2009 |
87 | EE | Dima Alhadidi,
Amine Boukhtouta,
Nadia Belblidia,
Mourad Debbabi,
Prabir Bhattacharya:
The dataflow pointcut: a formal and practical framework.
AOSD 2009: 15-26 |
86 | EE | Yosr Jarraya,
Mourad Debbabi,
Jamal Bentahar:
On the Meaning of SysML Activity Diagrams.
ECBS 2009: 95-105 |
85 | EE | Rachid Hadjidj,
Mourad Debbabi,
Hakim Lounis,
Farkhund Iqbal,
Adam Szporer,
Djamel Benredjem:
Towards an integrated e-mail forensic analysis framework.
Digital Investigation 5(3-4): 124-137 (2009) |
2008 |
84 | EE | Syrine Tlili,
Mourad Debbabi:
A novel flow-sensitive type and effect analysis for securing C code.
AICCSA 2008: 661-668 |
83 | EE | Syrine Tlili,
Zhenrong Yang,
Hai Zhou Ling,
Mourad Debbabi:
A Hybrid Approach for Safe Memory Management in C.
AMAST 2008: 377-391 |
82 | EE | Syrine Tlili,
Mourad Debbabi:
Type and Effect Annotations for Safe Memory Access in C.
ARES 2008: 302-309 |
81 | EE | Aiman Hanna,
Hai Zhou Ling,
Jason Furlong,
Mourad Debbabi:
Towards Automation of Testing High-Level Security Properties.
DBSec 2008: 268-282 |
80 | | Serguei A. Mokhov,
Joey Paquet,
Mourad Debbabi:
Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid.
IMF 2008: 197-216 |
79 | | Serguei A. Mokhov,
Mourad Debbabi:
File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis.
IMF 2008: 73-86 |
78 | EE | Benjamin C. M. Fung,
Ke Wang,
Lingyu Wang,
Mourad Debbabi:
A framework for privacy-preserving cluster analysis.
ISI 2008: 46-51 |
77 | EE | Rachid Hadjidj,
Xiaochun Yang,
Syrine Tlili,
Mourad Debbabi:
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support.
PST 2008: 133-142 |
76 | EE | Azzam Mourad,
Dima Alhadidi,
Mourad Debbabi:
Cross-Language Weaving Approach Targeting Software Security Hardening.
PST 2008: 87-98 |
75 | EE | Aiman Hanna,
Hai Zhou Ling,
Jason Furlong,
Zhenrong Yang,
Mourad Debbabi:
Targeting Security Vulnerabilities: From Specification to Detection (Short Paper).
QSIC 2008: 97-102 |
74 | EE | Noman Mohammed,
Hadi Otrok,
Lingyu Wang,
Mourad Debbabi,
Prabir Bhattacharya:
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
WCNC 2008: 2816-2821 |
73 | EE | Abderrezak Rachedi,
Abderrahim Benslimane,
Hadi Otrok,
Noman Mohammed,
Mourad Debbabi:
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks.
WiMob 2008: 417-422 |
72 | EE | Hadi Otrok,
Noman Mohammed,
Lingyu Wang,
Mourad Debbabi,
Prabir Bhattacharya:
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.
WiMob 2008: 608-612 |
71 | EE | Hadi Otrok,
Mona Mehrandish,
Chadi Assi,
Mourad Debbabi,
Prabir Bhattacharya:
Game theoretic models for detecting network intrusions.
Computer Communications 31(10): 1934-1944 (2008) |
70 | EE | Hadi Otrok,
Noman Mohammed,
Lingyu Wang,
Mourad Debbabi,
Prabir Bhattacharya:
A game-theoretic intrusion detection model for mobile ad hoc networks.
Computer Communications 31(4): 708-721 (2008) |
69 | EE | Azzam Mourad,
Marc-André Laverdière,
Mourad Debbabi:
An aspect-oriented approach for the systematic security hardening of code.
Computers & Security 27(3-4): 101-114 (2008) |
68 | EE | Chamseddine Talhi,
Nadia Tawbi,
Mourad Debbabi:
Execution monitoring enforcement under memory-limitation constraints.
Inf. Comput. 206(2-4): 158-184 (2008) |
67 | EE | Azzam Mourad,
Marc-André Laverdière,
Mourad Debbabi:
A High-level Aspect-oriented-based Framework for Software Security Hardening.
Information Security Journal: A Global Perspective 17(2): 56-74 (2008) |
66 | EE | Dima Alhadidi,
Mourad Debbabi,
Prabir Bhattacharya:
New AspectJ Pointcuts for Integer Overflow and Underflow Detection.
Information Security Journal: A Global Perspective 17(5&6): 278-287 (2008) |
65 | EE | Seyed Mahmood Hejazi,
Mourad Debbabi,
Chamseddine Talhi:
Automated Windows Memory File Extraction for Cyber Forensics Investigation.
J. Digital Forensic Practice 2(3): 117-131 (2008) |
2007 |
64 | EE | Azzam Mourad,
Marc-André Laverdière,
Mourad Debbabi:
Towards an Aspect Oriented Approach for the Security Hardening of Code.
AINA Workshops (1) 2007: 595-600 |
63 | EE | Hadi Otrok,
Joey Paquet,
Mourad Debbabi,
Prabir Bhattacharya:
Testing Intrusion Detection Systems in MANET: A Comprehensive Study.
CNSR 2007: 364-371 |
62 | EE | Yosr Jarraya,
Andrei Soeanu,
Mourad Debbabi,
Fawzi Hassaïne:
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams.
ECBS 2007: 515-522 |
61 | EE | Zhenrong Yang,
Aiman Hanna,
Mourad Debbabi:
Team Edit Automata for Testing Security Property.
IAS 2007: 235-240 |
60 | EE | Mohamed Saleh,
Mourad Debbabi:
Modeling Security Protocols as Games.
IAS 2007: 253-260 |
59 | EE | Hadi Otrok,
Mourad Debbabi,
Chadi Assi,
Prabir Bhattacharya:
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks.
ICDCS Workshops 2007: 86 |
58 | EE | Hamdi Yahyaoui,
Mourad Debbabi,
Nadia Tawbi:
A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL.
QSIC 2007: 348-355 |
57 | EE | Dima Alhadidi,
Nadia Belblidia,
Mourad Debbabi,
Prabir Bhattacharya:
An AOP Extended Lambda-Calculus.
SEFM 2007: 183-194 |
56 | EE | Mohamed Saleh,
Mourad Debbabi:
Verifying Security Properties of Cryptoprotocols: A Novel Approach.
SEFM 2007: 349-360 |
55 | | Azzam Mourad,
Marc-André Laverdière,
Mourad Debbabi:
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns.
WOSIS 2007: 123-130 |
54 | EE | Nadia Belblidia,
Mourad Debbabi:
A Dynamic Operational Semantics for JVML.
Journal of Object Technology 6(3): (2007) |
53 | EE | Ali Benssam,
Jean Berger,
Abdeslem Boukhtouta,
Mourad Debbabi,
Sujoy Ray,
Abderrazak Sahi:
What middleware for network centric operations?
Knowl.-Based Syst. 20(3): 255-265 (2007) |
52 | EE | Mohamed Saleh,
Ali Reza Arasteh,
Assaad Sakha,
Mourad Debbabi:
Forensic analysis of logs: Modeling and verification.
Knowl.-Based Syst. 20(7): 671-682 (2007) |
2006 |
51 | | Luay Alawneh,
Mourad Debbabi,
Fawzi Hassaïne,
Andrei Soeanu:
On the verification and validation of uml structural and behavioral diagrams.
ACST 2006: 304-309 |
50 | EE | Marc-André Laverdière,
Azzam Mourad,
Aiman Hanna,
Mourad Debbabi:
Security Design Patterns: Survey and Evaluation.
CCECE 2006: 1605-1608 |
49 | EE | Anil Kumar Venkataiahgari,
J. William Atwood,
Mourad Debbabi:
A Survey of Secure B2C Commerce for Multicast Services.
CCECE 2006: 288-293 |
48 | EE | Nadia Belblidia,
Mourad Debbabi,
Aiman Hanna,
Zhenrong Yang:
AOP Extension for Security Testing of Programs.
CCECE 2006: 647-650 |
47 | EE | Anil Kumar Venkataiahgari,
J. William Atwood,
Mourad Debbabi:
Secure E-Commerce Transactions for Multicast Services.
CEC/EEE 2006: 18 |
46 | EE | Luay Alawneh,
Mourad Debbabi,
Yosr Jarraya,
Andrei Soeanu,
Fawzi Hassaïne:
A Unified Approach for Verification and Validation of Systems and Software Engineering Models.
ECBS 2006: 409-418 |
45 | EE | Mona Mehrandish,
Hadi Otrok,
Mourad Debbabi,
Chadi Assi,
Prabir Bhattacharya:
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario.
GLOBECOM 2006 |
44 | | Luay Alawneh,
Mourad Debbabi,
Fawzi Hassaïne,
Yosr Jarraya,
Payam Shahi,
Andrei Soeanu:
Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models.
IASTED Conf. on Software Engineering 2006: 282-287 |
43 | EE | Hassan Issa,
Chadi Assi,
Mourad Debbabi:
QoS-Aware Middleware for Web Services Composition - A Qualitative Approach.
ISCC 2006: 359-364 |
42 | EE | Nadia Belblidia,
Mourad Debbabi:
Towards a Formal Semantics for AspectJ Weaving.
JMLC 2006: 155-171 |
41 | EE | Chamseddine Talhi,
Nadia Tawbi,
Mourad Debbabi:
Execution monitoring enforcement for limited-memory systems.
PST 2006: 38 |
40 | EE | Azzam Mourad,
Marc-André Laverdière,
Mourad Debbabi:
Security hardening of open source software.
PST 2006: 43 |
39 | EE | Dima Alhadidi,
Nadia Belblidia,
Mourad Debbabi:
Security crosscutting concerns and AspectJ.
PST 2006: 45 |
38 | EE | Nadia Belblidia,
Mourad Debbabi:
Formalizing AspectJ Weaving for Static Pointcuts.
SEFM 2006: 50-59 |
37 | | Anil Kumar Venkataiahgari,
Mourad Debbabi,
J. William Atwood:
Secure E-commerce Protection Profile.
Security and Management 2006: 279-285 |
36 | | Ali Reza Arasteh,
Mourad Debbabi,
Assaad Sakha:
A Formal Approach for the Forensic Analysis of Logs.
SoMeT 2006: 159-176 |
35 | | Mourad Debbabi,
Mohamed Saleh,
Chamseddine Talhi,
Sami Zhioua:
Common Criteria Approach to J2ME CLDC Security Requirements.
SoMeT 2006: 177-194 |
34 | EE | Mourad Debbabi,
Mohamed Saleh,
Chamseddine Talhi,
Sami Zhioua:
Security Evaluation of J2ME CLDC Embedded Java Platform.
Journal of Object Technology 5(2): 125-154 (2006) |
33 | EE | Mourad Debbabi,
Abdelouahed Gherbi,
Azzam Mourad,
Hamdi Yahyaoui:
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors.
Sci. Comput. Program. 59(1-2): 38-63 (2006) |
2005 |
32 | EE | Mourad Debbabi,
Mohamed Saleh,
Chamseddine Talhi,
Sami Zhioua:
Java for Mobile Devices: A Security Study.
ACSAC 2005: 235-244 |
31 | EE | Mourad Debbabi,
Mohamed Saleh,
Chamseddine Talhi,
Sami Zhioua:
Security Analysis of Mobile Java.
DEXA Workshops 2005: 231-235 |
30 | EE | Mourad Debbabi,
Mohamed Saleh:
Game Semantics Model for Security Protocols.
ICFEM 2005: 125-140 |
29 | EE | Mourad Debbabi,
Mohamed Saleh,
Chamseddine Talhi,
Sami Zhioua:
Security Analysis of Wireless Java.
PST 2005 |
28 | EE | Mourad Debbabi,
Azzam Mourad,
Nadia Tawbi:
Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors.
SAC 2005: 874-878 |
27 | EE | Mourad Debbabi,
Abdelouahed Gherbi,
Lamia Ketari,
Chamseddine Talhi,
Hamdi Yahyaoui,
Sami Zhioua,
Nadia Tawbi:
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines.
Journal of Object Technology 4(1): 83-108 (2005) |
2004 |
26 | EE | Mourad Debbabi,
Abdelouahed Gherbi,
Lamia Ketari,
Chamseddine Talhi,
Nadia Tawbi,
Hamdi Yahyaoui,
Sami Zhioua:
A dynamic compiler for embedded Java virtual machines.
PPPJ 2004: 100-106 |
25 | EE | Mourad Debbabi,
Abdelouahed Gherbi,
Lamia Ketari,
Chamseddine Talhi,
Hamdi Yahyaoui,
Sami Zhioua:
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines.
PPPJ 2004: 107-113 |
2003 |
24 | EE | Mourad Debbabi,
M. M. Erhioui,
Lamia Ketari,
Nadia Tawbi,
Hamdi Yahyaoui,
Sami Zhioua:
Method Call Acceleration in Embedded Java Virtual Machines.
International Conference on Computational Science 2003: 750-759 |
23 | EE | Mourad Debbabi,
Nancy A. Durgin,
Mohamed Mejri,
John C. Mitchell:
Security by typing.
STTT 4(4): 472-495 (2003) |
22 | | Kamel Adi,
Mourad Debbabi,
Mohamed Mejri:
A new logic for electronic commerce protocols.
Theor. Comput. Sci. 291(3): 223-283 (2003) |
2002 |
21 | EE | Mourad Debbabi,
Jules Desharnais,
M. Fourati,
E. Menif,
Frédéric Painchaud,
Nadia Tawbi:
Secure Self-certified Code for Java.
FASec 2002: 133-151 |
2001 |
20 | EE | Kamel Adi,
Mourad Debbabi:
Abstract interpretation for proving secrecy properties in security protocols.
Electr. Notes Theor. Comput. Sci. 55(1): (2001) |
2000 |
19 | EE | Kamel Adi,
Mourad Debbabi,
Mohamed Mejri:
A New Logic for Electronic Commerce Protocols.
AMAST 2000: 499-513 |
18 | | Mourad Debbabi,
M. Fourati:
Sur la sémantique statique de Java.
LMO 2000: 167-182 |
17 | | Stephane Doyon,
Mourad Debbabi:
Verifying Object Initialization in the Java Bytecode Language.
SAC (2) 2000: 821-830 |
16 | EE | Mourad Debbabi,
E. Giasson,
Béchir Ktari,
F. Michaud,
Nadia Tawbi:
Secure Self-Certified COTS.
WETICE 2000: 183-188 |
15 | EE | Frédéric Painchaud,
Mourad Debbabi:
On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier.
WETICE 2000: 189-194 |
14 | EE | Stephane Doyon,
Mourad Debbabi:
On object initialization in the Java bytecode.
Computer Communications 23(17): 1594-1605 (2000) |
1999 |
13 | EE | Yahya Y. Al-Salqan,
Nahid Shahmehri,
Wu Wen,
Mourad Debbabi:
Final Summary Report on Enterprise Security.
WETICE 1999: 134 |
12 | EE | J. Bergeron,
Mourad Debbabi,
M. M. Erhioui,
Béchir Ktari:
Static Analysis of Binary Code to Isolate Malicious Behaviors.
WETICE 1999: 184-189 |
1998 |
11 | EE | Mourad Debbabi,
Y. Legaré,
Mohamed Mejri:
An Environment for the Specification and Analysis of Cryptoprotocols.
ACSAC 1998: 321-332 |
10 | EE | Mourad Debbabi,
Abdelkader Benzakour,
Béchir Ktari:
A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes.
AMAST 1998: 214-230 |
1997 |
9 | | Mourad Debbabi,
Mohamed Mejri,
Nadia Tawbi,
I. Yahmadi:
Formal Automatic Verification of Authentication Crytographic Protocols.
ICFEM 1997: 50-59 |
8 | EE | Mourad Debbabi,
Mohamed Mejri,
Nadia Tawbi,
I. Yahmadi:
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm.
WETICE 1997: 256-262 |
7 | | Mourad Debbabi,
Zahia Aïdoud,
Ali Faour:
On the Inference od Structured Recursive Effects with Subtyping.
Journal of Functional and Logic Programming 1997(5): (1997) |
6 | | Mourad Debbabi:
A Model-Based Concurrent Specification Language Over CML: Semantic Foundations.
Parallel Processing Letters 7(3): 329-356 (1997) |
1996 |
5 | | Mourad Debbabi,
Ali Faour,
Nadia Tawbi:
A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs.
Implementation of Functional Languages 1996: 247-266 |
1994 |
4 | | Dominique Bolignano,
Mourad Debbabi:
A Semantic Theory for Concurrent ML.
TACS 1994: 766-785 |
1993 |
3 | | Dominique Bolignano,
Mourad Debbabi:
A Coherent Type System for a Concurrent, Functional and Imperative Programming Language.
AMAST 1993: 153-162 |
2 | | Dominique Bolignano,
Mourad Debbabi:
A Denotational Model for the Integration of Concurrent, Functional, and Imperative Programming.
ICCI 1993: 244-250 |
1992 |
1 | | Dominique Bolignano,
Mourad Debbabi:
Higher Order Communication Processes with Value-Passing, Assignment and Return of Results.
ISAAC 1992: 319-331 |