dblp.uni-trier.dewww.uni-trier.de

Mourad Debbabi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
87EEDima Alhadidi, Amine Boukhtouta, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya: The dataflow pointcut: a formal and practical framework. AOSD 2009: 15-26
86EEYosr Jarraya, Mourad Debbabi, Jamal Bentahar: On the Meaning of SysML Activity Diagrams. ECBS 2009: 95-105
85EERachid Hadjidj, Mourad Debbabi, Hakim Lounis, Farkhund Iqbal, Adam Szporer, Djamel Benredjem: Towards an integrated e-mail forensic analysis framework. Digital Investigation 5(3-4): 124-137 (2009)
2008
84EESyrine Tlili, Mourad Debbabi: A novel flow-sensitive type and effect analysis for securing C code. AICCSA 2008: 661-668
83EESyrine Tlili, Zhenrong Yang, Hai Zhou Ling, Mourad Debbabi: A Hybrid Approach for Safe Memory Management in C. AMAST 2008: 377-391
82EESyrine Tlili, Mourad Debbabi: Type and Effect Annotations for Safe Memory Access in C. ARES 2008: 302-309
81EEAiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad Debbabi: Towards Automation of Testing High-Level Security Properties. DBSec 2008: 268-282
80 Serguei A. Mokhov, Joey Paquet, Mourad Debbabi: Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid. IMF 2008: 197-216
79 Serguei A. Mokhov, Mourad Debbabi: File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis. IMF 2008: 73-86
78EEBenjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51
77EERachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi: Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. PST 2008: 133-142
76EEAzzam Mourad, Dima Alhadidi, Mourad Debbabi: Cross-Language Weaving Approach Targeting Software Security Hardening. PST 2008: 87-98
75EEAiman Hanna, Hai Zhou Ling, Jason Furlong, Zhenrong Yang, Mourad Debbabi: Targeting Security Vulnerabilities: From Specification to Detection (Short Paper). QSIC 2008: 97-102
74EENoman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821
73EEAbderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi: A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. WiMob 2008: 417-422
72EEHadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612
71EEHadi Otrok, Mona Mehrandish, Chadi Assi, Mourad Debbabi, Prabir Bhattacharya: Game theoretic models for detecting network intrusions. Computer Communications 31(10): 1934-1944 (2008)
70EEHadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A game-theoretic intrusion detection model for mobile ad hoc networks. Computer Communications 31(4): 708-721 (2008)
69EEAzzam Mourad, Marc-André Laverdière, Mourad Debbabi: An aspect-oriented approach for the systematic security hardening of code. Computers & Security 27(3-4): 101-114 (2008)
68EEChamseddine Talhi, Nadia Tawbi, Mourad Debbabi: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2-4): 158-184 (2008)
67EEAzzam Mourad, Marc-André Laverdière, Mourad Debbabi: A High-level Aspect-oriented-based Framework for Software Security Hardening. Information Security Journal: A Global Perspective 17(2): 56-74 (2008)
66EEDima Alhadidi, Mourad Debbabi, Prabir Bhattacharya: New AspectJ Pointcuts for Integer Overflow and Underflow Detection. Information Security Journal: A Global Perspective 17(5&6): 278-287 (2008)
65EESeyed Mahmood Hejazi, Mourad Debbabi, Chamseddine Talhi: Automated Windows Memory File Extraction for Cyber Forensics Investigation. J. Digital Forensic Practice 2(3): 117-131 (2008)
2007
64EEAzzam Mourad, Marc-André Laverdière, Mourad Debbabi: Towards an Aspect Oriented Approach for the Security Hardening of Code. AINA Workshops (1) 2007: 595-600
63EEHadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya: Testing Intrusion Detection Systems in MANET: A Comprehensive Study. CNSR 2007: 364-371
62EEYosr Jarraya, Andrei Soeanu, Mourad Debbabi, Fawzi Hassaïne: Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams. ECBS 2007: 515-522
61EEZhenrong Yang, Aiman Hanna, Mourad Debbabi: Team Edit Automata for Testing Security Property. IAS 2007: 235-240
60EEMohamed Saleh, Mourad Debbabi: Modeling Security Protocols as Games. IAS 2007: 253-260
59EEHadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya: A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks. ICDCS Workshops 2007: 86
58EEHamdi Yahyaoui, Mourad Debbabi, Nadia Tawbi: A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL. QSIC 2007: 348-355
57EEDima Alhadidi, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya: An AOP Extended Lambda-Calculus. SEFM 2007: 183-194
56EEMohamed Saleh, Mourad Debbabi: Verifying Security Properties of Cryptoprotocols: A Novel Approach. SEFM 2007: 349-360
55 Azzam Mourad, Marc-André Laverdière, Mourad Debbabi: New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. WOSIS 2007: 123-130
54EENadia Belblidia, Mourad Debbabi: A Dynamic Operational Semantics for JVML. Journal of Object Technology 6(3): (2007)
53EEAli Benssam, Jean Berger, Abdeslem Boukhtouta, Mourad Debbabi, Sujoy Ray, Abderrazak Sahi: What middleware for network centric operations? Knowl.-Based Syst. 20(3): 255-265 (2007)
52EEMohamed Saleh, Ali Reza Arasteh, Assaad Sakha, Mourad Debbabi: Forensic analysis of logs: Modeling and verification. Knowl.-Based Syst. 20(7): 671-682 (2007)
2006
51 Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne, Andrei Soeanu: On the verification and validation of uml structural and behavioral diagrams. ACST 2006: 304-309
50EEMarc-André Laverdière, Azzam Mourad, Aiman Hanna, Mourad Debbabi: Security Design Patterns: Survey and Evaluation. CCECE 2006: 1605-1608
49EEAnil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi: A Survey of Secure B2C Commerce for Multicast Services. CCECE 2006: 288-293
48EENadia Belblidia, Mourad Debbabi, Aiman Hanna, Zhenrong Yang: AOP Extension for Security Testing of Programs. CCECE 2006: 647-650
47EEAnil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi: Secure E-Commerce Transactions for Multicast Services. CEC/EEE 2006: 18
46EELuay Alawneh, Mourad Debbabi, Yosr Jarraya, Andrei Soeanu, Fawzi Hassaïne: A Unified Approach for Verification and Validation of Systems and Software Engineering Models. ECBS 2006: 409-418
45EEMona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya: A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario. GLOBECOM 2006
44 Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne, Yosr Jarraya, Payam Shahi, Andrei Soeanu: Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models. IASTED Conf. on Software Engineering 2006: 282-287
43EEHassan Issa, Chadi Assi, Mourad Debbabi: QoS-Aware Middleware for Web Services Composition - A Qualitative Approach. ISCC 2006: 359-364
42EENadia Belblidia, Mourad Debbabi: Towards a Formal Semantics for AspectJ Weaving. JMLC 2006: 155-171
41EEChamseddine Talhi, Nadia Tawbi, Mourad Debbabi: Execution monitoring enforcement for limited-memory systems. PST 2006: 38
40EEAzzam Mourad, Marc-André Laverdière, Mourad Debbabi: Security hardening of open source software. PST 2006: 43
39EEDima Alhadidi, Nadia Belblidia, Mourad Debbabi: Security crosscutting concerns and AspectJ. PST 2006: 45
38EENadia Belblidia, Mourad Debbabi: Formalizing AspectJ Weaving for Static Pointcuts. SEFM 2006: 50-59
37 Anil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood: Secure E-commerce Protection Profile. Security and Management 2006: 279-285
36 Ali Reza Arasteh, Mourad Debbabi, Assaad Sakha: A Formal Approach for the Forensic Analysis of Logs. SoMeT 2006: 159-176
35 Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Common Criteria Approach to J2ME CLDC Security Requirements. SoMeT 2006: 177-194
34EEMourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Security Evaluation of J2ME CLDC Embedded Java Platform. Journal of Object Technology 5(2): 125-154 (2006)
33EEMourad Debbabi, Abdelouahed Gherbi, Azzam Mourad, Hamdi Yahyaoui: A selective dynamic compiler for embedded Java virtual machines targeting ARM processors. Sci. Comput. Program. 59(1-2): 38-63 (2006)
2005
32EEMourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Java for Mobile Devices: A Security Study. ACSAC 2005: 235-244
31EEMourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Security Analysis of Mobile Java. DEXA Workshops 2005: 231-235
30EEMourad Debbabi, Mohamed Saleh: Game Semantics Model for Security Protocols. ICFEM 2005: 125-140
29EEMourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Security Analysis of Wireless Java. PST 2005
28EEMourad Debbabi, Azzam Mourad, Nadia Tawbi: Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. SAC 2005: 874-878
27EEMourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi: E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. Journal of Object Technology 4(1): 83-108 (2005)
2004
26EEMourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua: A dynamic compiler for embedded Java virtual machines. PPPJ 2004: 100-106
25EEMourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua: a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines. PPPJ 2004: 107-113
2003
24EEMourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua: Method Call Acceleration in Embedded Java Virtual Machines. International Conference on Computational Science 2003: 750-759
23EEMourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell: Security by typing. STTT 4(4): 472-495 (2003)
22 Kamel Adi, Mourad Debbabi, Mohamed Mejri: A new logic for electronic commerce protocols. Theor. Comput. Sci. 291(3): 223-283 (2003)
2002
21EEMourad Debbabi, Jules Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi: Secure Self-certified Code for Java. FASec 2002: 133-151
2001
20EEKamel Adi, Mourad Debbabi: Abstract interpretation for proving secrecy properties in security protocols. Electr. Notes Theor. Comput. Sci. 55(1): (2001)
2000
19EEKamel Adi, Mourad Debbabi, Mohamed Mejri: A New Logic for Electronic Commerce Protocols. AMAST 2000: 499-513
18 Mourad Debbabi, M. Fourati: Sur la sémantique statique de Java. LMO 2000: 167-182
17 Stephane Doyon, Mourad Debbabi: Verifying Object Initialization in the Java Bytecode Language. SAC (2) 2000: 821-830
16EEMourad Debbabi, E. Giasson, Béchir Ktari, F. Michaud, Nadia Tawbi: Secure Self-Certified COTS. WETICE 2000: 183-188
15EEFrédéric Painchaud, Mourad Debbabi: On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier. WETICE 2000: 189-194
14EEStephane Doyon, Mourad Debbabi: On object initialization in the Java bytecode. Computer Communications 23(17): 1594-1605 (2000)
1999
13EEYahya Y. Al-Salqan, Nahid Shahmehri, Wu Wen, Mourad Debbabi: Final Summary Report on Enterprise Security. WETICE 1999: 134
12EEJ. Bergeron, Mourad Debbabi, M. M. Erhioui, Béchir Ktari: Static Analysis of Binary Code to Isolate Malicious Behaviors. WETICE 1999: 184-189
1998
11EEMourad Debbabi, Y. Legaré, Mohamed Mejri: An Environment for the Specification and Analysis of Cryptoprotocols. ACSAC 1998: 321-332
10EEMourad Debbabi, Abdelkader Benzakour, Béchir Ktari: A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes. AMAST 1998: 214-230
1997
9 Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi: Formal Automatic Verification of Authentication Crytographic Protocols. ICFEM 1997: 50-59
8EEMourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi: From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. WETICE 1997: 256-262
7 Mourad Debbabi, Zahia Aïdoud, Ali Faour: On the Inference od Structured Recursive Effects with Subtyping. Journal of Functional and Logic Programming 1997(5): (1997)
6 Mourad Debbabi: A Model-Based Concurrent Specification Language Over CML: Semantic Foundations. Parallel Processing Letters 7(3): 329-356 (1997)
1996
5 Mourad Debbabi, Ali Faour, Nadia Tawbi: A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs. Implementation of Functional Languages 1996: 247-266
1994
4 Dominique Bolignano, Mourad Debbabi: A Semantic Theory for Concurrent ML. TACS 1994: 766-785
1993
3 Dominique Bolignano, Mourad Debbabi: A Coherent Type System for a Concurrent, Functional and Imperative Programming Language. AMAST 1993: 153-162
2 Dominique Bolignano, Mourad Debbabi: A Denotational Model for the Integration of Concurrent, Functional, and Imperative Programming. ICCI 1993: 244-250
1992
1 Dominique Bolignano, Mourad Debbabi: Higher Order Communication Processes with Value-Passing, Assignment and Return of Results. ISAAC 1992: 319-331

Coauthor Index

1Kamel Adi [19] [20] [22]
2Zahia Aïdoud [7]
3Yahya Y. Al-Salqan [13]
4Luay Alawneh [44] [46] [51]
5Dima Alhadidi [39] [57] [66] [76] [87]
6Ali Reza Arasteh [36] [52]
7Chadi Assi [43] [45] [59] [71]
8J. William Atwood [37] [47] [49]
9Nadia Belblidia [38] [39] [42] [48] [54] [57] [87]
10Djamel Benredjem [85]
11Abderrahim Benslimane [73]
12Ali Benssam [53]
13Jamal Bentahar [86]
14Abdelkader Benzakour [10]
15Jean Berger [53]
16J. Bergeron [12]
17Prabir Bhattacharya [45] [57] [59] [63] [66] [70] [71] [72] [74] [87]
18Dominique Bolignano [1] [2] [3] [4]
19Abdeslem Boukhtouta [53]
20Amine Boukhtouta [87]
21Jules Desharnais [21]
22Stephane Doyon [14] [17]
23Nancy A. Durgin [23]
24M. M. Erhioui [12] [24]
25Ali Faour [5] [7]
26M. Fourati [18] [21]
27Benjamin C. M. Fung [78]
28Jason Furlong [75] [81]
29Abdelouahed Gherbi [25] [26] [27] [33]
30E. Giasson [16]
31Rachid Hadjidj [77] [85]
32Aiman Hanna [48] [50] [61] [75] [81]
33Fawzi Hassaïne [44] [46] [51] [62]
34Seyed Mahmood Hejazi [65]
35Farkhund Iqbal [85]
36Hassan Issa [43]
37Yosr Jarraya [44] [46] [62] [86]
38Lamia Ketari [24] [25] [26] [27]
39Béchir Ktari [10] [12] [16]
40Marc-André Laverdière [40] [50] [55] [64] [67] [69]
41Y. Legaré [11]
42Hai Zhou Ling [75] [81] [83]
43Hakim Lounis [85]
44Mona Mehrandish [45] [71]
45Mohamed Mejri [8] [9] [11] [19] [22] [23]
46E. Menif [21]
47F. Michaud [16]
48John C. Mitchell [23]
49Noman Mohammed [70] [72] [73] [74]
50Serguei A. Mokhov [79] [80]
51Azzam Mourad [28] [33] [40] [50] [55] [64] [67] [69] [76]
52Hadi Otrok [45] [59] [63] [70] [71] [72] [73] [74]
53Frédéric Painchaud [15] [21]
54Joey Paquet [63] [80]
55Abderrezak Rachedi [73]
56Sujoy Ray [53]
57Abderrazak Sahi [53]
58Assaad Sakha [36] [52]
59Mohamed Saleh [29] [30] [31] [32] [34] [35] [52] [56] [60]
60Payam Shahi [44]
61Nahid Shahmehri [13]
62Andrei Soeanu [44] [46] [51] [62]
63Adam Szporer [85]
64Chamseddine Talhi [25] [26] [27] [29] [31] [32] [34] [35] [41] [65] [68]
65Nadia Tawbi [5] [8] [9] [16] [21] [24] [26] [27] [28] [41] [58] [68]
66Syrine Tlili [77] [82] [83] [84]
67Anil Kumar Venkataiahgari [37] [47] [49]
68Ke Wang [78]
69Lingyu Wang [70] [72] [74] [78]
70Wu Wen [13]
71I. Yahmadi [8] [9]
72Hamdi Yahyaoui [24] [25] [26] [27] [33] [58]
73Xiaochun Yang [77]
74Zhenrong Yang [48] [61] [75] [83]
75Sami Zhioua [24] [25] [26] [27] [29] [31] [32] [34] [35]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)