Abdelwahab Hamou-Lhadj

Orcid: 0000-0002-3319-5006

Affiliations:
  • Concordia University, Montreal, Canada


According to our database1, Abdelwahab Hamou-Lhadj authored at least 154 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ServiceAnomaly: An anomaly detection approach in microservices using distributed traces and profiling metrics.
J. Syst. Softw., March, 2024

Commit-time defect prediction using one-class classification.
J. Syst. Softw., February, 2024

Observability and Explainability for Software Systems Decision Making.
IEEE Softw., 2024

2023
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection.
IEEE Trans. Software Eng., April, 2023

JITBoost: Boosting Just-In-Time Defect Prediction using Boolean Combination of Classifiers.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

openCAESAR: Balancing Agility and Rigor in Model-Based Systems Engineering.
Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2023

Towards a Classification of Log Parsing Errors.
Proceedings of the 31st IEEE/ACM International Conference on Program Comprehension, 2023

2022
Locating and categorizing inefficient communication patterns in HPC systems using inter-process communication traces.
J. Syst. Softw., 2022

Guest Editors' introduction to the special section on the 12<sup>th</sup> system analysis and modelling conference (SAM 2020).
Inf. Softw. Technol., 2022

The sense of logging in the Linux kernel.
Empir. Softw. Eng., 2022

HealMA: a model-driven framework for automatic generation of IoT-based Android health monitoring applications.
Autom. Softw. Eng., 2022

ClusterCommit: A Just-in-Time Defect Prediction Approach Using Clusters of Projects.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Performance anomaly detection through sequence alignment of system-level traces.
Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension, 2022

An Effective Approach for Parsing Large Log Files.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2022

A Study on the Use of Runtime Files in Handling Crash Reports in a Large Telecom Company.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
MUPPIT: a method for using proper patterns in model transformations.
Softw. Syst. Model., 2021

The Botnet Simulator: A simulation tool for understanding the interaction between botnets.
Softw. Impacts, 2021

The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives.
J. Syst. Archit., 2021

AWSOM-LP: An Effective Log Parsing Technique Using Pattern Recognition and Frequency Analysis.
CoRR, 2021

ALBA: a model-driven framework for the automatic generation of android location-based apps.
Autom. Softw. Eng., 2021

EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report Fields.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

2020
Lossless compaction of model execution traces.
Softw. Syst. Model., 2020

Automatic prediction of the severity of bugs using stack traces and categorical features.
Inf. Softw. Technol., 2020

A systematic literature review on automated log abstraction techniques.
Inf. Softw. Technol., 2020

A study of run-time behavioral evolution of benign versus malicious apps in android.
Inf. Softw. Technol., 2020

MobiLogLeak: A Preliminary Study on Data Leakage Caused by Poor Logging Practices.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications Using Waiting Dependency Graphs and Software Tracing.
Proceedings of the 20th IEEE International Working Conference on Source Code Analysis and Manipulation, 2020

An Analysis of the Use of CVEs by IoT Malware.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

2019
Model execution tracing: a systematic mapping study.
Softw. Syst. Model., 2019

An HMM-based approach for automatic detection and classification of duplicate bug reports.
Inf. Softw. Technol., 2019

Exploiting Parts-of-Speech for effective automated requirements traceability.
Inf. Softw. Technol., 2019

Empirical study of android repackaged applications.
Empir. Softw. Eng., 2019

TRIADE A Three-Factor Trace Segmentation Method to Support Program Comprehension.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

Susereum: towards a reward structure for sustainable scientific research software.
Proceedings of the 14th International Workshop on Software Engineering for Science, 2019

Predicting bug report fields using stack traces and categorical attributes.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019

2018
Microtext Processing.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Anomaly Detection Techniques Based on Kappa-Pruned Ensembles.
IEEE Trans. Reliab., 2018

Combining heterogeneous anomaly detectors for improved software security.
J. Syst. Softw., 2018

A model-driven approach for the generation of configurations for highly available software systems.
Innov. Syst. Softw. Eng., 2018

A framework for the recovery and visualization of system availability scenarios from execution traces.
Inf. Softw. Technol., 2018

Collaborative Software Design and Modeling in Open Source Systems.
Proceedings of the System Analysis and Modeling. Languages, Methods, and Tools for Systems Engineering, 2018

MASKED: A MapReduce Solution for the Kappa-Pruned Ensemble-Based Anomaly Detection System.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

CLEVER: combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

vOCL: A novel approach for UML constraints modeling.
Proceedings of MODELS 2018 Workshops: ModComp, 2018

An Approach for Predicting Bug Report Fields Using a Neural Network Learning Model.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018

Towards a classification of bugs to facilitate software maintainability tasks.
Proceedings of the 1st International Workshop on Software Qualities and Their Dependencies, 2018

A Project on Software Defect Prevention at Commit-Time: A Success Story of University-Industry Research Collaboration.
Proceedings of the 5th IEEE/ACM International Workshop on Software Engineering Research and Industrial Practice, 2018

2017
A bug reproduction approach based on directed model checking and crash traces.
J. Softw. Evol. Process., 2017

An anomaly detection system based on variable N-gram features and one-class SVM.
Inf. Softw. Technol., 2017

On the Impact of the SDL Forum Society Conferences on Academic Research.
Proceedings of the SDL 2017: Model-Driven Engineering for Future Internet, 2017

An Automated Change Impact Analysis Approach to GRL Models.
Proceedings of the SDL 2017: Model-Driven Engineering for Future Internet, 2017

DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug Reports.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

SmartHomeML: Towards a Domain-Specific Modeling Language for Creating Smart Home Applications.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

2016
Operational-Log Analysis for Big Data Systems: Challenges and Solutions.
IEEE Softw., 2016

Mining trends and patterns of software vulnerabilities.
J. Syst. Softw., 2016

Segmenting large traces of inter-process communication with a focus on high performance computing systems.
J. Syst. Softw., 2016

A UML-based domain specific modeling language for service availability management: Design and experience.
Comput. Stand. Interfaces, 2016

BUMPER: A Tool for Coping with Natural Language Searches of Millions of Bugs and Fixes.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Buy Your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

A Controlled Experiment for Evaluating the Comprehensibility of UML Action Languages.
Proceedings of the MODELSWARD 2016, 2016

Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

Model driven performance simulation of cloud provisioned Hadoop mapreduce applications.
Proceedings of the 8th International Workshop on Modeling in Software Engineering, 2016

Automatic prediction of the severity of bugs using stack traces.
Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, 2016

An effective method for detecting duplicate crash reports using crash traces and hidden Markov models.
Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, 2016

2015
Identifying Recurring Faulty Functions in Field Traces of a Large Industrial Software System.
IEEE Trans. Reliab., 2015

JCHARMING: A bug reproduction approach using crash traces and directed model checking.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

Describing Early Security Requirements Using Use Case Maps.
Proceedings of the SDL 2015: Model-Driven Engineering for Smart Cities, 2015

On-device anomaly detection for resource-limited systems.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

The Effects of Education on Students' Perception of Modeling in Software Engineering.
Proceedings of the First International Workshop on Human Factors in Modeling co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2015), 2015

Towards Quality-Driven SOA Systems Refactoring Through Planning.
Proceedings of the E-Technologies - 6th International Conference, 2015

An empirical study on the handling of crash reports in a large software company: An experience report.
Proceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution, 2015

Towards an Emerging Theory for the Diagnosis of Faulty Functions in function-Call Traces.
Proceedings of the IEEE/ACM 4th SEMAT Workshop on a General Theory of Software Engineering, 2015

A trace abstraction approach for host-based anomaly detection.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

Understanding the Service Life Cycle of Android Apps: An Exploratory Study.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

CrashAutomata: an approach for the detection of duplicate crash reports based on generalizable automata.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

2014
Microtext Processing.
Encyclopedia of Social Network Analysis and Mining, 2014

An empirical study on the use of mutant traces for diagnosis of faults in deployed systems.
J. Syst. Softw., 2014

Taxonomy of intrusion risk assessment and response system.
Comput. Secur., 2014

Total ADS: Automated Software Anomaly Detection System.
Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation, 2014

Toward a UCM-Based Approach for Recovering System Availability Requirements from Execution Traces.
Proceedings of the System Analysis and Modeling: Models and Reusability, 2014

Software feature location in practice: debugging aircraft simulation systems.
Proceedings of the 36th International Conference on Software Engineering, 2014

A contextual approach for effective recovery of inter-process communication patterns from HPC traces.
Proceedings of the 2014 Software Evolution Week, 2014

Analyzing auto-scaling issues in cloud environments.
Proceedings of 24th Annual International Conference on Computer Science and Software Engineering, 2014

2013
The Role of Software Tracing in Software Maintenance.
Proceedings of the Modeling Approaches and Algorithms for Advanced Computer Applications, 2013

Stratified sampling of execution traces: Execution phases serving as strata.
Sci. Comput. Program., 2013

Automatic configuration generation for service high availability with load balancing.
Concurr. Comput. Pract. Exp., 2013

Towards the Generation of AMF Configurations from Use Case Maps Based Availability Requirements.
Proceedings of the SDL 2013: Model-Driven Dependability Engineering, 2013

Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

A host-based anomaly detection approach by representing system calls as states of kernel modules.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Monitoring system calls for anomaly detection in modern operating systems.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Mining Telecom System Logs to Facilitate Debugging Tasks.
Proceedings of the 2013 IEEE International Conference on Software Maintenance, 2013

2012
A metamodel for the compact but lossless exchange of execution traces.
Softw. Syst. Model., 2012

Identifying computational phases from inter-process communication traces of HPC applications.
Proceedings of the IEEE 20th International Conference on Program Comprehension, 2012

An improved Hidden Markov Model for anomaly detection using frequent common patterns.
Proceedings of IEEE International Conference on Communications, 2012

On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies.
Proceedings of the 16th European Conference on Software Maintenance and Reengineering, 2012

Towards a formal framework for evaluating the effectiveness of system diversity when applied to security.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

Pattern-Based Trace Correlation Technique to Compare Software Versions.
Proceedings of the Autonomous and Intelligent Systems - Third International Conference, 2012

2011
The Impact of Regulatory Compliance on Agile Software Processes with a Focus on the FDA Guidelines for Medical Device Software.
Int. J. Inf. Syst. Model. Des., 2011

An approach based on citation analysis to support effective handling of regulatory compliance.
Future Gener. Comput. Syst., 2011

An exchange format for representing dynamic information generated from High Performance Computing applications.
Future Gener. Comput. Syst., 2011

The Concept of Stratified Sampling of Execution Traces.
Proceedings of the 19th IEEE International Conference on Program Comprehension, 2011

MTF: A Scalable Exchange Format for Traces of High Performance Computing Systems.
Proceedings of the 19th IEEE International Conference on Program Comprehension, 2011

Exploiting text mining techniques in the analysis of execution traces.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011

A software behaviour analysis framework based on the human perception systems.
Proceedings of the 33rd International Conference on Software Engineering, 2011

A Novel Approach Based on Gestalt Psychology for Abstracting the Content of Large Execution Traces for Program Comprehension.
Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011

Pattern Recognition Techniques Applied to the Abstraction of Traces of Inter-Process Communication.
Proceedings of the 15th European Conference on Software Maintenance and Reengineering, 2011

AMF configurations: Checking for service protection using heuristics.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
An Extended Proof-Carrying Code Framework for Security Enforcement.
Trans. Comput. Sci., 2010

Understanding the complexity embedded in large routine call traces with a focus on program comprehension tasks.
IET Softw., 2010

Workshop on Program Comprehension through Dynamic Analysis (PCODA10).
Proceedings of the 17th Working Conference on Reverse Engineering, 2010

Extending the UML Metamodel to Provide Support for Crosscutting Concerns.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

An Approach for Detecting Execution Phases of a System for the Purpose of Program Comprehension.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

Investigating the Capability of Agile Processes to Support Life-Science Regulations: The Case of XP and FDA Regulations with a Focus on Human Factor Requirements.
Proceedings of the Software Engineering Research, 2010

A Model Driven Approach for AMF Configuration Generation.
Proceedings of the System Analysis and Modeling: About Models - 6th International Workshop, 2010

Ranking Service Units for Providing and Protecting Highly Available Services with Load Balancing.
Proceedings of the NOTERE 2010, Annual International Conference on New Technologies of Distributed Systems, Touzeur, Tunisia, May 31, 2010

A UML-Based Domain Specific Modeling Language for the Availability Management Framework.
Proceedings of the 12th IEEE High Assurance Systems Engineering Symposium, 2010

2009
Approach for solving the feature location problem by measuring the component modification impact.
IET Softw., 2009

Checking Service Instance Protection for AMF Configurations.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Quality of the Source Code for Design and Architecture Recovery Techniques: Utilities are the Problem.
Proceedings of the Ninth International Conference on Quality Software, 2009

A Survey of Model-Driven Testing Techniques.
Proceedings of the Ninth International Conference on Quality Software, 2009

A Tool Suite for the Generation and Validation of Configurations for Software Availability.
Proceedings of the ASE 2009, 2009

Interface-Based Object-Oriented Design with Mock Objects.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Citation Analysis: An Approach for Facilitating the Understanding and the Analysis of Regulatory Compliance Documents.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

The Impact of the Model-Driven Approach to Software Engineering on Software Engineering Education.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Execution Traces: A New Domain That Requires the Creation of a Standard Metamodel.
Proceedings of the Advances in Software Engineering, 2009

Software Clustering Using Dynamic Analysis and Static Dependencies.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009

Generating AMF Configurations from Software Vendor Constraints and User Requirements.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Introduction to the special issue on program comprehension through dynamic analysis (PCODA).
J. Softw. Maintenance Res. Pract., 2008

Workshop on Program Comprehension Through Dynamic Analysis (PCODA'08).
Proceedings of the WCRE 2008, 2008

A Boundary Checking Technique for Testing Real-Time Systems Modeled as Timed Input Output Automata (Short Paper).
Proceedings of the Eighth International Conference on Quality Software, 2008

An Approach for Mapping Features to Code Based on Static and Dynamic Analysis.
Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008

Measuring the Complexity of Traces Using Shannon Entropy.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Automatic Generation of AMF Compliant Configurations.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008

Comparing Agile Software Processes Based on the Software Development Project Requirements.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

JAction: A High-Level Surface Syntax for UML Action Semantics.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

2007
Workshop on Program Comprehension through Dynamic Analysis (PCODA07).
Proceedings of the 14th Working Conference on Reverse Engineering (WCRE 2007), 2007

Effective Exploration and Visualization of Large Execution Traces.
Proceedings of the 4th IEEE International Workshop on Visualizing Software for Understanding and Analysis, 2007

Understanding the dynamics of information systems.
Proceedings of the ICEIS 2007, 2007

2006
Program COmprehension through Dynamic Analysis.
Proceedings of the 13th Working Conference on Reverse Engineering (WCRE 2006), 2006

Summarizing the Content of Large Traces to Facilitate the Understanding of the Behaviour of a Software System.
Proceedings of the 14th International Conference on Program Comprehension (ICPC 2006), 2006

2005
Workshop on Program Comprehension through Dynamic Analysis (PCODA '05).
Proceedings of the 12th Working Conference on Reverse Engineering, 2005

SEAT: A Usable Trace Analysis Tool.
Proceedings of the 13th International Workshop on Program Comprehension (IWPC 2005), 2005

Measuring Various Properties of Execution Traces to Help Build Better Trace Analysis Tools.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Recovering Behavioral Design Models from Execution Traces.
Proceedings of the 9th European Conference on Software Maintenance and Reengineering (CSMR 2005), 2005

2004
Challenges and Requirements for an Effective Trace Exploration Tool.
Proceedings of the 12th International Workshop on Program Comprehension (IWPC 2004), 2004

A survey of trace exploration tools and techniques.
Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, 2004

2003
A Metamodel for Dynamic Information Generated from Object-Oriented Systems.
Proceedings of the International Workshop on Meta-Models and Schemas for Reverse Engineering, 2003

Techniques for Reducing the Complexity of Object-Oriented Execution Traces.
Proceedings of the 2nd International Workshop on Visualizing Software for Understanding and Analysis, 2003

2002
Compression Techniques to Simplify the Analysis of Large Execution Traces.
Proceedings of the 10th International Workshop on Program Comprehension (IWPC 2002), 2002


  Loading...