Mourad Debbabi
Orcid: 0000-0003-3015-3043Affiliations:
- Concordia University, Montreal, Canada
According to our database1,
Mourad Debbabi
authored at least 360 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery.
IEEE Trans. Netw. Serv. Manag., October, 2024
Spatial-Temporal Data-Driven Model for Load Altering Attack Detection in Smart Power Distribution Networks.
IEEE Trans. Ind. Informatics, May, 2024
Measuring and Improving the Security Posture of IEC 61850 Substations Against Supply Chain Attacks.
IEEE Trans. Instrum. Meas., 2024
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2024
ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Chronohunt: Determining Optimal Pace for Automated Alert Analysis in Threat Hunting Using Reinforcement Learning.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT Firmware.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features.
Expert Syst. Appl., September, 2023
Comput. Secur., September, 2023
IEEE Trans. Smart Grid, May, 2023
On the prevalence of software supply chain attacks: Empirical study and investigative framework.
Forensic Sci. Int. Digit. Investig., March, 2023
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security.
IEEE Secur. Priv., 2023
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features.
ACM Comput. Surv., 2023
An Electric Vehicle Control Strategy to Mitigate Load Altering Attacks Against Power Grids.
CoRR, 2023
Protecting the Future Grid: An Electric Vehicle Robust Mitigation Scheme Against Load Altering Attacks on Power Grids.
CoRR, 2023
CoRR, 2023
Security of Wide-Area Monitoring, Protection, and Control (WAMPAC) Systems of the Smart Grid: A Survey on Challenges and Opportunities.
IEEE Commun. Surv. Tutorials, 2023
IEEE Commun. Surv. Tutorials, 2023
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2023
Detection of Cyber Attacks on Synchro-Phasor Network Targeting Topology Detection Application of Power Distribution Grids.
Proceedings of the IEEE International Conference on Communications, 2023
A Resilience Quantitative Framework for Wide Area Damping Control Against Cyberattacks.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023
Vulnerability Analysis of Virtual Power Plant Voltage Support under Denial-of-Service Attacks.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring.
Proceedings of the Computer Security - ESORICS 2023, 2023
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management.
IEEE Trans. Ind. Informatics, 2022
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems.
IEEE Trans. Dependable Secur. Comput., 2022
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies.
ACM Comput. Surv., 2022
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection.
Comput. Secur., 2022
Online Attack-aware Risk Management for PMSG-based Wind Farm Depending on System Strength Evaluation.
Proceedings of the IEEE International Conference on Communications, 2022
Real-Time Co-simulation Platform for Security Analysis of Distribution Automation Systems.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022
A Cyber-Physical Resilience-Based Survivability Metric against Topological Cyberattacks.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022
Security Monitoring of the Microgrid Using IEC 62351-7 Network and System Management.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022
2021
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence
Advances in Information Security 86, Springer, ISBN: 978-3-030-74663-6, 2021
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization.
ACM Trans. Priv. Secur., 2021
Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems.
IEEE Trans. Inf. Forensics Secur., 2021
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing.
IEEE Trans. Dependable Secur. Comput., 2021
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships.
IEEE Netw. Lett., 2021
Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques.
CoRR, 2021
Modeling of Cyber Attacks Against Converter-Driven Stability of PMSG-Based Wind Farms with Intentional Subsynchronous Resonance.
Proceedings of the IEEE International Conference on Communications, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
2020
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting
Advances in Information Security 78, Springer, ISBN: 978-3-030-34237-1, 2020
Exploiting the Vulnerability of Relative Data Alignment in Phasor Data Concentrators to Time Synchronization Attacks.
IEEE Trans. Smart Grid, 2020
Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids.
IEEE Trans. Smart Grid, 2020
CASeS: Concurrent Contingency Analysis-Based Security Metric Deployment for the Smart Grid.
IEEE Trans. Smart Grid, 2020
An Extension to the Precision Time Protocol (PTP) to Enable the Detection of Cyber Attacks.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities.
IEEE Netw. Lett., 2020
Multi-depot vehicle routing problem with risk mitigation: Model and solution algorithm.
Expert Syst. Appl., 2020
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities.
Digit. Investig., 2020
R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020
Android Malware Clustering using Community Detection on Android Packages Similarity Network.
CoRR, 2020
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning.
Comput. Secur., 2020
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019
IEEE Trans. Smart Grid, 2019
ACM Trans. Priv. Secur., 2019
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective.
IEEE Trans. Big Data, 2019
Automated Post-Failure Service Restoration in Smart Grid Through Network Reconfiguration in the Presence of Energy Storage Systems.
IEEE Syst. J., 2019
Learning probabilistic dependencies among events for proactive security auditing in clouds.
J. Comput. Secur., 2019
Decoupling coding habits from functionality for effective binary authorship attribution.
J. Comput. Secur., 2019
IEEE Commun. Lett., 2019
Expert Syst. Appl., 2019
MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports.
Digit. Investig., 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management<sup>1</sup>.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
2018
IEEE Trans. Smart Grid, 2018
IEEE Trans. Smart Grid, 2018
<i>FOSSIL</i>: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries.
ACM Trans. Priv. Secur., 2018
Critical Links Identification for Selective Outages in Interdependent Power-Communication Networks.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Digit. Investig., 2018
Digit. Investig., 2018
Portable, Data-Driven Malware Detection using Language Processing and Machine Learning Techniques on Behavioral Analysis Reports.
CoRR, 2018
Toward Multimodal Interaction in Scalable Visual Digital Evidence Visualization Using Computer Vision Techniques and ISS.
CoRR, 2018
CoRR, 2018
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems.
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Computer Security, 2018
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Trans. Large Scale Data Knowl. Centered Syst., 2017
IEEE Netw., 2017
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103].
Digit. Investig., 2017
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
J. Comput. Virol. Hacking Tech., 2016
IEEE Trans. Ind. Informatics, 2016
Innov. Syst. Softw. Eng., 2016
Digit. Investig., 2016
<i>BinGold</i>: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs).
Digit. Investig., 2016
IEEE Commun. Surv. Tutorials, 2016
IEEE Commun. Surv. Tutorials, 2016
A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities.
Comput. Networks, 2016
Cascading link failure analysis in interdependent networks for maximal outages in smart grid.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016
Cypider: building community-based cyber-defense infrastructure for android malware detection.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
ACM Trans. Inf. Syst. Secur., 2015
Expert Syst. Appl., 2015
Digit. Investig., 2015
Digit. Investig., 2015
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code.
Digit. Investig., 2015
Computing, 2015
Comput. Commun., 2015
Verification of firewall reconfiguration for virtual machines migrations in the cloud.
Comput. Networks, 2015
Proceedings of the 1st IEEE International Workshop on Software Analytics, 2015
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Towards migrating security policies of virtual machines in Software Defined Networks.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Springer, ISBN: 978-3-319-16106-8, 2015
2014
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data.
IEEE Trans. Dependable Secur. Comput., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Int. J. Softw. Tools Technol. Transf., 2014
The multi-depot split-delivery vehicle routing problem: Model and solution algorithm.
Knowl. Based Syst., 2014
Knowl. Based Syst., 2014
Expert Syst. Appl., 2014
Digit. Investig., 2014
IEEE Commun. Surv. Tutorials, 2014
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the International C* Conference on Computer Science & Software Engineering, 2014
The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities.
Proceedings of the Advances in Artificial Intelligence, 2014
2013
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks.
Secur. Commun. Networks, 2013
J. Syst. Softw., 2013
A unified data mining solution for authorship analysis in anonymous textual communications.
Inf. Sci., 2013
Comput. Networks, 2013
Proceedings of the Seventh International Symposium on Theoretical Aspects of Software Engineering, 2013
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Proceedings of the IEEE 12th International Conference on Intelligent Software Methodologies, 2013
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Proceedings of the Health Information Science - Second International Conference, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Proceedings of the 2013 Forum on specification and Design Languages, 2013
Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the 4th International Conference on Ambient Systems, 2013
Proceedings of the 4th International Conference on Ambient Systems, 2013
Proceedings of the 4th International Conference on Ambient Systems, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
J. Softw., 2012
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012
Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2012
Proceedings of the Software Engineering and Formal Methods - 10th International Conference, 2012
Formal Analysis of the TLS Handshake Protocol.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the Advances in Knowledge-Based and Intelligent Information and Engineering Systems, 2012
A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks.
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012
2011
VLDB J., 2011
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
IEEE Trans. Dependable Secur. Comput., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011
Proceedings of the IEEE International Conference on Automation and Logistics, 2011
2010
Secur. Commun. Networks, 2010
Mob. Networks Appl., 2010
A game-theoretic framework for specification and verification of cryptographic protocols.
Formal Aspects Comput., 2010
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010
Digit. Investig., 2010
The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY
CoRR, 2010
Proceedings of the Software Engineering Research, 2010
Proceedings of the Software Engineering Research, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
Proceedings of the Formal Aspects of Component Software - 7th International Workshop, 2010
Proceedings of the CRiSIS 2010, 2010
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010
Proceedings of the Canadian Conference on Computer Science & Software Engineering, 2010
Verification and Validation in Systems Engineering - Assessing UML / SysML Design Models.
Springer, ISBN: 978-3-642-15227-6, 2010
2009
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité.
Tech. Sci. Informatiques, 2009
J. Object Technol., 2009
Interprocedural and Flow-Sensitive Type Analysis for Memory and Type Safety of C Code.
J. Autom. Reason., 2009
Inf. Secur. J. A Glob. Perspect., 2009
Int. J. Gen. Syst., 2009
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages.
Proceedings of the 4th International Workshop on Systems Software Verification, 2009
Enterp. Inf. Syst., 2009
Digit. Investig., 2009
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid.
Proceedings of the Huntsville Simulation Conference, 2009
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid (abstract).
Proceedings of the Huntsville Simulation Conference, 2009
Proceedings of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2009
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
Proceedings of the 13th workshop on Aspect-oriented modeling, 2009
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Encyclopedia of Wireless and Mobile Communications, 2008
Encyclopedia of Wireless and Mobile Communications, 2008
J. Digit. Forensic Pract., 2008
Inf. Secur. J. A Glob. Perspect., 2008
Inf. Secur. J. A Glob. Perspect., 2008
Inf. Comput., 2008
A novel approach of mining write-prints for authorship attribution in e-mail forensics.
Digit. Investig., 2008
Comput. Secur., 2008
Comput. Commun., 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Towards Language-Independent Approach for Security Concerns Weaving.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Eighth International Conference on Quality Software, 2008
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the IT-Incidents Management & IT-Forensics, 2008
File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Algebraic Methodology and Software Technology, 2008
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Digit. Investig., 2007
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns.
Proceedings of the Security in Information Systems, 2007
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007
A High-Level Aspect-Oriented based Language for Software Security Hardening.
Proceedings of the SECRYPT 2007, 2007
A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007
Proceedings of the Trust Management, 2007
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors.
Sci. Comput. Program., 2006
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006
Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006), 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the Modular Programming Languages, 7th Joint Modular Languages Conference, 2006
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
Proceedings of IEEE International Conference on Communications, 2006
Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models.
Proceedings of the IASTED International Conference on Software Engineering, 2006
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
A Unified Approach for Verification and Validation of Systems and Software Engineering Models.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006
Secure E-commerce Protection Profile.
Proceedings of the 2006 International Conference on Security & Management, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
On the verification and validation of uml structural and behavioral diagrams.
Proceedings of the IASTED International Conference on Advances in Computer Science and Technology, 2006
2005
J. Object Technol., 2005
Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the Third Annual Conference on Privacy, 2005
Proceedings of the Formal Methods and Software Engineering, 2005
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines.
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004
2003
Proceedings of 19th Conference on the Mathematical Foundations of Programming Semantics, 2003
Proceedings of the Computational Science - ICCS 2003, 2003
2002
Proceedings of the Formal Aspects of Security, First International Conference, 2002
2001
Proceedings of the Logical Aspects of Cryptographic Protocol Verification, 2001
2000
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000
Proceedings of the Applied Computing 2000, 2000
Sur la sémantique statique de Java.
Proceedings of the Actes des journées Langages et Modèles à Objets, 2000
1999
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999
1998
A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes.
Proceedings of the Algebraic Methodology and Software Technology, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Parallel Process. Lett., 1997
J. Funct. Log. Program., 1997
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997
Proceedings of the First IEEE International Conference on Formal Engineering Methods, 1997
1996
A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs.
Proceedings of the Implementation of Functional Languages, 8th International Workshop, 1996
1995
A Concurrent, Specification Language over CML.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995
1994
Proceedings of the Theoretical Aspects of Computer Software, 1994
1993
A Denotational Model for the Integration of Concurrent, Functional, and Imperative Programming.
Proceedings of the Computing and Information, 1993
A Coherent Type System for a Concurrent, Functional and Imperative Programming Language.
Proceedings of the Algebraic Methodology and Software Technology (AMAST '93), 1993
1992
Higher Order Communication Processes with Value-Passing, Assignment and Return of Results.
Proceedings of the Algorithms and Computation, Third International Symposium, 1992