingFD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/FachkhaBD15, author = {Claude Fachkha and Elias Bou{-}Harb and Mourad Debbabi}, title = {On the inference and prediction of DDoS campaigns}, journal = {Wirel. Commun. Mob. Comput.}, volume = {15}, number = {6}, pages = {1066--1078}, year = {2015}, url = {https://doi.org/10.1002/wcm.2510}, doi = {10.1002/WCM.2510}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/FachkhaBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Bou-HarbDA15, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {180--185}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.9}, doi = {10.1109/ARES.2015.9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Bou-HarbDA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/MajumdarMWJPWD15, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack}, booktitle = {7th {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December 3, 2015}, pages = {58--65}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CloudCom.2015.80}, doi = {10.1109/CLOUDCOM.2015.80}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/MajumdarMWJPWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/SadriJED15, author = {Sahba Sadri and Yosr Jarraya and Arash Eghtesadi and Mourad Debbabi}, title = {Towards migrating security policies of virtual machines in Software Defined Networks}, booktitle = {Proceedings of the 1st {IEEE} Conference on Network Softwarization, NetSoft 2015, London, United Kingdom, April 13-17, 2015}, pages = {1--9}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NETSOFT.2015.7116165}, doi = {10.1109/NETSOFT.2015.7116165}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/SadriJED15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/MoussaDA15, author = {Bassam Moussa and Mourad Debbabi and Chadi Assi}, title = {A detection and mitigation model for {PTP} delay attack in a smart grid substation}, booktitle = {2015 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2015, Miami, FL, USA, November 2-5, 2015}, pages = {497--502}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SmartGridComm.2015.7436349}, doi = {10.1109/SMARTGRIDCOMM.2015.7436349}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/MoussaDA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/MokhovPD15, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, editor = {Olga Baysal and Latifa Guerrouj}, title = {{MARFCAT:} Fast code analysis for defects and vulnerabilities}, booktitle = {1st {IEEE} International Workshop on Software Analytics, {SWAN} 2015, Montreal, QC, Canada, March 2, 2015}, pages = {35--38}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SWAN.2015.7070488}, doi = {10.1109/SWAN.2015.7070488}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcre/MokhovPD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bou-HarbDA14, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {On fingerprinting probing activities}, journal = {Comput. Secur.}, volume = {43}, pages = {35--48}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.005}, doi = {10.1016/J.COSE.2014.02.005}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bou-HarbDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/Bou-HarbDA14, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {Cyber Scanning: {A} Comprehensive Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {16}, number = {3}, pages = {1496--1519}, year = {2014}, url = {https://doi.org/10.1109/SURV.2013.102913.00020}, doi = {10.1109/SURV.2013.102913.00020}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/Bou-HarbDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/JarrayaMD14, author = {Yosr Jarraya and Taous Madi and Mourad Debbabi}, title = {A Survey and a Layered Taxonomy of Software-Defined Networking}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {16}, number = {4}, pages = {1955--1980}, year = {2014}, url = {https://doi.org/10.1109/COMST.2014.2320094}, doi = {10.1109/COMST.2014.2320094}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/JarrayaMD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeSPWD14, author = {Saed Alrabaee and Noman Saleem and Stere Preda and Lingyu Wang and Mourad Debbabi}, title = {{OBA2:} An Onion approach to Binary code Authorship Attribution}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S94--S103}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.012}, doi = {10.1016/J.DIIN.2014.03.012}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeSPWD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Bou-HarbLBD14, author = {Elias Bou{-}Harb and Nour{-}Eddine Lakhdari and Hamad Binsalleeh and Mourad Debbabi}, title = {Multidimensional investigation of source port 0 probing}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S114--S123}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.012}, doi = {10.1016/J.DIIN.2014.05.012}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Bou-HarbLBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/OuchaniMD14, author = {Samir Ouchani and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi}, title = {A formal verification framework for SysML activity diagrams}, journal = {Expert Syst. Appl.}, volume = {41}, number = {6}, pages = {2713--2728}, year = {2014}, url = {https://doi.org/10.1016/j.eswa.2013.10.064}, doi = {10.1016/J.ESWA.2013.10.064}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/OuchaniMD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/OuchaniMD14, author = {Samir Ouchani and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi}, title = {A property-based abstraction framework for SysML activity diagrams}, journal = {Knowl. Based Syst.}, volume = {56}, pages = {328--343}, year = {2014}, url = {https://doi.org/10.1016/j.knosys.2013.11.016}, doi = {10.1016/J.KNOSYS.2013.11.016}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/OuchaniMD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/RaySBD14, author = {Sujoy Ray and Andrei Soeanu and Jean Berger and Mourad Debbabi}, title = {The multi-depot split-delivery vehicle routing problem: Model and solution algorithm}, journal = {Knowl. Based Syst.}, volume = {71}, pages = {238--265}, year = {2014}, url = {https://doi.org/10.1016/j.knosys.2014.08.006}, doi = {10.1016/J.KNOSYS.2014.08.006}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/RaySBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/JarrayaD14, author = {Yosr Jarraya and Mourad Debbabi}, title = {Quantitative and qualitative analysis of SysML activity diagrams}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {16}, number = {4}, pages = {399--419}, year = {2014}, url = {https://doi.org/10.1007/s10009-014-0305-6}, doi = {10.1007/S10009-014-0305-6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/JarrayaD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohammedAFD14, author = {Noman Mohammed and Dima Alhadidi and Benjamin C. M. Fung and Mourad Debbabi}, title = {Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {59--71}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.22}, doi = {10.1109/TDSC.2013.22}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MohammedAFD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuWCRZD14, author = {Wen Ming Liu and Lingyu Wang and Pengsu Cheng and Kui Ren and Shunzhi Zhu and Mourad Debbabi}, title = {{PPTP:} Privacy-Preserving Traffic Padding in Web-Based Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {538--552}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2302308}, doi = {10.1109/TDSC.2014.2302308}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuWCRZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ai/MokhovPD14, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, editor = {Marina Sokolova and Peter van Beek}, title = {The Use of {NLP} Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities}, booktitle = {Advances in Artificial Intelligence - 27th Canadian Conference on Artificial Intelligence, Canadian {AI} 2014, Montr{\'{e}}al, QC, Canada, May 6-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8436}, pages = {326--332}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06483-3\_33}, doi = {10.1007/978-3-319-06483-3\_33}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ai/MokhovPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c3s2e/MokhovAPD14, author = {Serguei A. Mokhov and Michael J. Assels and Joey Paquet and Mourad Debbabi}, editor = {Bipin C. Desai}, title = {Toward Automated {MAC} Spoofer Investigations}, booktitle = {International C* Conference on Computer Science {\&} Software Engineering, {C3S2E} '14, Montreal, QC, Canada - August 03 - 05, 2014}, pages = {27:1--27:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2641483.2641540}, doi = {10.1145/2641483.2641540}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c3s2e/MokhovAPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BaroutiAAD14, author = {Samira Barouti and Feras Aljumah and Dima Alhadidi and Mourad Debbabi}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {82--97}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_6}, doi = {10.1007/978-3-662-43936-4\_6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BaroutiAAD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/MokhovAPD14, author = {Serguei A. Mokhov and Michael J. Assels and Joey Paquet and Mourad Debbabi}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood and Philip W. L. Fong}, title = {Automating {MAC} Spoofer Evidence Gathering and Encoding for Investigations}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8930}, pages = {168--183}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17040-4\_11}, doi = {10.1007/978-3-319-17040-4\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/MokhovAPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/EghtesadiJDP14, author = {Arash Eghtesadi and Yosr Jarraya and Mourad Debbabi and Makan Pourzandi}, title = {Preservation of Security Configurations in the Cloud}, booktitle = {2014 {IEEE} International Conference on Cloud Engineering, Boston, MA, USA, March 11-14, 2014}, pages = {17--26}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IC2E.2014.14}, doi = {10.1109/IC2E.2014.14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic2e/EghtesadiJDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Bou-HarbFDA14, author = {Elias Bou{-}Harb and Claude Fachkha and Mourad Debbabi and Chadi Assi}, title = {Inferring internet-scale infections by correlating malware and probing activities}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {640--646}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883391}, doi = {10.1109/ICC.2014.6883391}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/Bou-HarbFDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KaraBMYD14, author = {A. Mert Kara and Hamad Binsalleeh and Mohammad Mannan and Amr M. Youssef and Mourad Debbabi}, title = {Detection of malicious payload distribution channels in {DNS}}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {853--858}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883426}, doi = {10.1109/ICC.2014.6883426}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KaraBMYD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bou-HarbDA14, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {Behavioral analytics for inferring large-scale orchestrated probing events}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {506--511}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849283}, doi = {10.1109/INFCOMW.2014.6849283}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bou-HarbDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/BinsalleehKYD14, author = {Hamad Binsalleeh and A. Mert Kara and Amr M. Youssef and Mourad Debbabi}, editor = {Mohamad Badra and Omar Alfandi}, title = {Characterization of Covert Channels in {DNS}}, booktitle = {6th International Conference on New Technologies, Mobility and Security, {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NTMS.2014.6814008}, doi = {10.1109/NTMS.2014.6814008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/BinsalleehKYD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/BoukhtoutaLD14, author = {Amine Boukhtouta and Nour{-}Eddine Lakhdari and Mourad Debbabi}, editor = {Mohamad Badra and Omar Alfandi}, title = {Inferring Malware Family through Application Protocol Sequences Signature}, booktitle = {6th International Conference on New Technologies, Mobility and Security, {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NTMS.2014.6814026}, doi = {10.1109/NTMS.2014.6814026}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/BoukhtoutaLD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/FachkhaBD14, author = {Claude Fachkha and Elias Bou{-}Harb and Mourad Debbabi}, editor = {Mohamad Badra and Omar Alfandi}, title = {Fingerprinting Internet {DNS} Amplification DDoS Activities}, booktitle = {6th International Conference on New Technologies, Mobility and Security, {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NTMS.2014.6814019}, doi = {10.1109/NTMS.2014.6814019}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/FachkhaBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/FarhadiFCD14, author = {Mohammad Reza Farhadi and Benjamin C. M. Fung and Philippe Charland and Mourad Debbabi}, title = {BinClone: Detecting Code Clones in Malware}, booktitle = {Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014}, pages = {78--87}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE.2014.21}, doi = {10.1109/SERE.2014.21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/FarhadiFCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fps/2013, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05302-8}, doi = {10.1007/978-3-319-05302-8}, isbn = {978-3-319-05301-1}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RahimianZPD14, author = {Ashkan Rahimian and Raha Ziarati and Stere Preda and Mourad Debbabi}, title = {On the Reverse Engineering of the Citadel Botnet}, journal = {CoRR}, volume = {abs/1406.5569}, year = {2014}, url = {http://arxiv.org/abs/1406.5569}, eprinttype = {arXiv}, eprint = {1406.5569}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RahimianZPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/Bou-HarbFPDA13, author = {Elias Bou{-}Harb and Claude Fachkha and Makan Pourzandi and Mourad Debbabi and Chadi Assi}, title = {Communication security for smart grid distribution networks}, journal = {{IEEE} Commun. Mag.}, volume = {51}, number = {1}, pages = {42--49}, year = {2013}, url = {https://doi.org/10.1109/MCOM.2013.6400437}, doi = {10.1109/MCOM.2013.6400437}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/Bou-HarbFPDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Bou-HarbDA13, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A systematic approach for detecting and clustering distributed cyber scanning}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3826--3839}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.008}, doi = {10.1016/J.COMNET.2013.09.008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Bou-HarbDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/IqbalBFD13, author = {Farkhund Iqbal and Hamad Binsalleeh and Benjamin C. M. Fung and Mourad Debbabi}, title = {A unified data mining solution for authorship analysis in anonymous textual communications}, journal = {Inf. Sci.}, volume = {231}, pages = {98--112}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2011.03.006}, doi = {10.1016/J.INS.2011.03.006}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/IqbalBFD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/AlhadidiMKD13, author = {Dima Alhadidi and Azzam Mourad and Hakim Idrissi Kaitouni and Mourad Debbabi}, title = {Common weaving approach in mainstream languages for software security hardening}, journal = {J. Syst. Softw.}, volume = {86}, number = {10}, pages = {2654--2674}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2013.05.044}, doi = {10.1016/J.JSS.2013.05.044}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/AlhadidiMKD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Bou-HarbPDA13, author = {Elias Bou{-}Harb and Makan Pourzandi and Mourad Debbabi and Chadi Assi}, title = {A secure, efficient, and cost-effective distributed architecture for spam mitigation on {LTE} 4G mobile networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1478--1489}, year = {2013}, url = {https://doi.org/10.1002/sec.413}, doi = {10.1002/SEC.413}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Bou-HarbPDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Bou-HarbDA13, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A Statistical Approach for Fingerprinting Probing Activities}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {21--30}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.9}, doi = {10.1109/ARES.2013.9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Bou-HarbDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/SoeanuRDAB13, author = {Andrei Soeanu and Sujoy Ray and Mourad Debbabi and Mohamad Allouche and Jean Berger}, editor = {Elhadi M. Shakshuki and Karim Djouani and Michael Sheng and Mohamed F. Younis and Eduardo Vaz and Wayne Groszko}, title = {Gossiping Based Distributed Plan Monitoring}, booktitle = {Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013), Halifax, Nova Scotia, Canada, June 25-28, 2013}, series = {Procedia Computer Science}, volume = {19}, pages = {72--79}, publisher = {Elsevier}, year = {2013}, url = {https://doi.org/10.1016/j.procs.2013.06.015}, doi = {10.1016/J.PROCS.2013.06.015}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ant/SoeanuRDAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/BoukhtoutaLMD13, author = {Amine Boukhtouta and Nour{-}Eddine Lakhdari and Serguei A. Mokhov and Mourad Debbabi}, editor = {Elhadi M. Shakshuki and Karim Djouani and Michael Sheng and Mohamed F. Younis and Eduardo Vaz and Wayne Groszko}, title = {Towards Fingerprinting Malicious Traffic}, booktitle = {Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013), Halifax, Nova Scotia, Canada, June 25-28, 2013}, series = {Procedia Computer Science}, volume = {19}, pages = {548--555}, publisher = {Elsevier}, year = {2013}, url = {https://doi.org/10.1016/j.procs.2013.06.073}, doi = {10.1016/J.PROCS.2013.06.073}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ant/BoukhtoutaLMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/JarrayaRSDAB13, author = {Yosr Jarraya and Sujoy Ray and Andrei Soeanu and Mourad Debbabi and Mohamad Allouche and Jean Berger}, editor = {Elhadi M. Shakshuki and Karim Djouani and Michael Sheng and Mohamed F. Younis and Eduardo Vaz and Wayne Groszko}, title = {Towards a Distributed Plan Execution Monitoring Framework}, booktitle = {Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013), Halifax, Nova Scotia, Canada, June 25-28, 2013}, series = {Procedia Computer Science}, volume = {19}, pages = {1034--1039}, publisher = {Elsevier}, year = {2013}, url = {https://doi.org/10.1016/j.procs.2013.06.144}, doi = {10.1016/J.PROCS.2013.06.144}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ant/JarrayaRSDAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/BaroutiAD13, author = {Samira Barouti and Dima Alhadidi and Mourad Debbabi}, title = {Symmetrically-Private Database Search in Cloud Computing}, booktitle = {{IEEE} 5th International Conference on Cloud Computing Technology and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5, 2013, Volume 1}, pages = {671--678}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CloudCom.2013.95}, doi = {10.1109/CLOUDCOM.2013.95}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/BaroutiAD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/LiuWRD13, author = {Wen Ming Liu and Lingyu Wang and Kui Ren and Mourad Debbabi}, title = {Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications}, booktitle = {{IEEE} 5th International Conference on Cloud Computing Technology and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5, 2013, Volume 1}, pages = {679--686}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CloudCom.2013.96}, doi = {10.1109/CLOUDCOM.2013.96}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/LiuWRD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdl/OuchaniMD13, author = {Samir Ouchani and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi}, title = {A formal verification framework for Bluespec System Verilog}, booktitle = {Proceedings of the 2013 Forum on specification and Design Languages, {FDL} 2013, Paris, France, September 24-26, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6646644/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdl/OuchaniMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/RahimianZPD13, author = {Ashkan Rahimian and Raha Ziarati and Stere Preda and Mourad Debbabi}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {On the Reverse Engineering of the Citadel Botnet}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {408--425}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_25}, doi = {10.1007/978-3-319-05302-8\_25}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/RahimianZPD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his2/AljumahLPD13, author = {Feras Aljumah and Raymond Hei Man Leung and Makan Pourzandi and Mourad Debbabi}, editor = {Guangyan Huang and Xiaohui Liu and Jing He and Frank Klawonn and Guiqing Yao}, title = {Emergency Mobile Access to Personal Health Records Stored on an Untrusted Cloud}, booktitle = {Health Information Science - Second International Conference, {HIS} 2013, London, UK, March 25-27, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7798}, pages = {30--41}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37899-7\_3}, doi = {10.1007/978-3-642-37899-7\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/his2/AljumahLPD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/Bou-HarbDA13, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, editor = {Roberto Saracco and Khaled Ben Letaief and Mario Gerla and Sergio Palazzo and Luigi Atzori}, title = {On detecting and clustering distributed cyber scanning}, booktitle = {2013 9th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2013, Sardinia, Italy, July 1-5, 2013}, pages = {926--933}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IWCMC.2013.6583681}, doi = {10.1109/IWCMC.2013.6583681}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/Bou-HarbDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/FachkhaBD13, author = {Claude Fachkha and Elias Bou{-}Harb and Mourad Debbabi}, title = {Towards a Forecasting Model for Distributed Denial of Service Activities}, booktitle = {2013 {IEEE} 12th International Symposium on Network Computing and Applications, Cambridge, MA, USA, August 22-24, 2013}, pages = {110--117}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/NCA.2013.13}, doi = {10.1109/NCA.2013.13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nca/FachkhaBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/OuchaniMD13, author = {Samir Ouchani and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi}, title = {A probabilistic verification framework of SysML activity diagrams}, booktitle = {{IEEE} 12th International Conference on Intelligent Software Methodologies, Tools and Techniques, SoMeT 2013, Budapest, Hungary, September 22-24, 2013}, pages = {165--170}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SoMeT.2013.6645657}, doi = {10.1109/SOMET.2013.6645657}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/somet/OuchaniMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/OuchaniMD13, author = {Samir Ouchani and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi}, title = {A Security Risk Assessment Framework for SysML Activity Diagrams}, booktitle = {{IEEE} 7th International Conference on Software Security and Reliability, {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013}, pages = {227--236}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SERE.2013.11}, doi = {10.1109/SERE.2013.11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/OuchaniMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/MouhebZD13, author = {Djedjiga Mouheb and Raha Ziarati and Mourad Debbabi}, title = {Aspect-Oriented Semantic Framework for Executable Models}, booktitle = {Seventh International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2013, 1-3 July 2013, Birmingham, {UK}}, pages = {63--70}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TASE.2013.17}, doi = {10.1109/TASE.2013.17}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tase/MouhebZD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FachkhaBD13, author = {Claude Fachkha and Elias Bou{-}Harb and Mourad Debbabi}, title = {Fingerprinting Internet {DNS} Amplification DDoS Activities}, journal = {CoRR}, volume = {abs/1310.4216}, year = {2013}, url = {http://arxiv.org/abs/1310.4216}, eprinttype = {arXiv}, eprint = {1310.4216}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FachkhaBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/OuchaniJMD12, author = {Samir Ouchani and Yosr Jarraya and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi}, title = {Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols}, journal = {J. Softw.}, volume = {7}, number = {7}, pages = {1488--1495}, year = {2012}, url = {https://doi.org/10.4304/jsw.7.7.1488-1495}, doi = {10.4304/JSW.7.7.1488-1495}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/OuchaniJMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/DasPD12, author = {Swagata Das and Makan Pourzandi and Mourad Debbabi}, title = {On {SPIM} detection in {LTE} networks}, booktitle = {25th {IEEE} Canadian Conference on Electrical and Computer Engineering, {CCECE} 2012, Montreal, QC, Canada, April 29 - May 2, 2012}, pages = {1--4}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCECE.2012.6334959}, doi = {10.1109/CCECE.2012.6334959}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccece/DasPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/SoeanuRDBBG12, author = {Andrei Soeanu and Sujoy Ray and Mourad Debbabi and Jean Berger and Abdeslem Boukhtouta and Ahmed Ghanmi}, title = {Model checking based service delivery planning}, booktitle = {25th {IEEE} Canadian Conference on Electrical and Computer Engineering, {CCECE} 2012, Montreal, QC, Canada, April 29 - May 2, 2012}, pages = {1--4}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCECE.2012.6334956}, doi = {10.1109/CCECE.2012.6334956}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccece/SoeanuRDBBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/FachkhaBBDID12, author = {Claude Fachkha and Elias Bou{-}Harb and Amine Boukhtouta and Son Dinh and Farkhund Iqbal and Mourad Debbabi}, editor = {Fabio Martinelli and Jean{-}Louis Lanet and William M. Fitzgerald and Simon N. Foley}, title = {Investigating the dark cyberspace: Profiling, threat-based analysis and correlation}, booktitle = {7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CRISIS.2012.6378947}, doi = {10.1109/CRISIS.2012.6378947}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/FachkhaBBDID12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/JarrayaEDZP12, author = {Yosr Jarraya and Arash Eghtesadi and Mourad Debbabi and Ying Zhang and Makan Pourzandi}, editor = {Waleed W. Smari and Geoffrey Charles Fox}, title = {Cloud calculus: Security verification in elastic cloud computing platform}, booktitle = {2012 International Conference on Collaboration Technologies and Systems, {CTS} 2012, Denver, CO, USA, May 21-25, 2012}, pages = {447--454}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CTS.2012.6261089}, doi = {10.1109/CTS.2012.6261089}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cts/JarrayaEDZP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/RahimianCPD12, author = {Ashkan Rahimian and Philippe Charland and Stere Preda and Mourad Debbabi}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ali Miri and Nadia Tawbi}, title = {RESource: {A} Framework for Online Matching of Assembly with Open Source Code}, booktitle = {Foundations and Practice of Security - 5th International Symposium, {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7743}, pages = {211--226}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37119-6\_14}, doi = {10.1007/978-3-642-37119-6\_14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/RahimianCPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Bou-HarbDA12, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A first look on the effects and mitigation of VoIP {SPIT} flooding in 4G mobile networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {982--987}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364233}, doi = {10.1109/ICC.2012.6364233}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/Bou-HarbDA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/SoeanuRDBB12, author = {Andrei Soeanu and Sujoy Ray and Mourad Debbabi and Jean Berger and Abdeslem Boukhtouta}, editor = {Manuel Gra{\~{n}}a and Carlos Toro and Jorge Posada and Robert J. Howlett and Lakhmi C. Jain}, title = {A Learning Based Evolutionary Algorithm For Distributed Multi-Depot {VRP}}, booktitle = {Advances in Knowledge-Based and Intelligent Information and Engineering Systems - 16th Annual {KES} Conference, San Sebastian, Spain, 10-12 September 2012}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {243}, pages = {49--58}, publisher = {{IOS} Press}, year = {2012}, url = {https://doi.org/10.3233/978-1-61499-105-2-49}, doi = {10.3233/978-1-61499-105-2-49}, timestamp = {Sun, 04 Aug 2024 19:26:36 +0200}, biburl = {https://dblp.org/rec/conf/kes/SoeanuRDBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/LiuWRCD12, author = {Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {k-Indistinguishable Traffic Padding in Web Applications}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {79--99}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_5}, doi = {10.1007/978-3-642-31680-7\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/LiuWRCD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/AlhadidiMFD12, author = {Dima Alhadidi and Noman Mohammed and Benjamin C. M. Fung and Mourad Debbabi}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {Secure Distributed Framework for Achieving {\(\epsilon\)}-Differential Privacy}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {120--139}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_7}, doi = {10.1007/978-3-642-31680-7\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/AlhadidiMFD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SalehSRDBB12, author = {Mohamed Mostafa Saleh and Andrei Soeanu and Sujoy Ray and Mourad Debbabi and Jean Berger and Abdeslem Boukhtouta}, editor = {Sascha Ossowski and Paola Lecca}, title = {Mechanism design for decentralized vehicle routing problem}, booktitle = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012, Riva, Trento, Italy, March 26-30, 2012}, pages = {749--754}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2245276.2245419}, doi = {10.1145/2245276.2245419}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/SalehSRDBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HoumaniD12, author = {Hanane Houmani and Mourad Debbabi}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Formal Analysis of the {TLS} Handshake Protocol}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {192--205}, publisher = {SciTePress}, year = {2012}, timestamp = {Tue, 07 Nov 2017 12:02:58 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/HoumaniD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/OuchaniMD12, author = {Samir Ouchani and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi}, editor = {George Eleftherakis and Mike Hinchey and Mike Holcombe}, title = {Efficient Probabilistic Abstraction for SysML Activity Diagrams}, booktitle = {Software Engineering and Formal Methods - 10th International Conference, {SEFM} 2012, Thessaloniki, Greece, October 1-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7504}, pages = {263--277}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33826-7\_18}, doi = {10.1007/978-3-642-33826-7\_18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sefm/OuchaniMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/OuchaniMD12, author = {Samir Ouchani and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi}, editor = {Hamido Fujita and Roberto Revetria}, title = {A Probabilistic Verification Framework for SysML Activity Diagrams}, booktitle = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Eleventh SoMeT '12, Genoa, Italy, September 26-28, 2012}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {246}, pages = {108--123}, publisher = {{IOS} Press}, year = {2012}, url = {https://doi.org/10.3233/978-1-61499-125-0-108}, doi = {10.3233/978-1-61499-125-0-108}, timestamp = {Tue, 09 Jul 2024 18:22:51 +0200}, biburl = {https://dblp.org/rec/conf/somet/OuchaniMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/MouhebZD12, author = {Djedjiga Mouheb and Raha Ziarati and Mourad Debbabi}, editor = {Hamido Fujita and Roberto Revetria}, title = {Continuation/Frame-based Semantics for Aspect Matching and Weaving}, booktitle = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Eleventh SoMeT '12, Genoa, Italy, September 26-28, 2012}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {246}, pages = {146--161}, publisher = {{IOS} Press}, year = {2012}, url = {https://doi.org/10.3233/978-1-61499-125-0-146}, doi = {10.3233/978-1-61499-125-0-146}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/somet/MouhebZD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/JarrayaEDZP12, author = {Yosr Jarraya and Arash Eghtesadi and Mourad Debbabi and Ying Zhang and Makan Pourzandi}, editor = {Andr{\'{e}}a W. Richa and Christian Scheideler}, title = {Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 14th International Symposium, {SSS} 2012, Toronto, Canada, October 1-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7596}, pages = {111--125}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33536-5\_12}, doi = {10.1007/978-3-642-33536-5\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sss/JarrayaEDZP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/JarrayaD12, author = {Yosr Jarraya and Mourad Debbabi}, editor = {Tiziana Margaria and Zongyan Qiu and Hongli Yang}, title = {Formal Specification and Probabilistic Verification of SysML Activity Diagrams}, booktitle = {Sixth International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2012, 4-6 July 2012, Beijing, China}, pages = {17--24}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TASE.2012.34}, doi = {10.1109/TASE.2012.34}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tase/JarrayaD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/IqbalFD12, author = {Farkhund Iqbal and Benjamin C. M. Fung and Mourad Debbabi}, title = {Mining Criminal Networks from Chat Log}, booktitle = {2012 {IEEE/WIC/ACM} International Conferences on Web Intelligence, {WI} 2012, Macau, China, December 4-7, 2012}, pages = {332--337}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/WI-IAT.2012.68}, doi = {10.1109/WI-IAT.2012.68}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/webi/IqbalFD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-3718, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi and Yankui Sun}, title = {{MARFCAT:} Transitioning to Binary and Larger Data Sets of {SATE} {IV}}, journal = {CoRR}, volume = {abs/1207.3718}, year = {2012}, url = {http://arxiv.org/abs/1207.3718}, eprinttype = {arXiv}, eprint = {1207.3718}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-3718.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohammedOWDB11, author = {Noman Mohammed and Hadi Otrok and Lingyu Wang and Mourad Debbabi and Prabir Bhattacharya}, title = {Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in {MANET}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {1}, pages = {89--103}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2009.22}, doi = {10.1109/TDSC.2009.22}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MohammedOWDB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/MohammedFD11, author = {Noman Mohammed and Benjamin C. M. Fung and Mourad Debbabi}, title = {Anonymity meets game theory: secure data integration with malicious participants}, journal = {{VLDB} J.}, volume = {20}, number = {4}, pages = {567--588}, year = {2011}, url = {https://doi.org/10.1007/s00778-010-0214-6}, doi = {10.1007/S00778-010-0214-6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vldb/MohammedFD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ical/SoeanuRDBBG11, author = {Andrei Soeanu and Sujoy Ray and Mourad Debbabi and Jean Berger and Abdeslem Boukhtouta and Ahmed Ghanmi}, title = {A decentralized heuristic for multi-depot split-delivery vehicle routing problem}, booktitle = {{IEEE} International Conference on Automation and Logistics, {ICAL} 2011, Chongqing, China, 15-16 August, 2011}, pages = {70--75}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICAL.2011.6024686}, doi = {10.1109/ICAL.2011.6024686}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ical/SoeanuRDBBG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MokhovPD11, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Reasoning About a Simulated Printer Case Investigation with Forensic Lucid}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {282--296}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_23}, doi = {10.1007/978-3-642-35515-8\_23}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MokhovPD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MokhovPD11, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, title = {On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by {GIPSY}}, booktitle = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011, 19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada}, pages = {120--123}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/PST.2011.5971973}, doi = {10.1109/PST.2011.5971973}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/MokhovPD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/LiuWCD11, author = {Wen Ming Liu and Lingyu Wang and Pengsu Cheng and Mourad Debbabi}, editor = {Yan Chen and Jaideep Vaidya}, title = {Privacy-preserving traffic padding in web-based applications}, booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic society, {WPES} 2011, Chicago, IL, USA, October 17, 2011}, pages = {131--136}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046556.2046573}, doi = {10.1145/2046556.2046573}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/LiuWCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0025738, author = {Mourad Debbabi and Fawzi Hassa{\"{\i}}ne and Yosr Jarraya and Andrei Soeanu and Luay Alawneh}, title = {Verification and Validation in Systems Engineering - Assessing {UML} / SysML Design Models}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15228-3}, doi = {10.1007/978-3-642-15228-3}, isbn = {978-3-642-15227-6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0025738.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/IqbalBFD10, author = {Farkhund Iqbal and Hamad Binsalleeh and Benjamin C. M. Fung and Mourad Debbabi}, title = {Mining writeprints from anonymous e-mails for forensic investigation}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {56--64}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.03.003}, doi = {10.1016/J.DIIN.2010.03.003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/IqbalBFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/CharpentierDAMBBHHKLLTYY10, author = {Robert Charpentier and Mourad Debbabi and Dima Alhadidi and Azzam Mourad and Nadia Belblidia and Amine Boukhtouta and Aiman Hanna and Rachid Hadjidj and Hakim Idrissi Kaitouni and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Hai Zhou Ling and Syrine Tlili and Xiaochun Yang and Zhenrong Yang}, title = {Security Evaluation and Hardening of Free and Open Source Software {(FOSS)}}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {33}, year = {2010}, url = {https://doi.org/10.14279/tuj.eceasst.33.452}, doi = {10.14279/TUJ.ECEASST.33.452}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/CharpentierDAMBBHHKLLTYY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/SalehD10, author = {Mohamed Mostafa Saleh and Mourad Debbabi}, title = {A game-theoretic framework for specification and verification of cryptographic protocols}, journal = {Formal Aspects Comput.}, volume = {22}, number = {5}, pages = {585--609}, year = {2010}, url = {https://doi.org/10.1007/s00165-009-0129-4}, doi = {10.1007/S00165-009-0129-4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/SalehD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/RachediBOMD10, author = {Abderrezak Rachedi and Abderrahim Benslimane and Hadi Otrok and Noman Mohammed and Mourad Debbabi}, title = {A Secure Mechanism Design-Based and Game Theoretical Model for MANETs}, journal = {Mob. Networks Appl.}, volume = {15}, number = {2}, pages = {191--204}, year = {2010}, url = {https://doi.org/10.1007/s11036-009-0164-7}, doi = {10.1007/S11036-009-0164-7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/RachediBOMD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuRWD10, author = {Bo Zhu and Kui Ren and Lingyu Wang and Mourad Debbabi}, title = {{PCM:} a privacy-preserving detection mechanism in mobile \emph{ad hoc} networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {167--184}, year = {2010}, url = {https://doi.org/10.1002/sec.122}, doi = {10.1002/SEC.122}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhuRWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c3s2e/MokhovVPD10, author = {Serguei A. Mokhov and Emil Vassev and Joey Paquet and Mourad Debbabi}, editor = {Bipin C. Desai and Carson Kai{-}Sang Leung and Sudhir P. Mudur}, title = {Towards a self-forensics property in the {ASSL} toolset}, booktitle = {Canadian Conference on Computer Science {\&} Software Engineering, {C3S2E} 2010, Montreal, Quebec, Canada, May 19-20, 2010, Proceedings}, series = {{ACM} International Conference Proceeding Series}, pages = {108--113}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1822327.1822342}, doi = {10.1145/1822327.1822342}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c3s2e/MokhovVPD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/NouhZMADWP10, author = {Mariam Nouh and Raha Ziarati and Djedjiga Mouheb and Dima Alhadidi and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Joanna W. Ng and Christian Couturier and Hausi A. M{\"{u}}ller and Arthur G. Ryman and Anatol W. Kark}, title = {Aspect weaver: a model transformation approach for {UML} models}, booktitle = {Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, November 1-4, 2010, Toronto, Ontario, Canada}, pages = {139--153}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1923947.1923962}, doi = {10.1145/1923947.1923962}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cascon/NouhZMADWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/SinhaBBD10, author = {Prosenjit Sinha and Amine Boukhtouta and Victor Heber Belarde and Mourad Debbabi}, title = {Insights from the analysis of the Mariposa botnet}, booktitle = {CRiSIS 2010, Proceedings of the Fifth International Conference on Risks and Security of Internet and Systems, Montreal, QC, Canada, October 10-13, 2010}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CRISIS.2010.5764915}, doi = {10.1109/CRISIS.2010.5764915}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/SinhaBBD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/facs2/MouhebANDWP10, author = {Djedjiga Mouheb and Dima Alhadidi and Mariam Nouh and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Lu{\'{\i}}s Soares Barbosa and Markus Lumpe}, title = {Aspect Weaving in {UML} Activity Diagrams: {A} Semantic and Algorithmic Framework}, booktitle = {Formal Aspects of Component Software - 7th International Workshop, {FACS} 2010, Guimar{\~{a}}es, Portugal, October 14-16, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6921}, pages = {182--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27269-1\_11}, doi = {10.1007/978-3-642-27269-1\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/facs2/MouhebANDWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BinsalleehOBSYDW10, author = {Hamad Binsalleeh and Thomas C. Ormerod and Amine Boukhtouta and Prosenjit Sinha and Amr M. Youssef and Mourad Debbabi and Lingyu Wang}, title = {On the analysis of the Zeus botnet crimeware toolkit}, booktitle = {Eighth Annual Conference on Privacy, Security and Trust, {PST} 2010, August 17-19, 2010, Ottawa, Ontario, Canada}, pages = {31--38}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/PST.2010.5593240}, doi = {10.1109/PST.2010.5593240}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/BinsalleehOBSYDW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MokhovPD10, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the {IDS} Evidence}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {508--509}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_36}, doi = {10.1007/978-3-642-15512-3\_36}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MokhovPD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/IqbalKFD10, author = {Farkhund Iqbal and Liaquat A. Khan and Benjamin C. M. Fung and Mourad Debbabi}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {e-mail authorship verification for forensic investigation}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1591--1598}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774428}, doi = {10.1145/1774088.1774428}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/IqbalKFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/OrmerodWDYBBS10, author = {Thomas C. Ormerod and Lingyu Wang and Mourad Debbabi and Amr M. Youssef and Hamad Binsalleeh and Amine Boukhtouta and Prosenjit Sinha}, editor = {Reijo Savola and Masaru Takesue and Rainer Falk and Manuela Popescu}, title = {Defaming Botnet Toolkits: {A} Bottom-Up Approach to Mitigating the Threat}, booktitle = {Fourth International Conference on Emerging Security Information Systems and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010}, pages = {195--200}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SECURWARE.2010.39}, doi = {10.1109/SECURWARE.2010.39}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securware/OrmerodWDYBBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/OuchaniMDP10, author = {Samir Ouchani and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi and Makan Pourzandi}, editor = {Roger Y. Lee and Olga Ormandjieva and Alain Abran and Constantinos Constantinides}, title = {Verification of the Correctness in Composed {UML} Behavioural Diagrams}, booktitle = {Software Engineering Research, Management and Applications 2010 [selected papers from the 8th {ACIS} International Conference on Software Engineering Research, Management and Applications, {SERA} 2010, Montreal, Canada, May 24-26, 2010]}, series = {Studies in Computational Intelligence}, volume = {296}, pages = {163--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13273-5\_11}, doi = {10.1007/978-3-642-13273-5\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sera/OuchaniMDP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/MouhebTNLDWP10, author = {Djedjiga Mouheb and Chamseddine Talhi and Mariam Nouh and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Roger Y. Lee and Olga Ormandjieva and Alain Abran and Constantinos Constantinides}, title = {Aspect-Oriented Modeling for Representing and Integrating Security Concerns in {UML}}, booktitle = {Software Engineering Research, Management and Applications 2010 [selected papers from the 8th {ACIS} International Conference on Software Engineering Research, Management and Applications, {SERA} 2010, Montreal, Canada, May 24-26, 2010]}, series = {Studies in Computational Intelligence}, volume = {296}, pages = {197--213}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13273-5\_13}, doi = {10.1007/978-3-642-13273-5\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sera/MouhebTNLDWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1009-5423, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, title = {The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by {GIPSY}}, journal = {CoRR}, volume = {abs/1009.5423}, year = {2010}, url = {http://arxiv.org/abs/1009.5423}, eprinttype = {arXiv}, eprint = {1009.5423}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1009-5423.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AlhadidiBDB09, author = {Dima Alhadidi and Nadia Belblidia and Mourad Debbabi and Prabir Bhattacharya}, title = {lambda{\_}SAOP: {A} Security {AOP} Calculus}, journal = {Comput. J.}, volume = {52}, number = {7}, pages = {824--849}, year = {2009}, url = {https://doi.org/10.1093/comjnl/bxn065}, doi = {10.1093/COMJNL/BXN065}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AlhadidiBDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MouradSLD09, author = {Azzam Mourad and Andrei Soeanu and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Mourad Debbabi}, title = {New aspect-oriented constructs for security hardening concerns}, journal = {Comput. Secur.}, volume = {28}, number = {6}, pages = {341--358}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2009.02.003}, doi = {10.1016/J.COSE.2009.02.003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MouradSLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HadjidjDLISB09, author = {Rachid Hadjidj and Mourad Debbabi and Hakim Lounis and Farkhund Iqbal and Adam Szporer and Djamel Benredjem}, title = {Towards an integrated e-mail forensic analysis framework}, journal = {Digit. Investig.}, volume = {5}, number = {3-4}, pages = {124--137}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.01.004}, doi = {10.1016/J.DIIN.2009.01.004}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HadjidjDLISB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HejaziTD09, author = {Seyed Mahmood Hejazi and Chamseddine Talhi and Mourad Debbabi}, title = {Extraction of forensically sensitive information from windows physical memory}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S121--S131}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.003}, doi = {10.1016/J.DIIN.2009.06.003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HejaziTD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eis/IssaADR09, author = {Hassan Issa and Chadi Assi and Mourad Debbabi and Sujoy Ray}, title = {QoS-aware middleware for web services composition: a qualitative approach}, journal = {Enterp. Inf. Syst.}, volume = {3}, number = {4}, pages = {449--470}, year = {2009}, url = {https://doi.org/10.1080/17517570903042754}, doi = {10.1080/17517570903042754}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eis/IssaADR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgs/JarrayaSADH09, author = {Yosr Jarraya and Andrei Soeanu and Luay Alawneh and Mourad Debbabi and Fawzi Hassa{\"{\i}}ne}, title = {Synergistic verification and validation of systems and software engineering models}, journal = {Int. J. Gen. Syst.}, volume = {38}, number = {7}, pages = {719--746}, year = {2009}, url = {https://doi.org/10.1080/03081070903029253}, doi = {10.1080/03081070903029253}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijgs/JarrayaSADH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BoukhtoutaAD09, author = {Amine Boukhtouta and Dima Alhadidi and Mourad Debbabi}, title = {Capturing Returned Computable Values in AspectJ for Security Hardening}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {2}, pages = {87--98}, year = {2009}, url = {https://doi.org/10.1080/19393550902791432}, doi = {10.1080/19393550902791432}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BoukhtoutaAD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/TliliD09, author = {Syrine Tlili and Mourad Debbabi}, title = {Interprocedural and Flow-Sensitive Type Analysis for Memory and Type Safety of {C} Code}, journal = {J. Autom. Reason.}, volume = {42}, number = {2-4}, pages = {265--300}, year = {2009}, url = {https://doi.org/10.1007/s10817-009-9121-1}, doi = {10.1007/S10817-009-9121-1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/TliliD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/TalhiMLDWP09, author = {Chamseddine Talhi and Djedjiga Mouheb and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, title = {Usability of Security Specification Approaches for {UML} Design: {A} Survey}, journal = {J. Object Technol.}, volume = {8}, number = {6}, pages = {102--122}, year = {2009}, url = {https://doi.org/10.5381/jot.2009.8.6.a1}, doi = {10.5381/JOT.2009.8.6.A1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jot/TalhiMLDWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/MouradLSD09, author = {Azzam Mourad and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Andrei Soeanu and Mourad Debbabi}, title = {Nouveaux points de coupure et primitives pour les pr{\'{e}}occupations de renforcement de s{\'{e}}curit{\'{e}}}, journal = {Tech. Sci. Informatiques}, volume = {28}, number = {5}, pages = {611--644}, year = {2009}, url = {https://doi.org/10.3166/tsi.28.611-644}, doi = {10.3166/TSI.28.611-644}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/MouradLSD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BoukhtoutaAD09, author = {Amine Boukhtouta and Dima Alhadidi and Mourad Debbabi}, title = {A Practical Framework for the Dataflow Pointcut in AspectJ}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {835--840}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.86}, doi = {10.1109/ARES.2009.86}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BoukhtoutaAD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aosd/MouhebTLD0P09, author = {Djedjiga Mouheb and Chamseddine Talhi and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Omar Aldawud and Walter Cazzola and Thomas Cottenier and Jeff Gray and J{\"{o}}rg Kienzle and Dominik Stein}, title = {Weaving security aspects into {UML} 2.0 design models}, booktitle = {Proceedings of the 13th workshop on Aspect-oriented modeling, {AOM} '09, Charlottesville, Virginia, USA, March 2, 2009}, pages = {7--12}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1509297.1509300}, doi = {10.1145/1509297.1509300}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aosd/MouhebTLD0P09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aosd/AlhadidiBBDB09, author = {Dima Alhadidi and Amine Boukhtouta and Nadia Belblidia and Mourad Debbabi and Prabir Bhattacharya}, editor = {Kevin J. Sullivan and Ana Moreira and Christa Schwanninger and Jeff Gray}, title = {The dataflow pointcut: a formal and practical framework}, booktitle = {Proceedings of the 8th International Conference on Aspect-Oriented Software Development, {AOSD} 2009, Charlottesville, Virginia, USA, March 2-6, 2009}, pages = {15--26}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1509239.1509244}, doi = {10.1145/1509239.1509244}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aosd/AlhadidiBBDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/MohammedFD09, author = {Noman Mohammed and Benjamin C. M. Fung and Mourad Debbabi}, editor = {David Wai{-}Lok Cheung and Il{-}Yeol Song and Wesley W. Chu and Xiaohua Hu and Jimmy Lin}, title = {Walking in the crowd: anonymizing trajectory data for pattern analysis}, booktitle = {Proceedings of the 18th {ACM} Conference on Information and Knowledge Management, {CIKM} 2009, Hong Kong, China, November 2-6, 2009}, pages = {1441--1444}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1645953.1646140}, doi = {10.1145/1645953.1646140}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/MohammedFD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/JarrayaDB09, author = {Yosr Jarraya and Mourad Debbabi and Jamal Bentahar}, title = {On the Meaning of SysML Activity Diagrams}, booktitle = {16th Annual {IEEE} International Conference and Workshop on the Engineering of Computer Based Systems, {ECBS} 2009, San Francisco, California, USA, 14-16 April 2009}, pages = {95--105}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ECBS.2009.25}, doi = {10.1109/ECBS.2009.25}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecbs/JarrayaDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hsc/MokhovPD09, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, editor = {Joseph S. Gauthier}, title = {Reasoning About a Simulated Printer Case Investigation with Forensic Lucid (abstract)}, booktitle = {The Huntsville Simulation Conference - {HSC} 2009, Huntsville, AL, USA, October 27-29, 2009. Proceedings}, pages = {45}, publisher = {The Society for Modeling and Simulation International {(SCS)}}, year = {2009}, timestamp = {Wed, 01 Dec 2010 07:09:59 +0100}, biburl = {https://dblp.org/rec/conf/hsc/MokhovPD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hsc/MokhovPD09a, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, editor = {Joseph S. Gauthier}, title = {Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid}, booktitle = {The Huntsville Simulation Conference - {HSC} 2009, Huntsville, AL, USA, October 27-29, 2009. Proceedings}, pages = {326--333}, publisher = {The Society for Modeling and Simulation International {(SCS)}}, year = {2009}, timestamp = {Tue, 30 Nov 2010 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hsc/MokhovPD09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/HannaLYD09, author = {Aiman Hanna and Hai Zhou Ling and Xiaochun Yang and Mourad Debbabi}, editor = {Robert Meersman and Tharam S. Dillon and Pilar Herrero}, title = {A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5871}, pages = {815--832}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05151-7\_5}, doi = {10.1007/978-3-642-05151-7\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/HannaLYD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/TliliYHD09, author = {Syrine Tlili and Xiaochun Yang and Rachid Hadjidj and Mourad Debbabi}, editor = {Robert Meersman and Tharam S. Dillon and Pilar Herrero}, title = {Verification of {CERT} Secure Coding Rules: Case Studies}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5871}, pages = {913--930}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05151-7\_12}, doi = {10.1007/978-3-642-05151-7\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/TliliYHD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/MouhebTMLDWP09, author = {Djedjiga Mouheb and Chamseddine Talhi and Azzam Mourad and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Hamido Fujita and Vladim{\'{\i}}r Mar{\'{\i}}k}, title = {An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation}, booktitle = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Eighth SoMeT 2009, September 23-25, 2009, Prague, Czech Republic}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {199}, pages = {203--222}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-60750-049-0-203}, doi = {10.3233/978-1-60750-049-0-203}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/somet/MouhebTMLDWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/LimaTMDWP09, author = {Vitor Lima and Chamseddine Talhi and Djedjiga Mouheb and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Ralf Huuck and Gerwin Klein and Bastian Schlich}, title = {Formal Verification and Validation of {UML} 2.0 Sequence Diagrams using Source and Destination of Messages}, booktitle = {Proceedings of the 4th International Workshop on Systems Software Verification, {SSV} 2009, Aachen, Germany, June 22-24, 2009}, series = {Electronic Notes in Theoretical Computer Science}, volume = {254}, pages = {143--160}, publisher = {Elsevier}, year = {2009}, url = {https://doi.org/10.1016/j.entcs.2009.09.064}, doi = {10.1016/J.ENTCS.2009.09.064}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/LimaTMDWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0906-0049, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, title = {Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid}, journal = {CoRR}, volume = {abs/0906.0049}, year = {2009}, url = {http://arxiv.org/abs/0906.0049}, eprinttype = {arXiv}, eprint = {0906.0049}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0906-0049.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0906-5181, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, title = {Reasoning About an {ACME} Printer Case Investigation with Forensic Lucid}, journal = {CoRR}, volume = {abs/0906.5181}, year = {2009}, url = {http://arxiv.org/abs/0906.5181}, eprinttype = {arXiv}, eprint = {0906.5181}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0906-5181.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/OtrokMWDB08, author = {Hadi Otrok and Noman Mohammed and Lingyu Wang and Mourad Debbabi and Prabir Bhattacharya}, title = {A game-theoretic intrusion detection model for mobile ad hoc networks}, journal = {Comput. Commun.}, volume = {31}, number = {4}, pages = {708--721}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2007.10.024}, doi = {10.1016/J.COMCOM.2007.10.024}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/OtrokMWDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/OtrokMADB08, author = {Hadi Otrok and Mona Mehrandish and Chadi Assi and Mourad Debbabi and Prabir Bhattacharya}, title = {Game theoretic models for detecting network intrusions}, journal = {Comput. Commun.}, volume = {31}, number = {10}, pages = {1934--1944}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2007.12.028}, doi = {10.1016/J.COMCOM.2007.12.028}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/OtrokMADB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MouradLD08, author = {Azzam Mourad and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Mourad Debbabi}, title = {An aspect-oriented approach for the systematic security hardening of code}, journal = {Comput. Secur.}, volume = {27}, number = {3-4}, pages = {101--114}, year = {2008}, url = {https://doi.org/10.1016/j.cose.2008.04.003}, doi = {10.1016/J.COSE.2008.04.003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MouradLD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/IqbalHFD08, author = {Farkhund Iqbal and Rachid Hadjidj and Benjamin C. M. Fung and Mourad Debbabi}, title = {A novel approach of mining write-prints for authorship attribution in e-mail forensics}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S42--S51}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.001}, doi = {10.1016/J.DIIN.2008.05.001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/IqbalHFD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/TalhiTD08, author = {Chamseddine Talhi and Nadia Tawbi and Mourad Debbabi}, title = {Execution monitoring enforcement under memory-limitation constraints}, journal = {Inf. Comput.}, volume = {206}, number = {2-4}, pages = {158--184}, year = {2008}, url = {https://doi.org/10.1016/j.ic.2007.07.009}, doi = {10.1016/J.IC.2007.07.009}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/TalhiTD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MouradLD08, author = {Azzam Mourad and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Mourad Debbabi}, title = {A High-level Aspect-oriented-based Framework for Software Security Hardening}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {17}, number = {2}, pages = {56--74}, year = {2008}, url = {https://doi.org/10.1080/19393550801911230}, doi = {10.1080/19393550801911230}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/MouradLD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/AlhadidiDB08, author = {Dima Alhadidi and Mourad Debbabi and Prabir Bhattacharya}, title = {New AspectJ Pointcuts for Integer Overflow and Underflow Detection}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {17}, number = {5{\&}6}, pages = {278--287}, year = {2008}, url = {https://doi.org/10.1080/19393550802492479}, doi = {10.1080/19393550802492479}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/AlhadidiDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/HejaziDT08, author = {Seyed Mahmood Hejazi and Mourad Debbabi and Chamseddine Talhi}, title = {Automated Windows Memory File Extraction for Cyber Forensics Investigation}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {3}, pages = {117--131}, year = {2008}, url = {https://doi.org/10.1080/15567280802552829}, doi = {10.1080/15567280802552829}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/HejaziDT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TliliD08, author = {Syrine Tlili and Mourad Debbabi}, title = {Type and Effect Annotations for Safe Memory Access in {C}}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {302--309}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.18}, doi = {10.1109/ARES.2008.18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/TliliD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/TliliD08, author = {Syrine Tlili and Mourad Debbabi}, title = {A novel flow-sensitive type and effect analysis for securing {C} code}, booktitle = {The 6th {ACS/IEEE} International Conference on Computer Systems and Applications, {AICCSA} 2008, Doha, Qatar, March 31 - April 4, 2008}, pages = {661--668}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/AICCSA.2008.4493600}, doi = {10.1109/AICCSA.2008.4493600}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aiccsa/TliliD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/TliliYLD08, author = {Syrine Tlili and Zhenrong Yang and Hai Zhou Ling and Mourad Debbabi}, editor = {Jos{\'{e}} Meseguer and Grigore Rosu}, title = {A Hybrid Approach for Safe Memory Management in {C}}, booktitle = {Algebraic Methodology and Software Technology, 12th International Conference, {AMAST} 2008, Urbana, IL, USA, July 28-31, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5140}, pages = {377--391}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79980-1\_28}, doi = {10.1007/978-3-540-79980-1\_28}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amast/TliliYLD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HannaLFD08, author = {Aiman Hanna and Hai Zhou Ling and Jason Furlong and Mourad Debbabi}, editor = {Vijay Atluri}, title = {Towards Automation of Testing High-Level Security Properties}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {268--282}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_21}, doi = {10.1007/978-3-540-70567-3\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HannaLFD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/MokhovD08, author = {Serguei A. Mokhov and Mourad Debbabi}, editor = {Oliver G{\"{o}}bel and Sandra Frings and Detlef G{\"{u}}nther and Jens Nedon and Dirk Schadt}, title = {File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2008, Conference Proceedings, September 23-25, 2008, Mannheim, Germany}, series = {{LNI}}, volume = {{P-140}}, pages = {73--85}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/23599}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/MokhovD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/MokhovPD08, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, editor = {Oliver G{\"{o}}bel and Sandra Frings and Detlef G{\"{u}}nther and Jens Nedon and Dirk Schadt}, title = {Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2008, Conference Proceedings, September 23-25, 2008, Mannheim, Germany}, series = {{LNI}}, volume = {{P-140}}, pages = {197--216}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/23592}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/MokhovPD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FungWWD08, author = {Benjamin C. M. Fung and Ke Wang and Lingyu Wang and Mourad Debbabi}, title = {A framework for privacy-preserving cluster analysis}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {46--51}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565028}, doi = {10.1109/ISI.2008.4565028}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/FungWWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MouradAD08, author = {Azzam Mourad and Dima Alhadidi and Mourad Debbabi}, editor = {Larry Korba and Stephen Marsh and Reihaneh Safavi{-}Naini}, title = {Cross-Language Weaving Approach Targeting Software Security Hardening}, booktitle = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada}, pages = {87--98}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PST.2008.22}, doi = {10.1109/PST.2008.22}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/MouradAD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HadjidjYTD08, author = {Rachid Hadjidj and Xiaochun Yang and Syrine Tlili and Mourad Debbabi}, editor = {Larry Korba and Stephen Marsh and Reihaneh Safavi{-}Naini}, title = {Model-Checking for Software Vulnerabilities Detection with Multi-Language Support}, booktitle = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada}, pages = {133--142}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PST.2008.21}, doi = {10.1109/PST.2008.21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/HadjidjYTD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qsic/HannaLFYD08, author = {Aiman Hanna and Hai Zhou Ling and Jason Furlong and Zhenrong Yang and Mourad Debbabi}, editor = {Hong Zhu}, title = {Targeting Security Vulnerabilities: From Specification to Detection (Short Paper)}, booktitle = {Proceedings of the Eighth International Conference on Quality Software, {QSIC} 2008, 12-13 August 2008, Oxford, {UK}}, pages = {97--102}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/QSIC.2008.35}, doi = {10.1109/QSIC.2008.35}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qsic/HannaLFYD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MouradAD08, author = {Azzam Mourad and Dima Alhadidi and Mourad Debbabi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Towards Language-Independent Approach for Security Concerns Weaving}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {460--465}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 13:20:36 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MouradAD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/MohammedOWDB08, author = {Noman Mohammed and Hadi Otrok and Lingyu Wang and Mourad Debbabi and Prabir Bhattacharya}, title = {A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in {MANET}}, booktitle = {{WCNC} 2008, {IEEE} Wireless Communications {\&} Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings}, pages = {2816--2821}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/WCNC.2008.493}, doi = {10.1109/WCNC.2008.493}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/MohammedOWDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/RachediBOMD08, author = {Abderrezak Rachedi and Abderrahim Benslimane and Hadi Otrok and Noman Mohammed and Mourad Debbabi}, title = {A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks}, booktitle = {{IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, Avignon, France, 12-14 October 2008, Proceedings}, pages = {417--422}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WiMob.2008.77}, doi = {10.1109/WIMOB.2008.77}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wimob/RachediBOMD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/OtrokMWDB08, author = {Hadi Otrok and Noman Mohammed and Lingyu Wang and Mourad Debbabi and Prabir Bhattacharya}, title = {A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs}, booktitle = {{IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, Avignon, France, 12-14 October 2008, Proceedings}, pages = {608--612}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WiMob.2008.21}, doi = {10.1109/WIMOB.2008.21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wimob/OtrokMWDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/AssiBDMO08, author = {Chadi Assi and Prabir Bhattacharya and Mourad Debbabi and Mona Mehrandish and Hadi Otrok}, title = {Mobile Security: Game Theory}, booktitle = {Encyclopedia of Wireless and Mobile Communications}, year = {2008}, url = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043182}, doi = {10.1081/E-EWMC-120043182}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/AssiBDMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/DebbabiLMT08, author = {Mourad Debbabi and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Azzam Mourad and Syrine Tlili}, title = {Wireless Applications: Middleware Security}, booktitle = {Encyclopedia of Wireless and Mobile Communications}, year = {2008}, url = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043598}, doi = {10.1081/E-EWMC-120043598}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/DebbabiLMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ArastehDSS07, author = {Ali Reza Arasteh and Mourad Debbabi and Assaad Sakha and Mohamed Mostafa Saleh}, title = {Analyzing multiple logs for forensic evidence}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {82--91}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.013}, doi = {10.1016/J.DIIN.2007.06.013}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ArastehDSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ArastehD07, author = {Ali Reza Arasteh and Mourad Debbabi}, title = {Forensic memory analysis: From stack and code to execution history}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {114--125}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.010}, doi = {10.1016/J.DIIN.2007.06.010}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ArastehD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/BelblidiaD07, author = {Nadia Belblidia and Mourad Debbabi}, title = {A Dynamic Operational Semantics for {JVML}}, journal = {J. Object Technol.}, volume = {6}, number = {3}, pages = {71--100}, year = {2007}, url = {https://doi.org/10.5381/jot.2007.6.3.a2}, doi = {10.5381/JOT.2007.6.3.A2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jot/BelblidiaD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/DebbabiF07, author = {Mourad Debbabi and M. Fourati}, title = {A Formal Type System for Java}, journal = {J. Object Technol.}, volume = {6}, number = {8}, pages = {117--184}, year = {2007}, url = {https://doi.org/10.5381/jot.2007.6.8.a3}, doi = {10.5381/JOT.2007.6.8.A3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jot/DebbabiF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/BenssamBBDRS07, author = {Ali Benssam and Jean Berger and Abdeslem Boukhtouta and Mourad Debbabi and Sujoy Ray and Abderrazak Sahi}, title = {What middleware for network centric operations?}, journal = {Knowl. Based Syst.}, volume = {20}, number = {3}, pages = {255--265}, year = {2007}, url = {https://doi.org/10.1016/j.knosys.2006.05.020}, doi = {10.1016/J.KNOSYS.2006.05.020}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/BenssamBBDRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/SalehASD07, author = {Mohamed Mostafa Saleh and Ali Reza Arasteh and Assaad Sakha and Mourad Debbabi}, title = {Forensic analysis of logs: Modeling and verification}, journal = {Knowl. Based Syst.}, volume = {20}, number = {7}, pages = {671--682}, year = {2007}, url = {https://doi.org/10.1016/j.knosys.2007.05.002}, doi = {10.1016/J.KNOSYS.2007.05.002}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/SalehASD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/YangHD07, author = {Zhenrong Yang and Aiman Hanna and Mourad Debbabi}, editor = {Ning Zhang and Ajith Abraham}, title = {Team Edit Automata for Testing Security Property}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {235--240}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.45}, doi = {10.1109/IAS.2007.45}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/YangHD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SalehD07, author = {Mohamed Mostafa Saleh and Mourad Debbabi}, editor = {Ning Zhang and Ajith Abraham}, title = {Modeling Security Protocols as Games}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {253--260}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.44}, doi = {10.1109/IAS.2007.44}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/SalehD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/MouradLD07, author = {Azzam Mourad and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Mourad Debbabi}, title = {Towards an Aspect Oriented Approach for the Security Hardening of Code}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, pages = {595--600}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.355}, doi = {10.1109/AINAW.2007.355}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/MouradLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsr/OtrokPDB07, author = {Hadi Otrok and Joey Paquet and Mourad Debbabi and Prabir Bhattacharya}, title = {Testing Intrusion Detection Systems in {MANET:} {A} Comprehensive Study}, booktitle = {Fifth Annual Conference on Communication Networks and Services Research {(CNSR} 2007), 14-17 May 2006, Fredericton, New Brunswick, Canada}, pages = {364--371}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CNSR.2007.62}, doi = {10.1109/CNSR.2007.62}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsr/OtrokPDB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/JarrayaSDH07, author = {Yosr Jarraya and Andrei Soeanu and Mourad Debbabi and Fawzi Hassa{\"{\i}}ne}, title = {Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams}, booktitle = {14th Annual {IEEE} International Conference and Workshop on Engineering of Computer Based Systems {(ECBS} 2007), 26-29 March 2007, Tucson, Arizona, {USA}}, pages = {515--522}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ECBS.2007.22}, doi = {10.1109/ECBS.2007.22}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecbs/JarrayaSDH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/OtrokDAB07, author = {Hadi Otrok and Mourad Debbabi and Chadi Assi and Prabir Bhattacharya}, title = {A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks}, booktitle = {27th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada}, pages = {86}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICDCSW.2007.91}, doi = {10.1109/ICDCSW.2007.91}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcsw/OtrokDAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/MouradLD07, author = {Azzam Mourad and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Mourad Debbabi}, editor = {Joaquim Filipe and Mohammad S. Obaidat}, title = {A Security Hardening Language Based on Aspect-Orientation}, booktitle = {E-business and Telecommunications - 4th International Conference, {ICETE} 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {23}, pages = {254--266}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88653-2\_19}, doi = {10.1007/978-3-540-88653-2\_19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/MouradLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/LaverdiereMSD07, author = {Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Azzam Mourad and Andrei Soeanu and Mourad Debbabi}, editor = {Sandro Etalle and Stephen Marsh}, title = {Control Flow Based Pointcuts for Security Hardening Concerns}, booktitle = {Trust Management - Proceedings of {IFIPTM} 2007: Joint iTrust and {PST} Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, Moncton, New Brunswick, Canada}, series = {{IFIP}}, volume = {238}, pages = {301--316}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73655-6\_20}, doi = {10.1007/978-0-387-73655-6\_20}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/LaverdiereMSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qsic/YahyaouiDT07, author = {Hamdi Yahyaoui and Mourad Debbabi and Nadia Tawbi}, title = {A Denotational Semantic Model for Validating {JVML/CLDC} Optimizations under Isabelle/HOL}, booktitle = {Seventh International Conference on Quality Software {(QSIC} 2007), 11-12 October 2007, Portland, Oregon, {USA}}, pages = {348--355}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.ieeecomputersociety.org/10.1109/QSIC.2007.2}, doi = {10.1109/QSIC.2007.2}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qsic/YahyaouiDT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MouradLD07, author = {Azzam Mourad and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Mourad Debbabi}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {A High-Level Aspect-Oriented based Language for Software Security Hardening}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {363--370}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MouradLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/AlhadidiBDB07, author = {Dima Alhadidi and Nadia Belblidia and Mourad Debbabi and Prabir Bhattacharya}, title = {An {AOP} Extended Lambda-Calculus}, booktitle = {Fifth {IEEE} International Conference on Software Engineering and Formal Methods {(SEFM} 2007), 10-14 September 2007, London, England, {UK}}, pages = {183--194}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SEFM.2007.5}, doi = {10.1109/SEFM.2007.5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sefm/AlhadidiBDB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/SalehD07, author = {Mohamed Mostafa Saleh and Mourad Debbabi}, title = {Verifying Security Properties of Cryptoprotocols: {A} Novel Approach}, booktitle = {Fifth {IEEE} International Conference on Software Engineering and Formal Methods {(SEFM} 2007), 10-14 September 2007, London, England, {UK}}, pages = {349--360}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SEFM.2007.46}, doi = {10.1109/SEFM.2007.46}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sefm/SalehD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/MouradLD07, author = {Azzam Mourad and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Mourad Debbabi}, editor = {Mariemma Inmaculada Yag{\"{u}}e del Valle and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {New Primitives to {AOP} Weaving Capabilities for Security Hardening Concerns}, booktitle = {Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, {WOSIS} 2007, In conjunction with {ICEIS} 2007, Funchal, Madeira, Portugal, June 2007}, pages = {123--130}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Tue, 17 Mar 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sis/MouradLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/OtrokMWDB07, author = {Hadi Otrok and Noman Mohammed and Lingyu Wang and Mourad Debbabi and Prabir Bhattacharya}, title = {An Efficient and Truthful Leader {IDS} Election Mechanism for {MANET}}, booktitle = {Third {IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2007, White Plains, New York, USA, 8-10 October 2007, Proceedings}, pages = {78}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.ieeecomputersociety.org/10.1109/WIMOB.2007.19}, doi = {10.1109/WIMOB.2007.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/OtrokMWDB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/DebabbiSTZ06, author = {Mourad Debbabi and Mohamed Mostafa Saleh and Chamseddine Talhi and Sami Zhioua}, title = {Security Evaluation of {J2ME} {CLDC} Embedded Java Platform}, journal = {J. Object Technol.}, volume = {5}, number = {2}, pages = {125--154}, year = {2006}, url = {https://doi.org/10.5381/jot.2006.5.2.a2}, doi = {10.5381/JOT.2006.5.2.A2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jot/DebabbiSTZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/DebbabiGMY06, author = {Mourad Debbabi and Abdelouahed Gherbi and Azzam Mourad and Hamdi Yahyaoui}, title = {A selective dynamic compiler for embedded Java virtual machines targeting {ARM} processors}, journal = {Sci. Comput. Program.}, volume = {59}, number = {1-2}, pages = {38--63}, year = {2006}, url = {https://doi.org/10.1016/j.scico.2005.03.008}, doi = {10.1016/J.SCICO.2005.03.008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/DebbabiGMY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acst/AlawnehDHS06, author = {Luay Alawneh and Mourad Debbabi and Fawzi Hassa{\"{\i}}ne and Andrei Soeanu}, editor = {Sartaj Sahni}, title = {On the verification and validation of uml structural and behavioral diagrams}, booktitle = {{IASTED} International Conference on Advances in Computer Science and Technology, January 23-25, 2006, Puerto Vallarta, Mexico}, pages = {304--309}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Thu, 25 Jan 2007 12:46:30 +0100}, biburl = {https://dblp.org/rec/conf/acst/AlawnehDHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/VenkataiahgariAD06, author = {Anil Kumar Venkataiahgari and J. William Atwood and Mourad Debbabi}, title = {A Survey of Secure {B2C} Commerce for Multicast Services}, booktitle = {Proceedings of the Canadian Conference on Electrical and Computer Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada}, pages = {288--293}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CCECE.2006.277329}, doi = {10.1109/CCECE.2006.277329}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccece/VenkataiahgariAD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/BelblidiaDHY06, author = {Nadia Belblidia and Mourad Debbabi and Aiman Hanna and Zhenrong Yang}, title = {{AOP} Extension for Security Testing of Programs}, booktitle = {Proceedings of the Canadian Conference on Electrical and Computer Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada}, pages = {647--650}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CCECE.2006.277318}, doi = {10.1109/CCECE.2006.277318}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccece/BelblidiaDHY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/LaverdiereMHD06, author = {Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Azzam Mourad and Aiman Hanna and Mourad Debbabi}, title = {Security Design Patterns: Survey and Evaluation}, booktitle = {Proceedings of the Canadian Conference on Electrical and Computer Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada}, pages = {1605--1608}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CCECE.2006.277727}, doi = {10.1109/CCECE.2006.277727}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccece/LaverdiereMHD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/VenkataiahgariDA06, author = {Anil Kumar Venkataiahgari and Mourad Debbabi and J. William Atwood}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Secure E-commerce Protection Profile}, booktitle = {Proceedings of the 2006 International Conference on Security {\&} Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {279--285}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Wed, 06 Dec 2006 10:51:51 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/VenkataiahgariDA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/AlawnehDJSH06, author = {Luay Alawneh and Mourad Debbabi and Yosr Jarraya and Andrei Soeanu and Fawzi Hassa{\"{\i}}ne}, title = {A Unified Approach for Verification and Validation of Systems and Software Engineering Models}, booktitle = {13th Annual {IEEE} International Conference and Workshop on Engineering of Computer Based Systems {(ECBS} 2006), 27-30 March 2006, Potsdam, Germany}, pages = {409--418}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ECBS.2006.17}, doi = {10.1109/ECBS.2006.17}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecbs/AlawnehDJSH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/MehrandishODAB06, author = {Mona Mehrandish and Hadi Otrok and Mourad Debbabi and Chadi Assi and Prabir Bhattacharya}, title = {A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.293}, doi = {10.1109/GLOCOM.2006.293}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/MehrandishODAB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iastedSE/AlawnehDHJSS06, author = {Luay Alawneh and Mourad Debbabi and Fawzi Hassa{\"{\i}}ne and Yosr Jarraya and Payam Shahi and Andrei Soeanu}, editor = {Peter Kokol}, title = {Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models}, booktitle = {Proceedings of the {IASTED} International Conference on Software Engineering, February 14-16, 2006, Innsbruck, Austria}, pages = {282--287}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Wed, 08 Nov 2006 11:18:50 +0100}, biburl = {https://dblp.org/rec/conf/iastedSE/AlawnehDHJSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MehrandishAD06, author = {Mona Mehrandish and Chadi M. Assi and Mourad Debbabi}, title = {A Game Theoretic Model to Handle Network Intrusions over Multiple Packets}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {2189--2194}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.255095}, doi = {10.1109/ICC.2006.255095}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/MehrandishAD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/IssaAD06, author = {Hassan Issa and Chadi Assi and Mourad Debbabi}, editor = {Paolo Bellavista and Chi{-}Ming Chen and Antonio Corradi and Mahmoud Daneshmand}, title = {QoS-Aware Middleware for Web Services Composition - {A} Qualitative Approach}, booktitle = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy}, pages = {359--364}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ISCC.2006.135}, doi = {10.1109/ISCC.2006.135}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscc/IssaAD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jmlc/BelblidiaD06, author = {Nadia Belblidia and Mourad Debbabi}, editor = {David E. Lightfoot and Clemens A. Szyperski}, title = {Towards a Formal Semantics for AspectJ Weaving}, booktitle = {Modular Programming Languages, 7th Joint Modular Languages Conference, {JMLC} 2006, Oxford, UK, September 13-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4228}, pages = {155--171}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11860990\_11}, doi = {10.1007/11860990\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/jmlc/BelblidiaD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/TalhiTD06, author = {Chamseddine Talhi and Nadia Tawbi and Mourad Debbabi}, title = {Execution monitoring enforcement for limited-memory systems}, booktitle = {Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between {PST} Technologies and Business Services, {PST} 2006, Markham, Ontario, Canada, October 30 - November 1, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {380}, pages = {38}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1501434.1501480}, doi = {10.1145/1501434.1501480}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/TalhiTD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MouradLD06, author = {Azzam Mourad and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Mourad Debbabi}, title = {Security hardening of open source software}, booktitle = {Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between {PST} Technologies and Business Services, {PST} 2006, Markham, Ontario, Canada, October 30 - November 1, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {380}, pages = {43}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1501434.1501486}, doi = {10.1145/1501434.1501486}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/MouradLD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AlHadidiBD06, author = {Dima Alhadidi and Nadia Belblidia and Mourad Debbabi}, title = {Security crosscutting concerns and AspectJ}, booktitle = {Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between {PST} Technologies and Business Services, {PST} 2006, Markham, Ontario, Canada, October 30 - November 1, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {380}, pages = {45}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1501434.1501488}, doi = {10.1145/1501434.1501488}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AlHadidiBD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/BelblidiaD06, author = {Nadia Belblidia and Mourad Debbabi}, title = {Formalizing AspectJ Weaving for Static Pointcuts}, booktitle = {Fourth {IEEE} International Conference on Software Engineering and Formal Methods {(SEFM} 2006), 11-15 September 2006, Pune, India}, pages = {50--59}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SEFM.2006.19}, doi = {10.1109/SEFM.2006.19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sefm/BelblidiaD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/ArastehDS06, author = {Ali Reza Arasteh and Mourad Debbabi and Assaad Sakha}, editor = {Hamido Fujita and Mohamed Mejri}, title = {A Formal Approach for the Forensic Analysis of Logs}, booktitle = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {147}, pages = {159--176}, publisher = {{IOS} Press}, year = {2006}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=2134}, timestamp = {Tue, 13 Mar 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/somet/ArastehDS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/DebbabiSTZ06, author = {Mourad Debbabi and Mohamed Mostafa Saleh and Chamseddine Talhi and Sami Zhioua}, editor = {Hamido Fujita and Mohamed Mejri}, title = {Common Criteria Approach to {J2ME} {CLDC} Security Requirements}, booktitle = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {147}, pages = {177--194}, publisher = {{IOS} Press}, year = {2006}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=2135}, timestamp = {Sat, 14 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/somet/DebbabiSTZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/VenkataiahgariAD06, author = {Anil Kumar Venkataiahgari and J. William Atwood and Mourad Debbabi}, title = {Secure E-Commerce Transactions for Multicast Services}, booktitle = {Eighth {IEEE} International Conference on E-Commerce Technology {(CEC} 2006) / Third {IEEE} International Conference on Enterprise Computing, E-Commerce and E-Services {(EEE} 2006) and Workshops, 26-29 June 2006, Palo Alto, California, {USA}}, pages = {18}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CEC-EEE.2006.77}, doi = {10.1109/CEC-EEE.2006.77}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wecwis/VenkataiahgariAD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/DebbabiMTY05, author = {Mourad Debbabi and Azzam Mourad and Chamseddine Talhi and Hamdi Yahyaoui}, title = {Accelerating embedded Java for mobile devices}, journal = {{IEEE} Commun. Mag.}, volume = {43}, number = {9}, pages = {80--85}, year = {2005}, url = {https://doi.org/10.1109/MCOM.2005.1509971}, doi = {10.1109/MCOM.2005.1509971}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/DebbabiMTY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/DebbabiGKTYZT05, author = {Mourad Debbabi and Abdelouahed Gherbi and Lamia Ketari and Chamseddine Talhi and Hamdi Yahyaoui and Sami Zhioua and Nadia Tawbi}, title = {E-Bunny: {A} Dynamic Compiler for Embedded Java Virtual Machines}, journal = {J. Object Technol.}, volume = {4}, number = {1}, pages = {83--108}, year = {2005}, url = {https://doi.org/10.5381/jot.2005.4.1.a2}, doi = {10.5381/JOT.2005.4.1.A2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jot/DebbabiGKTYZT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DebbabiSTZ05, author = {Mourad Debbabi and Mohamed Mostafa Saleh and Chamseddine Talhi and Sami Zhioua}, title = {Java for Mobile Devices: {A} Security Study}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {235--244}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.34}, doi = {10.1109/CSAC.2005.34}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DebbabiSTZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/DebbabiSTZ05, author = {Mourad Debbabi and Mohamed Mostafa Saleh and Chamseddine Talhi and Sami Zhioua}, title = {Security Analysis of Mobile Java}, booktitle = {16th International Workshop on Database and Expert Systems Applications {(DEXA} 2005), 22-26 August 2005, Copenhagen, Denmark}, pages = {231--235}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/DEXA.2005.172}, doi = {10.1109/DEXA.2005.172}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexaw/DebbabiSTZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/DebbabiS05, author = {Mourad Debbabi and Mohamed Mostafa Saleh}, editor = {Kung{-}Kiu Lau and Richard Banach}, title = {Game Semantics Model for Security Protocols}, booktitle = {Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3785}, pages = {125--140}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576280\_10}, doi = {10.1007/11576280\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfem/DebbabiS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/DebbabiSTZ05, author = {Mourad Debbabi and Mohamed Mostafa Saleh and Chamseddine Talhi and Sami Zhioua}, title = {Security Analysis of Wireless Java}, booktitle = {Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings}, year = {2005}, url = {http://www.lib.unb.ca/Texts/PST/2005/pdf/debbabi.pdf}, timestamp = {Sat, 14 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/DebbabiSTZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/DebbabiMT05, author = {Mourad Debbabi and Azzam Mourad and Nadia Tawbi}, editor = {Hisham Haddad and Lorie M. Liebrock and Andrea Omicini and Roger L. Wainwright}, title = {Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting {ARM} processors}, booktitle = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005}, pages = {874--878}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1066677.1066876}, doi = {10.1145/1066677.1066876}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/DebbabiMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/DebbabiR04, author = {Mourad Debbabi and Mahfuzur Rahman}, title = {The war of presence and instant messaging: right protocols and APIs}, booktitle = {1st {IEEE} Consumer Communications and Networking Conference, {CCNC} 2004, Las Vegas, NV, USA, January 5-8, 2004}, pages = {341--346}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/CCNC.2004.1286884}, doi = {10.1109/CCNC.2004.1286884}, timestamp = {Fri, 26 Jun 2020 14:31:37 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/DebbabiR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pppj/DebbabiGKTTYZ04, author = {Mourad Debbabi and Abdelouahed Gherbi and Lamia Ketari and Chamseddine Talhi and Nadia Tawbi and Hamdi Yahyaoui and Sami Zhioua}, editor = {John Waldron}, title = {A dynamic compiler for embedded Java virtual machines}, booktitle = {Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, {PPPJ} 2004, Las Vegas, Nevada, USA, June 16-18, 2004}, series = {{ACM} International Conference Proceeding Series}, volume = {91}, pages = {100--106}, publisher = {{ACM}}, year = {2004}, url = {https://dl.acm.org/citation.cfm?id=1071584}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pppj/DebbabiGKTTYZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pppj/DebbabiGKTYZ04, author = {Mourad Debbabi and Abdelouahed Gherbi and Lamia Ketari and Chamseddine Talhi and Hamdi Yahyaoui and Sami Zhioua}, editor = {John Waldron}, title = {a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines}, booktitle = {Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, {PPPJ} 2004, Las Vegas, Nevada, USA, June 16-18, 2004}, series = {{ACM} International Conference Proceeding Series}, volume = {91}, pages = {107--113}, publisher = {{ACM}}, year = {2004}, url = {https://dl.acm.org/citation.cfm?id=1071585}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pppj/DebbabiGKTYZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/DebbabiDMM03, author = {Mourad Debbabi and Nancy A. Durgin and Mohamed Mejri and John C. Mitchell}, title = {Security by typing}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {4}, number = {4}, pages = {472--495}, year = {2003}, url = {https://doi.org/10.1007/s10009-002-0100-7}, doi = {10.1007/S10009-002-0100-7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/DebbabiDMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AdiDM03, author = {Kamel Adi and Mourad Debbabi and Mohamed Mejri}, title = {A new logic for electronic commerce protocols}, journal = {Theor. Comput. Sci.}, volume = {291}, number = {3}, pages = {223--283}, year = {2003}, url = {https://doi.org/10.1016/S0304-3975(02)00364-X}, doi = {10.1016/S0304-3975(02)00364-X}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/AdiDM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/DebbabiEKTYZ03, author = {Mourad Debbabi and M. M. Erhioui and Lamia Ketari and Nadia Tawbi and Hamdi Yahyaoui and Sami Zhioua}, editor = {Peter M. A. Sloot and David Abramson and Alexander V. Bogdanov and Jack J. Dongarra and Albert Y. Zomaya and Yuri E. Gorbachev}, title = {Method Call Acceleration in Embedded Java Virtual Machines}, booktitle = {Computational Science - {ICCS} 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {2659}, pages = {750--759}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44863-2\_73}, doi = {10.1007/3-540-44863-2\_73}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/DebbabiEKTYZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfps/DebbabiM03, author = {Mourad Debbabi and Mohamed Mejri}, editor = {Stephen D. Brookes and Prakash Panangaden}, title = {Towards the Correctness of Security Protocols}, booktitle = {Proceedings of 19th Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2003, Universit{\'{e}} de Montr{\'{e}}al, QC, Canada, March 19-22, 2003}, series = {Electronic Notes in Theoretical Computer Science}, volume = {83}, pages = {55--98}, publisher = {Elsevier}, year = {2003}, url = {https://doi.org/10.1016/S1571-0661(03)50004-4}, doi = {10.1016/S1571-0661(03)50004-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mfps/DebbabiM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fasec/DebbabiDFMPT02, author = {Mourad Debbabi and Jos{\'{e}}e Desharnais and M. Fourati and E. Menif and Fr{\'{e}}d{\'{e}}ric Painchaud and Nadia Tawbi}, editor = {Ali E. Abdallah and Peter Y. A. Ryan and Steve A. Schneider}, title = {Secure Self-certified Code for Java}, booktitle = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2629}, pages = {133--151}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-40981-6\_12}, doi = {10.1007/978-3-540-40981-6\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fasec/DebbabiDFMPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AdiD01, author = {Kamel Adi and Mourad Debbabi}, editor = {Jean Goubault{-}Larrecq}, title = {Abstract interpretation for proving secrecy properties in security protocols}, booktitle = {Logical Aspects of Cryptographic Protocol Verification, {LACPV} 2001, in connection with {CAV} 2001, Paris, France, July 23, 2001}, series = {Electronic Notes in Theoretical Computer Science}, volume = {55}, number = {1}, pages = {25--50}, publisher = {Elsevier}, year = {2001}, url = {https://doi.org/10.1016/S1571-0661(04)00243-9}, doi = {10.1016/S1571-0661(04)00243-9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/AdiD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/DoyonD00, author = {Stephane Doyon and Mourad Debbabi}, title = {On object initialization in the Java bytecode}, journal = {Comput. Commun.}, volume = {23}, number = {17}, pages = {1594--1605}, year = {2000}, url = {https://doi.org/10.1016/S0140-3664(00)00245-0}, doi = {10.1016/S0140-3664(00)00245-0}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/DoyonD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/AdiDM00, author = {Kamel Adi and Mourad Debbabi and Mohamed Mejri}, editor = {Teodor Rus}, title = {A New Logic for Electronic Commerce Protocols}, booktitle = {Algebraic Methodology and Software Technology. 8th International Conference, {AMAST} 2000, Iowa City, Iowa, USA, May 20-27, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1816}, pages = {499--513}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45499-3\_35}, doi = {10.1007/3-540-45499-3\_35}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amast/AdiDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lmo/DebbabiF00, author = {Mourad Debbabi and M. Fourati}, editor = {Christophe Dony and Houari A. Sahraoui}, title = {Sur la s{\'{e}}mantique statique de Java}, booktitle = {Actes des journ{\'{e}}es Langages et Mod{\`{e}}les {\`{a}} Objets, LMO'2000. Mont Saint-Hilaire, Qu{\'{e}}bec, Canada, 25-28 janvier}, pages = {167--182}, publisher = {Herm{\`{e}}s}, year = {2000}, timestamp = {Thu, 05 Jul 2018 08:01:55 +0200}, biburl = {https://dblp.org/rec/conf/lmo/DebbabiF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/DoyonD00, author = {Stephane Doyon and Mourad Debbabi}, editor = {Barrett R. Bryant and Janice H. Carroll and Ernesto Damiani and Hisham Haddad and Dave Oppenheim}, title = {Verifying Object Initialization in the Java Bytecode Language}, booktitle = {Applied Computing 2000, Proceedings of the 2000 {ACM} Symposium on Applied Computing, Villa Olmo, Via Cantoni 1, 22100 Como, Italy, March 19-21, 2000. Volume 2}, pages = {821--830}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/338407.338573}, doi = {10.1145/338407.338573}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/DoyonD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/DebbabiGKMT00, author = {Mourad Debbabi and E. Giasson and B{\'{e}}chir Ktari and Fr{\'{e}}d{\'{e}}ric Michaud and Nadia Tawbi}, title = {Secure Self-Certified {COTS}}, booktitle = {9th {IEEE} International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises {(WETICE} 2000), 4-16 June 2000, Gaithersburg, MD, {USA}}, pages = {183--188}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ENABL.2000.883726}, doi = {10.1109/ENABL.2000.883726}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wetice/DebbabiGKMT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/PainchaudD00, author = {Fr{\'{e}}d{\'{e}}ric Painchaud and Mourad Debbabi}, title = {On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier}, booktitle = {9th {IEEE} International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises {(WETICE} 2000), 4-16 June 2000, Gaithersburg, MD, {USA}}, pages = {189--194}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ENABL.2000.883727}, doi = {10.1109/ENABL.2000.883727}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wetice/PainchaudD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/Al-SalqanSWD99, author = {Yahya Y. Al{-}Salqan and Nahid Shahmehri and Wu Wen and Mourad Debbabi}, title = {Final Summary Report on Enterprise Security}, booktitle = {8th Workshop on Enabling Technologies {(WETICE} '99), Infrastructure for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA, Proceedings}, pages = {134}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ENABL.1999.805188}, doi = {10.1109/ENABL.1999.805188}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wetice/Al-SalqanSWD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/BergeronDEK99, author = {J. Bergeron and Mourad Debbabi and M. M. Erhioui and B{\'{e}}chir Ktari}, title = {Static Analysis of Binary Code to Isolate Malicious Behaviors}, booktitle = {8th Workshop on Enabling Technologies {(WETICE} '99), Infrastructure for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA, Proceedings}, pages = {184--189}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ENABL.1999.805197}, doi = {10.1109/ENABL.1999.805197}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wetice/BergeronDEK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DebbabiLM98, author = {Mourad Debbabi and Y. Legar{\'{e}} and Mohamed Mejri}, title = {An Environment for the Specification and Analysis of Cryptoprotocols}, booktitle = {14th Annual Computer Security Applications Conference {(ACSAC} 1998), 7-11 December 1998, Scottsdale, AZ, {USA}}, pages = {321--332}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSAC.1998.738652}, doi = {10.1109/CSAC.1998.738652}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DebbabiLM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/DebbabiBK98, author = {Mourad Debbabi and Abdelkader Benzakour and B{\'{e}}chir Ktari}, editor = {Armando Martin Haeberer}, title = {A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes}, booktitle = {Algebraic Methodology and Software Technology, 7th International Conference, {AMAST} '98, Amazonia, Brasil, January 4-8, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1548}, pages = {214--230}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49253-4\_17}, doi = {10.1007/3-540-49253-4\_17}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amast/DebbabiBK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jflp/DebbabiAF97, author = {Mourad Debbabi and Zahia A{\"{\i}}doud and Ali Faour}, title = {On the Inference od Structured Recursive Effects with Subtyping}, journal = {J. Funct. Log. Program.}, volume = {1997}, number = {5}, year = {1997}, url = {http://danae.uni-muenster.de/lehre/kuchen/JFLP/articles/1997/A97-05/A97-05.html}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jflp/DebbabiAF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppl/Debbabi97, author = {Mourad Debbabi}, title = {A Model-Based Concurrent Specification Language Over {CML:} Semantic Foundations}, journal = {Parallel Process. Lett.}, volume = {7}, number = {3}, pages = {329--356}, year = {1997}, url = {https://doi.org/10.1142/S0129626497000346}, doi = {10.1142/S0129626497000346}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppl/Debbabi97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/DebbabiMTY97, author = {Mourad Debbabi and Mohamed Mejri and Nadia Tawbi and I. Yahmadi}, title = {Formal Automatic Verification of Authentication Crytographic Protocols}, booktitle = {First {IEEE} International Conference on Formal Engineering Methods, {ICFEM} 1997, Hiroshima, Japan, November 12-14, 1997, Proceedings}, pages = {50--59}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ICFEM.1997.630399}, doi = {10.1109/ICFEM.1997.630399}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfem/DebbabiMTY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/DebbabiMTY97, author = {Mourad Debbabi and Mohamed Mejri and Nadia Tawbi and I. Yahmadi}, title = {From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm}, booktitle = {6th Workshop on Enabling Technologies {(WET-ICE} '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings}, pages = {256--262}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ENABL.1997.630823}, doi = {10.1109/ENABL.1997.630823}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/DebbabiMTY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifl/DebbabiFT96, author = {Mourad Debbabi and Ali Faour and Nadia Tawbi}, editor = {Werner E. Kluge}, title = {A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs}, booktitle = {Implementation of Functional Languages, 8th International Workshop, IFL'96, Bad Godesberg, Germany, September 16-18, 1996, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {1268}, pages = {247--266}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-63237-9\_29}, doi = {10.1007/3-540-63237-9\_29}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifl/DebbabiFT96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/Debbabi95, author = {Mourad Debbabi}, editor = {Hamid R. Arabnia}, title = {A Concurrent, Specification Language over {CML}}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 1995, November 3-4, 1995, Georgia, {USA}}, pages = {541--550}, publisher = {{CSREA} Press}, year = {1995}, timestamp = {Mon, 09 Nov 2009 13:57:16 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/Debbabi95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/BolignanoD94, author = {Dominique Bolignano and Mourad Debbabi}, editor = {Masami Hagiya and John C. Mitchell}, title = {A Semantic Theory for Concurrent {ML}}, booktitle = {Theoretical Aspects of Computer Software, International Conference {TACS} '94, Sendai, Japan, April 19-22, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {789}, pages = {766--785}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-57887-0\_124}, doi = {10.1007/3-540-57887-0\_124}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tacs/BolignanoD94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/BolignanoD93, author = {Dominique Bolignano and Mourad Debbabi}, editor = {Maurice Nivat and Charles Rattray and Teodor Rus and Giuseppe Scollo}, title = {A Coherent Type System for a Concurrent, Functional and Imperative Programming Language}, booktitle = {Algebraic Methodology and Software Technology {(AMAST} '93), Proceedings of the Third International Conference on Methodology and Software Technology, University of Twente, Enschede, The Netherlands, 21-25 June, 1993}, series = {Workshops in Computing}, pages = {153--162}, publisher = {Springer}, year = {1993}, timestamp = {Tue, 18 Feb 2003 11:00:12 +0100}, biburl = {https://dblp.org/rec/conf/amast/BolignanoD93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icci/BolignanoD93, author = {Dominique Bolignano and Mourad Debbabi}, editor = {Osman Abou{-}Rabia and Carl K. Chang and Waldemar W. Koczkodaj}, title = {A Denotational Model for the Integration of Concurrent, Functional, and Imperative Programming}, booktitle = {Computing and Information - ICCI'93, Fifth International Conference on Computing and Information, Sudbury, Ontario, Canada, May 27-29, 1993, Proceedings}, pages = {244--250}, publisher = {{IEEE} Computer Society}, year = {1993}, timestamp = {Thu, 21 Mar 2002 14:11:16 +0100}, biburl = {https://dblp.org/rec/conf/icci/BolignanoD93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/BolignanoD92, author = {Dominique Bolignano and Mourad Debbabi}, editor = {Toshihide Ibaraki and Yasuyoshi Inagaki and Kazuo Iwama and Takao Nishizeki and Masafumi Yamashita}, title = {Higher Order Communication Processes with Value-Passing, Assignment and Return of Results}, booktitle = {Algorithms and Computation, Third International Symposium, {ISAAC} '92, Nagoya, Japan, December 16-18, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {650}, pages = {319--331}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-56279-6\_85}, doi = {10.1007/3-540-56279-6\_85}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isaac/BolignanoD92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.