Fehmi Jaafar

Orcid: 0000-0002-1797-3840

According to our database1, Fehmi Jaafar authored at least 57 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Systematic Literature Review on AI Safety: Identifying Trends, Challenges, and Future Directions.
IEEE Access, 2024

Ensuring the Integrity, Confidentiality, and Availability of IoT Data in Industry 5.0: A Systematic Mapping Study.
IEEE Access, 2024

Detection of Abnormal Activities in a Crowd Video Surveillance using Contextual Information.
Proceedings of the 2024 9th International Conference on Multimedia and Image Processing, 2024

Enhancing RAG-Retrieval to Improve LLMs Robustness and Resilience to Hallucinations.
Proceedings of the Hybrid Artificial Intelligent Systems - 19th International Conference, 2024

Can Deep Learning Detect Fake News Better when Adding Context Features?
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

Securing AWS Lambda: Advanced Strategies and Best Practices.
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024

On Securing Sensitive Data Using Deep Convolutional Autoencoders.
Proceedings of the 10th International Conference on Control, 2024

2023
Quality and Security Frameworks for IoT-Architecture Models Evaluation.
SN Comput. Sci., July, 2023

Architecting Peer-to-Peer Serverless Distributed Machine Learning Training for Improved Fault Tolerance.
CoRR, 2023

IoT Phishing Detection Using Hybrid NLP and Machine Learning Models Enhanced with Contextual Embedding.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training Architecture.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Exploring the Impact of Serverless Computing on Peer To Peer Training Machine Learning.
Proceedings of the IEEE International Conference on Cloud Engineering, 2023

An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Privacy-Preserving Federated Learning for IoT Intrusion Detection System.
Proceedings of the 9th International Conference on Control, 2023

Blockchain-Based Consent Management for Privacy Persevering and Transparency in Intelligent Surveillance Systems.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Serverless on Machine Learning: A Systematic Mapping Study.
IEEE Access, 2022

On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Enhancing Biometric Security with Combinatorial and Permutational Multi-Fingerprint Authentication Strategies.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2021
On the Impact of Interlanguage Dependencies in Multilanguage Systems Empirical Case Study on Java Native Interface Applications (JNI).
IEEE Trans. Reliab., 2021

Investigating design anti-pattern and design pattern mutations and their change- and fault-proneness.
Empir. Softw. Eng., 2021

Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Blockchain Based Model for Consent Management and Data Transparency Assurance.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
Internet of Things Architectures: A Comparative Study.
CoRR, 2020

On the Impact of Inter-language Dependencies in Multi-language Systems.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality Perspective.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

Behavioral Study of Malware Affecting Financial Institutions and Clients.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Demystifying the Cyber Attribution: An Exploratory Study.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Knowledge Extraction and Integration for Information Gathering in Penetration Testing.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Lightweight authentication for MQTT to improve the security of IoT communication.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

Study of Trust at Device Level of the Internet of Things Architecture.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

Private Blockchain Network for IoT Device Firmware Integrity Verification and Update.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2018
Protecting Internet users from becoming victimized attackers of click-fraud.
J. Softw. Evol. Process., 2018

Using Probabilistic Temporal Logic PCTL and Model Checking for Context Prediction.
Comput. Informatics, 2018

Detecting Blind Cross-Site Scripting Attacks Using Machine Learning.
Proceedings of the 2018 International Conference on Signal Processing and Machine Learning, 2018

Information Security Considerations for Wireless Infusion Pumps.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

An Analysis of Android Malware Behavior.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud.
Proceedings of the 5th International Conference on Control, 2018

2017
Analyzing software evolution and quality by extracting Asynchrony change patterns.
J. Syst. Softw., 2017

On the Analysis of Co-Occurrence of Anti-Patterns and Clones.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

An Integrated Architecture for IoT Fingerprinting.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

An Automatic Software Vulnerability Classification Framework.
Proceedings of the International Conference on Software Security and Assurance, 2017

2016
Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults.
Empir. Softw. Eng., 2016

A Systematic Approach for Privilege Escalation Prevention.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

FCFraud: Fighting Click-Fraud from the User Side.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

2015
A slow read attack using cloud.
Proceedings of the 2015 7th International Conference on Electronics, 2015

2014
Detecting asynchrony and dephase change patterns by mining software repositories.
J. Softw. Evol. Process., 2014

Clones and Macro co-changes.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2014

Anti-pattern Mutations and Fault-proneness.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

2013
Analysing Anti-patterns Static Relationships with Design Patterns.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2013

Mining the relationship between anti-patterns dependencies and fault-proneness.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

Leveraging historical co-change information for requirements traceability.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

On the Relationship between Program Evolution and Fault-Proneness: An Empirical Study.
Proceedings of the 17th European Conference on Software Maintenance and Reengineering, 2013

2012
On the analysis of evolution of software artefacts and programs.
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
An Exploratory Study of Macro Co-changes.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011


  Loading...