2009 | ||
---|---|---|
87 | EE | Dima Alhadidi, Amine Boukhtouta, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya: The dataflow pointcut: a formal and practical framework. AOSD 2009: 15-26 |
86 | EE | Yosr Jarraya, Mourad Debbabi, Jamal Bentahar: On the Meaning of SysML Activity Diagrams. ECBS 2009: 95-105 |
85 | EE | Rachid Hadjidj, Mourad Debbabi, Hakim Lounis, Farkhund Iqbal, Adam Szporer, Djamel Benredjem: Towards an integrated e-mail forensic analysis framework. Digital Investigation 5(3-4): 124-137 (2009) |
2008 | ||
84 | EE | Syrine Tlili, Mourad Debbabi: A novel flow-sensitive type and effect analysis for securing C code. AICCSA 2008: 661-668 |
83 | EE | Syrine Tlili, Zhenrong Yang, Hai Zhou Ling, Mourad Debbabi: A Hybrid Approach for Safe Memory Management in C. AMAST 2008: 377-391 |
82 | EE | Syrine Tlili, Mourad Debbabi: Type and Effect Annotations for Safe Memory Access in C. ARES 2008: 302-309 |
81 | EE | Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad Debbabi: Towards Automation of Testing High-Level Security Properties. DBSec 2008: 268-282 |
80 | Serguei A. Mokhov, Joey Paquet, Mourad Debbabi: Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid. IMF 2008: 197-216 | |
79 | Serguei A. Mokhov, Mourad Debbabi: File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis. IMF 2008: 73-86 | |
78 | EE | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 |
77 | EE | Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi: Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. PST 2008: 133-142 |
76 | EE | Azzam Mourad, Dima Alhadidi, Mourad Debbabi: Cross-Language Weaving Approach Targeting Software Security Hardening. PST 2008: 87-98 |
75 | EE | Aiman Hanna, Hai Zhou Ling, Jason Furlong, Zhenrong Yang, Mourad Debbabi: Targeting Security Vulnerabilities: From Specification to Detection (Short Paper). QSIC 2008: 97-102 |
74 | EE | Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821 |
73 | EE | Abderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi: A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. WiMob 2008: 417-422 |
72 | EE | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612 |
71 | EE | Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad Debbabi, Prabir Bhattacharya: Game theoretic models for detecting network intrusions. Computer Communications 31(10): 1934-1944 (2008) |
70 | EE | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A game-theoretic intrusion detection model for mobile ad hoc networks. Computer Communications 31(4): 708-721 (2008) |
69 | EE | Azzam Mourad, Marc-André Laverdière, Mourad Debbabi: An aspect-oriented approach for the systematic security hardening of code. Computers & Security 27(3-4): 101-114 (2008) |
68 | EE | Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2-4): 158-184 (2008) |
67 | EE | Azzam Mourad, Marc-André Laverdière, Mourad Debbabi: A High-level Aspect-oriented-based Framework for Software Security Hardening. Information Security Journal: A Global Perspective 17(2): 56-74 (2008) |
66 | EE | Dima Alhadidi, Mourad Debbabi, Prabir Bhattacharya: New AspectJ Pointcuts for Integer Overflow and Underflow Detection. Information Security Journal: A Global Perspective 17(5&6): 278-287 (2008) |
65 | EE | Seyed Mahmood Hejazi, Mourad Debbabi, Chamseddine Talhi: Automated Windows Memory File Extraction for Cyber Forensics Investigation. J. Digital Forensic Practice 2(3): 117-131 (2008) |
2007 | ||
64 | EE | Azzam Mourad, Marc-André Laverdière, Mourad Debbabi: Towards an Aspect Oriented Approach for the Security Hardening of Code. AINA Workshops (1) 2007: 595-600 |
63 | EE | Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya: Testing Intrusion Detection Systems in MANET: A Comprehensive Study. CNSR 2007: 364-371 |
62 | EE | Yosr Jarraya, Andrei Soeanu, Mourad Debbabi, Fawzi Hassaïne: Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams. ECBS 2007: 515-522 |
61 | EE | Zhenrong Yang, Aiman Hanna, Mourad Debbabi: Team Edit Automata for Testing Security Property. IAS 2007: 235-240 |
60 | EE | Mohamed Saleh, Mourad Debbabi: Modeling Security Protocols as Games. IAS 2007: 253-260 |
59 | EE | Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya: A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks. ICDCS Workshops 2007: 86 |
58 | EE | Hamdi Yahyaoui, Mourad Debbabi, Nadia Tawbi: A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL. QSIC 2007: 348-355 |
57 | EE | Dima Alhadidi, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya: An AOP Extended Lambda-Calculus. SEFM 2007: 183-194 |
56 | EE | Mohamed Saleh, Mourad Debbabi: Verifying Security Properties of Cryptoprotocols: A Novel Approach. SEFM 2007: 349-360 |
55 | Azzam Mourad, Marc-André Laverdière, Mourad Debbabi: New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. WOSIS 2007: 123-130 | |
54 | EE | Nadia Belblidia, Mourad Debbabi: A Dynamic Operational Semantics for JVML. Journal of Object Technology 6(3): (2007) |
53 | EE | Ali Benssam, Jean Berger, Abdeslem Boukhtouta, Mourad Debbabi, Sujoy Ray, Abderrazak Sahi: What middleware for network centric operations? Knowl.-Based Syst. 20(3): 255-265 (2007) |
52 | EE | Mohamed Saleh, Ali Reza Arasteh, Assaad Sakha, Mourad Debbabi: Forensic analysis of logs: Modeling and verification. Knowl.-Based Syst. 20(7): 671-682 (2007) |
2006 | ||
51 | Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne, Andrei Soeanu: On the verification and validation of uml structural and behavioral diagrams. ACST 2006: 304-309 | |
50 | EE | Marc-André Laverdière, Azzam Mourad, Aiman Hanna, Mourad Debbabi: Security Design Patterns: Survey and Evaluation. CCECE 2006: 1605-1608 |
49 | EE | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi: A Survey of Secure B2C Commerce for Multicast Services. CCECE 2006: 288-293 |
48 | EE | Nadia Belblidia, Mourad Debbabi, Aiman Hanna, Zhenrong Yang: AOP Extension for Security Testing of Programs. CCECE 2006: 647-650 |
47 | EE | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi: Secure E-Commerce Transactions for Multicast Services. CEC/EEE 2006: 18 |
46 | EE | Luay Alawneh, Mourad Debbabi, Yosr Jarraya, Andrei Soeanu, Fawzi Hassaïne: A Unified Approach for Verification and Validation of Systems and Software Engineering Models. ECBS 2006: 409-418 |
45 | EE | Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya: A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario. GLOBECOM 2006 |
44 | Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne, Yosr Jarraya, Payam Shahi, Andrei Soeanu: Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models. IASTED Conf. on Software Engineering 2006: 282-287 | |
43 | EE | Hassan Issa, Chadi Assi, Mourad Debbabi: QoS-Aware Middleware for Web Services Composition - A Qualitative Approach. ISCC 2006: 359-364 |
42 | EE | Nadia Belblidia, Mourad Debbabi: Towards a Formal Semantics for AspectJ Weaving. JMLC 2006: 155-171 |
41 | EE | Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi: Execution monitoring enforcement for limited-memory systems. PST 2006: 38 |
40 | EE | Azzam Mourad, Marc-André Laverdière, Mourad Debbabi: Security hardening of open source software. PST 2006: 43 |
39 | EE | Dima Alhadidi, Nadia Belblidia, Mourad Debbabi: Security crosscutting concerns and AspectJ. PST 2006: 45 |
38 | EE | Nadia Belblidia, Mourad Debbabi: Formalizing AspectJ Weaving for Static Pointcuts. SEFM 2006: 50-59 |
37 | Anil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood: Secure E-commerce Protection Profile. Security and Management 2006: 279-285 | |
36 | Ali Reza Arasteh, Mourad Debbabi, Assaad Sakha: A Formal Approach for the Forensic Analysis of Logs. SoMeT 2006: 159-176 | |
35 | Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Common Criteria Approach to J2ME CLDC Security Requirements. SoMeT 2006: 177-194 | |
34 | EE | Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Security Evaluation of J2ME CLDC Embedded Java Platform. Journal of Object Technology 5(2): 125-154 (2006) |
33 | EE | Mourad Debbabi, Abdelouahed Gherbi, Azzam Mourad, Hamdi Yahyaoui: A selective dynamic compiler for embedded Java virtual machines targeting ARM processors. Sci. Comput. Program. 59(1-2): 38-63 (2006) |
2005 | ||
32 | EE | Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Java for Mobile Devices: A Security Study. ACSAC 2005: 235-244 |
31 | EE | Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Security Analysis of Mobile Java. DEXA Workshops 2005: 231-235 |
30 | EE | Mourad Debbabi, Mohamed Saleh: Game Semantics Model for Security Protocols. ICFEM 2005: 125-140 |
29 | EE | Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Security Analysis of Wireless Java. PST 2005 |
28 | EE | Mourad Debbabi, Azzam Mourad, Nadia Tawbi: Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. SAC 2005: 874-878 |
27 | EE | Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi: E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. Journal of Object Technology 4(1): 83-108 (2005) |
2004 | ||
26 | EE | Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua: A dynamic compiler for embedded Java virtual machines. PPPJ 2004: 100-106 |
25 | EE | Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua: a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines. PPPJ 2004: 107-113 |
2003 | ||
24 | EE | Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua: Method Call Acceleration in Embedded Java Virtual Machines. International Conference on Computational Science 2003: 750-759 |
23 | EE | Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell: Security by typing. STTT 4(4): 472-495 (2003) |
22 | Kamel Adi, Mourad Debbabi, Mohamed Mejri: A new logic for electronic commerce protocols. Theor. Comput. Sci. 291(3): 223-283 (2003) | |
2002 | ||
21 | EE | Mourad Debbabi, Jules Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi: Secure Self-certified Code for Java. FASec 2002: 133-151 |
2001 | ||
20 | EE | Kamel Adi, Mourad Debbabi: Abstract interpretation for proving secrecy properties in security protocols. Electr. Notes Theor. Comput. Sci. 55(1): (2001) |
2000 | ||
19 | EE | Kamel Adi, Mourad Debbabi, Mohamed Mejri: A New Logic for Electronic Commerce Protocols. AMAST 2000: 499-513 |
18 | Mourad Debbabi, M. Fourati: Sur la sémantique statique de Java. LMO 2000: 167-182 | |
17 | Stephane Doyon, Mourad Debbabi: Verifying Object Initialization in the Java Bytecode Language. SAC (2) 2000: 821-830 | |
16 | EE | Mourad Debbabi, E. Giasson, Béchir Ktari, F. Michaud, Nadia Tawbi: Secure Self-Certified COTS. WETICE 2000: 183-188 |
15 | EE | Frédéric Painchaud, Mourad Debbabi: On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier. WETICE 2000: 189-194 |
14 | EE | Stephane Doyon, Mourad Debbabi: On object initialization in the Java bytecode. Computer Communications 23(17): 1594-1605 (2000) |
1999 | ||
13 | EE | Yahya Y. Al-Salqan, Nahid Shahmehri, Wu Wen, Mourad Debbabi: Final Summary Report on Enterprise Security. WETICE 1999: 134 |
12 | EE | J. Bergeron, Mourad Debbabi, M. M. Erhioui, Béchir Ktari: Static Analysis of Binary Code to Isolate Malicious Behaviors. WETICE 1999: 184-189 |
1998 | ||
11 | EE | Mourad Debbabi, Y. Legaré, Mohamed Mejri: An Environment for the Specification and Analysis of Cryptoprotocols. ACSAC 1998: 321-332 |
10 | EE | Mourad Debbabi, Abdelkader Benzakour, Béchir Ktari: A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes. AMAST 1998: 214-230 |
1997 | ||
9 | Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi: Formal Automatic Verification of Authentication Crytographic Protocols. ICFEM 1997: 50-59 | |
8 | EE | Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi: From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. WETICE 1997: 256-262 |
7 | Mourad Debbabi, Zahia Aïdoud, Ali Faour: On the Inference od Structured Recursive Effects with Subtyping. Journal of Functional and Logic Programming 1997(5): (1997) | |
6 | Mourad Debbabi: A Model-Based Concurrent Specification Language Over CML: Semantic Foundations. Parallel Processing Letters 7(3): 329-356 (1997) | |
1996 | ||
5 | Mourad Debbabi, Ali Faour, Nadia Tawbi: A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs. Implementation of Functional Languages 1996: 247-266 | |
1994 | ||
4 | Dominique Bolignano, Mourad Debbabi: A Semantic Theory for Concurrent ML. TACS 1994: 766-785 | |
1993 | ||
3 | Dominique Bolignano, Mourad Debbabi: A Coherent Type System for a Concurrent, Functional and Imperative Programming Language. AMAST 1993: 153-162 | |
2 | Dominique Bolignano, Mourad Debbabi: A Denotational Model for the Integration of Concurrent, Functional, and Imperative Programming. ICCI 1993: 244-250 | |
1992 | ||
1 | Dominique Bolignano, Mourad Debbabi: Higher Order Communication Processes with Value-Passing, Assignment and Return of Results. ISAAC 1992: 319-331 |