Guy-Vincent Jourdan

Orcid: 0000-0001-6067-6545

Affiliations:
  • University of Ottawa, Canada


According to our database1, Guy-Vincent Jourdan authored at least 98 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Survey on the Applications of Semi-supervised Learning to Cyber-security.
ACM Comput. Surv., October, 2024

Strategic Digitalization in Oil and Gas: A Case Study on Mixed Reality and Digital Twins.
IEEE Access, 2024

Improving GNN-Based Methods for Scam Detection in Bitcoin Transactions - A Practical Case Study.
Proceedings of the 11th IEEE International Conference on Data Science and Advanced Analytics, 2024

2023
Generalized Attacks on Face Verification Systems.
CoRR, 2023

Measuring Improvement of F<sub>1</sub>-Scores in Detection of Self-Admitted Technical Debt.
CoRR, 2023

Measuring Improvement of F1-Scores in Detection of Self-Admitted Technical Debt.
Proceedings of the 2023 ACM/IEEE International Conference on Technical Debt (TechDebt), 2023

IntelliTweet: A Multifaceted Feature Approach to Detect Malicious Tweets.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Web Scams Detection System.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Are GNNs the Right Tool to Mine the Blockchain? The Case of the Bitcoin Generator Scam.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

HEART: Heterogeneous Log Anomaly Detection Using Robust Transformers.
Proceedings of the Discovery Science - 26th International Conference, 2023

Unsupervised Graph Neural Networks for Source Code Similarity Detection.
Proceedings of the Discovery Science - 26th International Conference, 2023

Towards Cross-Architecture Binary Code Vulnerability Detection.
Proceedings of the 33rd Annual International Conference on Computer Science and Software Engineering, 2023

First Workshop on Machine Learning Challenges in Cybersecurity.
Proceedings of the 33rd Annual International Conference on Computer Science and Software Engineering, 2023

Going Haywire: False Friends in Federated Learning and How to Find Them.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
COVID-19 malicious domain names classification.
Expert Syst. Appl., 2022

Phishing Kits Source Code Similarity Distribution: A Case Study.
Proceedings of the IEEE International Conference on Software Analysis, 2022

2021
Minimizing Characterizing sets.
Sci. Comput. Program., 2021

Using CGAN to Deal with Class Imbalance and Small Sample Size in Cybersecurity Problems.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

An Extensive Comparison of Systems for Entity Extraction from Log Files.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Proactive Detection of Phishing Kit Traffic.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review.
IEEE Access, 2020

An Automatic Detection and Analysis of the Bitcoin Generator Scam.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

SemanticPhish: A Semantic-based Scanning System for Early Detection of Phishing Attacks.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2019
Automatic Detection and Analysis of the "Game Hack" Scam.
J. Web Eng., 2019

Victim or Attacker? A Multi-dataset Domain Classification of Phishing Attacks.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Domain Classifier: Compromised Machines Versus Malicious Registrations.
Proceedings of the Web Engineering - 19th International Conference, 2019

The "Game Hack" Scam.
Proceedings of the Web Engineering - 19th International Conference, 2019

Minimizing Characterizing Sets.
Proceedings of the Formal Aspects of Component Software - 16th International Conference, 2019

2018
Recovering user-interactions of Rich Internet Applications through replaying of HTTP traces.
J. Internet Serv. Appl., 2018

Using AP-TED to Detect Phishing Attack Variations.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Phishing Attacks Modifications and Evolutions.
Proceedings of the Computer Security, 2018

Using URL shorteners to compare phishing and malware attacks.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

2017
Tracking Phishing Attacks Over Time.
Proceedings of the 26th International Conference on World Wide Web, 2017

2016
Recovering Representations of Systems with Repetitive Subfunctions from Observations.
J. Multiple Valued Log. Soft Comput., 2016

D-ForenRIA: Distributed Reconstruction of User-Interactions for Rich Internet Applications.
Proceedings of the 25th International Conference on World Wide Web, 2016

Reducing locating sequences for testing from finite state machines.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Fault Tolerant P2P RIA Crawling.
Proceedings of the Networked Systems - 4th International Conference, 2016

Reconstructing Interactions with Rich Internet Applications from HTTP Traces.
Proceedings of the Advances in Digital Forensics XII, 2016

D-ForenRIA: a distributed tool to reconstruct user sessions for rich internet applications.
Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, 2016

2015
Reduced checking sequences using unreliable reset.
Inf. Process. Lett., 2015

On The Book Embedding Of Ordered Sets.
Ars Comb., 2015

Using Multiple Adaptive Distinguishing Sequences for Checking Sequence Generation.
Proceedings of the Testing Software and Systems, 2015

Workshop on the application of security and testing to rich internet applications.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

2014
Bluetooth scatternet formation from a time-efficiency perspective.
Wirel. Networks, 2014

A Model-Based Approach for Crawling Rich Internet Applications.
ACM Trans. Web, 2014

Model-Based Rich Internet Applications Crawling: "Menu" and "Probability" Models.
J. Web Eng., 2014

PDist-RIA Crawler: A Peer-to-Peer Distributed Crawler for Rich Internet Applications.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

GDist-RIA Crawler: A Greedy Distributed Crawler for Rich Internet Applications.
Proceedings of the Networked Systems - Second International Conference, 2014

A Scalable P2P RIA Crawling System with Partial Knowledge.
Proceedings of the Networked Systems - Second International Conference, 2014

Indexing Rich Internet Applications Using Components-Based Crawling.
Proceedings of the Web Engineering, 14th International Conference, 2014

Digital signatures for mobile users.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

2013
BSF-UED: A new time-efficient Bluetooth Scatternet Formation algorithm based on Unnecessary-Edges Deletion.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Building Rich Internet Applications Models: Example of a Better Strategy.
Proceedings of the Web Engineering - 13th International Conference, 2013

A brief history of web crawlers.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013

Dist-RIA Crawler: A Distributed Crawler for Rich Internet Applications.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Towards better understanding of the behaviour of Bluetooth networks distributed algorithms.
Int. J. Parallel Emergent Distributed Syst., 2012

Time-efficient algorithms for the outdegree limited bluetooth scatternet formation problem.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

A Statistical Approach for Efficient Crawling of Rich Internet Applications.
Proceedings of the Web Engineering - 12th International Conference, 2012

Solving Some Modeling Challenges when Testing Rich Internet Applications for Security.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Differential Privacy in Tripartite Interaction: A Case Study with Linguistic Minorities in Canada.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Evaluating Reliability-Testing Usage Models.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

Workshop on Mobile and Rich Internet Application Model Generation.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2012

Crawling rich internet applications: the state of the art.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2012

2011
Improved Usage Model for Web Application Reliability Testing.
Proceedings of the Testing Software and Systems, 2011

Enabling dynamic linkage of linguistic census data at Statistics Canada (extended abstract).
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

A Strategy for Efficient Crawling of Rich Internet Applications.
Proceedings of the Web Engineering - 11th International Conference, 2011

2010
Lower bounds on lengths of checking sequences.
Formal Aspects Comput., 2010

Lightweight protection against brute force login attacks on Web applications.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Some Modeling Challenges When Testing Rich Internet Applications for Security.
Proceedings of the Third International Conference on Software Testing, 2010

Some side effects of FHSS on Bluetooth networks distributed algorithms.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
On Testing 1-Safe Petri Nets.
Proceedings of the TASE 2009, 2009

Checking Sequence Construction Using Adaptive and Preset Distinguishing Sequences.
Proceedings of the Seventh IEEE International Conference on Software Engineering and Formal Methods, 2009

Testing <i>k</i>-Safe Petri Nets.
Proceedings of the Testing of Software and Communication Systems, 2009

A Note on the Study of Bluetooth Networks' Distributed Algorithms.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Using a SAT solver to generate checking sequences.
Proceedings of the 24th International Symposium on Computer and Information Sciences, 2009

An Analysis of the BluePleidas Algorithm's Device Discovery Phase.
Proceedings of the ICTA 2009, 2009

Analyzing the Device Discovery Phase of Bluetooth Scatternet Formation Algorithms.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Software Security Vulnerabilities Seen As Feature Interactions.
Proceedings of the Feature Interactions in Software and Communication Systems X, 2009

2008
Using adaptive distinguishing sequences in checking sequence constructions.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Testing Systems Specified as Partial Order Input/Output Automata.
Proceedings of the Testing of Software and Communicating Systems, 2008

2007
Centralized Web Proxy Services: Security and Privacy Considerations.
IEEE Internet Comput., 2007

Testing Input/Output Partial Order Automata.
Proceedings of the Testing of Software and Communicating Systems, 2007

Recovering Repetitive Sub-functions from Observations.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2007

2006
Improving Coverage in Functional Testing.
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006

Test Suite Reduction Based on Dependence Analysis.
Proceedings of the Computer and Information Sciences, 2006

Minimizing Coordination Channels in Distributed Testing.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2006

2005
Minimizing the number of inputs while applying adaptive test cases.
Inf. Process. Lett., 2005

Recovering the Lattice of Repetitive Sub-functions.
Proceedings of the Computer and Information Sciences, 2005

On the Pagenumber of Bipartite Orders.
Proceedings of the 17th Canadian Conference on Computational Geometry, 2005

2003
Degree Navigator™: The Journey of a Visualization Software.
Proceedings of the Graph Drawing, 11th International Symposium, 2003

1996
Incremental Transitive Dependency Tracking in Distributed Computations.
Parallel Process. Lett., 1996

1995
On-Line Computations of the Ideal Lattice of Posets.
RAIRO Theor. Informatics Appl., 1995

On-The-Fly Analysis of Distributed Computations.
Inf. Process. Lett., 1995

Recognition of Patterns on Control Flows for Debugging Distributed Executions.
Proceedings of the Second International Workshop on Automated Debugging, 1995

1994
On the Coding of Dependencies in Distributed Computations (Abstract).
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

A General Approach to Trace-Checking in Distributed Computing Systems.
Proceedings of the 14th International Conference on Distributed Computing Systems, 1994

Upward Drawing on the Plane Grid Using Less Ink.
Proceedings of the Graph Drawing, DIMACS International Workshop, 1994


  Loading...