Lotfi Ben Othmane

Orcid: 0000-0003-0883-7844

Affiliations:
  • University of North Texas, TX, USA
  • Iowa State University, Ames, IA, USA (former)
  • Fraunhofer SIT, Darmstadt, Germany (2014 - 2016)
  • Western Michigan University, Kalamazoo, MI, USA


According to our database1, Lotfi Ben Othmane authored at least 49 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System.
CoRR, 2023


2022
Injection of RPM and speed reading messages onto the CAN bus of a moving vehicle.
Dataset, May, 2022

On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus.
IEEE Trans. Dependable Secur. Comput., 2022

Making Secure Software Insecure without Changing Its Code: The Possibilities and Impacts of Attacks on the DevOps Pipeline.
CoRR, 2022

Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles.
CoRR, 2022

Tutorial: Threat Modeling of Cloud-based Solutions.
Proceedings of the IEEE Secure Development Conference, 2022

Evaluation of the Architecture Alternatives for Real-Time Intrusion Detection Systems for Vehicles.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment.
Proceedings of the ICSSP/ICGSE 2022: 16th International Conference on Software and System Processes and 17th International Conference on Global Software Engineering, Virtual Event / Pittsburgh, PA, USA, May 19, 2022

2021
Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs.
IEEE Trans. Inf. Forensics Secur., 2021

Special issue on risk and security of smart systems.
J. Inf. Secur. Appl., 2021

Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs.
CoRR, 2021

Self-Confidence of Undergraduate Students in Designing Software Architecture.
CoRR, 2021

Using Garbled Circuit for Secure Brokering.
Proceedings of the Risks and Security of Internet and Systems, 2021

Threat Modeling of Cyber-Physical Systems in Practice.
Proceedings of the Risks and Security of Internet and Systems, 2021

2020
Editorial: Special issue on security and privacy in smart cyber-physical systems.
Comput. Secur., 2020

The current practices of changing secure software: an empirical study.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
EPICS: A Framework for Enforcing Security Policies in Composite Web Services.
IEEE Trans. Serv. Comput., 2019

Special Issue on Security and Privacy in Smart Cyber-physical Systems.
Comput. Secur., 2019

Mindset for Software Architecture Students.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Identification of the Impacts of Code Changes on the Security of Software.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
BP: Security Concerns and Best Practices for Automation of Software Deployment Processes: An Industrial Case Study.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Impacts of Security Attacks on The Effectiveness of Collaborative Adaptive Cruise Control Mechanism.
Proceedings of the IEEE International Smart Cities Conference, 2018

Demo: A Low-Cost Fleet Monitoring System.
Proceedings of the IEEE International Smart Cities Conference, 2018

Secure Data Communication in Autonomous V2X Systems.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

2017
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
Data Sci. Eng., 2017

Identification of Dependency-based Attacks on Node.js.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Evaluation of the Challenges of Developing Secure Software Using the Agile Approach.
Int. J. Secur. Softw. Eng., 2016

An Incremental B-Model for RBAC-Controlled Electronic Marking System.
Int. J. Secur. Softw. Eng., 2016

Dependency-Based Attacks on Node.js.
Proceedings of the IEEE Cybersecurity Development, 2016

Consumer Oriented Privacy Preserving Access Control for Electronic Health Records in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Towards Effective Security Assurance for Incremental Software Development the Case of Zen Cart Application.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

SecDevOps: Is It a Marketing Buzzword? - Mapping Research on Security in DevOps.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Incorporating attacker capabilities in risk estimation and mitigation.
Comput. Secur., 2015

Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study.
Proceedings of the Information Security - 18th International Conference, 2015

Literature Review of the Challenges of Developing Secure Software Using the Agile Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Incremental Development of RBAC-Controlled E-Marking System Using the B Method.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Extending the Agile Development Process to Develop Acceptably Secure Software.
IEEE Trans. Dependable Secur. Comput., 2014

A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks.
J. Netw. Comput. Appl., 2014

Likelihood of Threats to Connected Vehicles.
Int. J. Next Gener. Comput., 2014

Using Assurance Cases to Develop Iteratively Security Features Using Scrum.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A time-evolution model for the privacy degree of information disseminated in online social networks.
Int. J. Commun. Networks Distributed Syst., 2013

A Case for Societal Digital Security Culture.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Towards extended safety in connected vehicles.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

2012
An End-to-End Security Auditing Approach for Service Oriented Architectures.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

2010
Protection of Identity Information in Cloud Computing without Trusted Third Party.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

The pervasive trust foundation for security in next generation networks.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010


  Loading...