default search action
Mourad Debbabi
Person information
- affiliation: Concordia University, Montreal, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j134]Momen Oqaily, Mohammad Ekramul Kabir, Suryadipta Majumdar, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 2799-2817 (2024) - [j133]Afshin Ebtia, Dhiaa Elhak Rebbah, Mourad Debbabi, Marthe Kassouf, Mohsen Ghafouri, Arash Mohammadi, Andrei Soeanu:
Spatial-Temporal Data-Driven Model for Load Altering Attack Detection in Smart Power Distribution Networks. IEEE Trans. Ind. Informatics 20(5): 7414-7427 (2024) - [j132]Onur Duman, Azadeh Tabiban, Lingyu Wang, Mourad Debbabi:
Measuring and Improving the Security Posture of IEC 61850 Substations Against Supply Chain Attacks. IEEE Trans. Instrum. Meas. 73: 1-20 (2024) - [j131]Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi, Mourad Debbabi:
AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery. IEEE Trans. Netw. Serv. Manag. 21(5): 5178-5196 (2024) - [c206]Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Attallah, Danial Jafarigiv, Chadi Assi, Mourad Debbabi:
Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System. AsiaCCS 2024 - [c205]Abdullah Qasem, Mourad Debbabi, Andrei Soeanu:
OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT Firmware. CCS 2024: 2355-2369 - [c204]Boubakr Nour, Makan Pourzandi, Jesus Alatorre, Jan Willekens, Mourad Debbabi:
Chronohunt: Determining Optimal Pace for Automated Alert Analysis in Threat Hunting Using Reinforcement Learning. DSC 2024: 1-8 - [c203]Sofiane Benahmed, Abdullah Qasem, Anis Lounis, Mourad Debbabi:
Modularizing Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures. DIMVA 2024: 84-103 - [c202]Anis Lounis, Anthony Andreoli, Mourad Debbabi, Aiman Hanna:
Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence Semantics. DIMVA 2024: 395-415 - [c201]Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi:
SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. DIMVA 2024: 483-502 - [c200]Momen Oqaily, Hinddeep Purohit, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi, Mourad Debbabi:
ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers. USENIX Security Symposium 2024 - 2023
- [j130]Badis Racherache, Paria Shirani, Andrei Soeanu, Mourad Debbabi:
CPID: Insider threat detection using profiling and cyber-persona identification. Comput. Secur. 132: 103350 (2023) - [j129]Saghar Vahidi, Mohsen Ghafouri, Minh Au, Marthe Kassouf, Arash Mohammadi, Mourad Debbabi:
Security of Wide-Area Monitoring, Protection, and Control (WAMPAC) Systems of the Smart Grid: A Survey on Challenges and Opportunities. IEEE Commun. Surv. Tutorials 25(2): 1294-1335 (2023) - [j128]Boubakr Nour, Makan Pourzandi, Mourad Debbabi:
A Survey on Threat Hunting in Enterprise Networks. IEEE Commun. Surv. Tutorials 25(4): 2299-2324 (2023) - [j127]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features. ACM Comput. Surv. 55(2): 19:1-19:41 (2023) - [j126]Anthony Andreoli, Anis Lounis, Mourad Debbabi, Aiman Hanna:
On the prevalence of software supply chain attacks: Empirical study and investigative framework. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301508 (2023) - [j125]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab:
SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features. Expert Syst. Appl. 225: 120017 (2023) - [j124]Khaled Sarieddine, Mohammad Ali Sayed, Danial Jafarigiv, Ribal Atallah, Mourad Debbabi, Chadi Assi:
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security. IEEE Secur. Priv. 21(4): 74-83 (2023) - [j123]Mark Karanfil, Dhiaa Elhak Rebbah, Mourad Debbabi, Marthe Kassouf, Mohsen Ghafouri, El-Nasser S. Youssef, Aiman Hanna:
Detection of Microgrid Cyberattacks Using Network and System Management. IEEE Trans. Smart Grid 14(3): 2390-2405 (2023) - [c199]Abdullah Qasem, Mourad Debbabi, Bernard Lebel, Marthe Kassouf:
Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures. AsiaCCS 2023: 443-456 - [c198]Momen Oqaily, Suryadipta Majumdar, Lingyu Wang, Mohammad Ekramul Kabir, Yosr Jarraya, A. S. M. Asadujjaman, Makan Pourzandi, Mourad Debbabi:
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds. CODASPY 2023: 79-90 - [c197]Md. Nazmul Hoq, Jia Wei Yao, Suryadipta Majumdar, Luis Suárez, Lingyu Wang, Amine Boukhtouta, Makan Pourzandi, Mourad Debbabi:
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring. ESORICS (2) 2023: 123-144 - [c196]Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi, Mourad Debbabi:
Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting. FPS (2) 2023: 52-69 - [c195]Juanwei Chen, Jun Yan, Hang Du, Mourad Debbabi, Marthe Kassouf:
Vulnerability Analysis of Virtual Power Plant Voltage Support under Denial-of-Service Attacks. ISGT 2023: 1-5 - [c194]Abolfazl Rahiminejad, Onur Duman, Mohsen Ghafouri, Ribal Atallah, Arash Mohammadi, Mourad Debbabi:
A Resilience Quantitative Framework for Wide Area Damping Control Against Cyberattacks. ISGT 2023: 1-5 - [c193]Afshin Ebtia, Dhiaa Elhak Rebbah, Abdullah Qasem, Mohsen Ghafouri, Danial Jafarigiv, Mourad Debbabi, Arash Mohammadi:
Detection of Cyber Attacks on Synchro-Phasor Network Targeting Topology Detection Application of Power Distribution Grids. SmartGridComm 2023: 1-6 - [c192]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
An Enhanced Interface-Based Probabilistic Compositional Verification Approach. VECoS 2023: 60-75 - [i22]Khaled Sarieddine, Mohammad Ali Sayed, Danial Jafarigiv, Ribal Atallah, Mourad Debbabi, Chadi Assi:
A Real-Time Co-simulation Testbed for EV Charging and Smart Grid Security. CoRR abs/2302.12781 (2023) - [i21]Mohammad Ali Sayed, Mohsen Ghafouri, Ribal Atallah, Mourad Debbabi, Chadi Assi:
Protecting the Future Grid: An Electric Vehicle Robust Mitigation Scheme Against Load Altering Attacks on Power Grids. CoRR abs/2308.07526 (2023) - [i20]Mohammad Ali Sayed, Mohsen Ghafouri, Ribal Atallah, Mourad Debbabi, Chadi Assi:
An Electric Vehicle Control Strategy to Mitigate Load Altering Attacks Against Power Grids. CoRR abs/2310.14471 (2023) - 2022
- [j122]Aniss Chohra, Paria Shirani, ElMouatez Billah Karbab, Mourad Debbabi:
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection. Comput. Secur. 117: 102684 (2022) - [j121]Abdullah Qasem, Paria Shirani, Mourad Debbabi, Lingyu Wang, Bernard Lebel, Basile L. Agba:
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies. ACM Comput. Surv. 54(2): 25:1-25:42 (2022) - [j120]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. IEEE Trans. Dependable Secur. Comput. 19(1): 402-418 (2022) - [j119]Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi, Ribal F. Atallah, Bernard Lebel:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. IEEE Trans. Dependable Secur. Comput. 19(2): 1018-1035 (2022) - [j118]Suryadipta Majumdar, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ProSAS: Proactive Security Auditing System for Clouds. IEEE Trans. Dependable Secur. Comput. 19(4): 2517-2534 (2022) - [j117]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Mourad Debbabi, Amr M. Youssef, Mohsen Ghafouri, Rachid Hadjidj:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management. IEEE Trans. Ind. Informatics 18(3): 1641-1653 (2022) - [c191]Onur Duman, Lingyu Wang, Minh Au, Marthe Kassouf, Mourad Debbabi:
Hardening Substations against Supply Chain Attacks Under Operational Constraints. ISGT 2022: 1-5 - [c190]Mark Karanfil, Dhiaa Elhak Rebbah, Mohsen Ghafouri, Marthe Kassouf, Mourad Debbabi, Aiman Hanna:
Security Monitoring of the Microgrid Using IEC 62351-7 Network and System Management. ISGT 2022: 1-5 - [c189]Abolfazl Rahiminejad, Mohsen Ghafouri, Ribal Atallah, Arash Mohammadi, Mourad Debbabi:
A Cyber-Physical Resilience-Based Survivability Metric against Topological Cyberattacks. ISGT 2022: 1-5 - [c188]Dhiaa Elhak Rebbah, Afshin Ebtia, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Mourad Debbabi, Arash Mohammadi:
Real-Time Co-simulation Platform for Security Analysis of Distribution Automation Systems. ISGT 2022: 1-5 - [c187]Hang Du, Jun Yan, Mohsen Ghafouri, Rawad Zgheib, Mourad Debbabi:
Online Attack-aware Risk Management for PMSG-based Wind Farm Depending on System Strength Evaluation. SmartGridComm 2022: 218-223 - [i19]Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi, Yuan Hong:
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning. CoRR abs/2206.13046 (2022) - [i18]Mohammad Ali Sayed, Mohsen Ghafouri, Mourad Debbabi, Chadi Assi:
Dynamic Load Altering EV Attacks Against Power Grid Frequency Control. CoRR abs/2207.10129 (2022) - 2021
- [b5]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence. Advances in Information Security 86, Springer 2021, ISBN 978-3-030-74663-6, pp. 1-198 - [j116]Sadegh Torabi, Mirabelle Dib, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships. IEEE Netw. Lett. 3(3): 161-165 (2021) - [j115]Gagandeep Singh Chawla, Mengyuan Zhang, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV. IEEE Trans. Dependable Secur. Comput. 18(4): 1553-1567 (2021) - [j114]Momen Oqaily, Yosr Jarraya, Meisam Mohammady, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing. IEEE Trans. Dependable Secur. Comput. 18(5): 2486-2505 (2021) - [j113]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Ribal Atallah, Basile L. Agba:
Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems. IEEE Trans. Inf. Forensics Secur. 16: 3355-3370 (2021) - [j112]Meisam Mohammady, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. ACM Trans. Priv. Secur. 24(3): 14:1-14:36 (2021) - [c186]A. S. M. Asadujjaman, Momen Oqaily, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains. CNS 2021: 245-253 - [c185]ElMouatez Billah Karbab, Mourad Debbabi:
PetaDroid: Adaptive Android Malware Detection Using Deep Learning. DIMVA 2021: 319-340 - [c184]Hang Du, Jun Yan, Mohsen Ghafouri, Rawad Zgheib, Marthe Kassouf, Mourad Debbabi:
Modeling of Cyber Attacks Against Converter-Driven Stability of PMSG-Based Wind Farms with Intentional Subsynchronous Resonance. SmartGridComm 2021: 391-397 - [i17]ElMouatez Billah Karbab, Mourad Debbabi:
Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques. CoRR abs/2105.13491 (2021) - [i16]Mohammad Ali Sayed, Ribal Atallah, Chadi Assi, Mourad Debbabi:
Electric Vehicle Attack Impact on Power Grid Operation. CoRR abs/2111.11317 (2021) - 2020
- [b4]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j111]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning. Comput. Secur. 96: 101932 (2020) - [j110]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning. Comput. Secur. 97: 101965 (2020) - [j109]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities. Digit. Investig. 32 Supplement: 300922 (2020) - [j108]Andrei Soeanu, Sujoy Ray, Jean Berger, Abdeslem Boukhtouta, Mourad Debbabi:
Multi-depot vehicle routing problem with risk mitigation: Model and solution algorithm. Expert Syst. Appl. 145: 113099 (2020) - [j107]Morteza Safaei Pour, Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities. IEEE Netw. Lett. 2(3): 159-163 (2020) - [j106]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. IEEE Trans. Inf. Forensics Secur. 15: 3051-3066 (2020) - [j105]Bassam Moussa, Marthe Kassouf, Rachid Hadjidj, Mourad Debbabi, Chadi Assi:
An Extension to the Precision Time Protocol (PTP) to Enable the Detection of Cyber Attacks. IEEE Trans. Ind. Informatics 16(1): 18-27 (2020) - [j104]Bassam Moussa, Abdullah Albarakati, Marthe Kassouf, Mourad Debbabi, Chadi Assi:
Exploiting the Vulnerability of Relative Data Alignment in Phasor Data Concentrators to Time Synchronization Attacks. IEEE Trans. Smart Grid 11(3): 2541-2551 (2020) - [j103]Parisa Akaber, Bassam Moussa, Mohsen Ghafouri, Ribal Atallah, Basile L. Agba, Chadi Assi, Mourad Debbabi:
CASeS: Concurrent Contingency Analysis-Based Security Metric Deployment for the Smart Grid. IEEE Trans. Smart Grid 11(3): 2676-2687 (2020) - [j102]Mohsen Ghafouri, Minh Au, Marthe Kassouf, Mourad Debbabi, Chadi Assi, Jun Yan:
Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids. IEEE Trans. Smart Grid 11(6): 5227-5238 (2020) - [c183]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c182]Alaa Oqaily, Sudershan Lakshmanan Thirunavukkarasu, Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack. CloudCom 2020: 33-40 - [c181]Azadeh Tabiban, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. CNS 2020: 1-9 - [i15]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Clustering using Community Detection on Android Packages Similarity Network. CoRR abs/2005.06075 (2020) - [i14]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [b3]Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing. Advances in Information Security 76, Springer 2019, ISBN 978-3-030-23127-9, pp. 1-159 - [j101]Farkhund Iqbal, Benjamin C. M. Fung, Mourad Debbabi, Rabia Batool, Andrew Marrington:
Wordnet-Based Criminal Networks Mining for Cybercrime Investigation. IEEE Access 7: 22740-22755 (2019) - [j100]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
On the feasibility of binary authorship characterization. Digit. Investig. 28 Supplement: S3-S11 (2019) - [j99]ElMouatez Billah Karbab, Mourad Debbabi:
MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports. Digit. Investig. 28 Supplement: S77-S87 (2019) - [j98]Badr Afify, Sujoy Ray, Andrei Soeanu, Anjali Awasthi, Mourad Debbabi, Mohamad Allouche:
Evolutionary learning algorithm for reliable facility location under disruption. Expert Syst. Appl. 115: 223-244 (2019) - [j97]Bassam Moussa, Chantale Robillard, Alf Zugenmaier, Marthe Kassouf, Mourad Debbabi, Chadi Assi:
Securing the Precision Time Protocol (PTP) Against Fake Timestamps. IEEE Commun. Lett. 23(2): 278-281 (2019) - [j96]Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Learning probabilistic dependencies among events for proactive security auditing in clouds. J. Comput. Secur. 27(2): 165-202 (2019) - [j95]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
Decoupling coding habits from functionality for effective binary authorship attribution. J. Comput. Secur. 27(6): 613-648 (2019) - [j94]Parisa Akaber, Bassam Moussa, Mourad Debbabi, Chadi Assi:
Automated Post-Failure Service Restoration in Smart Grid Through Network Reconfiguration in the Presence of Energy Storage Systems. IEEE Syst. J. 13(3): 3358-3367 (2019) - [j93]Elias Bou-Harb, Martin Husák, Mourad Debbabi, Chadi Assi:
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Trans. Big Data 5(4): 439-453 (2019) - [j92]Taous Madi, Yosr Jarraya, Amir Alimohammadifar, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. ACM Trans. Priv. Secur. 22(1): 1:1-1:35 (2019) - [j91]Reem Kateb, Parisa Akaber, Mosaddek Hossain Kamal Tushar, Abdullah Albarakati, Mourad Debbabi, Chadi Assi:
Enhancing WAMS Communication Network Against Delay Attacks. IEEE Trans. Smart Grid 10(3): 2738-2751 (2019) - [c180]Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities. CloudCom 2019: 167-174 - [c179]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Multi-Level Proactive Security Auditing for Clouds. DSC 2019: 1-8 - [c178]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba:
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. DIMVA 2019: 89-108 - [c177]Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi:
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning. ESORICS (2) 2019: 47-67 - [c176]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. ESORICS (2) 2019: 239-262 - [c175]Momen Oqaily, Yosr Jarraya, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
iCAT: An Interactive Customizable Anonymization Tool. ESORICS (1) 2019: 658-680 - [c174]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Rachid Hadjidj, Mourad Debbabi, Amr M. Youssef:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1. SmartGridComm 2019: 1-7 - [c173]Onur Duman, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, Mourad Debbabi:
Modeling Supply Chain Attacks in IEC 61850 Substations. SmartGridComm 2019: 1-6 - [e2]Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquín García-Alfaro:
Foundations and Practice of Security - 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11358, Springer 2019, ISBN 978-3-030-18418-6 [contents] - 2018
- [j90]Sadegh Torabi, Amine Boukhtouta, Chadi Assi, Mourad Debbabi:
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems. IEEE Commun. Surv. Tutorials 20(4): 3389-3415 (2018) - [j89]Andrei Soeanu, Sujoy Ray, Jean Berger, Mourad Debbabi:
Efficient sensor network management for asset localization. Comput. Oper. Res. 99: 148-165 (2018) - [j88]Houssem Eddine Bordjiba, ElMouatez Billah Karbab, Mourad Debbabi:
Data-driven approach for automatic telephony threat analysis and campaign detection. Digit. Investig. 24 Supplement: S131-S141 (2018) - [j87]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
MalDozer: Automatic framework for android malware detection using deep learning. Digit. Investig. 24 Supplement: S48-S59 (2018) - [j86]Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
CSC-Detector: A System to Infer Large-Scale Probing Campaigns. IEEE Trans. Dependable Secur. Comput. 15(3): 364-377 (2018) - [j85]Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
User-Level Runtime Security Auditing for the Cloud. IEEE Trans. Inf. Forensics Secur. 13(5): 1185-1199 (2018) - [j84]Bassam Moussa, Parisa Akaber, Mourad Debbabi, Chadi Assi:
Critical Links Identification for Selective Outages in Interdependent Power-Communication Networks. IEEE Trans. Ind. Informatics 14(2): 472-483 (2018) - [j83]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. ACM Trans. Priv. Secur. 21(2): 8:1-8:34 (2018) - [j82]Reem Kateb, Mosaddek Hossain Kamal Tushar, Chadi Assi, Mourad Debbabi:
Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement Systems. IEEE Trans. Smart Grid 9(1): 25-34 (2018) - [j81]Bassam Moussa, Mourad Debbabi, Chadi Assi:
A Detection and Mitigation Model for PTP Delay Attack in an IEC 61850 Substation. IEEE Trans. Smart Grid 9(5): 3954-3965 (2018) - [c172]ElMouatez Billah Karbab, Mourad Debbabi:
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. ARES 2018: 20:1-20:10 - [c171]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [c170]Taous Madi, Mengyuan Zhang, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud. CloudCom 2018: 163-170 - [c169]Azadeh Tabiban, Suryadipta Majumdar, Lingyu Wang, Mourad Debbabi:
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds. CNS 2018: 1-7 - [c168]Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, Aiman Hanna:
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. DIMVA 2018: 114-138 - [c167]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta, Mourad Debbabi:
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective. DSN 2018: 562-573 - [c166]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
On Leveraging Coding Habits for Effective Binary Authorship Attribution. ESORICS (1) 2018: 26-47 - [c165]Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks. ESORICS (2) 2018: 463-484 - [c164]Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing: Major Approaches and Existing Challenges. FPS 2018: 61-77 - [c163]Aniss Chohra, Mourad Debbabi, Paria Shirani:
Daedalus: Network Anomaly Detection on IDS Stream Logs. FPS 2018: 95-111 - [c162]Abdullah Albarakati, Bassam Moussa, Mourad Debbabi, Amr M. Youssef, Basile L. Agba, Marthe Kassouf:
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security. SmartGridComm 2018: 1-6 - [i13]ElMouatez Billah Karbab, Mourad Debbabi:
Automatic Investigation Framework for Android Malware Cyber-Infrastructures. CoRR abs/1806.08893 (2018) - [i12]Serguei A. Mokhov, Miao Song, Jashanjot Singh, Joey Paquet, Mourad Debbabi, Sudhir P. Mudur:
Toward Multimodal Interaction in Scalable Visual Digital Evidence Visualization Using Computer Vision Techniques and ISS. CoRR abs/1808.00118 (2018) - [i11]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CoRR abs/1810.10464 (2018) - [i10]ElMouatez Billah Karbab, Mourad Debbabi:
Portable, Data-Driven Malware Detection using Language Processing and Machine Learning Techniques on Behavioral Analysis Reports. CoRR abs/1812.10327 (2018) - 2017
- [j80]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103]. Digit. Investig. 21: 89 (2017) - [j79]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns. IEEE Netw. 31(1): 18-26 (2017) - [j78]Feras Aljumah, Makan Pourzandi, Mourad Debbabi:
Privacy-Preserving Querying on Privately Encrypted Data in the Cloud. Trans. Large Scale Data Knowl. Centered Syst. 35: 50-73 (2017) - [c161]Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal:
SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream. ARES 2017: 23:1-23:11 - [c160]He Huang, Amr M. Youssef, Mourad Debbabi:
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. AsiaCCS 2017: 155-166 - [c159]Paria Shirani, Lingyu Wang, Mourad Debbabi:
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. DIMVA 2017: 301-324 - [c158]Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
LeaPS: Learning-Based Proactive Security Auditing for Clouds. ESORICS (2) 2017: 265-285 - [c157]Reem Kateb, Parisa Akaber, Mosaddek Hossain Kamal Tushar, Mourad Debbabi, Chadi Assi:
Delay aware measurements gathering in WAMS communication network. GlobalSIP 2017: 1090-1094 - [c156]Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. NDSS 2017 - [c155]Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi, Aiman Hanna:
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables. SEC 2017: 341-355 - [c154]Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi:
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks. SmartGridComm 2017: 108-114 - [i9]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. CoRR abs/1701.02711 (2017) - [i8]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: Dynamic Fingerprinting for the Automatic Detection of Android Malware. CoRR abs/1702.05699 (2017) - [i7]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Deep Learning on API Method Sequences. CoRR abs/1712.08996 (2017) - 2016
- [j77]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities. Comput. Networks 94: 327-343 (2016) - [j76]Claude Fachkha, Mourad Debbabi:
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization. IEEE Commun. Surv. Tutorials 18(2): 1197-1227 (2016) - [j75]Bassam Moussa, Mourad Debbabi, Chadi Assi:
Security Assessment of Time Synchronization Mechanisms for the Smart Grid. IEEE Commun. Surv. Tutorials 18(3): 1952-1973 (2016) - [j74]Saed Alrabaee, Lingyu Wang, Mourad Debbabi:
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs). Digit. Investig. 18 Supplement: S11-S22 (2016) - [j73]ElMouatez Billah Karbab, Mourad Debbabi, Djedjiga Mouheb:
Fingerprinting Android packaging: Generating DNAs for malware detection. Digit. Investig. 18 Supplement: S33-S45 (2016) - [j72]Andrei Soeanu, Mourad Debbabi, Mohamad Allouche, Micheline Bélanger, Nicholas Léchevin:
Hierarchy aware distributed plan execution monitoring. Expert Syst. Appl. 43: 66-81 (2016) - [j71]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-oriented modeling framework for security hardening. Innov. Syst. Softw. Eng. 12(1): 41-67 (2016) - [j70]Sujoy Ray, Mourad Debbabi, Mohamad Khaled Allouche, Nicolas Léchevin, Micheline Bélanger:
Energy-Efficient Monitor Deployment in Collaborative Distributed Setting. IEEE Trans. Ind. Informatics 12(1): 112-123 (2016) - [j69]Amine Boukhtouta, Serguei A. Mokhov, Nour-Eddine Lakhdari, Mourad Debbabi, Joey Paquet:
Network malware classification comparison using DPI and flow packet headers. J. Comput. Virol. Hacking Tech. 12(2): 69-100 (2016) - [c153]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Cypider: building community-based cyber-defense infrastructure for android malware detection. ACSAC 2016: 348-362 - [c152]Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack. ESORICS (1) 2016: 47-66 - [c151]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. FPS 2016: 256-272 - [c150]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: dynamic fingerprinting for the automatic detection of android malware. MALWARE 2016: 139-146 - [c149]Parisa Akaber, Bassam Moussa, Mourad Debbabi, Chadi Assi:
Cascading link failure analysis in interdependent networks for maximal outages in smart grid. SmartGridComm 2016: 429-434 - 2015
- [b2]Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima:
Aspect-Oriented Security Hardening of UML Design Models. Springer 2015, ISBN 978-3-319-16105-1, pp. 1-219 - [j68]Yosr Jarraya, Arash Eghtesadi, Sahba Sadri, Mourad Debbabi, Makan Pourzandi:
Verification of firewall reconfiguration for virtual machines migrations in the cloud. Comput. Networks 93: 480-491 (2015) - [j67]Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
Inferring distributed reflection denial of service attacks from darknet. Comput. Commun. 62: 59-71 (2015) - [j66]Samir Ouchani, Mourad Debbabi:
Specification, verification, and quantification of security in model-based systems. Computing 97(7): 691-711 (2015) - [j65]Son Dinh, Taher Azeb, Francis Fortin, Djedjiga Mouheb, Mourad Debbabi:
Spam campaign detection, analysis, and investigation. Digit. Investig. 12 Supplement 1: S12-S21 (2015) - [j64]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code. Digit. Investig. 12 Supplement 1: S61-S71 (2015) - [j63]Ashkan Rahimian, Paria Shirani, Saed Alrabaee, Lingyu Wang, Mourad Debbabi:
BinComp: A stratified approach to compiler provenance Attribution. Digit. Investig. 14 Supplement 1: S146-S155 (2015) - [j62]Amine Boukhtouta, Djedjiga Mouheb, Mourad Debbabi, Omar Alfandi, Farkhund Iqbal, May El Barachi:
Graph-theoretic characterization of cyber-threat infrastructures. Digit. Investig. 14 Supplement 1: S3-S15 (2015) - [j61]Mohammad Reza Farhadi, Benjamin C. M. Fung, Yin Bun Fung, Philippe Charland, Stere Preda, Mourad Debbabi:
Scalable code clone search for malware analysis. Digit. Investig. 15: 46-60 (2015) - [j60]Andrei Soeanu, Mourad Debbabi, Dima Alhadidi, Makram Makkawi, Mohamad Khaled Allouche, Micheline Bélanger, Nicolas Léchevin:
Transportation risk analysis using probabilistic model checking. Expert Syst. Appl. 42(9): 4410-4421 (2015) - [j59]Steven H. H. Ding, Benjamin C. M. Fung, Mourad Debbabi:
A Visualizable Evidence-Driven Approach for Authorship Attribution. ACM Trans. Inf. Syst. Secur. 17(3): 12:1-12:30 (2015) - [j58]Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
On the inference and prediction of DDoS campaigns. Wirel. Commun. Mob. Comput. 15(6): 1066-1078 (2015) - [c148]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic. ARES 2015: 180-185 - [c147]Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack. CloudCom 2015: 58-65 - [c146]Sahba Sadri, Yosr Jarraya, Arash Eghtesadi, Mourad Debbabi:
Towards migrating security policies of virtual machines in Software Defined Networks. NetSoft 2015: 1-9 - [c145]Bassam Moussa, Mourad Debbabi, Chadi Assi:
A detection and mitigation model for PTP delay attack in a smart grid substation. SmartGridComm 2015: 497-502 - [c144]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
MARFCAT: Fast code analysis for defects and vulnerabilities. SWAN@SANER 2015: 35-38 - 2014
- [j57]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
On fingerprinting probing activities. Comput. Secur. 43: 35-48 (2014) - [j56]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
Cyber Scanning: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 16(3): 1496-1519 (2014) - [j55]Yosr Jarraya, Taous Madi, Mourad Debbabi:
A Survey and a Layered Taxonomy of Software-Defined Networking. IEEE Commun. Surv. Tutorials 16(4): 1955-1980 (2014) - [j54]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
OBA2: An Onion approach to Binary code Authorship Attribution. Digit. Investig. 11(Supplement 1): S94-S103 (2014) - [j53]Elias Bou-Harb, Nour-Eddine Lakhdari, Hamad Binsalleeh, Mourad Debbabi:
Multidimensional investigation of source port 0 probing. Digit. Investig. 11(Supplement 2): S114-S123 (2014) - [j52]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
A formal verification framework for SysML activity diagrams. Expert Syst. Appl. 41(6): 2713-2728 (2014) - [j51]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
A property-based abstraction framework for SysML activity diagrams. Knowl. Based Syst. 56: 328-343 (2014) - [j50]Sujoy Ray, Andrei Soeanu, Jean Berger, Mourad Debbabi:
The multi-depot split-delivery vehicle routing problem: Model and solution algorithm. Knowl. Based Syst. 71: 238-265 (2014) - [j49]Yosr Jarraya, Mourad Debbabi:
Quantitative and qualitative analysis of SysML activity diagrams. Int. J. Softw. Tools Technol. Transf. 16(4): 399-419 (2014) - [j48]Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung, Mourad Debbabi:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data. IEEE Trans. Dependable Secur. Comput. 11(1): 59-71 (2014) - [j47]Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren, Shunzhi Zhu, Mourad Debbabi:
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications. IEEE Trans. Dependable Secur. Comput. 11(6): 538-552 (2014) - [c143]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities. Canadian AI 2014: 326-332 - [c142]Serguei A. Mokhov, Michael J. Assels, Joey Paquet, Mourad Debbabi:
Toward Automated MAC Spoofer Investigations. C3S2E 2014: 27:1-27:6 - [c141]Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi:
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud. DBSec 2014: 82-97 - [c140]Serguei A. Mokhov, Michael J. Assels, Joey Paquet, Mourad Debbabi:
Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. FPS 2014: 168-183 - [c139]Arash Eghtesadi, Yosr Jarraya, Mourad Debbabi, Makan Pourzandi:
Preservation of Security Configurations in the Cloud. IC2E 2014: 17-26 - [c138]Elias Bou-Harb, Claude Fachkha, Mourad Debbabi, Chadi Assi:
Inferring internet-scale infections by correlating malware and probing activities. ICC 2014: 640-646 - [c137]A. Mert Kara, Hamad Binsalleeh, Mohammad Mannan, Amr M. Youssef, Mourad Debbabi:
Detection of malicious payload distribution channels in DNS. ICC 2014: 853-858 - [c136]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
Behavioral analytics for inferring large-scale orchestrated probing events. INFOCOM Workshops 2014: 506-511 - [c135]Hamad Binsalleeh, A. Mert Kara, Amr M. Youssef, Mourad Debbabi:
Characterization of Covert Channels in DNS. NTMS 2014: 1-5 - [c134]Amine Boukhtouta, Nour-Eddine Lakhdari, Mourad Debbabi:
Inferring Malware Family through Application Protocol Sequences Signature. NTMS 2014: 1-5 - [c133]Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
Fingerprinting Internet DNS Amplification DDoS Activities. NTMS 2014: 1-5 - [c132]Mohammad Reza Farhadi, Benjamin C. M. Fung, Philippe Charland, Mourad Debbabi:
BinClone: Detecting Code Clones in Malware. SERE 2014: 78-87 - [e1]Jean-Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquín García-Alfaro, Nur Zincir-Heywood:
Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8352, Springer 2014, ISBN 978-3-319-05301-1 [contents] - [i6]Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi:
On the Reverse Engineering of the Citadel Botnet. CoRR abs/1406.5569 (2014) - 2013
- [j46]Elias Bou-Harb, Claude Fachkha, Makan Pourzandi, Mourad Debbabi, Chadi Assi:
Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1): 42-49 (2013) - [j45]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A systematic approach for detecting and clustering distributed cyber scanning. Comput. Networks 57(18): 3826-3839 (2013) - [j44]Farkhund Iqbal, Hamad Binsalleeh, Benjamin C. M. Fung, Mourad Debbabi:
A unified data mining solution for authorship analysis in anonymous textual communications. Inf. Sci. 231: 98-112 (2013) - [j43]Dima Alhadidi, Azzam Mourad, Hakim Idrissi Kaitouni, Mourad Debbabi:
Common weaving approach in mainstream languages for software security hardening. J. Syst. Softw. 86(10): 2654-2674 (2013) - [j42]Elias Bou-Harb, Makan Pourzandi, Mourad Debbabi, Chadi Assi:
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. Secur. Commun. Networks 6(12): 1478-1489 (2013) - [c131]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A Statistical Approach for Fingerprinting Probing Activities. ARES 2013: 21-30 - [c130]Andrei Soeanu, Sujoy Ray, Mourad Debbabi, Mohamad Allouche, Jean Berger:
Gossiping Based Distributed Plan Monitoring. ANT/SEIT 2013: 72-79 - [c129]Amine Boukhtouta, Nour-Eddine Lakhdari, Serguei A. Mokhov, Mourad Debbabi:
Towards Fingerprinting Malicious Traffic. ANT/SEIT 2013: 548-555 - [c128]Yosr Jarraya, Sujoy Ray, Andrei Soeanu, Mourad Debbabi, Mohamad Allouche, Jean Berger:
Towards a Distributed Plan Execution Monitoring Framework. ANT/SEIT 2013: 1034-1039 - [c127]Samira Barouti, Dima Alhadidi, Mourad Debbabi:
Symmetrically-Private Database Search in Cloud Computing. CloudCom (1) 2013: 671-678 - [c126]Wen Ming Liu, Lingyu Wang, Kui Ren, Mourad Debbabi:
Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications. CloudCom (1) 2013: 679-686 - [c125]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
A formal verification framework for Bluespec System Verilog. FDL 2013: 1-7 - [c124]Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi:
On the Reverse Engineering of the Citadel Botnet. FPS 2013: 408-425 - [c123]Feras Aljumah, Raymond Hei Man Leung, Makan Pourzandi, Mourad Debbabi:
Emergency Mobile Access to Personal Health Records Stored on an Untrusted Cloud. HIS 2013: 30-41 - [c122]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
On detecting and clustering distributed cyber scanning. IWCMC 2013: 926-933 - [c121]Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
Towards a Forecasting Model for Distributed Denial of Service Activities. NCA 2013: 110-117 - [c120]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
A probabilistic verification framework of SysML activity diagrams. SoMeT 2013: 165-170 - [c119]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
A Security Risk Assessment Framework for SysML Activity Diagrams. SERE 2013: 227-236 - [c118]Djedjiga Mouheb, Raha Ziarati, Mourad Debbabi:
Aspect-Oriented Semantic Framework for Executable Models. TASE 2013: 63-70 - [i5]Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
Fingerprinting Internet DNS Amplification DDoS Activities. CoRR abs/1310.4216 (2013) - 2012
- [j41]Samir Ouchani, Yosr Jarraya, Otmane Aït Mohamed, Mourad Debbabi:
Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols. J. Softw. 7(7): 1488-1495 (2012) - [c117]Swagata Das, Makan Pourzandi, Mourad Debbabi:
On SPIM detection in LTE networks. CCECE 2012: 1-4 - [c116]Andrei Soeanu, Sujoy Ray, Mourad Debbabi, Jean Berger, Abdeslem Boukhtouta, Ahmed Ghanmi:
Model checking based service delivery planning. CCECE 2012: 1-4 - [c115]Claude Fachkha, Elias Bou-Harb, Amine Boukhtouta, Son Dinh, Farkhund Iqbal, Mourad Debbabi:
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation. CRiSIS 2012: 1-8 - [c114]Yosr Jarraya, Arash Eghtesadi, Mourad Debbabi, Ying Zhang, Makan Pourzandi:
Cloud calculus: Security verification in elastic cloud computing platform. CTS 2012: 447-454 - [c113]Ashkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi:
RESource: A Framework for Online Matching of Assembly with Open Source Code. FPS 2012: 211-226 - [c112]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks. ICC 2012: 982-987 - [c111]Andrei Soeanu, Sujoy Ray, Mourad Debbabi, Jean Berger, Abdeslem Boukhtouta:
A Learning Based Evolutionary Algorithm For Distributed Multi-Depot VRP. KES 2012: 49-58 - [c110]Wen Ming Liu, Lingyu Wang, Kui Ren, Pengsu Cheng, Mourad Debbabi:
k-Indistinguishable Traffic Padding in Web Applications. Privacy Enhancing Technologies 2012: 79-99 - [c109]Dima Alhadidi, Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi:
Secure Distributed Framework for Achieving ε-Differential Privacy. Privacy Enhancing Technologies 2012: 120-139 - [c108]Mohamed Mostafa Saleh, Andrei Soeanu, Sujoy Ray, Mourad Debbabi, Jean Berger, Abdeslem Boukhtouta:
Mechanism design for decentralized vehicle routing problem. SAC 2012: 749-754 - [c107]Hanane Houmani, Mourad Debbabi:
Formal Analysis of the TLS Handshake Protocol. SECRYPT 2012: 192-205 - [c106]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
Efficient Probabilistic Abstraction for SysML Activity Diagrams. SEFM 2012: 263-277 - [c105]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
A Probabilistic Verification Framework for SysML Activity Diagrams. SoMeT 2012: 108-123 - [c104]Djedjiga Mouheb, Raha Ziarati, Mourad Debbabi:
Continuation/Frame-based Semantics for Aspect Matching and Weaving. SoMeT 2012: 146-161 - [c103]Yosr Jarraya, Arash Eghtesadi, Mourad Debbabi, Ying Zhang, Makan Pourzandi:
Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud. SSS 2012: 111-125 - [c102]Yosr Jarraya, Mourad Debbabi:
Formal Specification and Probabilistic Verification of SysML Activity Diagrams. TASE 2012: 17-24 - [c101]Farkhund Iqbal, Benjamin C. M. Fung, Mourad Debbabi:
Mining Criminal Networks from Chat Log. Web Intelligence 2012: 332-337 - [i4]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi, Yankui Sun:
MARFCAT: Transitioning to Binary and Larger Data Sets of SATE IV. CoRR abs/1207.3718 (2012) - 2011
- [j40]Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Trans. Dependable Secur. Comput. 8(1): 89-103 (2011) - [j39]Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi:
Anonymity meets game theory: secure data integration with malicious participants. VLDB J. 20(4): 567-588 (2011) - [c100]Andrei Soeanu, Sujoy Ray, Mourad Debbabi, Jean Berger, Abdeslem Boukhtouta, Ahmed Ghanmi:
A decentralized heuristic for multi-depot split-delivery vehicle routing problem. ICAL 2011: 70-75 - [c99]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid. ICDF2C 2011: 282-296 - [c98]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY. PST 2011: 120-123 - [c97]Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Mourad Debbabi:
Privacy-preserving traffic padding in web-based applications. WPES 2011: 131-136 - 2010
- [b1]Mourad Debbabi, Fawzi Hassaïne, Yosr Jarraya, Andrei Soeanu, Luay Alawneh:
Verification and Validation in Systems Engineering - Assessing UML / SysML Design Models. Springer 2010, ISBN 978-3-642-15227-6, pp. I-XXVI, 1-248 - [j38]Farkhund Iqbal, Hamad Binsalleeh, Benjamin C. M. Fung, Mourad Debbabi:
Mining writeprints from anonymous e-mails for forensic investigation. Digit. Investig. 7(1-2): 56-64 (2010) - [j37]Robert Charpentier, Mourad Debbabi, Dima Alhadidi, Azzam Mourad, Nadia Belblidia, Amine Boukhtouta, Aiman Hanna, Rachid Hadjidj, Hakim Idrissi Kaitouni, Marc-André Laverdière, Hai Zhou Ling, Syrine Tlili, Xiaochun Yang, Zhenrong Yang:
Security Evaluation and Hardening of Free and Open Source Software (FOSS). Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 33 (2010) - [j36]Mohamed Mostafa Saleh, Mourad Debbabi:
A game-theoretic framework for specification and verification of cryptographic protocols. Formal Aspects Comput. 22(5): 585-609 (2010) - [j35]Abderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi:
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs. Mob. Networks Appl. 15(2): 191-204 (2010) - [j34]Bo Zhu, Kui Ren, Lingyu Wang, Mourad Debbabi:
PCM: a privacy-preserving detection mechanism in mobile ad hoc networks. Secur. Commun. Networks 3(2-3): 167-184 (2010) - [c96]Serguei A. Mokhov, Emil Vassev, Joey Paquet, Mourad Debbabi:
Towards a self-forensics property in the ASSL toolset. C3S2E 2010: 108-113 - [c95]Mariam Nouh, Raha Ziarati, Djedjiga Mouheb, Dima Alhadidi, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect weaver: a model transformation approach for UML models. CASCON 2010: 139-153 - [c94]Prosenjit Sinha, Amine Boukhtouta, Victor Heber Belarde, Mourad Debbabi:
Insights from the analysis of the Mariposa botnet. CRiSIS 2010: 1-9 - [c93]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework. FACS 2010: 182-199 - [c92]Hamad Binsalleeh, Thomas C. Ormerod, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi, Lingyu Wang:
On the analysis of the Zeus botnet crimeware toolkit. PST 2010: 31-38 - [c91]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. RAID 2010: 508-509 - [c90]Farkhund Iqbal, Liaquat A. Khan, Benjamin C. M. Fung, Mourad Debbabi:
e-mail authorship verification for forensic investigation. SAC 2010: 1591-1598 - [c89]Thomas C. Ormerod, Lingyu Wang, Mourad Debbabi, Amr M. Youssef, Hamad Binsalleeh, Amine Boukhtouta, Prosenjit Sinha:
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. SECURWARE 2010: 195-200 - [c88]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi, Makan Pourzandi:
Verification of the Correctness in Composed UML Behavioural Diagrams. SERA (selected papers) 2010: 163-177 - [c87]Djedjiga Mouheb, Chamseddine Talhi, Mariam Nouh, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. SERA (selected papers) 2010: 197-213 - [i3]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY. CoRR abs/1009.5423 (2010)
2000 – 2009
- 2009
- [j33]Dima Alhadidi, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya:
lambda_SAOP: A Security AOP Calculus. Comput. J. 52(7): 824-849 (2009) - [j32]Azzam Mourad, Andrei Soeanu, Marc-André Laverdière, Mourad Debbabi:
New aspect-oriented constructs for security hardening concerns. Comput. Secur. 28(6): 341-358 (2009) - [j31]Rachid Hadjidj, Mourad Debbabi, Hakim Lounis, Farkhund Iqbal, Adam Szporer, Djamel Benredjem:
Towards an integrated e-mail forensic analysis framework. Digit. Investig. 5(3-4): 124-137 (2009) - [j30]Seyed Mahmood Hejazi, Chamseddine Talhi, Mourad Debbabi:
Extraction of forensically sensitive information from windows physical memory. Digit. Investig. 6(Supplement): S121-S131 (2009) - [j29]Hassan Issa, Chadi Assi, Mourad Debbabi, Sujoy Ray:
QoS-aware middleware for web services composition: a qualitative approach. Enterp. Inf. Syst. 3(4): 449-470 (2009) - [j28]Yosr Jarraya, Andrei Soeanu, Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne:
Synergistic verification and validation of systems and software engineering models. Int. J. Gen. Syst. 38(7): 719-746 (2009) - [j27]Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi:
Capturing Returned Computable Values in AspectJ for Security Hardening. Inf. Secur. J. A Glob. Perspect. 18(2): 87-98 (2009) - [j26]Syrine Tlili, Mourad Debbabi:
Interprocedural and Flow-Sensitive Type Analysis for Memory and Type Safety of C Code. J. Autom. Reason. 42(2-4): 265-300 (2009) - [j25]Chamseddine Talhi, Djedjiga Mouheb, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Usability of Security Specification Approaches for UML Design: A Survey. J. Object Technol. 8(6): 102-122 (2009) - [j24]Azzam Mourad, Marc-André Laverdière, Andrei Soeanu, Mourad Debbabi:
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité. Tech. Sci. Informatiques 28(5): 611-644 (2009) - [c86]Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi:
A Practical Framework for the Dataflow Pointcut in AspectJ. ARES 2009: 835-840 - [c85]Djedjiga Mouheb, Chamseddine Talhi, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Weaving security aspects into UML 2.0 design models. AOM@AOSD 2009: 7-12 - [c84]Dima Alhadidi, Amine Boukhtouta, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya:
The dataflow pointcut: a formal and practical framework. AOSD 2009: 15-26 - [c83]Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi:
Walking in the crowd: anonymizing trajectory data for pattern analysis. CIKM 2009: 1441-1444 - [c82]Yosr Jarraya, Mourad Debbabi, Jamal Bentahar:
On the Meaning of SysML Activity Diagrams. ECBS 2009: 95-105 - [c81]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid (abstract). HSC 2009: 45 - [c80]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid. HSC 2009: 326-333 - [c79]Aiman Hanna, Hai Zhou Ling, Xiaochun Yang, Mourad Debbabi:
A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities. OTM Conferences (2) 2009: 815-832 - [c78]Syrine Tlili, Xiaochun Yang, Rachid Hadjidj, Mourad Debbabi:
Verification of CERT Secure Coding Rules: Case Studies. OTM Conferences (2) 2009: 913-930 - [c77]Djedjiga Mouheb, Chamseddine Talhi, Azzam Mourad, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222 - [c76]Vitor Lima, Chamseddine Talhi, Djedjiga Mouheb, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. SSV 2009: 143-160 - [i2]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid. CoRR abs/0906.0049 (2009) - [i1]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
Reasoning About an ACME Printer Case Investigation with Forensic Lucid. CoRR abs/0906.5181 (2009) - 2008
- [j23]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31(4): 708-721 (2008) - [j22]Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad Debbabi, Prabir Bhattacharya:
Game theoretic models for detecting network intrusions. Comput. Commun. 31(10): 1934-1944 (2008) - [j21]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
An aspect-oriented approach for the systematic security hardening of code. Comput. Secur. 27(3-4): 101-114 (2008) - [j20]Farkhund Iqbal, Rachid Hadjidj, Benjamin C. M. Fung, Mourad Debbabi:
A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit. Investig. 5(Supplement): S42-S51 (2008) - [j19]Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi:
Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2-4): 158-184 (2008) - [j18]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A High-level Aspect-oriented-based Framework for Software Security Hardening. Inf. Secur. J. A Glob. Perspect. 17(2): 56-74 (2008) - [j17]Dima Alhadidi, Mourad Debbabi, Prabir Bhattacharya:
New AspectJ Pointcuts for Integer Overflow and Underflow Detection. Inf. Secur. J. A Glob. Perspect. 17(5&6): 278-287 (2008) - [j16]Seyed Mahmood Hejazi, Mourad Debbabi, Chamseddine Talhi:
Automated Windows Memory File Extraction for Cyber Forensics Investigation. J. Digit. Forensic Pract. 2(3): 117-131 (2008) - [c75]Syrine Tlili, Mourad Debbabi:
Type and Effect Annotations for Safe Memory Access in C. ARES 2008: 302-309 - [c74]Syrine Tlili, Mourad Debbabi:
A novel flow-sensitive type and effect analysis for securing C code. AICCSA 2008: 661-668 - [c73]Syrine Tlili, Zhenrong Yang, Hai Zhou Ling, Mourad Debbabi:
A Hybrid Approach for Safe Memory Management in C. AMAST 2008: 377-391 - [c72]Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad Debbabi:
Towards Automation of Testing High-Level Security Properties. DBSec 2008: 268-282 - [c71]Serguei A. Mokhov, Mourad Debbabi:
File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis. IMF 2008: 73-85 - [c70]Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid. IMF 2008: 197-216 - [c69]Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi:
A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 - [c68]Azzam Mourad, Dima Alhadidi, Mourad Debbabi:
Cross-Language Weaving Approach Targeting Software Security Hardening. PST 2008: 87-98 - [c67]Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi:
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. PST 2008: 133-142 - [c66]Aiman Hanna, Hai Zhou Ling, Jason Furlong, Zhenrong Yang, Mourad Debbabi:
Targeting Security Vulnerabilities: From Specification to Detection (Short Paper). QSIC 2008: 97-102 - [c65]Azzam Mourad, Dima Alhadidi, Mourad Debbabi:
Towards Language-Independent Approach for Security Concerns Weaving. SECRYPT 2008: 460-465 - [c64]Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821 - [c63]Abderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi:
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. WiMob 2008: 417-422 - [c62]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612 - [r2]Chadi Assi, Prabir Bhattacharya, Mourad Debbabi, Mona Mehrandish, Hadi Otrok:
Mobile Security: Game Theory. Encyclopedia of Wireless and Mobile Communications 2008 - [r1]Mourad Debbabi, Marc-André Laverdière, Azzam Mourad, Syrine Tlili:
Wireless Applications: Middleware Security. Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- [j15]Ali Reza Arasteh, Mourad Debbabi, Assaad Sakha, Mohamed Mostafa Saleh:
Analyzing multiple logs for forensic evidence. Digit. Investig. 4(Supplement): 82-91 (2007) - [j14]Ali Reza Arasteh, Mourad Debbabi:
Forensic memory analysis: From stack and code to execution history. Digit. Investig. 4(Supplement): 114-125 (2007) - [j13]Nadia Belblidia, Mourad Debbabi:
A Dynamic Operational Semantics for JVML. J. Object Technol. 6(3): 71-100 (2007) - [j12]Mourad Debbabi, M. Fourati:
A Formal Type System for Java. J. Object Technol. 6(8): 117-184 (2007) - [j11]Ali Benssam, Jean Berger, Abdeslem Boukhtouta, Mourad Debbabi, Sujoy Ray, Abderrazak Sahi:
What middleware for network centric operations? Knowl. Based Syst. 20(3): 255-265 (2007) - [j10]Mohamed Mostafa Saleh, Ali Reza Arasteh, Assaad Sakha, Mourad Debbabi:
Forensic analysis of logs: Modeling and verification. Knowl. Based Syst. 20(7): 671-682 (2007) - [c61]Zhenrong Yang, Aiman Hanna, Mourad Debbabi:
Team Edit Automata for Testing Security Property. IAS 2007: 235-240 - [c60]Mohamed Mostafa Saleh, Mourad Debbabi:
Modeling Security Protocols as Games. IAS 2007: 253-260 - [c59]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
Towards an Aspect Oriented Approach for the Security Hardening of Code. AINA Workshops (1) 2007: 595-600 - [c58]Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya:
Testing Intrusion Detection Systems in MANET: A Comprehensive Study. CNSR 2007: 364-371 - [c57]Yosr Jarraya, Andrei Soeanu, Mourad Debbabi, Fawzi Hassaïne:
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams. ECBS 2007: 515-522 - [c56]Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya:
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks. ICDCS Workshops 2007: 86 - [c55]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A Security Hardening Language Based on Aspect-Orientation. ICETE (Selected Papers) 2007: 254-266 - [c54]Marc-André Laverdière, Azzam Mourad, Andrei Soeanu, Mourad Debbabi:
Control Flow Based Pointcuts for Security Hardening Concerns. IFIPTM 2007: 301-316 - [c53]Hamdi Yahyaoui, Mourad Debbabi, Nadia Tawbi:
A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL. QSIC 2007: 348-355 - [c52]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A High-Level Aspect-Oriented based Language for Software Security Hardening. SECRYPT 2007: 363-370 - [c51]Dima Alhadidi, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya:
An AOP Extended Lambda-Calculus. SEFM 2007: 183-194 - [c50]Mohamed Mostafa Saleh, Mourad Debbabi:
Verifying Security Properties of Cryptoprotocols: A Novel Approach. SEFM 2007: 349-360 - [c49]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. WOSIS 2007: 123-130 - [c48]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
An Efficient and Truthful Leader IDS Election Mechanism for MANET. WiMob 2007: 78 - 2006
- [j9]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Security Evaluation of J2ME CLDC Embedded Java Platform. J. Object Technol. 5(2): 125-154 (2006) - [j8]Mourad Debbabi, Abdelouahed Gherbi, Azzam Mourad, Hamdi Yahyaoui:
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors. Sci. Comput. Program. 59(1-2): 38-63 (2006) - [c47]Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne, Andrei Soeanu:
On the verification and validation of uml structural and behavioral diagrams. ACST 2006: 304-309 - [c46]Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi:
A Survey of Secure B2C Commerce for Multicast Services. CCECE 2006: 288-293 - [c45]Nadia Belblidia, Mourad Debbabi, Aiman Hanna, Zhenrong Yang:
AOP Extension for Security Testing of Programs. CCECE 2006: 647-650 - [c44]Marc-André Laverdière, Azzam Mourad, Aiman Hanna, Mourad Debbabi:
Security Design Patterns: Survey and Evaluation. CCECE 2006: 1605-1608 - [c43]Anil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood:
Secure E-commerce Protection Profile. Security and Management 2006: 279-285 - [c42]Luay Alawneh, Mourad Debbabi, Yosr Jarraya, Andrei Soeanu, Fawzi Hassaïne:
A Unified Approach for Verification and Validation of Systems and Software Engineering Models. ECBS 2006: 409-418 - [c41]Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya:
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario. GLOBECOM 2006 - [c40]Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne, Yosr Jarraya, Payam Shahi, Andrei Soeanu:
Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models. IASTED Conf. on Software Engineering 2006: 282-287 - [c39]Mona Mehrandish, Chadi M. Assi, Mourad Debbabi:
A Game Theoretic Model to Handle Network Intrusions over Multiple Packets. ICC 2006: 2189-2194 - [c38]Hassan Issa, Chadi Assi, Mourad Debbabi:
QoS-Aware Middleware for Web Services Composition - A Qualitative Approach. ISCC 2006: 359-364 - [c37]Nadia Belblidia, Mourad Debbabi:
Towards a Formal Semantics for AspectJ Weaving. JMLC 2006: 155-171 - [c36]Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi:
Execution monitoring enforcement for limited-memory systems. PST 2006: 38 - [c35]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
Security hardening of open source software. PST 2006: 43 - [c34]Dima Alhadidi, Nadia Belblidia, Mourad Debbabi:
Security crosscutting concerns and AspectJ. PST 2006: 45 - [c33]Nadia Belblidia, Mourad Debbabi:
Formalizing AspectJ Weaving for Static Pointcuts. SEFM 2006: 50-59 - [c32]Ali Reza Arasteh, Mourad Debbabi, Assaad Sakha:
A Formal Approach for the Forensic Analysis of Logs. SoMeT 2006: 159-176 - [c31]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Common Criteria Approach to J2ME CLDC Security Requirements. SoMeT 2006: 177-194 - [c30]Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi:
Secure E-Commerce Transactions for Multicast Services. CEC/EEE 2006: 18 - 2005
- [j7]Mourad Debbabi, Azzam Mourad, Chamseddine Talhi, Hamdi Yahyaoui:
Accelerating embedded Java for mobile devices. IEEE Commun. Mag. 43(9): 80-85 (2005) - [j6]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi:
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. J. Object Technol. 4(1): 83-108 (2005) - [c29]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Java for Mobile Devices: A Security Study. ACSAC 2005: 235-244 - [c28]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Security Analysis of Mobile Java. DEXA Workshops 2005: 231-235 - [c27]Mourad Debbabi, Mohamed Mostafa Saleh:
Game Semantics Model for Security Protocols. ICFEM 2005: 125-140 - [c26]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Security Analysis of Wireless Java. PST 2005 - [c25]Mourad Debbabi, Azzam Mourad, Nadia Tawbi:
Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. SAC 2005: 874-878 - 2004
- [c24]Mourad Debbabi, Mahfuzur Rahman:
The war of presence and instant messaging: right protocols and APIs. CCNC 2004: 341-346 - [c23]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua:
A dynamic compiler for embedded Java virtual machines. PPPJ 2004: 100-106 - [c22]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua:
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines. PPPJ 2004: 107-113 - 2003
- [j5]Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell:
Security by typing. Int. J. Softw. Tools Technol. Transf. 4(4): 472-495 (2003) - [j4]Kamel Adi, Mourad Debbabi, Mohamed Mejri:
A new logic for electronic commerce protocols. Theor. Comput. Sci. 291(3): 223-283 (2003) - [c21]Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua:
Method Call Acceleration in Embedded Java Virtual Machines. International Conference on Computational Science 2003: 750-759 - [c20]Mourad Debbabi, Mohamed Mejri:
Towards the Correctness of Security Protocols. MFPS 2003: 55-98 - 2002
- [c19]Mourad Debbabi, Josée Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi:
Secure Self-certified Code for Java. FASec 2002: 133-151 - 2001
- [c18]Kamel Adi, Mourad Debbabi:
Abstract interpretation for proving secrecy properties in security protocols. LACPV@CAV 2001: 25-50 - 2000
- [j3]Stephane Doyon, Mourad Debbabi:
On object initialization in the Java bytecode. Comput. Commun. 23(17): 1594-1605 (2000) - [c17]Kamel Adi, Mourad Debbabi, Mohamed Mejri:
A New Logic for Electronic Commerce Protocols. AMAST 2000: 499-513 - [c16]Mourad Debbabi, M. Fourati:
Sur la sémantique statique de Java. LMO 2000: 167-182 - [c15]Stephane Doyon, Mourad Debbabi:
Verifying Object Initialization in the Java Bytecode Language. SAC (2) 2000: 821-830 - [c14]Mourad Debbabi, E. Giasson, Béchir Ktari, Frédéric Michaud, Nadia Tawbi:
Secure Self-Certified COTS. WETICE 2000: 183-188 - [c13]Frédéric Painchaud, Mourad Debbabi:
On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier. WETICE 2000: 189-194
1990 – 1999
- 1999
- [c12]Yahya Y. Al-Salqan, Nahid Shahmehri, Wu Wen, Mourad Debbabi:
Final Summary Report on Enterprise Security. WETICE 1999: 134 - [c11]J. Bergeron, Mourad Debbabi, M. M. Erhioui, Béchir Ktari:
Static Analysis of Binary Code to Isolate Malicious Behaviors. WETICE 1999: 184-189 - 1998
- [c10]Mourad Debbabi, Y. Legaré, Mohamed Mejri:
An Environment for the Specification and Analysis of Cryptoprotocols. ACSAC 1998: 321-332 - [c9]Mourad Debbabi, Abdelkader Benzakour, Béchir Ktari:
A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes. AMAST 1998: 214-230 - 1997
- [j2]Mourad Debbabi, Zahia Aïdoud, Ali Faour:
On the Inference od Structured Recursive Effects with Subtyping. J. Funct. Log. Program. 1997(5) (1997) - [j1]Mourad Debbabi:
A Model-Based Concurrent Specification Language Over CML: Semantic Foundations. Parallel Process. Lett. 7(3): 329-356 (1997) - [c8]Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi:
Formal Automatic Verification of Authentication Crytographic Protocols. ICFEM 1997: 50-59 - [c7]Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi:
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. WETICE 1997: 256-262 - 1996
- [c6]Mourad Debbabi, Ali Faour, Nadia Tawbi:
A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs. Implementation of Functional Languages 1996: 247-266 - 1995
- [c5]Mourad Debbabi:
A Concurrent, Specification Language over CML. PDPTA 1995: 541-550 - 1994
- [c4]Dominique Bolignano, Mourad Debbabi:
A Semantic Theory for Concurrent ML. TACS 1994: 766-785 - 1993
- [c3]Dominique Bolignano, Mourad Debbabi:
A Coherent Type System for a Concurrent, Functional and Imperative Programming Language. AMAST 1993: 153-162 - [c2]Dominique Bolignano, Mourad Debbabi:
A Denotational Model for the Integration of Concurrent, Functional, and Imperative Programming. ICCI 1993: 244-250 - 1992
- [c1]Dominique Bolignano, Mourad Debbabi:
Higher Order Communication Processes with Value-Passing, Assignment and Return of Results. ISAAC 1992: 319-331
Coauthor Index
aka: Chadi M. Assi
aka: Ribal F. Atallah
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint