Mourad Debbabi - Publications

Affiliations: 
Universite Laval (Canada) 
Area:
Computer Science

175 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Ray S, Debbabi M, Allouche M, Léchevin N, Bélanger M. Energy-Efficient Monitor Deployment in Collaborative Distributed Setting Ieee Transactions On Industrial Informatics. 12: 112-123. DOI: 10.1109/Tii.2015.2500163  0.8
2016 Moussa B, Debbabi M, Assi C. A detection and mitigation model for PTP delay attack in a smart grid substation 2015 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2015. 497-502. DOI: 10.1109/SmartGridComm.2015.7436349  0.8
2016 Fachkha C, Debbabi M. Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization Ieee Communications Surveys and Tutorials. 18: 1197-1227. DOI: 10.1109/Comst.2015.2497690  0.8
2016 Bou-Harb E, Debbabi M, Assi C. A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities Computer Networks. 94: 327-343. DOI: 10.1016/J.Comnet.2015.11.004  0.8
2015 Ding SHH, Fung BCM, Debbabi M. A visualizable evidence-driven approach for Authorship attribution Acm Transactions On Information and System Security. 17. DOI: 10.1145/2699910  0.8
2015 Mokhov SA, Paquet J, Debbabi M. MARFCAT: Fast code analysis for defects and vulnerabilities 2015 Ieee 1st International Workshop On Software Analytics, Swan 2015 - Proceedings. 35-38. DOI: 10.1109/SWAN.2015.7070488  0.8
2015 Sadri S, Jarraya Y, Eghtesadi A, Debbabi M. Towards migrating security policies of virtual machines in Software Defined Networks 1st Ieee Conference On Network Softwarization: Software-Defined Infrastructures For Networks, Clouds, Iot and Services, Netsoft 2015. DOI: 10.1109/NETSOFT.2015.7116165  0.8
2015 Bou-Harb E, Debbabi M, Assi C. A time series approach for inferring orchestrated probing campaigns by analyzing darknet traffic Proceedings - 10th International Conference On Availability, Reliability and Security, Ares 2015. 180-185. DOI: 10.1109/ARES.2015.9  0.8
2015 Aljumah F, Soeanu A, Liu WM, Debbabi M. Protocols for secure multi-party private function evaluation 2015 1st International Conference On Anti-Cybercrime, Icacc 2015. DOI: 10.1109/Anti-Cybercrime.2015.7351946  0.8
2015 Farhadi MR, Fung BCM, Fung YB, Charland P, Preda S, Debbabi M. Scalable code clone search for malware analysis Digital Investigation. DOI: 10.1016/J.Diin.2015.06.001  0.8
2015 Rahimian A, Shirani P, Alrbaee S, Wang L, Debbabi M. BinComp: A stratified approach to compiler provenance Attribution Digital Investigation. 14: S146-S155. DOI: 10.1016/J.Diin.2015.05.015  0.8
2015 Alrabaee S, Shirani P, Wang L, Debbabi M. SIGMA: A semantic integrated graph matching approach for identifying reused functions in binary code Digital Investigation. 12: S61-S71. DOI: 10.1016/J.Diin.2015.01.011  0.8
2015 Dinh S, Azeb T, Fortin F, Mouheb D, Debbabi M. Spam campaign detection, analysis, and investigation Digital Investigation. 12: S12-S21. DOI: 10.1016/J.Diin.2015.01.006  0.8
2015 Jarraya Y, Eghtesadi A, Sadri S, Debbabi M, Pourzandi M. Verification of firewall reconfiguration for virtual machines migrations in the cloud Computer Networks. DOI: 10.1016/J.Comnet.2015.10.008  0.8
2015 Fachkha C, Bou-Harb E, Debbabi M. Inferring distributed reflection denial of service attacks from darknet Computer Communications. 62: 59-71. DOI: 10.1016/J.Comcom.2015.01.016  0.8
2015 Ouchani S, Debbabi M. Specification, verification, and quantification of security in model-based systems Computing. 97: 691-711. DOI: 10.1007/S00607-015-0445-X  0.8
2015 Mokhov SA, Assels MJ, Paquet J, Debbabi M. Automating MAC spoofer evidence gathering and encoding for investigations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8930: 168-183. DOI: 10.1007/978-3-319-17040-4_11  0.8
2015 Fachkha C, Bou-Harb E, Debbabi M. On the inference and prediction of DDoS campaigns Wireless Communications and Mobile Computing. 15: 1066-1078. DOI: 10.1002/wcm.2510  0.8
2014 Mokhov SA, Assels MJ, Paquet J, Debbabi M. Toward automated MAC spoofer investigations Acm International Conference Proceeding Series. 179-184. DOI: 10.1145/2641483.2641540  0.8
2014 Liu WM, Wang L, Cheng P, Ren K, Zhu S, Debbabi M. PPTP: Privacy-preserving traffic padding in web-based applications Ieee Transactions On Dependable and Secure Computing. 11: 538-552. DOI: 10.1109/Tdsc.2014.2302308  0.8
2014 Mohammed N, Alhadidi D, Fung BCM, Debbabi M. Secure two-party differentially private data release for vertically partitioned data Ieee Transactions On Dependable and Secure Computing. 11: 59-71. DOI: 10.1109/Tdsc.2013.22  0.8
2014 Bou-Harb E, Debbabi M, Assi C. Cyber scanning: A comprehensive survey Ieee Communications Surveys and Tutorials. 16: 1496-1519. DOI: 10.1109/Surv.2013.102913.00020  0.8
2014 Farhadi MR, Fung BCM, Charland P, Debbabi M. BinClone: Detecting code clones in malware Proceedings - 8th International Conference On Software Security and Reliability, Sere 2014. 78-87. DOI: 10.1109/SERE.2014.21  0.8
2014 Boukhtouta A, Lakhdari NE, Debbabi M. Inferring malware family through application protocol sequences signature 2014 6th International Conference On New Technologies, Mobility and Security - Proceedings of Ntms 2014 Conference and Workshops. DOI: 10.1109/NTMS.2014.6814026  0.8
2014 Fachkha C, Bou-Harb E, Debbabi M. Fingerprinting internet DNS amplification DDoS Activities 2014 6th International Conference On New Technologies, Mobility and Security - Proceedings of Ntms 2014 Conference and Workshops. DOI: 10.1109/NTMS.2014.6814019  0.8
2014 Binsalleeh H, Kara AM, Youssef A, Debbabi M. Characterization of covert channels in DNS 2014 6th International Conference On New Technologies, Mobility and Security - Proceedings of Ntms 2014 Conference and Workshops. DOI: 10.1109/NTMS.2014.6814008  0.8
2014 Bou-Harb E, Debbabi M, Assi C. Behavioral analytics for inferring large-scale orchestrated probing events Proceedings - Ieee Infocom. 506-511. DOI: 10.1109/INFCOMW.2014.6849283  0.8
2014 Eghtesadi A, Jarraya Y, Debbabi M, Pourzandi M. Preservation of security configurations in the cloud Proceedings - 2014 Ieee International Conference On Cloud Engineering, Ic2e 2014. 17-26. DOI: 10.1109/IC2E.2014.14  0.8
2014 Jarraya Y, Madi T, Debbabi M. A survey and a layered taxonomy of software-defined networking Ieee Communications Surveys and Tutorials. 16: 1955-1980. DOI: 10.1109/Comst.2014.2320094  0.8
2014 Ray S, Soeanu A, Berger J, Debbabi M. The multi-depot split-delivery vehicle routing problem: Model and solution algorithm Knowledge-Based Systems. DOI: 10.1016/J.Knosys.2014.08.006  0.8
2014 Ouchani S, Aït Mohamed O, Debbabi M. A property-based abstraction framework for SysML activity diagrams Knowledge-Based Systems. 56: 328-343. DOI: 10.1016/J.Knosys.2013.11.016  0.8
2014 Ouchani S, Mohamed OA, Debbabi M. A formal verification framework for SysML activity diagrams Expert Systems With Applications. 41: 2713-2728. DOI: 10.1016/J.Eswa.2013.10.064  0.8
2014 Bou-Harb E, Lakhdari NE, Binsalleeh H, Debbabi M. Multidimensional investigation of source port 0 probing Digital Investigation. 11. DOI: 10.1016/J.Diin.2014.05.012  0.8
2014 Alrabaee S, Saleem N, Preda S, Wang L, Debbabi M. OBA2: An onion approach to binary code authorship attribution Digital Investigation. 11. DOI: 10.1016/J.Diin.2014.03.012  0.8
2014 Bou-Harb E, Debbabi M, Assi C. On fingerprinting probing activities Computers and Security. 43: 35-48. DOI: 10.1016/J.Cose.2014.02.005  0.8
2014 Jarraya Y, Debbabi M. Quantitative and qualitative analysis of SysML activity diagrams International Journal On Software Tools For Technology Transfer. 16: 399-419. DOI: 10.1007/S10009-014-0305-6  0.8
2014 Barouti S, Aljumah F, Alhadidi D, Debbabi M. Secure and privacy-preserving querying of personal health records in the cloud Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8566: 82-97. DOI: 10.1007/978-3-662-43936-4_6  0.8
2014 Mokhov SA, Paquet J, Debbabi M. The use of NLP techniques in static code analysis to detect weaknesses and vulnerabilities Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8436: 326-332. DOI: 10.1007/978-3-319-06483-3_33  0.8
2014 Rahimian A, Ziarati R, Preda S, Debbabi M. On the reverse engineering of the citadel botnet Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8352: 408-425. DOI: 10.1007/978-3-319-05302-8_25  0.8
2013 Mouheb D, Ziarati R, Debbabi M. Aspect-Oriented semantic framework for executable models Proceedings - 2013 International Symposium On Theoretical Aspects of Software Engineering, Tase 2013. 63-70. DOI: 10.1109/TASE.2013.17  0.8
2013 Ouchani S, Mohamed OA, Debbabi M. A probabilistic verification framework of SysML activity diagrams Somet 2013 - 12th Ieee International Conference On Intelligent Software Methodologies, Tools and Techniques, Proceedings. 165-170. DOI: 10.1109/SoMeT.2013.6645657  0.8
2013 Ouchani S, Mohamed OA, Debbabi M. A Security risk assessment framework for sysML activity diagrams Proceedings - 7th International Conference On Software Security and Reliability, Sere 2013. 227-236. DOI: 10.1109/SERE.2013.11  0.8
2013 Fachkha C, Bou-Harb E, Debbabi M. Towards a forecasting model for distributed denial of service activities Proceedings - Ieee 12th International Symposium On Network Computing and Applications, Nca 2013. 110-117. DOI: 10.1109/NCA.2013.13  0.8
2013 Bou-Harb E, Debbabi M, Assi C. On detecting and clustering distributed cyber scanning 2013 9th International Wireless Communications and Mobile Computing Conference, Iwcmc 2013. 926-933. DOI: 10.1109/IWCMC.2013.6583681  0.8
2013 Liu WM, Wang L, Ren K, Debbabi M. Background knowledge-resistant traffic padding for preserving user privacy in Web-based applications Proceedings of the International Conference On Cloud Computing Technology and Science, Cloudcom. 1: 679-686. DOI: 10.1109/CloudCom.2013.96  0.8
2013 Barouti S, Alhadidi D, Debbabi M. Symmetrically-private database search in cloud computing Proceedings of the International Conference On Cloud Computing Technology and Science, Cloudcom. 1: 671-678. DOI: 10.1109/CloudCom.2013.95  0.8
2013 Bou-Harb E, Debbabi M, Assi C. A statistical approach for fingerprinting probing activities Proceedings - 2013 International Conference On Availability, Reliability and Security, Ares 2013. 21-30. DOI: 10.1109/ARES.2013.9  0.8
2013 Debbabi M, Mejri M. Towards the Correctness of Security Protocols Electronic Notes in Theoretical Computer Science. 83: 55-98. DOI: 10.1016/S1571-0661(03)50004-4  1
2013 Boukhtouta A, Lakhdari NE, Mokhov SA, Debbabi M. Towards fingerprinting malicious traffic Procedia Computer Science. 19: 548-555. DOI: 10.1016/J.Procs.2013.06.073  0.8
2013 Soeanu A, Ray S, Debbabi M, Allouche M, Berger J. Gossiping based distributed plan monitoring Procedia Computer Science. 19: 72-79. DOI: 10.1016/J.Procs.2013.06.015  0.8
2013 Alhadidi D, Mourad A, Kaitouni HI, Debbabi M. Common weaving approach in mainstream languages for software security hardening Journal of Systems and Software. 86: 2654-2674. DOI: 10.1016/J.Jss.2013.05.044  0.8
2013 Iqbal F, Binsalleeh H, Fung BCM, Debbabi M. A unified data mining solution for authorship analysis in anonymous textual communications Information Sciences. 231: 98-112. DOI: 10.1016/J.Ins.2011.03.006  0.8
2013 Bou-Harb E, Debbabi M, Assi C. A systematic approach for detecting and clustering distributed cyber scanning Computer Networks. 57: 3826-3839. DOI: 10.1016/J.Comnet.2013.09.008  0.8
2013 Aljumah F, Leung RHM, Pourzandi M, Debbabi M. Emergency mobile access to personal health records stored on an untrusted cloud Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7798: 30-41. DOI: 10.1007/978-3-642-37899-7_3  0.8
2013 Rahimian A, Charland P, Preda S, Debbabi M. RESource: A framework for online matching of assembly with open source code Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7743: 211-226. DOI: 10.1007/978-3-642-37119-6_14  0.8
2013 Bou-Harb E, Pourzandi M, Debbabi M, Assi C. A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks Security and Communication Networks. 6: 1478-1489. DOI: 10.1002/Sec.413  0.8
2013 Ouchani S, Mohamed OA, Debbabi M. A formal verification framework for Bluespec System Verilog Forum On Specification and Design Languages 0.8
2012 Ouchani S, Jarraya Y, Mohamed OA, Debbabi M. Probabilistic attack scenarios to evaluate policies over communication protocols Journal of Software. 7: 1488-1495. DOI: 10.4304/Jsw.7.7.1488-1495  0.8
2012 Mouheb D, Ziarati R, Debbabi M. Continuation/frame-based semantics for aspect matching and weaving Frontiers in Artificial Intelligence and Applications. 246: 146-161. DOI: 10.3233/978-1-61499-125-0-146  0.8
2012 Ouchani S, Ait'Mohamed O, Debbabi M. A probabilistic verification framework for SysML activity diagrams Frontiers in Artificial Intelligence and Applications. 246: 108-123. DOI: 10.3233/978-1-61499-125-0-108  0.8
2012 Soeanu A, Ray S, Debbabi M, Berger J, Boukhtouta A. A learning based evolutionary algorithm for distributed multi-depot VRP Frontiers in Artificial Intelligence and Applications. 243: 49-58. DOI: 10.3233/978-1-61499-105-2-49  0.8
2012 Saleh M, Soeanu A, Ray S, Debbabi M, Berger J, Boukhtouta A. Mechanism design for decentralized vehicle routing problem Proceedings of the Acm Symposium On Applied Computing. 749-754. DOI: 10.1145/2245276.2245419  0.8
2012 Iqbal F, Fung BCM, Debbabi M. Mining criminal networks from chat log Proceedings - 2012 Ieee/Wic/Acm International Conference On Web Intelligence, Wi 2012. 332-337. DOI: 10.1109/WI-IAT.2012.68  0.8
2012 Jarraya Y, Debbabi M. Formal specification and probabilistic verification of SysML activity diagrams Proceedings - Ieee 6th International Symposium On Theoretical Aspects of Software Engineering, Tase 2012. 17-24. DOI: 10.1109/TASE.2012.34  0.8
2012 Ouchani S, Ait'Mohamed O, Debbabi M. A non-convex classifier support for abstraction-refinement framework Proceedings of the International Conference On Microelectronics, Icm. DOI: 10.1109/ICM.2012.6471409  0.8
2012 Bou-Harb E, Debbabi M, Assi C. A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks Ieee International Conference On Communications. 982-987. DOI: 10.1109/ICC.2012.6364233  0.8
2012 Das S, Pourzandi M, Debbabi M. On SPIM detection in LTE networks 2012 25th Ieee Canadian Conference On Electrical and Computer Engineering: Vision For a Greener Future, Ccece 2012. DOI: 10.1109/CCECE.2012.6334959  0.8
2012 Soeanu A, Ray S, Debbabi M, Berger J, Boukhtouta A, Ghanmi A. Model checking based service delivery planning 2012 25th Ieee Canadian Conference On Electrical and Computer Engineering: Vision For a Greener Future, Ccece 2012. DOI: 10.1109/CCECE.2012.6334956  0.8
2012 Mokhov SA, Paquet J, Debbabi M. Reasoning about a simulated printer case investigation with forensic lucid Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 88: 282-296. DOI: 10.1007/978-3-642-35515-8_23  0.8
2012 Ouchani S, Ait Mohamed O, Debbabi M. Efficient probabilistic abstraction for SysML activity diagrams Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7504: 263-277. DOI: 10.1007/978-3-642-33826-7_18  0.8
2012 Alhadidi D, Mohammed N, Fung BCM, Debbabi M. Secure distributed framework for achieving ε-differential privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7384: 120-139. DOI: 10.1007/978-3-642-31680-7_7  0.8
2012 Liu WM, Wang L, Ren K, Cheng P, Debbabi M. K-indistinguishable traffic padding in Web applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7384: 79-99. DOI: 10.1007/978-3-642-31680-7_5  0.8
2012 Houmani H, Debbabi M. Formal analysis of the TLS handshake protocol Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 192-205.  0.8
2011 Liu WM, Wang L, Cheng P, Debbabi M. Privacy-preserving traffic padding in web-based applications Proceedings of the Acm Conference On Computer and Communications Security. 131-135. DOI: 10.1145/2046556.2046573  0.8
2011 Mokhov SA, Paquet J, Debbabi M. On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY 2011 9th Annual International Conference On Privacy, Security and Trust, Pst 2011. 120-123. DOI: 10.1109/PST.2011.5971973  0.8
2011 Ouchani S, Jarraya Y, Mohamed OA, Debbabi M. Security estimation in streaming protocols 2011 International Conference On Innovations in Information Technology, Iit 2011. 427-432. DOI: 10.1109/INNOVATIONS.2011.5893863  0.8
2011 Soeanu A, Ray S, Debbabi M, Berger J, Boukhtouta A, Ghanmi A. A decentralized heuristic for multi-depot split-delivery vehicle routing problem Ieee International Conference On Automation and Logistics, Ical. 70-75. DOI: 10.1109/ICAL.2011.6024686  0.8
2011 Mohammed N, Fung BCM, Debbabi M. Anonymity meets game theory: Secure data integration with malicious participants Vldb Journal. 20: 567-588. DOI: 10.1007/s00778-010-0214-6  0.8
2010 Mokhov SA, Vassev E, Paquet J, Debbabi M. Towards a self-forensics property in the ASSL toolset Acm International Conference Proceeding Series. 108-113. DOI: 10.1145/1822327.1822342  0.8
2010 Iqbal F, Khan LA, Fung BCM, Debbabi M. E-mail authorship verification for forensic investigation Proceedings of the Acm Symposium On Applied Computing. 1591-1598. DOI: 10.1145/1774088.1774428  0.8
2010 Sinha P, Boukhtouta A, Belarde VH, Debbabi M. Insights from the analysis of the Mariposa botnet 2010 5th International Conference On Risks and Security of Internet and Systems, Crisis 2010. DOI: 10.1109/CRISIS.2010.5764915  0.8
2010 Iqbal F, Binsalleeh H, Fung BCM, Debbabi M. Mining writeprints from anonymous e-mails for forensic investigation Digital Investigation. 7: 56-64. DOI: 10.1016/J.Diin.2010.03.003  0.8
2010 Rachedi A, Benslimane A, Otrok H, Mohammed N, Debbabi M. A secure mechanism design-based and game theoretical model for MANETs Mobile Networks and Applications. 15: 191-204. DOI: 10.1007/S11036-009-0164-7  0.8
2010 Saleh M, Debbabi M. A game-theoretic framework for specification and verification of cryptographic protocols Formal Aspects of Computing. 22: 585-609. DOI: 10.1007/S00165-009-0129-4  0.8
2010 Mokhov SA, Paquet J, Debbabi M. Towards automatic deduction and event reconstruction using Forensic Lucid and probabilities to encode the IDS evidence Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 508-509. DOI: 10.1007/978-3-642-15512-3_36  0.8
2010 Ouchani S, Mohamed OA, Debbabi M, Pourzandi M. Verification of the correctness in composed UML behavioural diagrams Studies in Computational Intelligence. 296: 163-177. DOI: 10.1007/978-3-642-13273-5_11  0.8
2010 Zhu B, Ren K, Wang L, Debbabi M. PCM: A privacy-preserving detection mechanism in mobile ad hoc networks Security and Communication Networks. 3: 167-184. DOI: 10.1002/Sec.122  0.8
2010 Mokhov SA, Paquet J, Debbabi M. Towards automated deduction in blackmail case analysis with forensic lucid Proceedings of the 2009 Huntsville Simulation Conference, Hsc 2009. 326-333.  0.8
2009 Talhi C, Mouheb D, Lima V, Debbabi M, Wang L, Pourzandi M. Usability of security specification approaches for UML design: A survey Journal of Object Technology. 8: 1-20. DOI: 10.5381/Jot.2009.8.6.A1  0.8
2009 Mohammed N, Fung BCM, Debbabi M. Walking in the crowd: Anonymizing trajectory data for pattern analysis International Conference On Information and Knowledge Management, Proceedings. 1441-1444. DOI: 10.1145/1645953.1646140  0.8
2009 Jarraya Y, Debbabi M, Bentahar J. On the meaning of SysML activity diagrams Proceedings of the International Symposium and Workshop On Engineering of Computer Based Systems. 95-105. DOI: 10.1109/ECBS.2009.25  0.8
2009 Boukhtouta A, Alhadidi D, Debbabi M. A practical framework for the dataflow pointcut in aspect Proceedings - International Conference On Availability, Reliability and Security, Ares 2009. 835-840. DOI: 10.1109/ARES.2009.86  0.8
2009 Alhadidi D, Belblidia N, Debbabi M, Bhattacharya P. λ-SAOP: A security AOP calculus Computer Journal. 52: 824-849. DOI: 10.1093/Comjnl/Bxn065  0.8
2009 Issa H, Assi C, Debbabi M, Ray S. QoS-aware middleware for web services composition: A qualitative approach Enterprise Information Systems. 3: 449-470. DOI: 10.1080/17517570903042754  0.8
2009 Hejazi SM, Talhi C, Debbabi M. Extraction of forensically sensitive information from windows physical memory Digital Investigation. 6. DOI: 10.1016/J.Diin.2009.06.003  0.8
2009 Mourad A, Soeanu A, Laverdière MA, Debbabi M. New aspect-oriented constructs for security hardening concerns Computers and Security. 28: 341-358. DOI: 10.1016/J.Cose.2009.02.003  0.8
2009 Tlili S, Debbabi M. Interprocedural and flow-sensitive type analysis for memory and type safety of C code Journal of Automated Reasoning. 42: 265-300. DOI: 10.1007/S10817-009-9121-1  0.8
2009 Hanna A, Ling HZ, Yang X, Debbabi M. A synergy between static and dynamic analysis for the detection of software security vulnerabilities Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5871: 815-832. DOI: 10.1007/978-3-642-05151-7_5  0.8
2009 Tlili S, Yang X, Hadjidj R, Debbabi M. Verification of CERT secure coding rules: Case studies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5871: 913-930. DOI: 10.1007/978-3-642-05151-7_12  0.8
2008 Hanna A, Hai ZL, Furlong J, Zhenrong Y, Debbabi M. Targeting security vulnerabilities: From specification to detection Proceedings - International Conference On Quality Software. 97-102. DOI: 10.1109/QSIC.2008.35  0.8
2008 Mourad A, Alhadidi D, Debbabi M. Cross-languageweaving approach targeting software security hardening Proceedings - 6th Annual Conference On Privacy, Security and Trust, Pst 2008. 87-98. DOI: 10.1109/PST.2008.22  0.8
2008 Hadjidj R, Yang X, Tlili S, Debbabi M. Model-checking for software vulnerabilities detection with multi-language support Proceedings - 6th Annual Conference On Privacy, Security and Trust, Pst 2008. 133-142. DOI: 10.1109/PST.2008.21  0.8
2008 Fung BCM, Wang K, Wang L, Debbabi M. A framework for privacy-preserving cluster nalysis Ieee International Conference On Intelligence and Security Informatics, 2008, Ieee Isi 2008. 46-51. DOI: 10.1109/ISI.2008.4565028  0.8
2008 Tlili S, Debbabi M. Type and effect annotations for safe memory access in C Ares 2008 - 3rd International Conference On Availability, Security, and Reliability, Proceedings. 302-309. DOI: 10.1109/ARES.2008.18  0.8
2008 Tlili S, Debbabi M. A novel flow-sensitive type and effect analysis for securing C code Aiccsa 08 - 6th Ieee/Acs International Conference On Computer Systems and Applications. 661-668. DOI: 10.1109/AICCSA.2008.4493600  0.8
2008 Hejazi SM, Debbabi M, Talhi C. Automated windows memory file extraction for cyber forensics investigation Journal of Digital Forensic Practice. 2: 117-131. DOI: 10.1080/15567280802552829  0.8
2008 Talhi C, Tawbi N, Debbabi M. Execution monitoring enforcement under memory-limitation constraints Information and Computation. 206: 158-184. DOI: 10.1016/J.Ic.2007.07.009  0.8
2008 Iqbal F, Hadjidj R, Fung BCM, Debbabi M. A novel approach of mining write-prints for authorship attribution in e-mail forensics Digital Investigation. 5. DOI: 10.1016/J.Diin.2008.05.001  0.8
2008 Mourad A, Laverdière MA, Debbabi M. An aspect-oriented approach for the systematic security hardening of code Computers and Security. 27: 101-114. DOI: 10.1016/J.Cose.2008.04.003  0.8
2008 Mourad A, Laverdière MA, Debbabi M. A security hardening language based on aspect-orientation Communications in Computer and Information Science. 23: 254-266. DOI: 10.1007/978-3-540-88653-2-19  0.8
2008 Tlili S, Yang Z, Ling HZ, Debbabi M. A hybrid approach for safe memory management in C Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5140: 377-391. DOI: 10.1007/978-3-540-79980-1_28  0.8
2008 Hanna A, Ling HZ, Furlong J, Debbabi M. Towards automation of testing high-level security properties Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5094: 268-282. DOI: 10.1007/978-3-540-70567-3_21  0.8
2008 Mourad A, Alhadidi D, Debbabi M. Towards language-independent approach for security concerns weaving Secrypt 2008 - International Conference On Security and Cryptography, Proceedings. 460-465.  0.8
2007 Debbabi M, Fourati M. A formal type system for Java Journal of Object Technology. 6: 117-184. DOI: 10.5381/Jot.2007.6.8.A3  0.8
2007 Belblidia N, Debbabi M. A dynamic operational semantics for JVML Journal of Object Technology. 6: 71-100. DOI: 10.5381/Jot.2007.6.3.A2  0.8
2007 Alhadidi D, Belblidia N, Debbabi M, Bhattacharya P. λ_AOP: An AOP extended lambda-calculus Proceedings - 5th Ieee International Conference On Software Engineering and Formal Methods, Sefm 2007. 183-191. DOI: 10.1109/SEFM.2007.5  0.8
2007 Saleh M, Debbabi M. Verifying security properties of cryptoprotocols: A novel approach Proceedings - 5th Ieee International Conference On Software Engineering and Formal Methods, Sefm 2007. 349-358. DOI: 10.1109/SEFM.2007.46  0.8
2007 Yahyaoui H, Debbabi M, Tawbi N. A denotational semantic model for validating JVML/CLDC optimizations under Isabelle/HOL Proceedings - International Conference On Quality Software. 348-355. DOI: 10.1109/QSIC.2007.4385519  0.8
2007 Otrok H, Debbabi M, Assi C, Bhattacharya P. A cooperative approach for analyzing intrusions in mobile ad hoc networks Proceedings - International Conference On Distributed Computing Systems. DOI: 10.1109/ICDCSW.2007.91  0.8
2007 Yang Z, Hanna A, Debbabi M. Team edit automata for testing security property Proceedings - Ias 2007 3rd Internationl Symposium On Information Assurance and Security. 235-240. DOI: 10.1109/IAS.2007.45  0.8
2007 Saleh M, Debbabi M. Modeling security protocols as games Proceedings - Ias 2007 3rd Internationl Symposium On Information Assurance and Security. 253-258. DOI: 10.1109/IAS.2007.44  0.8
2007 Jarraya Y, Soeanu A, Debbabi M, Hassaïne F. Automatic verification and performance analysis of time-constrained SysML activity diagrams Proceedings of the International Symposium and Workshop On Engineering of Computer Based Systems. 515-522. DOI: 10.1109/ECBS.2007.22  0.8
2007 Otrok H, Paquet J, Debbabi M, Bhattacharya P. Testing intrusion detection systems in MANET: A comprehensive study Proceedings - Cnsr 2007: Fifth Annual Conference On Communication Networks and Services Research. 364-371. DOI: 10.1109/CNSR.2007.62  0.8
2007 Laverdière MA, Mourad A, Hanna A, Debbabi M. Security design patterns: Survey and evaluation Canadian Conference On Electrical and Computer Engineering. 1605-1608. DOI: 10.1109/CCECE.2006.277727  0.8
2007 Venkataiahgari AK, Atwood JW, Debbabi M. A survey of secure B2C commerce for multicast services Canadian Conference On Electrical and Computer Engineering. 288-293. DOI: 10.1109/CCECE.2006.277329  0.8
2007 Belblidia N, Debbabi M, Hanna A, Yang Z. AOP extension for security testing of programs Canadian Conference On Electrical and Computer Engineering. 647-650. DOI: 10.1109/CCECE.2006.277318  0.8
2007 Mourad A, Laverdière MA, Debbabi M. Towards an aspect oriented approach for the security hardening of code Proceedings - 21st International Conference On Advanced Information Networking and Applications Workshops/Symposia, Ainaw'07. 2: 595-600. DOI: 10.1109/AINAW.2007.355  0.8
2007 Saleh M, Arasteh AR, Sakha A, Debbabi M. Forensic analysis of logs: Modeling and verification Knowledge-Based Systems. 20: 671-682. DOI: 10.1016/J.Knosys.2007.05.002  0.8
2007 Arasteh AR, Debbabi M, Sakha A, Saleh M. Analyzing multiple logs for forensic evidence Digital Investigation. 4: 82-91. DOI: 10.1016/J.Diin.2007.06.013  0.8
2007 Arasteh AR, Debbabi M. Forensic memory analysis: From stack and code to execution history Digital Investigation. 4: 114-125. DOI: 10.1016/J.Diin.2007.06.010  0.8
2007 Debbabi M, Saleh M, Talhi C, Zhioua S. Embedded Java security: Security for mobile devices Embedded Java Security: Security For Mobile Devices. 1-243. DOI: 10.1007/978-1-84628-711-4  0.8
2007 Laverdière MA, Mourad A, Soeanu A, Debbabi M. Control flow based pointcuts for security hardening concerns Ifip International Federation For Information Processing. 238: 301-316. DOI: 10.1007/978-0-387-73655-6_20  0.8
2007 Mourad A, Laverdière MA, Debbabi M. New primitives to AOP weaving capabilities for security hardening concerns Proceedings of the 5th International Workshop On Security in Information Systems - Wosis 2007; in Conjunction With Iceis 2007. 123-130.  0.8
2007 Mourad A, Laverdiere MA, Debbabi M. A high-level aspect-oriented based language for software security hardening Secrypt 2007 - International Conference On Security and Cryptography, Proceedings. 363-370.  0.8
2006 Debbabi M, Saleh M, Talhi C, Zhioua S. Security evaluation of J2ME CLDC embedded java platform Journal of Object Technology. 5: 125-154. DOI: 10.5381/Jot.2006.5.2.A2  0.8
2006 Belblidia N, Debbabi M. Formalizing aspectj weaving for static pointcuts Proceedings - 4th Ieee International Conference On Software Engineering and Formal Methods, Sefm 2006. 50-59. DOI: 10.1109/SEFM.2006.19  0.8
2006 Issa H, Assi C, Debbabi M. QoS-aware middleware for Web services composition - A qualitative approach Proceedings - International Symposium On Computers and Communications. 359-364. DOI: 10.1109/ISCC.2006.135  0.8
2006 Mehrandish M, Assi CM, Debbabi M. A game theoretic model to handle network intrusions over multiple packets Ieee International Conference On Communications. 5: 2189-2194. DOI: 10.1109/ICC.2006.255095  0.8
2006 Alawneh L, Debbabi M, Hassaïne F, Jarraya Y, Soeanu A. A unified approach for verification and validation of systems and software engineering models Proceedings of the International Symposium and Workshop On Engineering of Computer Based Systems. 409-418. DOI: 10.1109/ECBS.2006.17  0.8
2006 Venkataiahgari AK, Atwood JW, Debbabi M. Secure e-commerce transactions for multicast services Cec/Eee 2006 Joint Conferences. 2006. DOI: 10.1109/CEC-EEE.2006.77  0.8
2006 Debbabi M, Gherbi A, Mourad A, Yahyaoui H. A selective dynamic compiler for embedded Java virtual machines targeting ARM processors Science of Computer Programming. 59: 38-63. DOI: 10.1016/J.Scico.2005.03.008  0.8
2006 Belblidia N, Debbabi M. Towards a formal semantics for AspectJ weaving Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4228: 155-171. DOI: 10.1007/11860990_11  0.8
2006 Venkataiahgari AK, Debbabi M, Atwood JW. Secure E-commerce Protection Profile Proceedings of the 2006 International Conference On Security and Management, Sam'06 0.8
2006 Debbabi M, Saleh M, Talhi C, Zhioua S. Common Criteria approach to J2ME CLDC security requirements Proceedings of 5th International Conference On New Trends in Software Methodologies, Tools and Techniques, Somet_06 0.8
2006 Alawneh L, Debbabi M, Hassaïne F, Soeanu A. On the verification and validation of UML structural and behavioral diagrams Proceedings of the Seventh Iasted International Conference On Advances in Computer Science and Technology. 304-309.  0.8
2006 Arasteh AR, Debbabi M, Sakha A. A formal approach for the forensic analysis of logs Proceedings of 5th International Conference On New Trends in Software Methodologies, Tools and Techniques, Somet_06 0.8
2006 Berger J, Boukhtouta A, Debbabi M. A middleware solution for data and service integration in network centric information systems 5th European Conference On Information Warfare and Security 2006, Eciw 2006. 19-29.  0.8
2005 Debbabi M, Gherbi A, Ketari L, Talhi C, Yahyaoui H, Zhioua S, Tawbi N. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines The Journal of Object Technology. 4: 83-108. DOI: 10.5381/Jot.2005.4.1.A2  0.84
2005 Debbabi M, Mourad A, Tawbi N. Armed E-bunny: A selective dynamic compiler for embedded Java virtual machine targeting ARM processors Proceedings of the Acm Symposium On Applied Computing. 1: 874-878. DOI: 10.1145/1066677.1066876  0.8
2005 Otrok H, Mourad A, Debbabi M, Assi C. Improving the security of SNMP in wireless networks 2005 International Conference On Wireless Networks, Communications and Mobile Computing. 1: 198-202. DOI: 10.1109/WIRLES.2005.1549409  0.8
2005 Bhattacharya P, Debbabi M, Otrok H. Improving the Diffie-Hellman secure key exchange 2005 International Conference On Wireless Networks, Communications and Mobile Computing. 1: 193-197. DOI: 10.1109/WIRLES.2005.1549408  0.8
2005 Debbabi M, Mourad A, Talhi C, Yahyaoui H. Accelerating embedded Java for mobile devices Ieee Communications Magazine. 43: 80-85. DOI: 10.1109/Mcom.2005.1509971  0.8
2005 Debbabi M, Saleh M, Talhi C, Zhioua S. Security analysis of mobile java Proceedings - International Workshop On Database and Expert Systems Applications, Dexa. 2006: 231-235. DOI: 10.1109/DEXA.2005.172  0.8
2005 Debbabi M, Saleh M, Talhi C, Zhioua S. Java for mobile devices: A security study Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 235-244. DOI: 10.1109/CSAC.2005.34  0.8
2005 Debbabi M, Saleh M. Game semantics model for security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3785: 125-140. DOI: 10.1007/11576280_10  0.8
2005 Debbabi M, Saleh M, Talhi C, Zhioua S. Security analysis of wireless java Pst 2005 - 3rd Annual Conference On Privacy, Security and Trust, Conference Proceedings 0.8
2005 Moselhi O, Hammad A, Alkass S, Assi C, Debbabi M, Haider M. Vulnerability assessment of civil infrastructure systems: A network approach Proceedings, Annual Conference - Canadian Society For Civil Engineering. 2005.  0.8
2004 Debbabi M, Rahman M. The war of presence and instant messaging: Right protocols and APIs Ieee Consumer Communications and Networking Conference, Ccnc. 341-346.  0.8
2003 Adi K, Debbabi M. Abstract interpretation for proving secrecy properties in security protocols Electronic Notes in Theoretical Computer Science. 55: 25-50. DOI: 10.1016/S1571-0661(04)00243-9  1
2003 Debbabi M, Durgin N, Mejri M, Mitchell JC. Security by typing International Journal On Software Tools For Technology Transfer. 4: 472-495. DOI: 10.1007/S10009-002-0100-7  1
2003 Boukhtouta A, Debbabi M, Tawbi N. A new paradigm for decision-making: Business intelligence and digital cockpits Proceedings of the 10th Ispe International Conference On Concurrent Engineering. 1247-1254.  0.8
2003 Debbabi M, Ketari L, Yahyaoui H. A Java Sip Interface for Connected Limited Devices Proceedings of the Iasted International Conference On Wireless and Optical Communications. 3: 560-565.  0.8
2003 Debbabi M, Desharnais J, Fourati M, Menif E, Painchaud F, Tawbi N. Secure self-certified code for Java Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2629: 133-151.  1
2000 Doyon S, Debbabi M. Verifying object initialization in the Java bytecode language Proceedings of the Acm Symposium On Applied Computing. 2: 821-830. DOI: 10.1145/338407.338573  1
2000 Painchaud F, Debbabi M. On the implementation of a stand-alone Java™ bytecode verifier Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2000: 189-194. DOI: 10.1109/ENABL.2000.883727  1
2000 Adi K, Debbabi M, Mejri M. A new logic for electronic commerce protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1816: 499-513. DOI: 10.1016/S0304-3975(02)00364-X  1
2000 Doyon S, Debbabi M. On object initialization in the Java bytecode Computer Communications. 23: 1594-1605. DOI: 10.1016/S0140-3664(00)00245-0  1
2000 Adi K, Debbabi M, Mejri M. A new logic for electronic commerce protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1816: 499-513.  1
1998 Debbabi M, Benzakour A, Ktari B. A synergy between model-checking and type inference for the verification of value-passing higher-order processes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1548: 214-230. DOI: 10.1007/3-540-49253-4_17  1
1997 Debbabi M, Bouguerch F, Tawbi N. Information control nets as processes: Qualitative analysis Concurrent Engineering Research and Applications. 5: 47-57. DOI: 10.1177/1063293X9700500106  1
1997 Debbabi M, Faour A, Tawbi N. A type based algorithm for the control flow analysis of higher order concurrent programs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1268: 247-266. DOI: 10.1007/3-540-63237-9_29  1
1997 Debbabi M. A model-based concurrent specification language over cml: semantic foundations Parallel Processing Letters. 7: 329-356.  1
1997 Debbabi M, Mejri M, Tawbi N, Yahmadi I. From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm Journal of Engineering and Applied Science. 256-261.  1
1997 Debbabi M, Mejri M, Tawbi N, Yahmadi I. Formal automatic verification of authentication cryptographic protocols Proceedings of the International Conference On Formal Engineering Methods, Icfem. 50-59.  1
1996 Debbabi M. From CML to a model-based concurrent specification language Concurrent Engineering Research and Applications. 4: 137-148. DOI: 10.1177/1063293X9600400204  1
Show low-probability matches.