Abdelwahab Hamou-Lhadj

According to our database1, Abdelwahab Hamou-Lhadj authored at least 111 papers between 2002 and 2018.

Collaborative distances :
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Anomaly Detection Techniques Based on Kappa-Pruned Ensembles.
IEEE Trans. Reliability, 2018

Combining heterogeneous anomaly detectors for improved software security.
Journal of Systems and Software, 2018

A framework for the recovery and visualization of system availability scenarios from execution traces.
Information & Software Technology, 2018

Buy your coffee with bitcoin: Real-world deployment of a bitcoin point of sale terminal.
CoRR, 2018

MASKED: A MapReduce Solution for the Kappa-Pruned Ensemble-Based Anomaly Detection System.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

CLEVER: combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Towards a classification of bugs to facilitate software maintainability tasks.
Proceedings of the 1st International Workshop on Software Qualities and Their Dependencies, 2018

2017
A bug reproduction approach based on directed model checking and crash traces.
Journal of Software: Evolution and Process, 2017

An anomaly detection system based on variable N-gram features and one-class SVM.
Information & Software Technology, 2017

On the Impact of the SDL Forum Society Conferences on Academic Research.
Proceedings of the SDL 2017: Model-Driven Engineering for Future Internet, 2017

An Automated Change Impact Analysis Approach to GRL Models.
Proceedings of the SDL 2017: Model-Driven Engineering for Future Internet, 2017

DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug Reports.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

SmartHomeML: Towards a Domain-Specific Modeling Language for Creating Smart Home Applications.
Proceedings of the IEEE International Congress on Internet of Things, 2017

2016
Operational-Log Analysis for Big Data Systems: Challenges and Solutions.
IEEE Software, 2016

Mining trends and patterns of software vulnerabilities.
Journal of Systems and Software, 2016

Segmenting large traces of inter-process communication with a focus on high performance computing systems.
Journal of Systems and Software, 2016

A UML-based domain specific modeling language for service availability management: Design and experience.
Computer Standards & Interfaces, 2016

BUMPER: A Tool for Coping with Natural Language Searches of Millions of Bugs and Fixes.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Buy Your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

A Controlled Experiment for Evaluating the Comprehensibility of UML Action Languages.
Proceedings of the MODELSWARD 2016, 2016

Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

Model driven performance simulation of cloud provisioned Hadoop mapreduce applications.
Proceedings of the 8th International Workshop on Modeling in Software Engineering, 2016

Automatic prediction of the severity of bugs using stack traces.
Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, 2016

An effective method for detecting duplicate crash reports using crash traces and hidden Markov models.
Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, 2016

2015
Identifying Recurring Faulty Functions in Field Traces of a Large Industrial Software System.
IEEE Trans. Reliability, 2015

JCHARMING: A bug reproduction approach using crash traces and directed model checking.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

Describing Early Security Requirements Using Use Case Maps.
Proceedings of the SDL 2015: Model-Driven Engineering for Smart Cities, 2015

On-device anomaly detection for resource-limited systems.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

The Effects of Education on Students' Perception of Modeling in Software Engineering.
Proceedings of the First International Workshop on Human Factors in Modeling co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2015), 2015

Towards Quality-Driven SOA Systems Refactoring Through Planning.
Proceedings of the E-Technologies - 6th International Conference, 2015

An empirical study on the handling of crash reports in a large software company: An experience report.
Proceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution, 2015

Towards an Emerging Theory for the Diagnosis of Faulty Functions in function-Call Traces.
Proceedings of the IEEE/ACM 4th SEMAT Workshop on a General Theory of Software Engineering, 2015

A trace abstraction approach for host-based anomaly detection.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

Understanding the Service Life Cycle of Android Apps: An Exploratory Study.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

CrashAutomata: an approach for the detection of duplicate crash reports based on generalizable automata.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

2014
Microtext Processing.
Encyclopedia of Social Network Analysis and Mining, 2014

An empirical study on the use of mutant traces for diagnosis of faults in deployed systems.
Journal of Systems and Software, 2014

Taxonomy of intrusion risk assessment and response system.
Computers & Security, 2014

Total ADS: Automated Software Anomaly Detection System.
Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation, 2014

Toward a UCM-Based Approach for Recovering System Availability Requirements from Execution Traces.
Proceedings of the System Analysis and Modeling: Models and Reusability, 2014

Software feature location in practice: debugging aircraft simulation systems.
Proceedings of the 36th International Conference on Software Engineering, 2014

A contextual approach for effective recovery of inter-process communication patterns from HPC traces.
Proceedings of the 2014 Software Evolution Week, 2014

Analyzing auto-scaling issues in cloud environments.
Proceedings of 24th Annual International Conference on Computer Science and Software Engineering, 2014

2013
The Role of Software Tracing in Software Maintenance.
Proceedings of the Modeling Approaches and Algorithms for Advanced Computer Applications, 2013

Stratified sampling of execution traces: Execution phases serving as strata.
Sci. Comput. Program., 2013

Automatic configuration generation for service high availability with load balancing.
Concurrency and Computation: Practice and Experience, 2013

Towards the Generation of AMF Configurations from Use Case Maps Based Availability Requirements.
Proceedings of the SDL 2013: Model-Driven Dependability Engineering, 2013

Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

A host-based anomaly detection approach by representing system calls as states of kernel modules.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Monitoring system calls for anomaly detection in modern operating systems.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Mining Telecom System Logs to Facilitate Debugging Tasks.
Proceedings of the 2013 IEEE International Conference on Software Maintenance, 2013

2012
A metamodel for the compact but lossless exchange of execution traces.
Software and System Modeling, 2012

Identifying computational phases from inter-process communication traces of HPC applications.
Proceedings of the IEEE 20th International Conference on Program Comprehension, 2012

An improved Hidden Markov Model for anomaly detection using frequent common patterns.
Proceedings of IEEE International Conference on Communications, 2012

On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies.
Proceedings of the 16th European Conference on Software Maintenance and Reengineering, 2012

Towards a formal framework for evaluating the effectiveness of system diversity when applied to security.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

Pattern-Based Trace Correlation Technique to Compare Software Versions.
Proceedings of the Autonomous and Intelligent Systems - Third International Conference, 2012

2011
The Impact of Regulatory Compliance on Agile Software Processes with a Focus on the FDA Guidelines for Medical Device Software.
IJISMD, 2011

An approach based on citation analysis to support effective handling of regulatory compliance.
Future Generation Comp. Syst., 2011

An exchange format for representing dynamic information generated from High Performance Computing applications.
Future Generation Comp. Syst., 2011

The Concept of Stratified Sampling of Execution Traces.
Proceedings of the 19th IEEE International Conference on Program Comprehension, 2011

MTF: A Scalable Exchange Format for Traces of High Performance Computing Systems.
Proceedings of the 19th IEEE International Conference on Program Comprehension, 2011

Exploiting text mining techniques in the analysis of execution traces.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011

A software behaviour analysis framework based on the human perception systems.
Proceedings of the 33rd International Conference on Software Engineering, 2011

A Novel Approach Based on Gestalt Psychology for Abstracting the Content of Large Execution Traces for Program Comprehension.
Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011

Pattern Recognition Techniques Applied to the Abstraction of Traces of Inter-Process Communication.
Proceedings of the 15th European Conference on Software Maintenance and Reengineering, 2011

AMF configurations: Checking for service protection using heuristics.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
An Extended Proof-Carrying Code Framework for Security Enforcement.
Trans. Computational Science, 2010

Understanding the complexity embedded in large routine call traces with a focus on program comprehension tasks.
IET Software, 2010

Workshop on Program Comprehension through Dynamic Analysis (PCODA10).
Proceedings of the 17th Working Conference on Reverse Engineering, 2010

Extending the UML Metamodel to Provide Support for Crosscutting Concerns.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

An Approach for Detecting Execution Phases of a System for the Purpose of Program Comprehension.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

Investigating the Capability of Agile Processes to Support Life-Science Regulations: The Case of XP and FDA Regulations with a Focus on Human Factor Requirements.
Proceedings of the Software Engineering Research, 2010

A Model Driven Approach for AMF Configuration Generation.
Proceedings of the System Analysis and Modeling: About Models - 6th International Workshop, 2010

Ranking Service Units for Providing and Protecting Highly Available Services with Load Balancing.
Proceedings of the NOTERE 2010, Annual International Conference on New Technologies of Distributed Systems, Touzeur, Tunisia, May 31, 2010

A UML-Based Domain Specific Modeling Language for the Availability Management Framework.
Proceedings of the 12th IEEE High Assurance Systems Engineering Symposium, 2010

2009
Approach for solving the feature location problem by measuring the component modification impact.
IET Software, 2009

Checking Service Instance Protection for AMF Configurations.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Quality of the Source Code for Design and Architecture Recovery Techniques: Utilities are the Problem.
Proceedings of the Ninth International Conference on Quality Software, 2009

A Survey of Model-Driven Testing Techniques.
Proceedings of the Ninth International Conference on Quality Software, 2009

A Tool Suite for the Generation and Validation of Configurations for Software Availability.
Proceedings of the ASE 2009, 2009

Interface-Based Object-Oriented Design with Mock Objects.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Citation Analysis: An Approach for Facilitating the Understanding and the Analysis of Regulatory Compliance Documents.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

The Impact of the Model-Driven Approach to Software Engineering on Software Engineering Education.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Software Clustering Using Dynamic Analysis and Static Dependencies.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009

Generating AMF Configurations from Software Vendor Constraints and User Requirements.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Introduction to the special issue on program comprehension through dynamic analysis (PCODA).
Journal of Software Maintenance, 2008

Workshop on Program Comprehension Through Dynamic Analysis (PCODA'08).
Proceedings of the WCRE 2008, 2008

A Boundary Checking Technique for Testing Real-Time Systems Modeled as Timed Input Output Automata (Short Paper).
Proceedings of the Eighth International Conference on Quality Software, 2008

An Approach for Mapping Features to Code Based on Static and Dynamic Analysis.
Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008

Measuring the Complexity of Traces Using Shannon Entropy.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Automatic Generation of AMF Compliant Configurations.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008

Comparing Agile Software Processes Based on the Software Development Project Requirements.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

JAction: A High-Level Surface Syntax for UML Action Semantics.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

2007
Workshop on Program Comprehension through Dynamic Analysis (PCODA07).
Proceedings of the 14th Working Conference on Reverse Engineering (WCRE 2007), 2007

Effective Exploration and Visualization of Large Execution Traces.
Proceedings of the 4th IEEE International Workshop on Visualizing Software for Understanding and Analysis, 2007

Understanding the dynamics of information systems.
Proceedings of the ICEIS 2007, 2007

2006
Program COmprehension through Dynamic Analysis.
Proceedings of the 13th Working Conference on Reverse Engineering (WCRE 2006), 2006

Summarizing the Content of Large Traces to Facilitate the Understanding of the Behaviour of a Software System.
Proceedings of the 14th International Conference on Program Comprehension (ICPC 2006), 2006

2005
Workshop on Program Comprehension through Dynamic Analysis (PCODA '05).
Proceedings of the 12th Working Conference on Reverse Engineering, 2005

SEAT: A Usable Trace Analysis Tool.
Proceedings of the 13th International Workshop on Program Comprehension (IWPC 2005), 2005

Measuring Various Properties of Execution Traces to Help Build Better Trace Analysis Tools.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Recovering Behavioral Design Models from Execution Traces.
Proceedings of the 9th European Conference on Software Maintenance and Reengineering (CSMR 2005), 2005

2004
A Metamodel for Dynamic Information Generated from Object-Oriented Systems.
Electr. Notes Theor. Comput. Sci., 2004

Challenges and Requirements for an Effective Trace Exploration Tool.
Proceedings of the 12th International Workshop on Program Comprehension (IWPC 2004), 2004

A survey of trace exploration tools and techniques.
Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, 2004

2002
Compression Techniques to Simplify the Analysis of Large Execution Traces.
Proceedings of the 10th International Workshop on Program Comprehension (IWPC 2002), 2002


  Loading...