Mourad Debbabi

According to our database1, Mourad Debbabi authored at least 284 papers between 1992 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
An Extension to the Precision Time Protocol (PTP) to Enable the Detection of Cyber Attacks.
IEEE Trans. Industrial Informatics, 2020

Multi-depot vehicle routing problem with risk mitigation: Model and solution algorithm.
Expert Syst. Appl., 2020

2019
Cloud Security Auditing
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019

Enhancing WAMS Communication Network Against Delay Attacks.
IEEE Trans. Smart Grid, 2019

ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack.
ACM Trans. Priv. Secur., 2019

Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective.
IEEE Trans. Big Data, 2019

Automated Post-Failure Service Restoration in Smart Grid Through Network Reconfiguration in the Presence of Energy Storage Systems.
IEEE Systems Journal, 2019

Learning probabilistic dependencies among events for proactive security auditing in clouds.
Journal of Computer Security, 2019

Decoupling coding habits from functionality for effective binary authorship attribution.
Journal of Computer Security, 2019

Securing the Precision Time Protocol (PTP) Against Fake Timestamps.
IEEE Communications Letters, 2019

Evolutionary learning algorithm for reliable facility location under disruption.
Expert Syst. Appl., 2019

MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports.
Digital Investigation, 2019

On the feasibility of binary authorship characterization.
Digital Investigation, 2019

Wordnet-Based Criminal Networks Mining for Cybercrime Investigation.
IEEE Access, 2019

Modeling Supply Chain Attacks in IEC 61850 Substations.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

iCAT: An Interactive Customizable Anonymization Tool.
Proceedings of the Computer Security - ESORICS 2019, 2019

Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019

BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning.
Proceedings of the Computer Security - ESORICS 2019, 2019

Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
A Detection and Mitigation Model for PTP Delay Attack in an IEC 61850 Substation.
IEEE Trans. Smart Grid, 2018

Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement Systems.
IEEE Trans. Smart Grid, 2018

FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries.
ACM Trans. Priv. Secur., 2018

Critical Links Identification for Selective Outages in Interdependent Power-Communication Networks.
IEEE Trans. Industrial Informatics, 2018

User-Level Runtime Security Auditing for the Cloud.
IEEE Trans. Information Forensics and Security, 2018

CSC-Detector: A System to Infer Large-Scale Probing Campaigns.
IEEE Trans. Dependable Sec. Comput., 2018

MalDozer: Automatic framework for android malware detection using deep learning.
Digital Investigation, 2018

Data-driven approach for automatic telephony threat analysis and campaign detection.
Digital Investigation, 2018

Portable, Data-Driven Malware Detection using Language Processing and Machine Learning Techniques on Behavioral Analysis Reports.
CoRR, 2018

Toward Multimodal Interaction in Scalable Visual Digital Evidence Visualization Using Computer Vision Techniques and ISS.
CoRR, 2018

Automatic Investigation Framework for Android Malware Cyber-Infrastructures.
CoRR, 2018

Efficient sensor network management for asset localization.
Comput. Oper. Res., 2018

Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems.
IEEE Communications Surveys and Tutorials, 2018

OpenStack-Based Evaluation Framework for Smart Grid Cyber Security.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Cloud Security Auditing: Major Approaches and Existing Challenges.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Daedalus: Network Anomaly Detection on IDS Stream Logs.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

On Leveraging Coding Habits for Effective Binary Authorship Attribution.
Proceedings of the Computer Security, 2018

Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018

Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

Preserving Both Privacy and Utility in Network Trace Anonymization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Privacy-Preserving Querying on Privately Encrypted Data in the Cloud.
T. Large-Scale Data- and Knowledge-Centered Systems, 2017

Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns.
IEEE Network, 2017

Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103].
Digital Investigation, 2017

Android Malware Detection using Deep Learning on API Method Sequences.
CoRR, 2017

Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Delay aware measurements gathering in WAMS communication network.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

LeaPS: Learning-Based Proactive Security Auditing for Clouds.
Proceedings of the Computer Security - ESORICS 2017, 2017

BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Network malware classification comparison using DPI and flow packet headers.
J. Computer Virology and Hacking Techniques, 2016

Energy-Efficient Monitor Deployment in Collaborative Distributed Setting.
IEEE Trans. Industrial Informatics, 2016

Aspect-oriented modeling framework for security hardening.
ISSE, 2016

Hierarchy aware distributed plan execution monitoring.
Expert Syst. Appl., 2016

Security Assessment of Time Synchronization Mechanisms for the Smart Grid.
IEEE Communications Surveys and Tutorials, 2016

Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization.
IEEE Communications Surveys and Tutorials, 2016

A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities.
Comput. Networks, 2016

Cascading link failure analysis in interdependent networks for maximal outages in smart grid.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

DySign: dynamic fingerprinting for the automatic detection of android malware.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

On the Feasibility of Malware Authorship Attribution.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016

Cypider: building community-based cyber-defense infrastructure for android malware detection.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
On the inference and prediction of DDoS campaigns.
Wireless Communications and Mobile Computing, 2015

A Visualizable Evidence-Driven Approach for Authorship Attribution.
ACM Trans. Inf. Syst. Secur., 2015

Transportation risk analysis using probabilistic model checking.
Expert Syst. Appl., 2015

BinComp: A stratified approach to compiler provenance Attribution.
Digital Investigation, 2015

Scalable code clone search for malware analysis.
Digital Investigation, 2015

Spam campaign detection, analysis, and investigation.
Digital Investigation, 2015

Graph-theoretic characterization of cyber-threat infrastructures.
Digital Investigation, 2015

SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code.
Digital Investigation, 2015

Specification, verification, and quantification of security in model-based systems.
Computing, 2015

Inferring distributed reflection denial of service attacks from darknet.
Comput. Commun., 2015

Verification of firewall reconfiguration for virtual machines migrations in the cloud.
Comput. Networks, 2015

MARFCAT: Fast code analysis for defects and vulnerabilities.
Proceedings of the 1st IEEE International Workshop on Software Analytics, 2015

A detection and mitigation model for PTP delay attack in a smart grid substation.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Towards migrating security policies of virtual machines in Software Defined Networks.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Aspect-Oriented Security Hardening of UML Design Models
Springer, ISBN: 978-3-319-16106-8, 2015

2014
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data.
IEEE Trans. Dependable Sec. Comput., 2014

PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications.
IEEE Trans. Dependable Sec. Comput., 2014

Quantitative and qualitative analysis of SysML activity diagrams.
STTT, 2014

The multi-depot split-delivery vehicle routing problem: Model and solution algorithm.
Knowl.-Based Syst., 2014

A property-based abstraction framework for SysML activity diagrams.
Knowl.-Based Syst., 2014

A formal verification framework for SysML activity diagrams.
Expert Syst. Appl., 2014

Multidimensional investigation of source port 0 probing.
Digital Investigation, 2014

OBA2: An Onion approach to Binary code Authorship Attribution.
Digital Investigation, 2014

A Survey and a Layered Taxonomy of Software-Defined Networking.
IEEE Communications Surveys and Tutorials, 2014

Cyber Scanning: A Comprehensive Survey.
IEEE Communications Surveys and Tutorials, 2014

On fingerprinting probing activities.
Comput. Secur., 2014

BinClone: Detecting Code Clones in Malware.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Fingerprinting Internet DNS Amplification DDoS Activities.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Inferring Malware Family through Application Protocol Sequences Signature.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Characterization of Covert Channels in DNS.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Behavioral analytics for inferring large-scale orchestrated probing events.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Detection of malicious payload distribution channels in DNS.
Proceedings of the IEEE International Conference on Communications, 2014

Inferring internet-scale infections by correlating malware and probing activities.
Proceedings of the IEEE International Conference on Communications, 2014

Preservation of Security Configurations in the Cloud.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Automating MAC Spoofer Evidence Gathering and Encoding for Investigations.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Toward Automated MAC Spoofer Investigations.
Proceedings of the International C* Conference on Computer Science & Software Engineering, 2014

The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities.
Proceedings of the Advances in Artificial Intelligence, 2014

2013
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks.
Security and Communication Networks, 2013

Common weaving approach in mainstream languages for software security hardening.
J. Syst. Softw., 2013

A unified data mining solution for authorship analysis in anonymous textual communications.
Inf. Sci., 2013

A systematic approach for detecting and clustering distributed cyber scanning.
Comput. Networks, 2013

Communication security for smart grid distribution networks.
IEEE Communications Magazine, 2013

Aspect-Oriented Semantic Framework for Executable Models.
Proceedings of the Seventh International Symposium on Theoretical Aspects of Software Engineering, 2013

A Security Risk Assessment Framework for SysML Activity Diagrams.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

A probabilistic verification framework of SysML activity diagrams.
Proceedings of the IEEE 12th International Conference on Intelligent Software Methodologies, 2013

Towards a Forecasting Model for Distributed Denial of Service Activities.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

On detecting and clustering distributed cyber scanning.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Emergency Mobile Access to Personal Health Records Stored on an Untrusted Cloud.
Proceedings of the Health Information Science - Second International Conference, 2013

On the Reverse Engineering of the Citadel Botnet.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

A formal verification framework for Bluespec System Verilog.
Proceedings of the 2013 Forum on specification and Design Languages, 2013

Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Symmetrically-Private Database Search in Cloud Computing.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Gossiping Based Distributed Plan Monitoring.
Proceedings of the 4th International Conference on Ambient Systems, 2013

Towards a Distributed Plan Execution Monitoring Framework.
Proceedings of the 4th International Conference on Ambient Systems, 2013

Towards Fingerprinting Malicious Traffic.
Proceedings of the 4th International Conference on Ambient Systems, 2013

A Statistical Approach for Fingerprinting Probing Activities.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols.
JSW, 2012

MARFCAT: Transitioning to Binary and Larger Data Sets of SATE IV
CoRR, 2012

Mining Criminal Networks from Chat Log.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Formal Specification and Probabilistic Verification of SysML Activity Diagrams.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Continuation/Frame-based Semantics for Aspect Matching and Weaving.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2012

Efficient Probabilistic Abstraction for SysML Activity Diagrams.
Proceedings of the Software Engineering and Formal Methods - 10th International Conference, 2012

Formal Analysis of the TLS Handshake Protocol.
Proceedings of the SECRYPT 2012, 2012

Mechanism design for decentralized vehicle routing problem.
Proceedings of the ACM Symposium on Applied Computing, 2012

k-Indistinguishable Traffic Padding in Web Applications.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Secure Distributed Framework for Achieving ε-Differential Privacy.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

A Learning Based Evolutionary Algorithm For Distributed Multi-Depot VRP.
Proceedings of the Advances in Knowledge-Based and Intelligent Information and Engineering Systems, 2012

A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks.
Proceedings of IEEE International Conference on Communications, 2012

RESource: A Framework for Online Matching of Assembly with Open Source Code.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Cloud calculus: Security verification in elastic cloud computing platform.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Investigating the dark cyberspace: Profiling, threat-based analysis and correlation.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Model checking based service delivery planning.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

On SPIM detection in LTE networks.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

2011
Anonymity meets game theory: secure data integration with malicious participants.
VLDB J., 2011

Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
IEEE Trans. Dependable Sec. Comput., 2011

Privacy-preserving traffic padding in web-based applications.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Reasoning About a Simulated Printer Case Investigation with Forensic Lucid.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

A decentralized heuristic for multi-depot split-delivery vehicle routing problem.
Proceedings of the IEEE International Conference on Automation and Logistics, 2011

2010
PCM: a privacy-preserving detection mechanism in mobile ad hoc networks.
Security and Communication Networks, 2010

A Secure Mechanism Design-Based and Game Theoretical Model for MANETs.
MONET, 2010

A game-theoretic framework for specification and verification of cryptographic protocols.
Formal Asp. Comput., 2010

Security Evaluation and Hardening of Free and Open Source Software (FOSS).
ECEASST, 2010

Mining writeprints from anonymous e-mails for forensic investigation.
Digital Investigation, 2010

The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY
CoRR, 2010

Verification of the Correctness in Composed UML Behavioural Diagrams.
Proceedings of the Software Engineering Research, 2010

Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML.
Proceedings of the Software Engineering Research, 2010

Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

e-mail authorship verification for forensic investigation.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

On the analysis of the Zeus botnet crimeware toolkit.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework.
Proceedings of the Formal Aspects of Component Software - 7th International Workshop, 2010

Insights from the analysis of the Mariposa botnet.
Proceedings of the CRiSIS 2010, 2010

Aspect weaver: a model transformation approach for UML models.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

Towards a self-forensics property in the ASSL toolset.
Proceedings of the Canadian Conference on Computer Science & Software Engineering, 2010

Verification and Validation in Systems Engineering - Assessing UML / SysML Design Models.
Springer, ISBN: 978-3-642-15227-6, 2010

2009
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité.
Technique et Science Informatiques, 2009

Usability of Security Specification Approaches for UML Design: A Survey.
Journal of Object Technology, 2009

Interprocedural and Flow-Sensitive Type Analysis for Memory and Type Safety of C Code.
J. Autom. Reasoning, 2009

Capturing Returned Computable Values in AspectJ for Security Hardening.
Information Security Journal: A Global Perspective, 2009

Synergistic verification and validation of systems and software engineering models.
Int. J. General Systems, 2009

Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages.
Electron. Notes Theor. Comput. Sci., 2009

QoS-aware middleware for web services composition: a qualitative approach.
Enterprise IS, 2009

Towards an integrated e-mail forensic analysis framework.
Digital Investigation, 2009

Reasoning About an ACME Printer Case Investigation with Forensic Lucid
CoRR, 2009

New aspect-oriented constructs for security hardening concerns.
Comput. Secur., 2009

lambda_SAOP: A Security AOP Calculus.
Comput. J., 2009

An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

Verification of CERT Secure Coding Rules: Case Studies.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid.
Proceedings of the Huntsville Simulation Conference, 2009

Reasoning About a Simulated Printer Case Investigation with Forensic Lucid (abstract).
Proceedings of the Huntsville Simulation Conference, 2009

On the Meaning of SysML Activity Diagrams.
Proceedings of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2009

Walking in the crowd: anonymizing trajectory data for pattern analysis.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

The dataflow pointcut: a formal and practical framework.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

A Practical Framework for the Dataflow Pointcut in AspectJ.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Wireless Applications: Middleware Security.
Encyclopedia of Wireless and Mobile Communications, 2008

Mobile Security: Game Theory.
Encyclopedia of Wireless and Mobile Communications, 2008

Automated Windows Memory File Extraction for Cyber Forensics Investigation.
J. Digital Forensic Practice, 2008

A High-level Aspect-oriented-based Framework for Software Security Hardening.
Information Security Journal: A Global Perspective, 2008

New AspectJ Pointcuts for Integer Overflow and Underflow Detection.
Information Security Journal: A Global Perspective, 2008

Execution monitoring enforcement under memory-limitation constraints.
Inf. Comput., 2008

An aspect-oriented approach for the systematic security hardening of code.
Comput. Secur., 2008

A game-theoretic intrusion detection model for mobile ad hoc networks.
Comput. Commun., 2008

Game theoretic models for detecting network intrusions.
Comput. Commun., 2008

A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Towards Language-Independent Approach for Security Concerns Weaving.
Proceedings of the SECRYPT 2008, 2008

Targeting Security Vulnerabilities: From Specification to Detection (Short Paper).
Proceedings of the Eighth International Conference on Quality Software, 2008

Cross-Language Weaving Approach Targeting Software Security Hardening.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Model-Checking for Software Vulnerabilities Detection with Multi-Language Support.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

A framework for privacy-preserving cluster analysis.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008

File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008

Towards Automation of Testing High-Level Security Properties.
Proceedings of the Data and Applications Security XXII, 2008

A Hybrid Approach for Safe Memory Management in C.
Proceedings of the Algebraic Methodology and Software Technology, 2008

A novel flow-sensitive type and effect analysis for securing C code.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

Type and Effect Annotations for Safe Memory Access in C.
Proceedings of the The Third International Conference on Availability, 2008

2007
Forensic analysis of logs: Modeling and verification.
Knowl.-Based Syst., 2007

What middleware for network centric operations?
Knowl.-Based Syst., 2007

A Formal Type System for Java.
Journal of Object Technology, 2007

A Dynamic Operational Semantics for JVML.
Journal of Object Technology, 2007

An Efficient and Truthful Leader IDS Election Mechanism for MANET.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

New Primitives to AOP Weaving Capabilities for Security Hardening Concerns.
Proceedings of the Security in Information Systems, 2007

Verifying Security Properties of Cryptoprotocols: A Novel Approach.
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007

An AOP Extended Lambda-Calculus.
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007

A High-Level Aspect-Oriented based Language for Software Security Hardening.
Proceedings of the SECRYPT 2007, 2007

A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

Control Flow Based Pointcuts for Security Hardening Concerns.
Proceedings of the Trust Management, 2007

A Security Hardening Language Based on Aspect-Orientation.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007

Testing Intrusion Detection Systems in MANET: A Comprehensive Study.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

Towards an Aspect Oriented Approach for the Security Hardening of Code.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Team Edit Automata for Testing Security Property.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Modeling Security Protocols as Games.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors.
Sci. Comput. Program., 2006

Security Evaluation of J2ME CLDC Embedded Java Platform.
Journal of Object Technology, 2006

Secure E-Commerce Transactions for Multicast Services.
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006

Common Criteria Approach to J2ME CLDC Security Requirements.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

A Formal Approach for the Forensic Analysis of Logs.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

Formalizing AspectJ Weaving for Static Pointcuts.
Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006), 2006

Execution monitoring enforcement for limited-memory systems.
Proceedings of the 2006 International Conference on Privacy, 2006

Security hardening of open source software.
Proceedings of the 2006 International Conference on Privacy, 2006

Security crosscutting concerns and AspectJ.
Proceedings of the 2006 International Conference on Privacy, 2006

Towards a Formal Semantics for AspectJ Weaving.
Proceedings of the Modular Programming Languages, 7th Joint Modular Languages Conference, 2006

QoS-Aware Middleware for Web Services Composition - A Qualitative Approach.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

A Game Theoretic Model to Handle Network Intrusions over Multiple Packets.
Proceedings of IEEE International Conference on Communications, 2006

Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models.
Proceedings of the IASTED International Conference on Software Engineering, 2006

A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Unified Approach for Verification and Validation of Systems and Software Engineering Models.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006

Secure E-commerce Protection Profile.
Proceedings of the 2006 International Conference on Security & Management, 2006

A Survey of Secure B2C Commerce for Multicast Services.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

Security Design Patterns: Survey and Evaluation.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

AOP Extension for Security Testing of Programs.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

On the verification and validation of uml structural and behavioral diagrams.
Proceedings of the IASTED International Conference on Advances in Computer Science and Technology, 2006

2005
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines.
Journal of Object Technology, 2005

Accelerating embedded Java for mobile devices.
IEEE Communications Magazine, 2005

Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Security Analysis of Wireless Java.
Proceedings of the Third Annual Conference on Privacy, 2005

Game Semantics Model for Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2005

Security Analysis of Mobile Java.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Java for Mobile Devices: A Security Study.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines.
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004

A dynamic compiler for embedded Java virtual machines.
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004

2003
A new logic for electronic commerce protocols.
Theor. Comput. Sci., 2003

Security by typing.
STTT, 2003

Towards the Correctness of Security Protocols.
Proceedings of 19th Conference on the Mathematical Foundations of Programming Semantics, 2003

Method Call Acceleration in Embedded Java Virtual Machines.
Proceedings of the Computational Science - ICCS 2003, 2003

2002
Secure Self-certified Code for Java.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

2001
Abstract interpretation for proving secrecy properties in security protocols.
Electron. Notes Theor. Comput. Sci., 2001

2000
On object initialization in the Java bytecode.
Comput. Commun., 2000

On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Secure Self-Certified COTS.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Verifying Object Initialization in the Java Bytecode Language.
Proceedings of the Applied Computing 2000, 2000

Sur la sémantique statique de Java.
Proceedings of the Actes des journées Langages et Modèles à Objets, 2000

1999
Static Analysis of Binary Code to Isolate Malicious Behaviors.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999

Final Summary Report on Enterprise Security.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999

1998
A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes.
Proceedings of the Algebraic Methodology and Software Technology, 1998

An Environment for the Specification and Analysis of Cryptoprotocols.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
A Model-Based Concurrent Specification Language Over CML: Semantic Foundations.
Parallel Processing Letters, 1997

On the Inference od Structured Recursive Effects with Subtyping.
Journal of Functional and Logic Programming, 1997

From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997

Formal Automatic Verification of Authentication Crytographic Protocols.
Proceedings of the First IEEE International Conference on Formal Engineering Methods, 1997

1996
A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs.
Proceedings of the Implementation of Functional Languages, 8th International Workshop, 1996

1995
A Concurrent, Specification Language over CML.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995

1994
A Semantic Theory for Concurrent ML.
Proceedings of the Theoretical Aspects of Computer Software, 1994

1993
A Denotational Model for the Integration of Concurrent, Functional, and Imperative Programming.
Proceedings of the Computing and Information, 1993

A Coherent Type System for a Concurrent, Functional and Imperative Programming Language.
Proceedings of the Algebraic Methodology and Software Technology (AMAST '93), 1993

1992
Higher Order Communication Processes with Value-Passing, Assignment and Return of Results.
Proceedings of the Algorithms and Computation, Third International Symposium, 1992


  Loading...