Research Publications

 

I have authored, together with my students and collaborators, more than 250 research publications (books, book chapters, articles in refereed international journals and papers in refereed international conferences and workshops).

 

2 Books

  1. D Mouheb, M Debbabi, M Pourzandi, L Wang, M Nouh, R Ziarati, D Alhadidi, C Talhi and V Lima. Aspect-Oriented Security Hardening of UML Design Models. Springer International Publishing, ISBN: 978-3-319-16105-1, 2015. BibTeX

    @book{DBLP:books/daglib/10257366,
    	author = "D. Mouheb and M. Debbabi and M. Pourzandi and L. Wang and M. Nouh and R. Ziarati and D. Alhadidi and C. Talhi and V. Lima",
    	title = "Aspect-Oriented Security Hardening of UML Design Models",
    	publisher = "Springer International Publishing",
    	year = 2015,
    	isbn = "978-3-319-16105-1",
    	pages = "1--237"
    }
    
  2. Mourad Debbabi, Fawzi Hassaine, Yosr Jarraya, Andrei Soeanu and Luay Alawneh. Verification and Validation in Systems Engineering - Assessing UML / SysML Design Models. Springer, ISBN: 978-3-642-15227-6, 2010. BibTeX

    @book{DBLP:books/daglib/1025738,
    	author = "Mourad Debbabi and Fawzi Hassaine and Yosr Jarraya and Andrei Soeanu and Luay Alawneh",
    	title = "Verification and Validation in Systems Engineering - Assessing UML / SysML Design Models",
    	publisher = "Springer",
    	year = 2010,
    	isbn = "978-3-642-15227-6",
    	pages = "1--248"
    }
    
  3. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi and Sami Zhioua. Embedded Java Security. Springer, ISBN: 978-1-84628-590-5, 2007. BibTeX

    @book{DBLP:books/daglib/0025738,
    	author = "Mourad Debbabi and Mohamed Saleh and Chamseddine Talhi and Sami Zhioua",
    	title = "Embedded Java Security",
    	publisher = "Springer",
    	year = 2007,
    	isbn = "978-1-84628-590-5",
    	pages = "1--243"
    }
    
  4. Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro and Nur Zincir Heywood. Foundations and Practice of Security: Proceedings of the Sixth International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers, LNCS Volume 8352. Springer, ISBN: 978-3-319-05301-1, 2014. BibTeX

    @book{DBLP:books/daglib/0025731,
    	author = "Jean Luc Danger and Mourad Debbabi and Jean-Yves Marion and Joaquin Garcia-Alfaro and Nur Zincir Heywood",
    	title = "Foundations and Practice of Security: Proceedings of the Sixth International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers, LNCS Volume 8352",
    	publisher = "Springer",
    	year = 2014,
    	isbn = "978-3-319-05301-1",
    	pages = "1--444"
    }
    

 

aomsec  fpslncs  vvse  javame 

 

2 Articles Published in Refereed International Journals

  1. Assi C S. Torabi A. Boukhtouta and M Debbabi. Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems. IEEE Communications Surveys and Tutorials, IEEE, June 2018. Accepted for Publication (To Appear). BibTeX

    @article{982541782765,
    	author = "S. Torabi, A. Boukhtouta, C. Assi, and M. Debbabi",
    	title = "Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems",
    	journal = "IEEE Communications Surveys and Tutorials",
    	publisher = "IEEE",
    	year = 2018,
    	month = "June",
    	note = "Accepted for Publication (To Appear)"
    }
    
  2. Berger J A. Soeanu S. Ray and M Debbabi. Efficient sensor network management for asset localization. Computers and Operations Research 99:148–165, Elsevier, November 2018. BibTeX

    @article{772541782765,
    	author = "A. Soeanu, S. Ray, J. Berger, and M. Debbabi",
    	title = "Efficient sensor network management for asset localization",
    	journal = "Computers and Operations Research",
    	publisher = "Elsevier",
    	year = 2018,
    	month = "November",
    	volume = 99,
    	pages = "148--165"
    }
    
  3. Derhab A E. B. Karbab M. Debbabi and D Mouheb. MalDozer: Automatic framework for android malware detection using deep learning. Digital Investigation 24:48–59, Elsevier, March 2018. BibTeX

    @article{766541782763,
    	author = "E. B. Karbab, M. Debbabi, A. Derhab, and D. Mouheb",
    	title = "MalDozer: Automatic framework for android malware detection using deep learning",
    	journal = "Digital Investigation",
    	publisher = "Elsevier",
    	year = 2018,
    	month = "March",
    	volume = 24,
    	pages = "48--59"
    }
    
  4. E. Bou-Harb C. Assi and M Debbabi. E. Bou-Harb, C. Assi, and M. Debbabi. IEEE Transactions on Dependable and Secure Computing 15(3} pages ={364–377), IEEE Press, May 2018. BibTeX

    @article{655541782753,
    	author = "E. Bou-Harb, C. Assi, and M. Debbabi",
    	title = "E. Bou-Harb, C. Assi, and M. Debbabi",
    	journal = "IEEE Transactions on Dependable and Secure Computing",
    	publisher = "IEEE Press",
    	year = 2018,
    	month = "May",
    	volume = 15,
    	number = "3} pages ={364--377"
    }
    
  5. Wang Jarraya Pourzandi Wang Y Y M L S. Majumdar T. Madi and M Debbabi. User-Level Runtime Security Auditing for the Cloud. IEEE Transactions on Information Forensics and Security 13(5} pages ={1185–1199), IEEE Press, May 2018. BibTeX

    @article{544441772753,
    	author = "S. Majumdar, T. Madi, Y. Wang, Y. Jarraya, M. Pourzandi, L. Wang, and M. Debbabi",
    	title = "User-Level Runtime Security Auditing for the Cloud",
    	journal = "IEEE Transactions on Information Forensics and Security",
    	publisher = "IEEE Press",
    	year = 2018,
    	month = "May",
    	volume = 13,
    	number = "5} pages ={1185--1199"
    }
    
  6. R. Kateb C. Assi and M Debbabi. Enhancing WAMS Communication Network Against Delay Attacks. IEEE Transactions on Smart Grid, IEEE Press, February 2018. Accepted for Publication (to appear). BibTeX

    @article{433331772753,
    	author = "R. Kateb, C. Assi, and M. Debbabi",
    	title = "Enhancing WAMS Communication Network Against Delay Attacks",
    	journal = "IEEE Transactions on Smart Grid",
    	publisher = "IEEE Press",
    	year = 2018,
    	month = "February",
    	note = "Accepted for Publication (to appear)"
    }
    
  7. Wang L S. Alrabaee P. Shirani and M Debbabi. FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. ACM Transactions on Privacy and Security 21(2):8:1–8:34, ACM Press, 2018. BibTeX

    @article{57771772752,
    	author = "S. Alrabaee, P. Shirani, L. Wang, and M. Debbabi",
    	title = "FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries",
    	journal = "ACM Transactions on Privacy and Security",
    	publisher = "ACM Press",
    	year = 2018,
    	volume = 21,
    	number = 2,
    	pages = "8:1--8:34"
    }
    
  8. Debbabi M Moussa P. Akaber and C Assi. Critical Links Identification for Selective Outages in Interdependent Power-Communication Networks. IEEE Transactions on Industrial Informatics 14(2):472–483, IEEE Press, 2018. BibTeX

    @article{322431772753,
    	author = "Moussa, P. Akaber, M. Debbabi, and C. Assi",
    	title = "Critical Links Identification for Selective Outages in Interdependent Power-Communication Networks",
    	journal = "IEEE Transactions on Industrial Informatics",
    	publisher = "IEEE Press",
    	year = 2018,
    	volume = 14,
    	number = 2,
    	pages = "472--483"
    }
    
  9. R Kateb, M Tushar, C Assi and M Debbabi. Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement Systems. IEEE Transactions on Smart Grid 9(1):25–34, IEEE Press, 2018. BibTeX

    @article{2315237889,
    	author = "R. Kateb and M. Tushar and C. Assi and M. Debbabi",
    	title = "Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement Systems",
    	journal = "IEEE Transactions on Smart Grid",
    	publisher = "IEEE Press",
    	year = 2018,
    	volume = 9,
    	number = 1,
    	pages = "25--34"
    }
    
  10. Debbabi M E. Bou-Harb M. Husak and C Assi. Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Transactions on Big Data, IEEE, 2018. Accepted for Publication (to appear). BibTeX

    @article{1328237889,
    	author = "E. Bou-Harb, M. Husak, M. Debbabi, and C. Assi",
    	title = "Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective",
    	journal = "IEEE Transactions on Big Data",
    	publisher = "IEEE",
    	year = 2018,
    	note = "Accepted for Publication (to appear)"
    }
    
  11. Assi C E. Bou-Harb M. Debbabi. Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns. IEEE Network 31(1):18–26, IEEE Press, 2017. BibTeX

    @article{1325439887,
    	author = "E. Bou-Harb, M. Debbabi, C. Assi",
    	title = "Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns",
    	journal = "IEEE Network",
    	publisher = "IEEE Press",
    	year = 2017,
    	volume = 31,
    	number = 1,
    	pages = "18--26"
    }
    
  12. Feras Aljumah Makan Pourzandi and Mourad Debbabi. Privacy-Preserving Querying on Privately Encrypted Data in the Cloud. Transactions on Large-Scale Data and Knowledge-Centered Systems 35:50–73, 2017. BibTeX

    @article{9325739887,
    	author = "Feras Aljumah, Makan Pourzandi, and Mourad Debbabi",
    	title = "Privacy-Preserving Querying on Privately Encrypted Data in the Cloud",
    	journal = "Transactions on Large-Scale Data and Knowledge-Centered Systems",
    	volume = 35,
    	pages = "50--73",
    	year = 2017
    }
    
  13. B Moussa, M Debbabi and C Assi. Security Assessment of Time Synchronization Mechanisms for the Smart Grid. IEEE Communications Surveys and Tutorials 18(3):1952–1973, IEEE Press, 2016. BibTeX

    @article{891541782765,
    	author = "B. Moussa and M. Debbabi and C. Assi",
    	title = "Security Assessment of Time Synchronization Mechanisms for the Smart Grid",
    	journal = "IEEE Communications Surveys and Tutorials",
    	publisher = "IEEE Press",
    	volume = 18,
    	number = 3,
    	pages = "1952--1973",
    	year = 2016
    }
    
  14. S Ray, M Debbabi, M Allouche, N Lechevin and M Belanger. Energy-Efficient Monitor Deployment in Collaborative Distributed Setting. IEEE Transactions on Industrial Informatics (1):112–123}, volume {12, IEEE, February 2016. BibTeX

    @article{47624178255,
    	author = "S. Ray and M. Debbabi and M. Allouche and N. Lechevin and M. Belanger",
    	title = "Energy-Efficient Monitor Deployment in Collaborative Distributed Setting",
    	journal = "IEEE Transactions on Industrial Informatics",
    	publisher = "IEEE",
    	pages = "112--123}, volume {12",
    	number = 1,
    	year = 2016,
    	month = "February"
    }
    
  15. E Bou-Harb, M Debbabi and C Assi. A Novel Cyber Security Capability: Inferring Internet-scale Infections by Correlating Malware and Probing Activities. Computer Networks 94:327Ð-343, Elsevier Science Publishers, January 2016. BibTeX

    @article{1771785288,
    	author = "E. Bou-Harb and M. Debbabi and C. Assi",
    	title = "A Novel Cyber Security Capability: Inferring Internet-scale Infections by Correlating Malware and Probing Activities",
    	journal = "Computer Networks",
    	publisher = "Elsevier Science Publishers",
    	year = 2016,
    	month = "January",
    	volume = 94,
    	pages = "327Ð-343"
    }
    
  16. C Fachkha and M Debbabi. Darknet as a Source of Cyber Intelligence: Survey, Taxonomy and Characterization. IEEE Communications Surveys and Tutorials 18(2):1197–1227, IEEE, 2016. BibTeX

    @article{669958255251,
    	author = "C. Fachkha and M. Debbabi",
    	title = "Darknet as a Source of Cyber Intelligence: Survey, Taxonomy and Characterization",
    	journal = "IEEE Communications Surveys and Tutorials",
    	publisher = "IEEE",
    	volume = 18,
    	number = 2,
    	pages = "1197--1227",
    	year = 2016
    }
    
  17. D Mouheb, D Alhadidi, M Nouh, M Debbabi, L Wang and M Pourzandi. Aspect-Oriented Modeling Framework for Security Hardening. Innovations in Systems and Software Engineering 12(1):41–67, Springer, March 2016. BibTeX

    @article{1715417825211,
    	author = "D. Mouheb and D. Alhadidi and M. Nouh and M. Debbabi and L. Wang and M. Pourzandi",
    	title = "Aspect-Oriented Modeling Framework for Security Hardening",
    	journal = "Innovations in Systems and Software Engineering",
    	volume = 12,
    	number = 1,
    	pages = "41--67",
    	publisher = "Springer",
    	year = 2016,
    	month = "March"
    }
    
  18. A Soeanu, M Debbabi, D Alhadidi, M Makkawi, M K Allouche, M Belanger and N Lechevin. Transportation risk analysis using probabilistic model checking. Expert Systems with Applications 42(9):4410–4421, Elsevier Science Publishers, June 2015. BibTeX

    @article{621542255261,
    	author = "A. Soeanu and M. Debbabi and D. Alhadidi and M. Makkawi and M. K. Allouche and M. Belanger and N. Lechevin",
    	title = "Transportation risk analysis using probabilistic model checking",
    	journal = "Expert Systems with Applications",
    	volume = 42,
    	number = 9,
    	pages = "4410--4421",
    	publisher = "Elsevier Science Publishers",
    	year = 2015,
    	month = "June"
    }
    
  19. Y Jarraya, A Eghtesadi, S Sadri, M Debbabi and M Pourzandi. Verification of Firewall Reconfiguration for Virtual Machines Migrations in the Cloud. Computer Networks 93, Part 3(24):480–491, Elsevier Science Publishers, December 2015. BibTeX

    @article{3215479255211,
    	author = "Y. Jarraya and A. Eghtesadi and S. Sadri and M. Debbabi and M. Pourzandi",
    	title = "Verification of Firewall Reconfiguration for Virtual Machines Migrations in the Cloud",
    	journal = "Computer Networks",
    	volume = "93, Part 3",
    	number = 24,
    	pages = "480--491",
    	publisher = "Elsevier Science Publishers",
    	year = 2015,
    	month = "December"
    }
    
  20. S H H Ding, B C M Fung and M Debbabi. A Visualizable Evidence-Driven Approach for Authorship Attribution. ACM Transactions on Information and System Security (TISSEC) 17(3):12:1-12:30, March 2015. BibTeX

    @article{1541787662124,
    	author = "S. H. H. Ding and B. C. M. Fung and M. Debbabi",
    	title = "A Visualizable Evidence-Driven Approach for Authorship Attribution",
    	journal = "ACM Transactions on Information and System Security (TISSEC)",
    	volume = 17,
    	number = 3,
    	articleno = 12,
    	pages = "12:1-12:30",
    	month = "March",
    	year = 2015
    }
    
  21. A Boukhetouta, S Mokhov, N Lakhdari, M Debbabi and J Paquet. Network Malware Classification Comparison Using DPI and Flow Packet Headers. International Journal of Computer Virology and Hacking Techniques 12(2):69–100, Springer, 2016. BibTeX

    @article{121541782552123,
    	author = "A. Boukhetouta and S. Mokhov and N. Lakhdari and M. Debbabi and J. Paquet",
    	title = "Network Malware Classification Comparison Using DPI and Flow Packet Headers",
    	journal = "International Journal of Computer Virology and Hacking Techniques",
    	publisher = "Springer",
    	volume = 12,
    	number = 2,
    	pages = "69--100",
    	year = 2016
    }
    
  22. C Fachkha, E Bou-Harb and M Debbabi. Inferring Distributed Reflection Denial of Service Attacks from Darknet. Computer Communications 62(C):59–71, Elsevier Science Publishers B. V., May 2015. BibTeX

    @article{831541792552123,
    	author = "C. Fachkha and E. Bou-Harb and M. Debbabi",
    	title = "Inferring Distributed Reflection Denial of Service Attacks from Darknet",
    	journal = "Computer Communications",
    	volume = 62,
    	number = "C",
    	month = "May",
    	year = 2015,
    	issn = "0140-3664",
    	pages = "59--71",
    	numpages = 13,
    	publisher = "Elsevier Science Publishers B. V."
    }
    
  23. S Ouchani and M Debbabi. Specification, Verification, and Quantification of Security in Model-Based Systems. Computing 97(7):691-711, Springer Vienna, 2015. DOI BibTeX

    @article{721541792552123,
    	author = "S. Ouchani and M. Debbabi",
    	title = "Specification, Verification, and Quantification of Security in Model-Based Systems",
    	journal = "Computing",
    	publisher = "Springer Vienna",
    	issn = "0010-485X",
    	volume = 97,
    	number = 7,
    	doi = "10.1007/s00607-015-0445-x",
    	pages = "691-711",
    	year = 2015
    }
    
  24. A Boukhtouta, D Mouheb, M Debbabi, O Alfandi, F Iqbal and El M Barachi. Graph-Theoretic Characterization of Cyber-threat Infrastructures. International Journal of Digital Investigation 14(1):S3–S15, Elsevier Science Publishers, August 2015. BibTeX

    @article{341141782552124,
    	author = "A. Boukhtouta and D. Mouheb and M. Debbabi and O. Alfandi and F. Iqbal and M. El Barachi",
    	title = "Graph-Theoretic Characterization of Cyber-threat Infrastructures",
    	journal = "International Journal of Digital Investigation",
    	publisher = "Elsevier Science Publishers",
    	volume = 14,
    	number = 1,
    	pages = "S3--S15",
    	year = 2015,
    	month = "August"
    }
    
  25. S Alrabaee, P Shirani, A Rahimian, L Wang and M Debbabi. BinComp: A Practical Approach to Compiler Provenance Attribution. International Journal of Digital Investigation 14(1):S146–S155, Elsevier Science Publishers, August 2015. BibTeX

    @article{561521782552124,
    	author = "S. Alrabaee and P. Shirani and A. Rahimian and L. Wang and M. Debbabi",
    	title = "BinComp: A Practical Approach to Compiler Provenance Attribution",
    	journal = "International Journal of Digital Investigation",
    	publisher = "Elsevier Science Publishers",
    	volume = 14,
    	number = 1,
    	pages = "S146--S155",
    	year = 2015,
    	month = "August"
    }
    
  26. M R Farhadi, B C M Fung, Y B Fung, P Charland, S Preda and M Debbabi. Scalable Code Clone Search for Malware Analysis. International Journal of Digital Investigation (DIIN): Special Issue on Big Data and Intelligent Data Analysis 15:46Ð-60, Elsevier Science Publishers, December 2015. BibTeX

    @article{111541782552124,
    	author = "M. R. Farhadi and B. C. M. Fung and Y. B. Fung and P. Charland and S. Preda and M. Debbabi",
    	title = "Scalable Code Clone Search for Malware Analysis",
    	journal = "International Journal of Digital Investigation (DIIN): Special Issue on Big Data and Intelligent Data Analysis",
    	volume = 15,
    	pages = "46Ð-60",
    	publisher = "Elsevier Science Publishers",
    	year = 2015,
    	month = "December"
    }
    
  27. S Dinh, T Azeb, F Fortin, D Mouheb and M Debbabi. Spam Campaign Detection, Analysis, and Investigation. International Journal of Digital Investigation 12:S12–S21, Elsevier Science Publishers, March 2015. BibTeX

    @article{2171139011128,
    	author = "S. Dinh and T. Azeb and F. Fortin and D. Mouheb and M. Debbabi",
    	title = "Spam Campaign Detection, Analysis, and Investigation",
    	journal = "International Journal of Digital Investigation",
    	volume = 12,
    	pages = "S12--S21",
    	month = "March",
    	year = 2015,
    	publisher = "Elsevier Science Publishers"
    }
    
  28. S Alrabaee, P Shirani, L Wang and M Debbabi. SIGMA: A Semantic Integrated Graph Matching Approach for Identifying Reused Functions in Binary Code. International Journal of Digital Investigation 12:S61–S71, Elsevier Science Publishers, March 2015. BibTeX

    @article{9186510021861,
    	author = "S. Alrabaee and P. Shirani and L. Wang and M. Debbabi",
    	title = "SIGMA: A Semantic Integrated Graph Matching Approach for Identifying Reused Functions in Binary Code",
    	journal = "International Journal of Digital Investigation",
    	volume = 12,
    	pages = "S61--S71",
    	month = "March",
    	year = 2015,
    	publisher = "Elsevier Science Publishers"
    }
    
  29. E Bou-Harb, N Lakhdari, H Binsalleeh and M Debbabi. Multidimensional Investigation of Source Port 0 Probing. International Journal of Digital Investigation 11(2):S114-S123, Elsevier Science Publishers, 2014. BibTeX

    @article{2420795121013,
    	author = "E. Bou-Harb and N. Lakhdari and H. Binsalleeh and M. Debbabi",
    	title = "Multidimensional Investigation of Source Port 0 Probing",
    	journal = "International Journal of Digital Investigation",
    	volume = 11,
    	number = 2,
    	year = 2014,
    	pages = "S114-S123",
    	publisher = "Elsevier Science Publishers"
    }
    
  30. Y Jarraya, L Madi and M Debbabi. A Survey and a Layered Taxonomy of Software-Defined Networking. IEEE Communications Surveys and Tutorials 16(4):1955–1980, IEEE, 2014. BibTeX

    @article{7240785122013,
    	author = "Y. Jarraya and L. Madi and M. Debbabi",
    	title = "A Survey and a Layered Taxonomy of Software-Defined Networking",
    	journal = "IEEE Communications Surveys and Tutorials",
    	volume = 16,
    	number = 4,
    	pages = "1955--1980",
    	year = 2014,
    	publisher = "IEEE"
    }
    
  31. N Mohammed, D Alhadidi, B C M Fung and M Debbabi. Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data. IEEE Transactions on Dependable and Secure Computing (TDSC) 11(1):59–71, IEEE, January 2014. BibTeX

    @article{key:article,
    	author = "N. Mohammed and D. Alhadidi and B.C. M. Fung and M. Debbabi",
    	title = "Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data",
    	journal = "IEEE Transactions on Dependable and Secure Computing (TDSC)",
    	volume = 11,
    	number = 1,
    	pages = "59--71",
    	year = 2014,
    	month = "January",
    	publisher = "IEEE"
    }
    
  32. N W M Liu, L Wang, P Cheng and M Debbabi. PPTP: Privacy Preserving Traffic Padding in Web-Based Applications. IEEE Transactions on Dependable and Secure Computing (TDSC) 11(6):538–552, IEEE, December 2014. BibTeX

    @article{1130795122013,
    	author = "N.W. M. Liu and L. Wang and P. Cheng and M. Debbabi",
    	title = "PPTP: Privacy Preserving Traffic Padding in Web-Based Applications",
    	journal = "IEEE Transactions on Dependable and Secure Computing (TDSC)",
    	month = "December",
    	volume = 11,
    	number = 6,
    	pages = "538--552",
    	year = 2014,
    	publisher = "IEEE"
    }
    
  33. E Bou-Harb, M Debbabi and C Assi. On Fingerprinting Probing Activities. International Journal of Computers and Security 43} month = {June:35–48, Elsevier Science Publishers, 2014. BibTeX

    @article{2230795122013,
    	author = "E. Bou-Harb and M. Debbabi and C. Assi",
    	title = "On Fingerprinting Probing Activities",
    	journal = "International Journal of Computers and Security",
    	volume = "43} month = {June",
    	year = 2014,
    	pages = "35--48",
    	publisher = "Elsevier Science Publishers"
    }
    
  34. S Alrabaee, N Saleem, S Preda, L Wang and M Debbabi. OBA2: An Onion Approach to Binary Code Authrorship Attribution. International Journal of Digital Investigation 11(1):S94–S103, Elsevier Science Publishers, May 2014. BibTeX

    @article{3330795122013,
    	author = "S. Alrabaee and N. Saleem and S. Preda and L. Wang and M. Debbabi",
    	title = "OBA2: An Onion Approach to Binary Code Authrorship Attribution",
    	journal = "International Journal of Digital Investigation",
    	volume = 11,
    	number = 1,
    	pages = "S94--S103",
    	month = "May",
    	year = 2014,
    	publisher = "Elsevier Science Publishers"
    }
    
  35. Y Jarraya and M Debbabi. Quantitative and Qualitative Analysis of SysML Activity Diagrams. Journal on Software Tools for Technology Transfer (STTT) 16(4):399–419, Springer, August 2014. BibTeX

    @article{4430795122013,
    	author = "Y. Jarraya and M. Debbabi",
    	title = "Quantitative and Qualitative Analysis of SysML Activity Diagrams",
    	journal = "Journal on Software Tools for Technology Transfer (STTT)",
    	volume = 16,
    	number = 4,
    	pages = "399--419",
    	month = "August",
    	year = 2014,
    	publisher = "Springer"
    }
    
  36. Claude Fachkha, Elias Bou-Harb and M Debbabi. On the inference and prediction of DDoS campaigns. Wireless Communications and Mobile Computing 15(6):1066Ð1078, Wiley, April 2015. BibTeX

    @article{1330786122124,
    	author = "Claude Fachkha and Elias Bou-Harb and M. Debbabi",
    	title = "On the inference and prediction of DDoS campaigns",
    	journal = "Wireless Communications and Mobile Computing",
    	volume = 15,
    	number = 6,
    	pages = "1066Ð1078",
    	month = "April",
    	year = 2015,
    	publisher = "Wiley"
    }
    
  37. Sujoy Ray, Andrei Soeanu, Jean Berger and M Debbabi. The Multi-Depot Split-Delivery Vehicle Routing Problem: Model and Solution Algorithm. Knowledge Based Systems 71:238–265, Elsevier, November 2014. BibTeX

    @article{1330785122013,
    	author = "Sujoy Ray and Andrei Soeanu and Jean Berger and M. Debbabi",
    	title = "The Multi-Depot Split-Delivery Vehicle Routing Problem: Model and Solution Algorithm",
    	journal = "Knowledge Based Systems",
    	volume = 71,
    	pages = "238--265",
    	month = "November",
    	year = 2014,
    	publisher = "Elsevier"
    }
    
  38. E Bou-Harb, M Debbabi and C Assi. A Systematic Approach for Detecting and Clustering Distributed Cyber Scanning. International Journal of Computer Networks 57(18):3826–3839, Elsevier Science Publishers, December 2013. BibTeX

    @article{5530795122013,
    	author = "E. Bou-Harb and M. Debbabi and C. Assi",
    	title = "A Systematic Approach for Detecting and Clustering Distributed Cyber Scanning",
    	journal = "International Journal of Computer Networks",
    	volume = 57,
    	number = 18,
    	pages = "3826--3839",
    	month = "December",
    	year = 2013,
    	publisher = "Elsevier Science Publishers"
    }
    
  39. E Bou-Harb, M Debbabi and C Assi. Cyber Scanning: A Comprehensive Survey. IEEE Communications Surveys and Tutorials 16(3):1496–1519, IEEE, September 2014. BibTeX

    @article{6130785122013,
    	author = "E. Bou-Harb and M. Debbabi and C. Assi",
    	title = "Cyber Scanning: A Comprehensive Survey",
    	journal = "IEEE Communications Surveys and Tutorials",
    	volume = 16,
    	number = 3,
    	pages = "1496--1519",
    	month = "September",
    	year = 2014,
    	publisher = "IEEE"
    }
    
  40. S Ouchani, Ait O Mohamed and M Debbabi. A Formal Verification Framework for SysML Activity Diagrams. Journal of Expert Systems with Applications 41(6):2713–2728, Elsevier Science Publishers, May 2014. BibTeX

    @article{7730795122013,
    	author = "S. Ouchani and O. Ait Mohamed and M. Debbabi",
    	title = "A Formal Verification Framework for SysML Activity Diagrams",
    	journal = "Journal of Expert Systems with Applications",
    	volume = 41,
    	number = 6,
    	pages = "2713--2728",
    	month = "May",
    	year = 2014,
    	publisher = "Elsevier Science Publishers"
    }
    
  41. S Ouchani, Ait O Mohamed and M Debbabi. A Property Based Abstraction Framework for SysML Activity Diagrams. Knowledge Based Systems 56:328–343, Elsevier Science Publishers, January 2014. BibTeX

    @article{8830795122013,
    	author = "S. Ouchani and O. Ait Mohamed and M. Debbabi",
    	title = "A Property Based Abstraction Framework for SysML Activity Diagrams",
    	journal = "Knowledge Based Systems",
    	volume = 56,
    	pages = "328--343",
    	month = "January",
    	year = 2014,
    	publisher = "Elsevier Science Publishers"
    }
    
  42. F Iqbal, H Binsalleeh, B C M Fung and M Debbabi. Unified Data Mining Solution for Authorship Analysis in Anonymous Textual Communications. International Journal on Information Sciences 231():98–112, Elsevier Science Publishers, May 2013. BibTeX

    @article{9930795122013,
    	author = "F. Iqbal and H. Binsalleeh and B. C. M. Fung and M. Debbabi",
    	title = "Unified Data Mining Solution for Authorship Analysis in Anonymous Textual Communications",
    	journal = "International Journal on Information Sciences",
    	volume = 231,
    	number = "",
    	pages = "98--112",
    	month = "May",
    	year = 2013,
    	publisher = "Elsevier Science Publishers"
    }
    
  43. D Alhadidi, Idrissi H Kaitouni, M Debbabi and A Mourad. Common Weaving Approach in Mainstream Languages for Software Security Hardening. Journal of Systems and Software 86(10):2654–2674, Elsevier Science Publishers, October 2013. BibTeX

    @article{1982479602013,
    	author = "D. Alhadidi and H. Idrissi Kaitouni and M. Debbabi and A. Mourad",
    	title = "Common Weaving Approach in Mainstream Languages for Software Security Hardening",
    	journal = "Journal of Systems and Software",
    	volume = 86,
    	number = 10,
    	pages = "2654--2674",
    	publisher = "Elsevier Science Publishers",
    	month = "October",
    	year = 2013
    }
    
  44. E Bou-Harb, C Fachkha, M Pourzandi, M Debbabi and C Assi. Communication Security for Smart Grid Distribution Networks. IEEE Communications Magazine 51(1):42–49, IEEE. BibTeX

    @article{8678668332013,
    	author = "E. Bou-Harb and C. Fachkha and M. Pourzandi and M. Debbabi and C. Assi",
    	title = "Communication Security for Smart Grid Distribution Networks",
    	journal = "IEEE Communications Magazine",
    	volume = 51,
    	number = 1,
    	pages = "42--49",
    	publisher = "IEEE",
    	month = "January} year = {2013"
    }
    
  45. S Ouchani, Ait O Mohamed, Y Jarraya and M Debbabi. Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols. Journal of Software (JSW) 7(7):1488–1495, Academy Publisher, 2012. BibTeX

    @article{3686149732012,
    	author = "S. Ouchani and O. Ait Mohamed and Y. Jarraya and M. Debbabi",
    	title = "Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols",
    	journal = "Journal of Software (JSW)",
    	volume = 7,
    	number = 7,
    	publisher = "Academy Publisher",
    	pages = "1488--1495",
    	year = 2012
    }
    
  46. N Mohammed, H Otrok, L Wang, M Debbabi and P Bhattacharya. Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Transactions on Dependable and Secure Computing (TDSC) 8(1):89–103, IEEE, 2011. BibTeX

    @article{8015512192011,
    	author = "N. Mohammed and H. Otrok and L. Wang and M. Debbabi and P. Bhattacharya",
    	title = "Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET",
    	journal = "IEEE Transactions on Dependable and Secure Computing (TDSC)",
    	volume = 8,
    	number = 1,
    	pages = "89--103",
    	publisher = "IEEE",
    	year = 2011
    }
    
  47. N Mohammed, B C M Fung and M Debbabi. Anonymity meets Game Theory: Secure Data Integration with Malicious Participants. Very Large Data Bases Journal (VLDB) 20(4):567–588, Springer, 2011. BibTeX

    @article{3409144532011,
    	author = "N. Mohammed and B. C. M. Fung and M. Debbabi",
    	title = "Anonymity meets Game Theory: Secure Data Integration with Malicious Participants",
    	journal = "Very Large Data Bases Journal (VLDB)",
    	volume = 20,
    	number = 4,
    	pages = "567--588",
    	publisher = "Springer",
    	year = 2011
    }
    
  48. E Bou-Harb, M Pourzandi, M Debbabi and C Assi. Secure, Efficient and Cost-Effective Distributed Architecture for Spam Mitigation on LTE 4G Mobile Networks. Journal of Security and Communication Networks 6(12):1478–1489, Wiley, 2013. BibTeX

    @article{7276084802013,
    	author = "E. Bou-Harb and M. Pourzandi and M. Debbabi and C. Assi",
    	title = "Secure, Efficient and Cost-Effective Distributed Architecture for Spam Mitigation on LTE 4G Mobile Networks",
    	journal = "Journal of Security and Communication Networks",
    	volume = 6,
    	number = 12,
    	pages = "1478--1489",
    	publisher = "Wiley",
    	year = 2013
    }
    
  49. D Mouheb, C Talhi, M Nouh, V Lima, M Debbabi, L Wang and M Pourzandi. Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. International Journal of Computing and Information Sciences (IJCIS) 12(1):1–10, 2011. ISSN 15259293. BibTeX

    @article{781407372011,
    	author = "D. Mouheb and C. Talhi and M. Nouh and V. Lima and M. Debbabi and L. Wang and M. Pourzandi",
    	title = "Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML",
    	journal = "International Journal of Computing and Information Sciences (IJCIS)",
    	volume = 12,
    	number = 1,
    	pages = "1--10",
    	note = "ISSN 15259293",
    	month = "Jun.",
    	year = 2011
    }
    
  50. R Charpentier, M Debbabi and TFOSS Research Team. Security Evaluation and Hardening of Free and Open Source Software (FOSS). Electronic Communications of the EASST 33():1–18, 2010. BibTeX

    @article{8216892962010,
    	author = "R. Charpentier and M. Debbabi and TFOSS Research Team",
    	title = "Security Evaluation and Hardening of Free and Open Source Software (FOSS)",
    	journal = "Electronic Communications of the EASST",
    	volume = 33,
    	pages = "1--18",
    	number = "",
    	year = 2010
    }
    
  51. F Iqbal, H Binsalleeh, B C M Fung and M Debbabi. Mining Writeprints from Anonymous E-mails for Forensic Investigation. Digital Investigation Journal 7(1-2):56–64, Elsevier Science Publishers, 2010. BibTeX

    @article{1310260722010,
    	author = "F. Iqbal and H. Binsalleeh and B. C. M. Fung and M. Debbabi",
    	title = "Mining Writeprints from Anonymous E-mails for Forensic Investigation",
    	journal = "Digital Investigation Journal",
    	volume = 7,
    	number = "1-2",
    	pages = "56--64",
    	publisher = "Elsevier Science Publishers",
    	year = 2010
    }
    
  52. M Saleh and M Debbabi. A Game-theoretic Framework for Specification and Verification of Cryptographic Protocols. Formal Aspects of Computing (FACS) 22(5):585–609, Springer, 2010. BibTeX

    @article{1049777692010,
    	author = "M. Saleh and M. Debbabi",
    	title = "A Game-theoretic Framework for Specification and Verification of Cryptographic Protocols",
    	journal = "Formal Aspects of Computing (FACS)",
    	volume = 22,
    	number = 5,
    	pages = "585--609",
    	publisher = "Springer",
    	year = 2010
    }
    
  53. A Rachedi, A Benslimane, H Otrok, N Mohammed and M Debbabi. A Secure Mechanism Design-Based and Game Theoretical Model for MANETs. Journal of Mobile Networks and Applications (MONET) 15(2):191–204, Springer, 2010. BibTeX

    @article{5888388662010,
    	author = "A. Rachedi and A. Benslimane and H. Otrok and N. Mohammed and M. Debbabi",
    	title = "A Secure Mechanism Design-Based and Game Theoretical Model for MANETs",
    	journal = "Journal of Mobile Networks and Applications (MONET)",
    	volume = 15,
    	number = 2,
    	pages = "191--204",
    	publisher = "Springer",
    	year = 2010
    }
    
  54. V Lima, C Talhi, D Mouheb, M Debbabi, M Pourzandi and L Wang. Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. Electronic Notes of Theoretical Computer Science 254():143–160, Elsevier Science Publishers, 2009. BibTeX

    @article{8749780502009,
    	author = "V. Lima and C. Talhi and D. Mouheb and M. Debbabi and M. Pourzandi and L. Wang",
    	title = "Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages",
    	journal = "Electronic Notes of Theoretical Computer Science",
    	volume = 254,
    	number = "",
    	pages = "143--160",
    	publisher = "Elsevier Science Publishers",
    	year = 2009
    }
    
  55. D Alhadidi, N Belblidia, A Boukhtouta and M Debbabi. Extending AspectJ Open Source for Application Security Hardening. International Journal of Software Engineering Studies 4(1):26–43, Software Engineering Association of Taiwan, 2009. BibTeX

    @article{3401496182009,
    	author = "D. Alhadidi and N. Belblidia and A. Boukhtouta and M. Debbabi",
    	title = "Extending AspectJ Open Source for Application Security Hardening",
    	journal = "International Journal of Software Engineering Studies",
    	volume = 4,
    	number = 1,
    	pages = "26--43",
    	publisher = "Software Engineering Association of Taiwan",
    	year = 2009
    }
    
  56. S M Hejazi, C Talhi and M Debbabi. Extraction of Forensically Sensitive Information from Windows Physical Memory. Digital Investigation Journal 6:121–131, Elsevier Science Publishers, 2009. BibTeX

    @article{6067246582009,
    	author = "S. M. Hejazi and C. Talhi and M. Debbabi",
    	title = "Extraction of Forensically Sensitive Information from Windows Physical Memory",
    	journal = "Digital Investigation Journal",
    	volume = 6,
    	pages = "121--131",
    	publisher = "Elsevier Science Publishers",
    	year = 2009
    }
    
  57. A Mourad, M A Laverdiere, A Soeanu and M Debbabi. New Aspect-Oriented Constructs for Security Hardening Concerns. Journal of Computers and Security 28(6):341–358, Elsevier Science Publishers, 2009. BibTeX

    @article{1443246412009,
    	author = "A. Mourad and M. A. Laverdiere and A. Soeanu and M. Debbabi",
    	title = "New Aspect-Oriented Constructs for Security Hardening Concerns",
    	journal = "Journal of Computers and Security",
    	volume = 28,
    	number = 6,
    	publisher = "Elsevier Science Publishers",
    	pages = "341--358",
    	year = 2009
    }
    
  58. S Tlili and M Debbabi. Interprocedural and Flow-Sensitive Type Analysis for Memory and Type Safety of C Code. Journal of Automated Reasoning (JAR) 42:265–300, Springer, 2009. BibTeX

    @article{10492709772009,
    	author = "S. Tlili and M. Debbabi",
    	title = "Interprocedural and Flow-Sensitive Type Analysis for Memory and Type Safety of C Code",
    	journal = "Journal of Automated Reasoning (JAR)",
    	volume = 42,
    	numbers = "2-4",
    	pages = "265--300",
    	publisher = "Springer",
    	year = 2009
    }
    
  59. Y Jarraya, A Soeanu, L Alawneh, M Debbabi and F Hassaine. Synergistic Verification and Validation of Systems and Software Engineering Models. International Journal of General Systems 38(7):719–746, Taylor and Francis Group Publishers, 2009. BibTeX

    @article{9069593782009,
    	author = "Y. Jarraya and A. Soeanu and L. Alawneh and M. Debbabi and F. Hassaine",
    	title = "Synergistic Verification and Validation of Systems and Software Engineering Models",
    	journal = "International Journal of General Systems",
    	volume = 38,
    	number = 7,
    	pages = "719--746",
    	publisher = "Taylor and Francis Group Publishers",
    	year = 2009
    }
    
  60. R Hadjidj, M Debbabi, H Lounis, F Iqbal, A Szporer and D Benredjem. Towards an Integrated Email Forensics Analysis Framework. Digital Investigation Journal 5(3-4):124–137, Elsevier Science Publishers, 2009. BibTeX

    @article{9927045232009,
    	author = "R. Hadjidj and M. Debbabi and H. Lounis and F. Iqbal and A. Szporer and D. Benredjem",
    	title = "Towards an Integrated Email Forensics Analysis Framework",
    	journal = "Digital Investigation Journal",
    	volume = 5,
    	number = "3-4",
    	pages = "124--137",
    	publisher = "Elsevier Science Publishers",
    	year = 2009
    }
    
  61. A Boukhtouta, D Alhadidi, M Debbabi and C Talhi. Capturing Returned Computable Values in AspectJ for Security Hardening. Information Security Journal: A Global Perspective 18(2):87–98, Taylor and Francis Publishers, 2009. BibTeX

    @article{4888216992009,
    	author = "A. Boukhtouta and D. Alhadidi and M. Debbabi and C. Talhi",
    	title = "Capturing Returned Computable Values in AspectJ for Security Hardening",
    	journal = "Information Security Journal: A Global Perspective",
    	volume = 18,
    	number = 2,
    	pages = "87--98",
    	publisher = "Taylor and Francis Publishers",
    	year = 2009
    }
    
  62. D Alhadidi, N Belblidia and M Debbabi. Lambda-SAOP: A Security AOP Calculus. Computer Journal 52(7):824–849, Oxford University Press, 2009. BibTeX

    @article{7130604962009,
    	author = "D. Alhadidi and N. Belblidia and M. Debbabi",
    	title = "Lambda-SAOP: A Security AOP Calculus",
    	journal = "Computer Journal",
    	volume = 52,
    	number = 7,
    	pages = "824--849",
    	publisher = "Oxford University Press",
    	year = 2009
    }
    
  63. S M Hejazi, M Debbabi and C Talhi. Automated Windows Memory File Extraction for Cyber Forensics. Journal of Digital Forensic Practice 2(3):117–131, Taylor and Francis Publishers, 2008. BibTeX

    @article{7452819492008,
    	author = "S. M. Hejazi and M. Debbabi and C. Talhi",
    	title = "Automated Windows Memory File Extraction for Cyber Forensics",
    	journal = "Journal of Digital Forensic Practice",
    	volume = 2,
    	number = 3,
    	pages = "117--131",
    	publisher = "Taylor and Francis Publishers",
    	year = 2008
    }
    
  64. H Issa, C Assi, M Debbabi and S Ray. QoS-Aware Middleware for Web Services Composition - A Qualitative Approach. Journal of Enterprise Information Systems 3(4):359–364, Taylor and Francis Publishers, 2009. BibTeX

    @article{10019014422009,
    	author = "H. Issa and C. Assi and M. Debbabi and S. Ray",
    	title = "QoS-Aware Middleware for Web Services Composition - A Qualitative Approach",
    	journal = "Journal of Enterprise Information Systems",
    	volume = 3,
    	number = 4,
    	pages = "359--364",
    	publisher = "Taylor and Francis Publishers",
    	year = 2009
    }
    
  65. C Talhi, D Mouheb, V Lima, M Debbabi, L Wang and M Pourzandi. Usability of Security Specification Approaches for UML Design: A Survey. Journal of Object Technology 8(6):103–122, 2009. ISSN 1660-1769. BibTeX

    @article{1575001022009,
    	author = "C. Talhi and D. Mouheb and V. Lima and M. Debbabi and L. Wang and M. Pourzandi",
    	title = "Usability of Security Specification Approaches for UML Design: A Survey",
    	journal = "Journal of Object Technology",
    	volume = 8,
    	number = 6,
    	pages = "103--122",
    	note = "ISSN 1660-1769",
    	year = 2009
    }
    
  66. A Mourad, M A Laverdiere, A Soeanu and M Debbabi. Nouveaux Points de Coupure et Primitives pour les Preoccupations de Renforcement de Securite. Technique et Science Informatiques (TSI) 28(5):611–644, Hermes-Lavoisier, 2009. BibTeX

    @article{4745216192009,
    	author = "A. Mourad and M. A. Laverdiere and A. Soeanu and M. Debbabi",
    	title = "Nouveaux Points de Coupure et Primitives pour les Preoccupations de Renforcement de Securite",
    	journal = "Technique et Science Informatiques (TSI)",
    	volume = 28,
    	number = 5,
    	pages = "611--644",
    	publisher = "Hermes-Lavoisier",
    	year = 2009
    }
    
  67. D Alhadidi, M Debbabi and P Bhattacharya. New AspectJ Pointcuts for Integer Overflow and Underflow Detection. Information Security Journal: A Global Perspective 17(5-6):278–287, Taylor and Francis Publishers, 2008. BibTeX

    @article{6693122022008,
    	author = "D. Alhadidi and M. Debbabi and P. Bhattacharya",
    	title = "New AspectJ Pointcuts for Integer Overflow and Underflow Detection",
    	journal = "Information Security Journal: A Global Perspective",
    	volume = 17,
    	number = "5-6",
    	pages = "278--287",
    	publisher = "Taylor and Francis Publishers",
    	year = 2008
    }
    
  68. H Otrok, M Mehrandish, C Assi, M Debbabi and P Bhattacharya. Game Theoretic Models for Detecting Network Intrusions. Journal of Computer Communications 31(10):1934–1944, Elsevier Science Publishers, June 2008. BibTeX

    @article{2057284862008,
    	author = "H. Otrok and M. Mehrandish and C. Assi and M. Debbabi and P. Bhattacharya",
    	title = "Game Theoretic Models for Detecting Network Intrusions",
    	journal = "Journal of Computer Communications",
    	volume = 31,
    	number = 10,
    	month = "June",
    	pages = "1934--1944",
    	publisher = "Elsevier Science Publishers",
    	year = 2008
    }
    
  69. A Mourad, M A Laverdiere and M Debbabi. An Aspect Oriented Approach for the Security Hardening of Code. Journal of Computers & Security 27(3-4):101–114, Elsevier Science Publishers, May 2008. BibTeX

    @article{4828976092008,
    	author = "A. Mourad and M. A. Laverdiere and M. Debbabi",
    	title = "An Aspect Oriented Approach for the Security Hardening of Code",
    	journal = "Journal of Computers & Security",
    	volume = 27,
    	number = "3-4",
    	pages = "101--114",
    	publisher = "Elsevier Science Publishers",
    	month = "May",
    	year = 2008
    }
    
  70. R Charpentier, M Debbabi, A Mourad and M A Laverdiere. Security Hardening of Open Source Software. Open Source Business Resource Journal, Talent First Network, June 2008. ISSN 1913-6102. BibTeX

    @article{7380081752008,
    	author = "R. Charpentier and M. Debbabi and A. Mourad and M. A. Laverdiere",
    	title = "Security Hardening of Open Source Software",
    	journal = "Open Source Business Resource Journal",
    	publisher = "Talent First Network",
    	month = "June",
    	note = "ISSN 1913-6102",
    	year = 2008
    }
    
  71. B Fung, I Farkhund, R Hadjidj and M Debbabi. A Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail Forensics. Digital Investigation Journal 5:42–51, Elsevier Science Publishers, September 2008. BibTeX

    @article{3635797142008,
    	author = "B. Fung and I. Farkhund and R. Hadjidj and M. Debbabi",
    	title = "A Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail Forensics",
    	journal = "Digital Investigation Journal",
    	volume = 5,
    	pages = "42--51",
    	month = "September",
    	publisher = "Elsevier Science Publishers",
    	year = 2008
    }
    
  72. A Mourad, M A Laverdiere and M Debbabi. A High-Level Aspect-Oriented Based Framework for Software Security Hardening. Information Security Journal: A Global Perspective 17(2):56–74, Taylor & Francis Group Publishers, May 2008. BibTeX

    @article{187518742008,
    	author = "A. Mourad and M. A. Laverdiere and M. Debbabi",
    	title = "A High-Level Aspect-Oriented Based Framework for Software Security Hardening",
    	journal = "Information Security Journal: A Global Perspective",
    	volume = 17,
    	number = 2,
    	pages = "56--74",
    	publisher = "Taylor & Francis Group Publishers",
    	month = "May",
    	year = 2008
    }
    
  73. H Otrok, N Mohammed, L Wang, M Debbabi and P Bhattacharya. A Game-Theoretic Intrusion Detection Model for Mobile Ad-hoc Networks. Special Issue of the Computer Communications Journal on 'Algorithmic and Theoretical Aspects of Wireless Ad Hoc and Sensor Networks' 31(4):708–721, Elsevier Science Publishers, March 2008. BibTeX

    @article{8209425722008,
    	author = "H. Otrok and N. Mohammed and L. Wang and M. Debbabi and P. Bhattacharya",
    	title = "A Game-Theoretic Intrusion Detection Model for Mobile Ad-hoc Networks",
    	journal = "Special Issue of the Computer Communications Journal on 'Algorithmic and Theoretical Aspects of Wireless Ad Hoc and Sensor Networks'",
    	volume = 31,
    	number = 4,
    	pages = "708--721",
    	publisher = "Elsevier Science Publishers",
    	month = "March",
    	year = 2008
    }
    
  74. C Talhi, N Tawbi and M Debbabi. Execution Monitoring Enforcement under Memory-Limitations Constraints. Journal of Information and Computation 206(2-4):158–184, 2008, Elsevier Science Publishers, 2008. BibTeX

    @article{3280377052008,
    	author = "C. Talhi and N. Tawbi and M. Debbabi",
    	title = "Execution Monitoring Enforcement under Memory-Limitations Constraints",
    	journal = "Journal of Information and Computation",
    	volume = 206,
    	number = "2-4",
    	pages = "158--184",
    	publisher = "2008, Elsevier Science Publishers",
    	year = 2008
    }
    
  75. A R Arasteh and M Debbabi. Forensic Memory Analysis: From Stack and Code to Execution History. Digital Investigation Journal 4(1):114–125, Elsevier Science Publishers, September 2007. BibTeX

    @article{1787199752007,
    	author = "A. R. Arasteh and M. Debbabi",
    	title = "Forensic Memory Analysis: From Stack and Code to Execution History",
    	journal = "Digital Investigation Journal",
    	volume = 4,
    	number = 1,
    	pages = "114--125",
    	publisher = "Elsevier Science Publishers",
    	month = "September",
    	year = 2007
    }
    
  76. A R Arasteh, M Debbabi, A Sakha and M Saleh. Analyzing Multiple Logs for Forensic Evidence. Digital Investigation Journal 4(1):82–91, Elsevier Science Publishers, September 2007. BibTeX

    @article{4588649442007,
    	author = "A. R. Arasteh and M. Debbabi and A. Sakha and M. Saleh",
    	title = "Analyzing Multiple Logs for Forensic Evidence",
    	journal = "Digital Investigation Journal",
    	volume = 4,
    	number = 1,
    	pages = "82--91",
    	publisher = "Elsevier Science Publishers",
    	month = "September",
    	year = 2007
    }
    
  77. M Saleh, A R Arasteh, A Sakha and M Debbabi. Forensics Analysis of Logs: Modeling and Verification. Journal of Knowledge Based Systems 20(7):671–682, Elsevier Science Publishers, 2007. BibTeX

    @article{5747621782007,
    	author = "M. Saleh and A. R. Arasteh and A. Sakha and M. Debbabi",
    	title = "Forensics Analysis of Logs: Modeling and Verification",
    	journal = "Journal of Knowledge Based Systems",
    	volume = 20,
    	number = 7,
    	pages = "671--682",
    	publisher = "Elsevier Science Publishers",
    	year = 2007
    }
    
  78. M Debbabi and M Fourati. A Formal Type System for Java. International Journal of Object Technology 6(8):117–184, September 2007. ISSN 1660-1769. BibTeX

    @article{8493478602007,
    	author = "M. Debbabi and M. Fourati",
    	title = "A Formal Type System for Java",
    	journal = "International Journal of Object Technology",
    	volume = 6,
    	number = 8,
    	pages = "117--184",
    	month = "September",
    	note = "ISSN 1660-1769",
    	year = 2007
    }
    
  79. A Benssam, J Berger, A Boukhtouta, M Debbabi, S Ray and A Sahi. What Middleware for Network Centric Operations?. International Journal of Knowledge Based Engineering 20(3):255–265, Elsevier Science Publishers, April 2007. BibTeX

    @article{8575383182007,
    	author = "A. Benssam and J. Berger and A. Boukhtouta and M. Debbabi and S. Ray and A. Sahi",
    	title = "What Middleware for Network Centric Operations?",
    	journal = "International Journal of Knowledge Based Engineering",
    	volume = 20,
    	number = 3,
    	pages = "255--265",
    	publisher = "Elsevier Science Publishers",
    	month = "April",
    	year = 2007
    }
    
  80. N Belblidia and M Debbabi. A Dynamic Operational Semantics for JVML. International Journal of Object Technology 6(3):71–100, February 2007. ISSN 1660-1769. BibTeX

    @article{10032921542007,
    	author = "N. Belblidia and M. Debbabi",
    	title = "A Dynamic Operational Semantics for JVML",
    	journal = "International Journal of Object Technology",
    	volume = 6,
    	number = 3,
    	pages = "71--100",
    	month = "February",
    	note = "ISSN 1660-1769",
    	year = 2007
    }
    
  81. M Debbabi, M Saleh, C Talhi and S Zhioua. Security Analysis of Mobile Embedded Java. International Journal of Object Technology 5(2):125–154, 2006. ISSN 1660-1769. BibTeX

    @article{10393956872006,
    	author = "M. Debbabi and M. Saleh and C. Talhi and S. Zhioua",
    	title = "Security Analysis of Mobile Embedded Java",
    	journal = "International Journal of Object Technology",
    	volume = 5,
    	number = 2,
    	pages = "125--154",
    	note = "ISSN 1660-1769",
    	year = 2006
    }
    
  82. M Debbabi, A Gherbi, A Mourad and H Yahyaoui. A Selective Dynamic Compiler for Embedded Java Virtual Machines Targeting ARM Processors. International Journal of Science of Computer Programming 59(1-2):38–63, Elsevier Science Publishers, January 2006. BibTeX

    @article{5766500842006,
    	author = "M. Debbabi and A. Gherbi and A. Mourad and H. Yahyaoui",
    	title = "A Selective Dynamic Compiler for Embedded Java Virtual Machines Targeting ARM Processors",
    	journal = "International Journal of Science of Computer Programming",
    	volume = 59,
    	number = "1-2",
    	pages = "38--63",
    	month = "January",
    	publisher = "Elsevier Science Publishers",
    	year = 2006
    }
    
  83. M Debbabi, M Saleh, C Talhi and S Zhioua. Vulnerability Analysis of J2ME CLDC Security. US DoD Information Assurance Newsletter 9(2):18–23, September 2006. BibTeX

    @article{127982492006,
    	author = "M. Debbabi and M. Saleh and C. Talhi and S. Zhioua",
    	title = "Vulnerability Analysis of J2ME CLDC Security",
    	journal = "US DoD Information Assurance Newsletter",
    	volume = 9,
    	number = 2,
    	pages = "18--23",
    	month = "September",
    	year = 2006
    }
    
  84. M Debbabi, A Gherbi, L Ketari, C Talhi, N Tawbi, H Yahyaoui and S Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. International Journal of Object Technology 4(1):83–108, January 2005. ISSN 1660-1769. BibTeX

    @article{641800242005,
    	author = "M. Debbabi and A. Gherbi and L. Ketari and C. Talhi and N. Tawbi and H. Yahyaoui and S. Zhioua",
    	title = "E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines",
    	journal = "International Journal of Object Technology",
    	volume = 4,
    	number = 1,
    	pages = "83--108",
    	month = "January",
    	note = "ISSN 1660-1769",
    	year = 2005
    }
    
  85. M Debbabi, A Mourad, C Talhi and H Yahyaoui. Accelerating Embedded Java for Mobile Devices. IEEE Communications Magazine 43(9):80–85, IEEE, September 2005. BibTeX

    @article{5605243952005,
    	author = "M. Debbabi and A. Mourad and C. Talhi and H. Yahyaoui",
    	title = "Accelerating Embedded Java for Mobile Devices",
    	journal = "IEEE Communications Magazine",
    	volume = 43,
    	number = 9,
    	pages = "80--85",
    	month = "September",
    	publisher = "IEEE",
    	year = 2005
    }
    
  86. K Adi, M Debbabi and M Mejri. A New Logic for Electronic Commerce Protocols. International Journal of Theoretical Computer Science (TCS) 291(3):223–283, Elsevier Science Publishers, January 2003. BibTeX

    @article{6963205342003,
    	author = "K. Adi and M. Debbabi and M. Mejri",
    	title = "A New Logic for Electronic Commerce Protocols",
    	journal = "International Journal of Theoretical Computer Science (TCS)",
    	volume = 291,
    	number = 3,
    	pages = "223--283",
    	month = "January",
    	publisher = "Elsevier Science Publishers",
    	year = 2003
    }
    
  87. M Debbabi and M Mejri. Towards the Correctness of Security Protocols. Electronic Notes in Theoretical Computer Science 83(1):1–46, Elsevier Science Publishers, 2003. BibTeX

    @article{8389709102003,
    	author = "M. Debbabi and M. Mejri",
    	title = "Towards the Correctness of Security Protocols",
    	journal = "Electronic Notes in Theoretical Computer Science",
    	volume = 83,
    	number = 1,
    	pages = "1--46",
    	publisher = "Elsevier Science Publishers",
    	year = 2003
    }
    
  88. M Debbabi, N Tawbi and H Yahyaoui. A Formal Dynamic Semantics of Java: An Essential Ingredient of Java Security. Journal of Telecommunications and Information Technology 4():81-119, National Institute of Telecommunications, 2002. BibTeX

    @article{4543595342002,
    	author = "M. Debbabi and N. Tawbi and H. Yahyaoui",
    	title = "A Formal Dynamic Semantics of Java: An Essential Ingredient of Java Security",
    	journal = "Journal of Telecommunications and Information Technology",
    	volume = 4,
    	number = "",
    	pages = "81-119",
    	publisher = "National Institute of Telecommunications",
    	year = 2002
    }
    
  89. M Debbabi, N Durgin, M Mejri and J Mitchell. Security by Typing. International Journal of Software Systems for Technology Transfer (STTT) 4(4):1–24, Springer, 2002. BibTeX

    @article{4378986632002,
    	author = "M. Debbabi and N. Durgin and M. Mejri and J. Mitchell",
    	title = "Security by Typing",
    	journal = "International Journal of Software Systems for Technology Transfer (STTT)",
    	volume = 4,
    	number = 4,
    	pages = "1--24",
    	publisher = "Springer",
    	year = 2002
    }
    
  90. K Adi and M Debbabi. Abstract Interpretation for Proving Secrecy Properties in Security Protocols. Electronic Notes in Theoretical Computer Science 55(1):25–50, Elsevier Science Publishers, January 2001. BibTeX

    @article{1334432922001,
    	author = "K. Adi and M. Debbabi",
    	title = "Abstract Interpretation for Proving Secrecy Properties in Security Protocols",
    	journal = "Electronic Notes in Theoretical Computer Science",
    	volume = 55,
    	number = 1,
    	pages = "25--50",
    	month = "January",
    	publisher = "Elsevier Science Publishers",
    	year = 2001
    }
    
  91. S Doyon and M Debbabi. On Object Initialization in the Java Bytecode. International Journal of Computer Communications 23(17):1594–1605, Elsevier Science Publishers, November 2000. BibTeX

    @article{5196454372000,
    	author = "S. Doyon and M. Debbabi",
    	title = "On Object Initialization in the Java Bytecode",
    	journal = "International Journal of Computer Communications",
    	volume = 23,
    	number = 17,
    	pages = "1594--1605",
    	publisher = "Elsevier Science Publishers",
    	month = "November",
    	year = 2000
    }
    
  92. M Debbabi and A Faour. On the Inference of Structured Recursive Effects with Subtyping. International Journal of Functional and Logic Programming 1997(5):1–35, MIT Press, June 1997. BibTeX

    @article{3167914041997,
    	author = "M. Debbabi and A. Faour",
    	title = "On the Inference of Structured Recursive Effects with Subtyping",
    	journal = "International Journal of Functional and Logic Programming",
    	volume = 1997,
    	number = 5,
    	pages = "1--35",
    	publisher = "MIT Press",
    	month = "June",
    	year = 1997
    }
    
  93. M Debbabi. From CML to a Model-Based Concurrent Specification Language: Semantic Foundations. Journal of Parallel Processing Letters (PPL) 7(3):329–356, World Scientific, 1997. BibTeX

    @article{2107530421997,
    	author = "M. Debbabi",
    	title = "From CML to a Model-Based Concurrent Specification Language: Semantic Foundations",
    	journal = "Journal of Parallel Processing Letters (PPL)",
    	volume = 7,
    	number = 3,
    	pages = "329--356",
    	publisher = "World Scientific",
    	year = 1997
    }
    
  94. M Debbabi, N Tawbi and F Bouguerch. Information Control Nets as Processes: Qualitative Processes. Journal of Concurrent Engineering: Research and Application 5(1):47–57, Technomic Publishing, March 1997. BibTeX

    @article{7185183931997,
    	author = "M. Debbabi and N. Tawbi and F. Bouguerch",
    	title = "Information Control Nets as Processes: Qualitative Processes",
    	journal = "Journal of Concurrent Engineering: Research and Application",
    	volume = 5,
    	number = 1,
    	pages = "47--57",
    	month = "March",
    	publisher = "Technomic Publishing",
    	year = 1997
    }
    
  95. M Debbabi. A Model-Based Concurrent Specification Language Over Concurrent ML. Journal of Concurrent Engineering: Research and Application 4(2):137–148, Technomic Publishing, June 1996. BibTeX

    @article{5293249121996,
    	author = "M. Debbabi",
    	title = "A Model-Based Concurrent Specification Language Over Concurrent ML",
    	journal = "Journal of Concurrent Engineering: Research and Application",
    	volume = 4,
    	number = 2,
    	pages = "137--148",
    	publisher = "Technomic Publishing",
    	month = "June",
    	year = 1996
    }
    
  96. M Debbabi and D Bolignano. Programmation parallele fonctionnelle et imperative : fondements semantiques. Journal of Technique et Science Informatiques (TSI) 15(7):899–928, Hermes, September 1995. BibTeX

    @article{1448062361995,
    	author = "M. Debbabi and D. Bolignano",
    	title = "Programmation parallele fonctionnelle et imperative : fondements semantiques",
    	journal = "Journal of Technique et Science Informatiques (TSI)",
    	volume = 15,
    	number = 7,
    	pages = "899--928",
    	publisher = "Hermes",
    	month = "September",
    	year = 1995
    }
    

2 Book Chapters

  1. S Ouchani, Ait O Mohamed, M Debbabi and M Pourzandi. . Volume 296/2010, chapter Verification of the Correctness in Composed UML Behavioural Diagrams, pages 163–177, Springer, 2010. BibTeX

    @inbook{726459266,
    	author = "S. Ouchani and O. Ait Mohamed and M. Debbabi and M. Pourzandi",
    	booktitle = "Springer's Studies in Computational Intelligence Series, Volume 296/2010, DOI: 10.1007/978-3-642-13273-5 11, Springer",
    	chapter = "Verification of the Correctness in Composed UML Behavioural Diagrams",
    	pages = "163--177",
    	publisher = "Springer",
    	volume = "296/2010",
    	year = 2010
    }
    
  2. D Mouheb, C Talhi, M Nouh, V Lima, M Debbabi, L Wang and M Pourzandi. . Volume 296/2010, chapter Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML, pages 197–213, Springer, 2010. BibTeX

    @inbook{397575318,
    	author = "D. Mouheb and C. Talhi and M. Nouh and V. Lima and M. Debbabi and L. Wang and M. Pourzandi",
    	booktitle = "Springer's Studies in Computational Intelligence Series, Volume 296/2010, DOI: 10.1007/978-3-642-13273-5 13, Springer",
    	chapter = "Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML",
    	pages = "197--213",
    	publisher = "Springer",
    	volume = "296/2010",
    	year = 2010
    }
    
  3. A Mourad, M-A Laverdiere and M Debbabi. . Volume 23, chapter A Security Hardening Language Based On Aspect-Orientation, pages 254–266, Springer, 2009. BibTeX

    @inbook{858998718,
    	author = "A. Mourad and M-A Laverdiere and M. Debbabi",
    	booktitle = "E-Business and Telecommunications, Communications in Computer and Information Science Series, Volume 23, 2009, Springer",
    	chapter = "A Security Hardening Language Based On Aspect-Orientation",
    	pages = "254--266",
    	publisher = "Springer",
    	volume = 23,
    	year = 2009
    }
    
  4. M-A Laverdiere, A Mourad, S Tlili and M Debbabi. . Chapter Wireless Applications: Middleware Security, pages 1242–1250, CRC Press, 2008. BibTeX

    @inbook{1030340504,
    	author = "M-A. Laverdiere and A. Mourad and S. Tlili and M. Debbabi",
    	booktitle = "Encyclopedia of Wireless and Mobile Communications Book, DOI 10.1081/E-EWMC-120043598, 2008, CRC Press, Taylor & Francis Group",
    	chapter = "Wireless Applications: Middleware Security",
    	pages = "1242--1250",
    	publisher = "CRC Press",
    	year = 2008
    }
    
  5. H Otrok, M Mehrandish, C Assi, P Bhattacharya and M Debbabi. . Chapter Mobile Security: Game Theory, pages 764–770, CRC Press, 2007. BibTeX

    @inbook{1368075588,
    	author = "H. Otrok and M. Mehrandish and C. Assi and P. Bhattacharya and M. Debbabi",
    	booktitle = "Encyclopedia of Wireless and Mobile Communications Book, DOI 10.1081/E-EWMC-120043182, CRC Press, Taylor & Francis Group, 2007",
    	chapter = "Mobile Security: Game Theory",
    	pages = "764--770",
    	publisher = "CRC Press",
    	year = 2007
    }
    
  6. M Debbabi and M Fourati. . Chapter Sur la semantiquede Java, January 2000. BibTeX

    @inbook{1130877825,
    	author = "M. Debbabi and M. Fourati",
    	booktitle = "Christophe Dony and Houari Sahraoui Editors, Languages and Models with Objects, Hermes",
    	chapter = "Sur la semantiquede Java",
    	month = "Jan",
    	year = 2000
    }
    
  7. M Debbabi, Z Aidoud and A Faour. . Chapter On the Inference of Structured Recursive Effects with Subtyping, pages 123–142, World Scientific, April 1997. BibTeX

    @inbook{27455595,
    	author = "M. Debbabi and Z. Aidoud and A. Faour",
    	booktitle = "Tetsuo Ida, Atsushi Ohori, Masato Takeichi Editors, Functional and Logic Programming, ISBN 981-02-2923-2, World Scientific",
    	chapter = "On the Inference of Structured Recursive Effects with Subtyping",
    	month = "Apr",
    	pages = "123--142",
    	publisher = "World Scientific",
    	year = 1997
    }
    
  8. M Debbabi and D Bolignano. . Chapter A Semantic Theory for ML Higher Order Concurrency Primitives, pages 145–184, Springer Verlag, December 1996. BibTeX

    @inbook{1895598324,
    	author = "M. Debbabi and D. Bolignano",
    	booktitle = "Flemming Nielson Editor, ML with Concurrency: Design, Analysis, Implementation and Application, Chapter 6, ISBN 0-387-94875-9. Monographs in Computer Science, Springer Verlag",
    	chapter = "A Semantic Theory for ML Higher Order Concurrency Primitives",
    	month = "Dec",
    	pages = "145--184",
    	publisher = "Springer Verlag",
    	year = 1996
    }
    
  9. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi and Sami Zhioua. Embedded Java Security. Springer, ISBN: 978-1-84628-590-5, 2007. BibTeX

    @book{DBLP:books/daglib/0025738,
    	author = "Mourad Debbabi and Mohamed Saleh and Chamseddine Talhi and Sami Zhioua",
    	title = "Embedded Java Security",
    	publisher = "Springer",
    	year = 2007,
    	isbn = "978-1-84628-590-5",
    	pages = "1--243"
    }
    

 

2 Articles Published in Refereeed International Conferences

 

  1. ElMouatez Billah Karbab and Mourad Debbabi. ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018. 2018, 20:1–20:10. BibTeX

    @inproceedings{DBLP:conf/IEEEares/KarbabD18,
    	author = "ElMouatez Billah Karbab and Mourad Debbabi",
    	title = "ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures",
    	booktitle = "Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018",
    	pages = "20:1--20:10",
    	year = 2018,
    	publisher = "{ACM}"
    }
    
  2. Azadeh Tabiban, Suryadipta Majumdar, Lingyu Wang and Mourad Debbabi. PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds. In 2018 IEEE Conference on Communications and Network Security, CNS 2018, Beijing, China, May 30 - June 1, 2018. 2018, 1–7. BibTeX

    @inproceedings{DBLP:conf/cns/TabibanM0D18,
    	author = "Azadeh Tabiban and Suryadipta Majumdar and Lingyu Wang and Mourad Debbabi",
    	title = "{PERMON:} An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds",
    	booktitle = "2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018",
    	pages = "1--7",
    	year = 2018,
    	publisher = "{IEEE}"
    }
    
  3. Paria Shirani, Leo Collard, Basile L Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang and Aiman Hanna. BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. In Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings 10885. 2018, 114–138. BibTeX

    @inproceedings{DBLP:conf/dimva/ShiraniCALD0H18,
    	author = "Paria Shirani and Leo Collard and Basile L. Agba and Bernard Lebel and Mourad Debbabi and Lingyu Wang and Aiman Hanna",
    	title = "{BINARM:} Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices",
    	booktitle = "Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings",
    	pages = "114--138",
    	year = 2018,
    	series = "Lecture Notes in Computer Science",
    	volume = 10885,
    	publisher = "Springer"
    }
    
  4. Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta and Mourad Debbabi. Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective. In 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, Luxembourg City, Luxembourg, June 25-28, 2018. 2018, 562–573. BibTeX

    @inproceedings{DBLP:conf/dsn/TorabiBAGBD18,
    	author = "Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mario Galluscio and Amine Boukhtouta and Mourad Debbabi",
    	title = "Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: {A} Network Telescope Perspective",
    	booktitle = "48th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28, 2018",
    	pages = "562--573",
    	year = 2018,
    	publisher = "{IEEE} Computer Society"
    }
    
  5. Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi and Aiman Hanna. On Leveraging Coding Habits for Effective Binary Authorship Attribution. In Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I 11098. 2018, 26–47. BibTeX

    @inproceedings{DBLP:conf/esorics/AlrabaeeS0DH18,
    	author = "Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi and Aiman Hanna",
    	title = "On Leveraging Coding Habits for Effective Binary Authorship Attribution",
    	booktitle = "Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}",
    	pages = "26--47",
    	year = 2018,
    	series = "Lecture Notes in Computer Science",
    	volume = 11098,
    	publisher = "Springer"
    }
    
  6. Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi. Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks. In Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II 11099. 2018, 463–484. BibTeX

    @inproceedings{DBLP:conf/esorics/Alimohammadifar18,
    	author = "Amir Alimohammadifar and Suryadipta Majumdar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi",
    	title = "Stealthy Probing-Based Verification {(SPV):} An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks",
    	booktitle = "Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}",
    	pages = "463--484",
    	year = 2018,
    	series = "Lecture Notes in Computer Science",
    	volume = 11099,
    	publisher = "Springer"
    }
    
  7. Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi and Farkhund Iqbal. SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream. In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017. 2017, 23:1–23:11. BibTeX

    @inproceedings{DBLP:conf/IEEEares/ScellerKDI17,
    	author = "Quentin Le Sceller and ElMouatez Billah Karbab and Mourad Debbabi and Farkhund Iqbal",
    	title = "{SONAR:} Automatic Detection of Cyber Security Events over the Twitter Stream",
    	booktitle = "Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017",
    	pages = "23:1--23:11",
    	year = 2017,
    	publisher = "{ACM}"
    }
    
  8. He Huang, Amr M Youssef and Mourad Debbabi. BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017. 2017, 155–166. BibTeX

    @inproceedings{DBLP:conf/ccs/HuangYD17,
    	author = "He Huang and Amr M. Youssef and Mourad Debbabi",
    	title = "BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection",
    	booktitle = "Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017",
    	pages = "155--166",
    	year = 2017,
    	publisher = "{ACM}"
    }
    
  9. Paria Shirani, Lingyu Wang and Mourad Debbabi. BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. In Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings 10327. 2017, 301–324. BibTeX

    @inproceedings{DBLP:conf/dimva/Shirani0D17,
    	author = "Paria Shirani and Lingyu Wang and Mourad Debbabi",
    	title = "BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape",
    	booktitle = "Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings",
    	pages = "301--324",
    	year = 2017,
    	series = "Lecture Notes in Computer Science",
    	volume = 10327,
    	publisher = "Springer"
    }
    
  10. Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi. LeaPS: Learning-Based Proactive Security Auditing for Clouds. In Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II 10493. 2017, 265–285. BibTeX

    @inproceedings{DBLP:conf/esorics/MajumdarJOAPWD17,
    	author = "Suryadipta Majumdar and Yosr Jarraya and Momen Oqaily and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi",
    	title = "LeaPS: Learning-Based Proactive Security Auditing for Clouds",
    	booktitle = "Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}",
    	pages = "265--285",
    	year = 2017,
    	series = "Lecture Notes in Computer Science",
    	volume = 10493,
    	publisher = "Springer"
    }
    
  11. Reem Kateb, Parisa Akaber, Mosaddek Hossain Kamal Tushar, Mourad Debbabi and Chadi Assi. Delay aware measurements gathering in WAMS communication network. In 2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017, Montreal, QC, Canada, November 14-16, 2017. 2017, 1090–1094. BibTeX

    @inproceedings{DBLP:conf/globalsip/KatebATDA17,
    	author = "Reem Kateb and Parisa Akaber and Mosaddek Hossain Kamal Tushar and Mourad Debbabi and Chadi Assi",
    	title = "Delay aware measurements gathering in {WAMS} communication network",
    	booktitle = "2017 {IEEE} Global Conference on Signal and Information Processing, GlobalSIP 2017, Montreal, QC, Canada, November 14-16, 2017",
    	pages = "1090--1094",
    	year = 2017,
    	publisher = "{IEEE}"
    }
    
  12. Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi. TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. 2017. BibTeX

    @inproceedings{DBLP:conf/ndss/WangMMJAP0D17,
    	author = "Yushun Wang and Taous Madi and Suryadipta Majumdar and Yosr Jarraya and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi",
    	title = "TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation",
    	booktitle = "24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017",
    	year = 2017,
    	publisher = "The Internet Society"
    }
    
  13. Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi and Aiman Hanna. BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables. In ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings 502. 2017, 341–355. BibTeX

    @inproceedings{DBLP:conf/sec/NouhRMDH17,
    	author = "Lina Nouh and Ashkan Rahimian and Djedjiga Mouheb and Mourad Debbabi and Aiman Hanna",
    	title = "BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables",
    	booktitle = "{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings",
    	pages = "341--355",
    	year = 2017,
    	series = "{IFIP} Advances in Information and Communication Technology",
    	volume = 502,
    	publisher = "Springer"
    }
    
  14. Onur Duman, Mengyuan Zhang, Lingyu Wang and Mourad Debbabi. Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks. In 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017. 2017, 108–114. BibTeX

    @inproceedings{DBLP:conf/smartgridcomm/DumanZ0D17,
    	author = "Onur Duman and Mengyuan Zhang and Lingyu Wang and Mourad Debbabi",
    	title = "Measuring the security posture of {IEC} 61850 substations with redundancy against zero day attacks",
    	booktitle = "2017 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017",
    	pages = "108--114",
    	year = 2017,
    	publisher = "{IEEE}"
    }
    
  15. ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab and Djedjiga Mouheb. Cypider: building community-based cyber-defense infrastructure for android malware detection. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016. 2016, 348–362. BibTeX

    @inproceedings{DBLP:conf/acsac/KarbabDDM16,
    	author = "ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb",
    	title = "Cypider: building community-based cyber-defense infrastructure for android malware detection",
    	booktitle = "Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016",
    	pages = "348--362",
    	year = 2016,
    	publisher = "{ACM}"
    }
    
  16. Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi. Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack. In Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I 9878. 2016, 47–66. BibTeX

    @inproceedings{DBLP:conf/esorics/MajumdarJMAPWD16,
    	author = "Suryadipta Majumdar and Yosr Jarraya and Taous Madi and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi",
    	title = "Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack",
    	booktitle = "Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}",
    	pages = "47--66",
    	year = 2016,
    	series = "Lecture Notes in Computer Science",
    	volume = 9878,
    	publisher = "Springer"
    }
    
  17. Saed Alrabaee, Paria Shirani, Mourad Debbabi and Lingyu Wang. On the Feasibility of Malware Authorship Attribution. In Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers 10128. 2017, 256–272. BibTeX

    @inproceedings{DBLP:conf/fps/AlrabaeeSDW16,
    	author = "Saed Alrabaee and Paria Shirani and Mourad Debbabi and Lingyu Wang",
    	title = "On the Feasibility of Malware Authorship Attribution",
    	booktitle = "Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers",
    	pages = "256--272",
    	series = "Lecture Notes in Computer Science",
    	volume = 10128,
    	publisher = "Springer",
    	year = 2017
    }
    
  18. ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee and Djedjiga Mouheb. DySign: dynamic fingerprinting for the automatic detection of android malware. In 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016. 2016, 139–146. BibTeX

    @inproceedings{DBLP:conf/malware/KarbabDAM16,
    	author = "ElMouatez Billah Karbab and Mourad Debbabi and Saed Alrabaee and Djedjiga Mouheb",
    	title = "DySign: dynamic fingerprinting for the automatic detection of android malware",
    	booktitle = "11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016",
    	pages = "139--146",
    	year = 2016,
    	publisher = "{IEEE} Computer Society"
    }
    
  19. Parisa Akaber, Bassam Moussa, Mourad Debbabi and Chadi Assi. Cascading link failure analysis in interdependent networks for maximal outages in smart grid. In 2016 IEEE International Conference on Smart Grid Communications, SmartGridComm 2016, Sydney, Australia, November 6-9, 2016. 2016, 429–434. BibTeX

    @inproceedings{DBLP:conf/smartgridcomm/AkaberMDA16,
    	author = "Parisa Akaber and Bassam Moussa and Mourad Debbabi and Chadi Assi",
    	title = "Cascading link failure analysis in interdependent networks for maximal outages in smart grid",
    	booktitle = "2016 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2016, Sydney, Australia, November 6-9, 2016",
    	pages = "429--434",
    	year = 2016,
    	publisher = "{IEEE}"
    }
    
  20. Elias Bou-Harb, Mourad Debbabi and Chadi Assi. A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic. In 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015. 2015, 180–185. BibTeX

    @inproceedings{DBLP:conf/IEEEares/Bou-HarbDA15,
    	author = "Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi",
    	title = "A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic",
    	booktitle = "10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015",
    	pages = "180--185",
    	year = 2015,
    	publisher = "{IEEE} Computer Society"
    }
    
  21. Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi. Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack. In 7th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December 3, 2015. 2015, 58–65. BibTeX

    @inproceedings{DBLP:conf/cloudcom/MajumdarMWJPWD15,
    	author = "Suryadipta Majumdar and Taous Madi and Yushun Wang and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi",
    	title = "Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack",
    	booktitle = "7th {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December 3, 2015",
    	pages = "58--65",
    	year = 2015,
    	publisher = "{IEEE} Computer Society"
    }
    
  22. Sahba Sadri, Yosr Jarraya, Arash Eghtesadi and Mourad Debbabi. Towards migrating security policies of virtual machines in Software Defined Networks. In Proceedings of the 1st IEEE Conference on Network Softwarization, NetSoft 2015, London, United Kingdom, April 13-17, 2015. 2015, 1–9. BibTeX

    @inproceedings{DBLP:conf/netsoft/SadriJED15,
    	author = "Sahba Sadri and Yosr Jarraya and Arash Eghtesadi and Mourad Debbabi",
    	title = "Towards migrating security policies of virtual machines in Software Defined Networks",
    	booktitle = "Proceedings of the 1st {IEEE} Conference on Network Softwarization, NetSoft 2015, London, United Kingdom, April 13-17, 2015",
    	pages = "1--9",
    	year = 2015,
    	publisher = "{IEEE}"
    }
    
  23. Bassam Moussa, Mourad Debbabi and Chadi Assi. A detection and mitigation model for PTP delay attack in a smart grid substation. In 2015 IEEE International Conference on Smart Grid Communications, SmartGridComm 2015, Miami, FL, USA, November 2-5, 2015. 2015, 497–502. BibTeX

    @inproceedings{DBLP:conf/smartgridcomm/MoussaDA15,
    	author = "Bassam Moussa and Mourad Debbabi and Chadi Assi",
    	title = "A detection and mitigation model for {PTP} delay attack in a smart grid substation",
    	booktitle = "2015 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2015, Miami, FL, USA, November 2-5, 2015",
    	pages = "497--502",
    	year = 2015,
    	publisher = "{IEEE}"
    }
    
  24. Serguei A Mokhov, Joey Paquet and Mourad Debbabi. MARFCAT: Fast code analysis for defects and vulnerabilities. In 1st IEEE International Workshop on Software Analytics, SWAN 2015, Montreal, QC, Canada, March 2, 2015. 2015, 35–38. BibTeX

    @inproceedings{DBLP:conf/wcre/MokhovPD15,
    	author = "Serguei A. Mokhov and Joey Paquet and Mourad Debbabi",
    	title = "{MARFCAT:} Fast code analysis for defects and vulnerabilities",
    	booktitle = "1st {IEEE} International Workshop on Software Analytics, {SWAN} 2015, Montreal, QC, Canada, March 2, 2015",
    	pages = "35--38",
    	year = 2015,
    	publisher = "{IEEE} Computer Society"
    }
    
  25. Samira Barouti, Feras Aljumah, Dima Alhadidi and Mourad Debbabi. Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud. In Proceedings of the 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014 (DBSEC'2014), Vienna, Austria, July 14-16, 2014 8566. July 2014. BibTeX

    @inproceedings{552622811271,
    	author = "Samira Barouti and Feras Aljumah and Dima Alhadidi and Mourad Debbabi",
    	title = "Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud",
    	booktitle = "Proceedings of the 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014 (DBSEC'2014), Vienna, Austria, July 14-16, 2014",
    	month = "July",
    	year = 2014,
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	volume = 8566,
    	isbn = "978-3-662-43935-7",
    	ee = "http://dx.doi.org/10.1007/978-3-662-43936-4"
    }
    
  26. Serguei A Mokhov, Michael J Assels, Joey Paquet and Mourad Debbabi. Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. In Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers 8930. 2015, 168–183. BibTeX

    @inproceedings{441822811271,
    	author = "Serguei A. Mokhov and Michael J. Assels and Joey Paquet and Mourad Debbabi",
    	title = "Automating MAC Spoofer Evidence Gathering and Encoding for Investigations",
    	booktitle = "Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers",
    	pages = "168--183",
    	series = "Lecture Notes in Computer Science",
    	volume = 8930,
    	publisher = "Springer",
    	year = 2015,
    	isbn = "978-3-319-17039-8"
    }
    
  27. A Eghtesadi, Y Jarraya and M Debbabi. Preservation of Security Configurations in the Cloud. In Proceedings of the IEEE International Conference on Cloud Engineering (IC2E'2014), March 11-14, Boston, Massachusetts, USA. March 2014, 17–26. BibTeX

    @inproceedings{442622701281,
    	author = "A. Eghtesadi and Y. Jarraya and M. Debbabi",
    	title = "Preservation of Security Configurations in the Cloud",
    	booktitle = "Proceedings of the IEEE International Conference on Cloud Engineering (IC2E'2014), March 11-14, Boston, Massachusetts, USA",
    	month = "March",
    	year = 2014,
    	publisher = "IEEE",
    	pages = "17--26",
    	isbn = "978-1-4799-3766-0"
    }
    
  28. Philippe Charland Mohammad Reza Farhadi Benjamin C.M. Fung and Mourad Debbabi. BinClone: Detecting Code Clones in Malware. In Proceedings of the Eighth IEEE International Conference on Software Security and Reliability (SERE 2014), June 30 - July 2nd, San Francisco, California, USA. June 2014, 78–87. BibTeX

    @inproceedings{432622701281,
    	author = "Mohammad Reza Farhadi, Benjamin C.M. Fung, Philippe Charland and Mourad Debbabi",
    	title = "BinClone: Detecting Code Clones in Malware",
    	booktitle = "Proceedings of the Eighth IEEE International Conference on Software Security and Reliability (SERE 2014), June 30 - July 2nd, San Francisco, California, USA",
    	month = "June",
    	pages = "78--87",
    	publisher = "IEEE",
    	year = 2014,
    	isbn = "978-1-4799-4296-1"
    }
    
  29. Serguei A Mokhov, Joey Paquet and Mourad Debbabi. The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities. In Advances in Artificial Intelligence - 27th Canadian Conference on Artificial Intelligence, Canadian AI 2014, Montreal, QC, Canada, May 6-9, 2014 8436. May 2014. BibTeX

    @inproceedings{533621721283,
    	author = "Serguei A. Mokhov and Joey Paquet and Mourad Debbabi",
    	title = "The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities",
    	booktitle = "Advances in Artificial Intelligence - 27th Canadian Conference on Artificial Intelligence, Canadian AI 2014, Montreal, QC, Canada, May 6-9, 2014",
    	month = "May",
    	year = 2014,
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	volume = 8436,
    	isbn = "978-3-319-06482-6",
    	ee = "http://dx.doi.org/10.1007/978-3-319-06483-3"
    }
    
  30. Serguei A Mokhov, Michael J Assels, Joey Paquet and Mourad Debbabi. Toward Automated MAC Spoofer Investigations. In Proceedings of the International C* Conference on Computer Science and Software Engineering, C3S2E'2014, Montreal, QC, Canada - August 03 - 05, 2014. August 2014, 27:1–27:6. BibTeX

    @inproceedings{ mac-spoofer-analyzer,
    	author = "Serguei A. Mokhov and Michael J. Assels and Joey Paquet and Mourad Debbabi",
    	title = "Toward Automated MAC Spoofer Investigations",
    	booktitle = "Proceedings of the International C* Conference on Computer Science and Software Engineering, C3S2E'2014, Montreal, QC, Canada - August 03 - 05, 2014",
    	pages = "27:1--27:6",
    	publisher = "ACM",
    	year = 2014,
    	isbn = "978-1-4503-2712-1",
    	month = "August"
    }
    
  31. Amine Boukhtouta, Nour-Eddine Lakhdari, Serguei A Mokhov and Mourad Debbabi. Towards Fingerprinting Malicious Traffic. In Proceedings of ANT'13 19. 2013, 548–555. DOI BibTeX

    @inproceedings{ fingerprinting-mal-traffic,
    	author = "Amine Boukhtouta and Nour-Eddine Lakhdari and Serguei A. Mokhov and Mourad Debbabi",
    	title = "Towards Fingerprinting Malicious Traffic",
    	booktitle = "Proceedings of ANT'13",
    	pages = "548--555",
    	volume = 19,
    	publisher = "Elsevier",
    	year = 2013,
    	month = "",
    	location = "Halifax, Canada",
    	doi = "10.1016/j.procs.2013.06.073"
    }
    
  32. Serguei A Mokhov, Joey Paquet and Mourad Debbabi. Reasoning About a Simulated Printer Case Investigation with Forensic Lucid. In Pavel Gladyshev and Marcus K Rogers (eds.). Proceedings of Digital Forensics and Cyber Crime (ICDF2C'11) (0088). 2011, 282–296. Accepted and presented in 2011, appeared in 2012; online at \urlhttp://arxiv.org/abs/0906.5181. DOI BibTeX

    @inproceedings{ flucid-printer-case-icdf2c-2011,
    	author = "Serguei A. Mokhov and Joey Paquet and Mourad Debbabi",
    	title = "Reasoning About a Simulated Printer Case Investigation with {Forensic Lucid}",
    	booktitle = "Proceedings of Digital Forensics and Cyber Crime (ICDF2C'11)",
    	editor = "Pavel Gladyshev and Marcus K. Rogers",
    	publisher = "Springer Berlin Heidelberg",
    	series = "LNICST",
    	number = 0088,
    	pages = "282--296",
    	year = 2011,
    	month = "",
    	day = "25--27",
    	address = "",
    	location = "Dublin, Ireland",
    	doi = "10.1007/978-3-642-35515-8_23",
    	isbn = "978-3-642-35514-1",
    	issn = "1867-8211",
    	note = "Accepted and presented in 2011, appeared in 2012; online at \url{http://arxiv.org/abs/0906.5181}"
    }
    
  33. Serguei A Mokhov and Mourad Debbabi. File Type Analysis Using Signal Processing Techniques and Machine Learning vs.~\textttfile Unix Utility for Forensic Analysis. In Oliver Goebel, Sandra Frings, Detlef Guenther, Jens Nedon and Dirk Schadt (eds.). Proceedings of the IT Incident Management and IT Forensics (IMF'08). 2008, 73–85. BibTeX

    @inproceedings{ marf-file-type,
    	author = "Serguei A. Mokhov and Mourad Debbabi",
    	title = "File Type Analysis Using Signal Processing Techniques and Machine Learning vs.~\texttt{file} Unix Utility for Forensic Analysis",
    	booktitle = "Proceedings of the IT Incident Management and IT Forensics (IMF'08)",
    	editor = "Oliver Goebel and Sandra Frings and Detlef Guenther and Jens Nedon and Dirk Schadt",
    	publisher = "GI",
    	pages = "73--85",
    	year = 2008,
    	month = "",
    	day = "23--25",
    	location = "Mannheim, Germany",
    	isbn = "978-3-88579-234-5",
    	issn = "1617-5468",
    	series = "LNI140"
    }
    
  34. E Bou-Harb, M Debbabi and C Assi. Behavioral Analytics for Inferring Large-Scale Orchestrated Probing Events. In Proceedings of the IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity'2014), April 27 - May 2nd, 2014, Toronto, Ontario, Canada. April 2014, 506–511. BibTeX

    @inproceedings{442622701289,
    	author = "E. Bou-Harb and M. Debbabi and C. Assi",
    	title = "Behavioral Analytics for Inferring Large-Scale Orchestrated Probing Events",
    	booktitle = "Proceedings of the IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity'2014), April 27 - May 2nd, 2014, Toronto, Ontario, Canada",
    	month = "April",
    	pages = "506--511",
    	year = 2014,
    	publisher = "IEEE",
    	isbn = "978-1-4799-3088-3"
    }
    
  35. E Bou-Harb, C Fachkha, M Debbabi and C Assi. Inferring Internet-scale Infections by Correlating Malware and Probing Activities. In Proceedings of the IEEE International Conference on Communications (ICC'2014), Sydney, Australia, June 10-14, 2014. June 2014, 640–646. BibTeX

    @inproceedings{222622701282,
    	author = "E. Bou-Harb and C. Fachkha and M. Debbabi and C. Assi",
    	title = "Inferring Internet-scale Infections by Correlating Malware and Probing Activities",
    	booktitle = "Proceedings of the IEEE International Conference on Communications (ICC'2014), Sydney, Australia, June 10-14, 2014",
    	month = "June",
    	year = 2014,
    	pages = "640--646",
    	publisher = "IEEE"
    }
    
  36. A M Kara, H Binsalleeh, M Mannan, A Youssef and M Debbabi. Detection of Malicious Payload Distribution Channels in DNS. In Proceedings of the IEEE International Conference on Communications (ICC'2014), Sydney, Australia, June 10-14, 2014. June 2014, 853–858. BibTeX

    @inproceedings{222622701281,
    	author = "A. M. Kara and H. Binsalleeh and M. Mannan and A. Youssef and M. Debbabi",
    	title = "Detection of Malicious Payload Distribution Channels in DNS",
    	booktitle = "Proceedings of the IEEE International Conference on Communications (ICC'2014), Sydney, Australia, June 10-14, 2014",
    	month = "June",
    	year = 2014,
    	pages = "853--858",
    	publisher = "IEEE"
    }
    
  37. H Binsalleeh, A M Kara, A Youssef and M Debbabi. Characterization of Covert Channels in DNS. In Proceedings of the IEEE Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS'2014), March 30-April 2nd, 2014, Dubai, UAE. March 2014, 1–5. BibTeX

    @inproceedings{112622701281,
    	author = "H. Binsalleeh and A. M. Kara and A. Youssef and M. Debbabi",
    	title = "Characterization of Covert Channels in DNS",
    	booktitle = "Proceedings of the IEEE Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS'2014), March 30-April 2nd, 2014, Dubai, UAE",
    	publisher = "IEEE",
    	month = "March",
    	pages = "1--5",
    	year = 2014
    }
    
  38. C Fachkha, E Bou-Harb and M Debbabi. Fingerprinting Internet DNS Amplification DDoS Activities. In Proceedings of the IEEE Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS'2014), March 30-April 2nd, 2014, Dubai, UAE. March 2014, 1–5. BibTeX

    @inproceedings{112622701282,
    	author = "C. Fachkha and E. Bou-Harb and M. Debbabi",
    	title = "Fingerprinting Internet DNS Amplification DDoS Activities",
    	booktitle = "Proceedings of the IEEE Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS'2014), March 30-April 2nd, 2014, Dubai, UAE",
    	publisher = "IEEE",
    	month = "March",
    	pages = "1--5",
    	year = 2014
    }
    
  39. N Lakhdari, A Boukhtouta and M Debbabi. Inferring Malware Family through Application Protocol Sequences Signature. In Proceedings of the IEEE Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS'2014), March 30-April 2nd, 2014, Dubai, UAE. March 2014, 1–5. BibTeX

    @inproceedings{112622701283,
    	author = "N. Lakhdari and A. Boukhtouta and M. Debbabi",
    	title = "Inferring Malware Family through Application Protocol Sequences Signature",
    	booktitle = "Proceedings of the IEEE Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS'2014), March 30-April 2nd, 2014, Dubai, UAE",
    	publisher = "IEEE",
    	month = "March",
    	pages = "1--5",
    	year = 2014
    }
    
  40. S Barouti, D Alhadidi and M Debbabi. Symmetrically-Private Database Search in Cloud Computing. In Proceedings of the IEEE Fifth International Conference on Cloud Computing Technology and Science (CloudCom'2013), December 2-5, 2013, Bristol, UK. December 2013, 671–678. BibTeX

    @inproceedings{332622701281,
    	author = "S. Barouti and D. Alhadidi and M. Debbabi",
    	title = "Symmetrically-Private Database Search in Cloud Computing",
    	booktitle = "Proceedings of the IEEE Fifth International Conference on Cloud Computing Technology and Science (CloudCom'2013), December 2-5, 2013, Bristol, UK",
    	pages = "671--678",
    	month = "December",
    	year = 2013,
    	publisher = "IEEE"
    }
    
  41. W M Liu, L Wang, K Ren and M Debbabi. Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications. In Proceedings of the IEEE Fifth International Conference on Cloud Computing Technology and Science (CloudCom'2013), December 2-5, 2013, Bristol, UK. December 2013, 679–686. BibTeX

    @inproceedings{332622701282,
    	author = "W. M. Liu and L. Wang and K. Ren and M. Debbabi",
    	title = "Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications",
    	booktitle = "Proceedings of the IEEE Fifth International Conference on Cloud Computing Technology and Science (CloudCom'2013), December 2-5, 2013, Bristol, UK",
    	pages = "679--686",
    	month = "December",
    	year = 2013,
    	publisher = "IEEE"
    }
    
  42. S Ouchani, O Ait-Mohamed and M Debbabi. A Formal Verification Framework for Bluespec System Verilog. In Proceedings of the 2013 Forum on specification and Design Languages (FDL'2013), September 24-26, 2013, Paris, France. September 2013, 1–7. BibTeX

    @inproceedings{552622701281,
    	author = "S. Ouchani and O. Ait-Mohamed and M. Debbabi",
    	title = "A Formal Verification Framework for Bluespec System Verilog",
    	booktitle = "Proceedings of the 2013 Forum on specification and Design Languages (FDL'2013), September 24-26, 2013, Paris, France",
    	pages = "1--7",
    	month = "September",
    	year = 2013,
    	publisher = "IEEE"
    }
    
  43. C Fachkha, E Bou-Harb and M Debbabi. Towards a Forecasting Model for Distributed Denial of Service Activities. In Proceedings of the IEEE 12th International Symposium on Network Computing and Applications (NCA'2013), August 22-24, 2013, Cambridge, MA, USA. August 2013, 110–117. Best Paper Award. BibTeX

    @inproceedings{662622701281,
    	author = "C. Fachkha and E. Bou-Harb and M. Debbabi",
    	title = "Towards a Forecasting Model for Distributed Denial of Service Activities",
    	booktitle = "Proceedings of the IEEE 12th International Symposium on Network Computing and Applications (NCA'2013), August 22-24, 2013, Cambridge, MA, USA",
    	pages = "110--117",
    	month = "August",
    	year = 2013,
    	publisher = "IEEE",
    	note = "Best Paper Award"
    }
    
  44. D Mouheb, R Ziarati and M Debbabi. Aspect-Oriented Semantic Framework for Executable Models. In Proceedings of the 7th International Symposium on Theoretical Aspects of Software Engineering (TASE'2013), 1-3 July 2013, Birmingham, UK. July 2013, 63–70. BibTeX

    @inproceedings{262270128,
    	author = "D. Mouheb and R. Ziarati and M. Debbabi",
    	booktitle = "Proceedings of the 7th International Symposium on Theoretical Aspects of Software Engineering (TASE'2013), 1-3 July 2013, Birmingham, UK",
    	ee = "http://dx.doi.org/10.1109/TASE.2013.17",
    	isbn = "978-0-7695-5053-4",
    	month = "Jul",
    	pages = "63--70",
    	publisher = "IEEE",
    	title = "Aspect-Oriented Semantic Framework for Executable Models",
    	year = 2013
    }
    
  45. A Soeanu, S Ray, M Debbabi, M Allouche and J Berger. Gossiping Based Distributed Plan Monitoring. In Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT'2013), 25-28 June 2013, Halifax, Nova Scotia, Canada 19. June 2013, 72–79. BibTeX

    @inproceedings{577184040,
    	author = "A. Soeanu and S. Ray and M. Debbabi and M. Allouche and J. Berger",
    	booktitle = "Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT'2013), 25-28 June 2013, Halifax, Nova Scotia, Canada",
    	ee = "http://dx.doi.org/10.1016/j.procs.2013.06.015",
    	month = "Jun",
    	pages = "72--79",
    	publisher = "Elsevier",
    	series = "Procedia Computer Science",
    	title = "Gossiping Based Distributed Plan Monitoring",
    	volume = 19,
    	year = 2013
    }
    
  46. N Lakhdari, A Boukhtouta and M Debbabi. Fingerprinting Malicious Traffic with Malware Family Attribution. In Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT'2013), 25-28 June 2013, Halifax, Nova Scotia, Canada 19. June 2013, 548–555. BibTeX

    @inproceedings{1949887427,
    	author = "N. Lakhdari and A. Boukhtouta and M. Debbabi",
    	booktitle = "Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT'2013), 25-28 June 2013, Halifax, Nova Scotia, Canada",
    	ee = "http://dx.doi.org/10.1016/j.procs.2013.06.073",
    	month = "Jun",
    	pages = "548--555",
    	publisher = "Elsevier",
    	series = "Procedia Computer Science",
    	title = "Fingerprinting Malicious Traffic with Malware Family Attribution",
    	volume = 19,
    	year = 2013
    }
    
  47. Y Jarraya, S Ray, A Soeanu, M Debbabi, M Allouche and J Berger. Towards a Distributed Plan Execution Monitoring Framework. In Proceedings of the 3rd International Symposium on Frontiers in Ambient and Mobile Systems (FAMS'2013), 25-28 June 2013, Halifax, Nova Scotia, Canada. June 2013, 1034–1039. BibTeX

    @inproceedings{464223537,
    	author = "Y. Jarraya and S. Ray and A. Soeanu and M. Debbabi and M. Allouche and J. Berger",
    	booktitle = "Proceedings of the 3rd International Symposium on Frontiers in Ambient and Mobile Systems (FAMS'2013), 25-28 June 2013, Halifax, Nova Scotia, Canada",
    	ee = "http://dx.doi.org/10.1016/j.procs.2013.06.144",
    	month = "Jun",
    	pages = "1034--1039",
    	publisher = "Elsevier",
    	series = "Procedia Computer Science",
    	title = "Towards a Distributed Plan Execution Monitoring Framework",
    	year = 2013
    }
    
  48. E Bou-Harb, M Debbabi and C Assi. On Detecting and Clustering Distributed Cyber Scanning. In Proceedings of the 9th International Wireless Communications & Mobile Computing Conference (IWCMC'2013), Cagliari, Sardinia, Italy. July 2013, 926–933. BibTeX

    @inproceedings{485730446,
    	author = "E. Bou-Harb and M. Debbabi and C. Assi",
    	booktitle = "Proceedings of the 9th International Wireless Communications & Mobile Computing Conference (IWCMC'2013), Cagliari, Sardinia, Italy",
    	ee = "http://dx.doi.org/10.1109/IWCMC.2013.6583681",
    	isbn = "978-1-4673-2479-3",
    	month = "Jul",
    	pages = "926--933",
    	publisher = "IEEE",
    	title = "On Detecting and Clustering Distributed Cyber Scanning",
    	year = 2013
    }
    
  49. F Aljumah, R H M Leung, M Pourzandi and M Debbabi. Emergency Mobile Access to Personal Health Records Stored on an Untrusted Cloud. In Proceedings of the International Conference on Health Information Science (HIS'2013), March 25-27, 2013, London, UK 7798. March 2013, 30–41. BibTeX

    @inproceedings{1360405322,
    	author = "F. Aljumah and R. H. M. Leung and M. Pourzandi and M. Debbabi",
    	booktitle = "Proceedings of the International Conference on Health Information Science (HIS'2013), March 25-27, 2013, London, UK",
    	ee = "http://dx.doi.org/10.1007/978-3-642-37899-7",
    	isbn = "978-3-642-37898-0",
    	month = "Mar",
    	pages = "30--41",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Emergency Mobile Access to Personal Health Records Stored on an Untrusted Cloud",
    	volume = 7798,
    	year = 2013
    }
    
  50. C Fachkha, E Bou-Harb, A Boukhtouta, S Dinh, F Iqbal and M Debbabi. Investigating the Dark Cyberspace: Profiling,Threat-Based Analysis and Correlation. In 7th International Conference on Risks and Security of Internet and Systems, Cork, Ireland. October 2012, 1–8. BibTeX

    @inproceedings{1297138270,
    	author = "C. Fachkha and E. Bou-Harb and A. Boukhtouta and S. Dinh and F. Iqbal and M. Debbabi",
    	booktitle = "7th International Conference on Risks and Security of Internet and Systems, Cork, Ireland",
    	ee = "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber",
    	isbn = "978-1-4673-3087-9",
    	month = "Oct",
    	pages = "1--8",
    	publisher = "IEEE Computer Society",
    	title = "Investigating the Dark Cyberspace: Profiling,Threat-Based Analysis and Correlation",
    	year = 2012
    }
    
  51. Y Jarraya, A Eghtesadi, M Debbabi, Y Zhang and M Pourzandi. Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud. In 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2012), Toronto, Canada, LNCS, Volume 7596 7596. October 2012, 111–125. BibTeX

    @inproceedings{425538858,
    	author = "Y. Jarraya and A. Eghtesadi and M. Debbabi and Y. Zhang and M. Pourzandi",
    	booktitle = "14th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2012), Toronto, Canada, LNCS, Volume 7596",
    	ee = "http://dx.doi.org/10.1007/978-3-642-33536-5",
    	isbn = "978-3-642-33535-8",
    	month = "Oct",
    	pages = "111--125",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud",
    	volume = 7596,
    	year = 2012
    }
    
  52. S Ouchani, Ait O Mohamed and M Debbabi. Efficient Probabilistic Abstraction for SysML Activity Diagrams. In 10th International Conference on Software Engineering and Formal Methods (SEFM 2012), LNCS 7504. 2012, 263–277. BibTeX

    @inproceedings{1174070881,
    	author = "S. Ouchani and O. Ait Mohamed and M. Debbabi",
    	booktitle = "10th International Conference on Software Engineering and Formal Methods (SEFM 2012), LNCS",
    	ee = "http://dx.doi.org/10.1007/978-3-642-33826-7",
    	isbn = "978-3-642-33825-0",
    	pages = "263--277",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Efficient Probabilistic Abstraction for SysML Activity Diagrams",
    	volume = 7504,
    	year = 2012
    }
    
  53. A Soeanu, S Ray, M Debbabi, J Berger and A Boukhtouta. A Learning Based Evolutionary Algorithm For Distributed MultiDepot VRP. In 16th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES 2012), San Sebastian, Spain, IOS Press 243. September 2012, 49–58. BibTeX

    @inproceedings{75181913,
    	author = "A. Soeanu and S. Ray and M. Debbabi and J. Berger and A. Boukhtouta",
    	booktitle = "16th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES 2012), San Sebastian, Spain, IOS Press",
    	ee = "http://www.booksonline.iospress.nl/Content/View.aspx?piid",
    	isbn = "978-1-61499-104-5",
    	month = "Sep",
    	pages = "49--58",
    	publisher = "IOS Press",
    	series = "Frontiers in Artificial Intelligence and Applications",
    	title = "A Learning Based Evolutionary Algorithm For Distributed MultiDepot VRP",
    	volume = 243,
    	year = 2012
    }
    
  54. H Houmani and M Debbabi. Formal Analysis of the TLS Handshake Protocol. In 9th International Conference on Security and Cryptography (SECRYPT 2012), 2012. 2012, 192–205. BibTeX

    @inproceedings{697775977,
    	author = "H. Houmani and M. Debbabi",
    	booktitle = "9th International Conference on Security and Cryptography (SECRYPT 2012), 2012",
    	isbn = "978-989-8565-24-2",
    	pages = "192--205",
    	publisher = "SciTePress",
    	title = "Formal Analysis of the TLS Handshake Protocol",
    	year = 2012
    }
    
  55. D Mouheb, R Ziarati and M Debbabi. CPS/Frame-based Semantics for Aspect Matching and Weaving. In 11th International Conference on Intelligent Software Methodologies, Tools and Techniques (SOMET 2012), Volume 246, Genoa, Italy, IOS Press 246. September 2012, 146–161. BibTeX

    @inproceedings{2069426431,
    	author = "D. Mouheb and R. Ziarati and M. Debbabi",
    	booktitle = "11th International Conference on Intelligent Software Methodologies, Tools and Techniques (SOMET 2012), Volume 246, Genoa, Italy, IOS Press",
    	ee = "http://www.booksonline.iospress.nl/Content/View.aspx?piid",
    	isbn = "978-1-61499-124-3",
    	month = "Sep",
    	pages = "146--161",
    	publisher = "IOS Press",
    	series = "Frontiers in Artificial Intelligence and Applications",
    	title = "CPS/Frame-based Semantics for Aspect Matching and Weaving",
    	volume = 246,
    	year = 2012
    }
    
  56. S Ouchani, Ait O Mohamed and M Debbabi. A Probabilistic Verification Framework for SysML Activity Diagrams. In 11th International Conference on Intelligent Software Methodologies, Tools and Techniques (SOMET 2012), Volume 246, Genoa, Italy, IOS Press 246. September 2012, 108–123. BibTeX

    @inproceedings{521349907,
    	author = "S. Ouchani and O. Ait Mohamed and M. Debbabi",
    	booktitle = "11th International Conference on Intelligent Software Methodologies, Tools and Techniques (SOMET 2012), Volume 246, Genoa, Italy, IOS Press",
    	ee = "http://www.booksonline.iospress.nl/Content/View.aspx?piid",
    	isbn = "978-1-61499-124-3",
    	month = "Sep",
    	pages = "108--123",
    	publisher = "IOS Press",
    	series = "Frontiers in Artificial Intelligence and Applications",
    	title = "A Probabilistic Verification Framework for SysML Activity Diagrams",
    	volume = 246,
    	year = 2012
    }
    
  57. W M Liu, L Wang, K Ren, P Cheng and M Debbabi. K-Indistinguishable Traffic Padding in Web Applications. In 12th Privacy Enhancing Technologies Symposium, Vigo, Spain, LNCS, Volume 7384 7384. July 2012, 79–99. BibTeX

    @inproceedings{529563864,
    	author = "W. M. Liu and L. Wang and K. Ren and P. Cheng and M. Debbabi",
    	booktitle = "12th Privacy Enhancing Technologies Symposium, Vigo, Spain, LNCS, Volume 7384",
    	ee = "http://dx.doi.org/10.1007/978-3-642-31680-7",
    	isbn = "978-3-642-31679-1",
    	month = "Jul",
    	pages = "79--99",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "K-Indistinguishable Traffic Padding in Web Applications",
    	volume = 7384,
    	year = 2012
    }
    
  58. D Alhadidi, N Mohammed, B C M Fung and M Debbabi. Secure Distributed Framework for achieving e-Deferential Privacy. In 12th Privacy Enhancing Technologies Symposium, Vigo, Spain, LNCS, Volume 7384 7384. July 2012, 120–139. BibTeX

    @inproceedings{451606965,
    	author = "D. Alhadidi and N. Mohammed and B. C. M. Fung and M. Debbabi",
    	booktitle = "12th Privacy Enhancing Technologies Symposium, Vigo, Spain, LNCS, Volume 7384",
    	ee = "http://dx.doi.org/10.1007/978-3-642-31680-7",
    	isbn = "978-3-642-31679-1",
    	month = "Jul",
    	pages = "120--139",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Secure Distributed Framework for achieving e-Deferential Privacy",
    	volume = 7384,
    	year = 2012
    }
    
  59. Y Jarraya and M Debbabi. Formal Specification and Probabilistic Verification of SysML Activity Diagrams. In Sixth International Symposium on Theoretical Aspects of Software Engineering (TASE 2012), Beijing, China. July 2012, 17–24. BibTeX

    @inproceedings{964469749,
    	author = "Y. Jarraya and M. Debbabi",
    	booktitle = "Sixth International Symposium on Theoretical Aspects of Software Engineering (TASE 2012), Beijing, China",
    	ee = "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber",
    	isbn = "978-0-7695-4751-0",
    	month = "Jul",
    	pages = "17--24",
    	publisher = "IEEE",
    	title = "Formal Specification and Probabilistic Verification of SysML Activity Diagrams",
    	year = 2012
    }
    
  60. Y Jarraya, A Eghtesadi, M Debbabi, Y Zhang and M Pourzandi. Cloud Calculus: Security Verification in Elastic Cloud Computing Platform. In International Symposium on Security in Collaboration Technologies and Systems (SECOTS 2012), Denver, Colorado, USA, IEEE Press. May 2012, 447–454. BibTeX

    @inproceedings{1094460411,
    	author = "Y. Jarraya and A. Eghtesadi and M. Debbabi and Y. Zhang and M. Pourzandi",
    	booktitle = "International Symposium on Security in Collaboration Technologies and Systems (SECOTS 2012), Denver, Colorado, USA, IEEE Press",
    	ee = "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber",
    	isbn = "978-1-4673-1381-0",
    	month = "May",
    	pages = "447--454",
    	publisher = "IEEE",
    	title = "Cloud Calculus: Security Verification in Elastic Cloud Computing Platform",
    	year = 2012
    }
    
  61. E Bou-Harb, M Debbabi and C Assi. A First Look on the Effects and Mitigation of VoIP SPIT Flooding in 4G Mobile Networks. In IEEE International Conference on Communications (ICC 2012), Ottawa, Canada, IEEE Press. June 2012, 982–987. BibTeX

    @inproceedings{127304652,
    	author = "E. Bou-Harb and M. Debbabi and C. Assi",
    	booktitle = "IEEE International Conference on Communications (ICC 2012), Ottawa, Canada, IEEE Press",
    	ee = "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber",
    	isbn = "978-1-4577-2052-9",
    	month = "Jun",
    	pages = "982--987",
    	publisher = "IEEE",
    	title = "A First Look on the Effects and Mitigation of VoIP SPIT Flooding in 4G Mobile Networks",
    	year = 2012
    }
    
  62. M Saleh, A Soeanu, S Ray, M Debbabi, J Berger and A Boukhtouta. Mechanism Design for Decentralized Vehicle Routing Problem. In ACM Symposium on Applied Computing (ACM SAC 2012), Cooperative Systems in Heterogeneous Environments Track, Trento, Italy, ACM Press. March 2012, 749–754. BibTeX

    @inproceedings{1238058139,
    	author = "M. Saleh and A. Soeanu and S. Ray and M. Debbabi and J. Berger and A. Boukhtouta",
    	booktitle = "ACM Symposium on Applied Computing (ACM SAC 2012), Cooperative Systems in Heterogeneous Environments Track, Trento, Italy, ACM Press",
    	ee = "http://dl.acm.org/citation.cfm?id",
    	isbn = "978-1-4503-0857-1",
    	month = "Mar",
    	pages = "749--754",
    	publisher = "ACM",
    	title = "Mechanism Design for Decentralized Vehicle Routing Problem",
    	year = 2012
    }
    
  63. S Das, M Pourzandi and M Debbabi. On SPIM Detection in LTE Networks. In IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2012), Montreal, QC, Canada, IEEE Press. April 2012, 1–4. BibTeX

    @inproceedings{705062537,
    	author = "S. Das and M. Pourzandi and M. Debbabi",
    	booktitle = "IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2012), Montreal, QC, Canada, IEEE Press",
    	ee = "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber",
    	isbn = "978-1-4673-1431-2",
    	month = "Apr",
    	pages = "1--4",
    	publisher = "IEEE",
    	title = "On SPIM Detection in LTE Networks",
    	year = 2012
    }
    
  64. A Soeanu, S Ray, M Debbabi, J Berger, A Boukhtouta and A Ghanmi. Model-Checking Based Service Delivery Planning. In IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2012), Montreal, Qc, Canada, IEEE Press. April 2012, 1–4. BibTeX

    @inproceedings{1040179145,
    	author = "A. Soeanu and S. Ray and M. Debbabi and J. Berger and A. Boukhtouta and A. Ghanmi",
    	booktitle = "IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2012), Montreal, Qc, Canada, IEEE Press",
    	ee = "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber",
    	isbn = "978-1-4673-1431-2",
    	month = "Apr",
    	pages = "1--4",
    	publisher = "IEEE",
    	title = "Model-Checking Based Service Delivery Planning",
    	year = 2012
    }
    
  65. A Soeanu, S Ray, M Debbabi, J Berger, A Boukhtouta and A Ghanmi. A Decentralized Heuristic for Multi-Depot Split-Delivery Vehicle Routing Problem. In IEEE International Conference on Automation and Logistics (ICAL 2011), Chongqing, China, ISBN 978-1-4577-0301 (Finalist for the Best Paper Award). August 2011, 70–75. BibTeX

    @inproceedings{325478801,
    	author = "A. Soeanu and S. Ray and M. Debbabi and J. Berger and A. Boukhtouta and A. Ghanmi",
    	booktitle = "IEEE International Conference on Automation and Logistics (ICAL 2011), Chongqing, China, ISBN 978-1-4577-0301 (Finalist for the Best Paper Award)",
    	ee = "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber",
    	isbn = "978-1-4577-0301-0",
    	month = "Aug",
    	pages = "70--75",
    	publisher = "IEEE",
    	title = "A Decentralized Heuristic for Multi-Depot Split-Delivery Vehicle Routing Problem",
    	year = 2011
    }
    
  66. S Ouchani, Y Jarraya, Ait O Mohamed and M Debbabi. Security Estimation in Streaming Protocols. In 7th International Conference on Innovations in Information Technology, Abu Dhabi, United Arab Emirates. April 2011, 427–432. BibTeX

    @inproceedings{1135162170,
    	author = "S. Ouchani and Y. Jarraya and O. Ait Mohamed and M. Debbabi",
    	booktitle = "7th International Conference on Innovations in Information Technology, Abu Dhabi, United Arab Emirates",
    	month = "Apr",
    	pages = "427--432",
    	title = "Security Estimation in Streaming Protocols",
    	year = 2011
    }
    
  67. H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi and L Wang. On the Analysis of the Zeus Botnet Crime ware Toolkit. In 8th Annual Conference on Privacy, Security and Trust (PST 2010), Ottawa, Ontario, Canada. IEEE Press. (Best Paper Award). August 2010, 31–38. BibTeX

    @inproceedings{1789073431,
    	author = "H. Binsalleeh and T. Ormerod and A. Boukhtouta and P. Sinha and A. Youssef and M. Debbabi and L. Wang",
    	booktitle = "8th Annual Conference on Privacy, Security and Trust (PST 2010), Ottawa, Ontario, Canada. IEEE Press. (Best Paper Award)",
    	ee = "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber",
    	isbn = "978-1-4244-7551-3",
    	month = "Aug",
    	pages = "31--38",
    	publisher = "IEEE",
    	title = "On the Analysis of the Zeus Botnet Crime ware Toolkit",
    	year = 2010
    }
    
  68. M Nouh, R Ziarati, D Mouheb, D Alhadidi, M Debbabi, L Wang and M Pourzandi. Aspect Weaver: A Model Transformation Approach for UML Models. In 20th Annual Conference of the Center for Advanced Studies on Collaborative Research (CASCON 2010), Toronto, Ontario, Canada, ACM Press. November 2010, 139–153. BibTeX

    @inproceedings{2107956314,
    	author = "M. Nouh and R. Ziarati and D. Mouheb and D. Alhadidi and M. Debbabi and L. Wang and M. Pourzandi",
    	booktitle = "20th Annual Conference of the Center for Advanced Studies on Collaborative Research (CASCON 2010), Toronto, Ontario, Canada, ACM Press",
    	ee = "http://doi.acm.org/10.1145/1923947.1923962",
    	month = "Nov",
    	pages = "139--153",
    	publisher = "ACM",
    	title = "Aspect Weaver: A Model Transformation Approach for UML Models",
    	year = 2010
    }
    
  69. P Sinha, A Boukhtouta, V H Belarde and M Debbabi. Insights from the Analysis of the Mariposa Botnet. In 5th International Conference on Risks and Security of Internet and Systems (CRISIS 2010), Montreal, Quebec, Canada, IEEE Press. October 2010, 1–9. BibTeX

    @inproceedings{660895301,
    	author = "P. Sinha and A. Boukhtouta and V. H. Belarde and M. Debbabi",
    	booktitle = "5th International Conference on Risks and Security of Internet and Systems (CRISIS 2010), Montreal, Quebec, Canada, IEEE Press",
    	ee = "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber",
    	isbn = "978-1-4244-8641-0",
    	month = "Oct",
    	pages = "1--9",
    	publisher = "IEEE",
    	title = "Insights from the Analysis of the Mariposa Botnet",
    	year = 2010
    }
    
  70. D Mouheb, D Alhadidi, M Nouh, M Debbabi, L Wang and M Pourzandi. Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework. In 7th International Workshop on Formal Aspects of Component Software (FACS 2010), Guimaraes, Portugal, Springer 6921. October 2010, 182–199. BibTeX

    @inproceedings{1448838736,
    	author = "D. Mouheb and D. Alhadidi and M. Nouh and M. Debbabi and L. Wang and M. Pourzandi",
    	booktitle = "7th International Workshop on Formal Aspects of Component Software (FACS 2010), Guimaraes, Portugal, Springer",
    	ee = "http://dx.doi.org/10.1007/978-3-642-27269-1",
    	isbn = "978-3-642-27268-4",
    	month = "Oct",
    	pages = "182--199",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework",
    	volume = 6921,
    	year = 2010
    }
    
  71. S A Mokhov, J Paquet and M Debbabi. Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. In 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Ontario, Canada, Springer 6307. September 2010, 508–509. BibTeX

    @inproceedings{1226705899,
    	author = "S. A. Mokhov and J. Paquet and M. Debbabi",
    	booktitle = "13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Ontario, Canada, Springer",
    	ee = "http://dx.doi.org/10.1007/978-3-642-15512-3",
    	isbn = "978-3-642-15511-6",
    	month = "Sep",
    	pages = "508--509",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence",
    	volume = 6307,
    	year = 2010
    }
    
  72. T Ormerod, L Wang, M Debbabi, A Youssef, H Binsalleeh, A Boukhtouta and P Sinha. Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. In 4th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2010), Venice/Mestre, Italy. July 2010, 195–200. BibTeX

    @inproceedings{356494143,
    	author = "T. Ormerod and L. Wang and M. Debbabi and A. Youssef and H. Binsalleeh and A. Boukhtouta and P. Sinha",
    	booktitle = "4th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2010), Venice/Mestre, Italy",
    	month = "Jul",
    	pages = "195--200",
    	title = "Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat",
    	year = 2010
    }
    
  73. S A Mokhov, E Vassev, J Paquet and M Debbabi. Towards a Self-Forensics Property in the ASSL Toolset. In Canadian Conference on Computer Science & Software Engineering (C3S2E 2010), Montreal, Quebec, Canada, ACM Press. May 2010, 108–113. BibTeX

    @inproceedings{329205081,
    	author = "S. A. Mokhov and E. Vassev and J. Paquet and M. Debbabi",
    	booktitle = "Canadian Conference on Computer Science & Software Engineering (C3S2E 2010), Montreal, Quebec, Canada, ACM Press",
    	ee = "http://doi.acm.org/10.1145/1822327.1822342",
    	isbn = "978-1-60558-901-5",
    	month = "May",
    	pages = "108--113",
    	publisher = "ACM",
    	series = "ACM International Conference Proceeding Series",
    	title = "Towards a Self-Forensics Property in the ASSL Toolset",
    	year = 2010
    }
    
  74. F Iqbal, L A Khan, B C M Fung and M Debbabi. E-mail Authorship Verification for Forensic Investigation. In 2010 ACM Symposium on Applied Computing (SAC 2010), Sierre, Switzerland, ACM Press. March 2010, 1591–1598. BibTeX

    @inproceedings{566184522,
    	author = "F. Iqbal and L. A. Khan and B. C. M. Fung and M. Debbabi",
    	booktitle = "2010 ACM Symposium on Applied Computing (SAC 2010), Sierre, Switzerland, ACM Press",
    	ee = "http://doi.acm.org/10.1145/1774088.1774428",
    	isbn = "978-1-60558-639-7",
    	month = "Mar",
    	pages = "1591--1598",
    	publisher = "ACM",
    	title = "E-mail Authorship Verification for Forensic Investigation",
    	year = 2010
    }
    
  75. R Charpentier, M Debbabi and TFOSS Research Team. Security Evaluation and Hardening of Free and Open Source Software (FOSS). In 4th International Workshop on Foundations and Techniques for Open Source Software Certification, Pisa, Italy. September 2010. BibTeX

    @inproceedings{993807979,
    	author = "R. Charpentier and M. Debbabi and TFOSS Research Team",
    	booktitle = "4th International Workshop on Foundations and Techniques for Open Source Software Certification, Pisa, Italy",
    	month = "Sep",
    	title = "Security Evaluation and Hardening of Free and Open Source Software (FOSS)",
    	year = 2010
    }
    
  76. D Alhadidi, A Boukhtouta, N Belblidia, M Debbabi and P Bhattacharya. The Dataflow Pointcut: A Formal and Practical Framework. In 8th International Conference on Aspect-Oriented Software Development (AOSD'09), Charlottesville, Virginia, USA, ACM Press. March 2009, 15–26. BibTeX

    @inproceedings{1939488365,
    	author = "D. Alhadidi and A. Boukhtouta and N. Belblidia and M. Debbabi and P. Bhattacharya",
    	booktitle = "8th International Conference on Aspect-Oriented Software Development (AOSD'09), Charlottesville, Virginia, USA, ACM Press",
    	ee = "http://doi.acm.org/10.1145/1509239.1509244",
    	isbn = "978-1-60558-442-3",
    	month = "Mar",
    	pages = "15--26",
    	publisher = "ACM",
    	title = "The Dataflow Pointcut: A Formal and Practical Framework",
    	year = 2009
    }
    
  77. S M Hejazi, C Talhi and M Debbabi. Extraction of Forensically Sensitive Information from Windows Physical Memory. In 9th Digital Forensic Research Workshop (DFRWS'2009), Montreal, QC, CA, Elsevier Press. August 2009, S121–S131. BibTeX

    @inproceedings{1114316504,
    	author = "S. M. Hejazi and C. Talhi and M. Debbabi",
    	booktitle = "9th Digital Forensic Research Workshop (DFRWS'2009), Montreal, QC, CA, Elsevier Press",
    	ee = "http://dx.doi.org/10.1016/j.diin.2009.06.003",
    	issn = "1742-2876",
    	month = "Aug",
    	pages = "S121--S131",
    	publisher = "Elsevier",
    	title = "Extraction of Forensically Sensitive Information from Windows Physical Memory",
    	year = 2009
    }
    
  78. D Mouheb, C Talhi, M Azzam, V Lima, M Debbabi, L Wang and M Pourzandi. An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. In 8th Inter. Conference on Software Methodologies, Tools and Techniques (SOMET'2009), Prague, Czech Republic, IOS Press 199. September 2009, 203–222. BibTeX

    @inproceedings{1193117428,
    	author = "D. Mouheb and C. Talhi and M. Azzam and V. Lima and M. Debbabi and L. Wang and M. Pourzandi",
    	booktitle = "8th Inter. Conference on Software Methodologies, Tools and Techniques (SOMET'2009), Prague, Czech Republic, IOS Press",
    	ee = "http://dx.doi.org/10.3233/978-1-60750-049-0-203",
    	isbn = "978-1-60750-049-0",
    	month = "Sep",
    	pages = "203--222",
    	publisher = "IOS Press",
    	series = "Frontiers in Artificial Intelligence and Applications",
    	title = "An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation",
    	volume = 199,
    	year = 2009
    }
    
  79. A Hanna, H Z Ling, X Yang and M Debbabi. A Synergy Between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities. In Inter. Symposium on Information Security (IS'2009), LNCS, Volume 5871, 2009, Springer Verlag 5871. 2009, 815–832. BibTeX

    @inproceedings{1691139505,
    	author = "A. Hanna and H. Z. Ling and X. Yang and M. Debbabi",
    	booktitle = "Inter. Symposium on Information Security (IS'2009), LNCS, Volume 5871, 2009, Springer Verlag",
    	ee = "http://dx.doi.org/10.1007/978-3-642-05151-7",
    	isbn = "978-3-642-05150-0",
    	pages = "815--832",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "A Synergy Between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities",
    	volume = 5871,
    	year = 2009
    }
    
  80. S Tlili, X Yang, R Hadjidj and M Debbabi. Verification of CERT Secure Coding Rules: Case Studies. In International Symposium on Information Security (IS'2009), LNCS, Volume 5871, 2009, Springer Verlag 5871. 2009, 913–930. BibTeX

    @inproceedings{1586910287,
    	author = "S. Tlili and X. Yang and R. Hadjidj and M. Debbabi",
    	booktitle = "International Symposium on Information Security (IS'2009), LNCS, Volume 5871, 2009, Springer Verlag",
    	ee = "http://dx.doi.org/10.1007/978-3-642-05151-7",
    	isbn = "978-3-642-05150-0",
    	pages = "913--930",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Verification of CERT Secure Coding Rules: Case Studies",
    	volume = 5871,
    	year = 2009
    }
    
  81. A Boukhtouta, D Alhadidi and M Debbabi. A Practical Framework for the Dataflow Pointcut in AspectJ. In International Workshop on Secure Software Engineering (SecSE'2009), International Conference on Availability, Reliability and Security, Fukuoka, Japan, IEEE Press. March 2009, 835–840. BibTeX

    @inproceedings{727549533,
    	author = "A. Boukhtouta and D. Alhadidi and M. Debbabi",
    	booktitle = "International Workshop on Secure Software Engineering (SecSE'2009), International Conference on Availability, Reliability and Security, Fukuoka, Japan, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/ARES.2009.86",
    	month = "Mar",
    	pages = "835--840",
    	publisher = "IEEE Computer Society",
    	title = "A Practical Framework for the Dataflow Pointcut in AspectJ",
    	year = 2009
    }
    
  82. Y Jarraya, M Debbabi and J Bentahar. On the Meaning of SysML Activity Diagrams. In 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS'09), San Francisco, CA, USA, IEEE Press. April 2009, 95–105. BibTeX

    @inproceedings{1685648508,
    	author = "Y. Jarraya and M. Debbabi and J. Bentahar",
    	booktitle = "16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS'09), San Francisco, CA, USA, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/ECBS.2009.25",
    	isbn = "978-0-7695-3602-6",
    	month = "Apr",
    	pages = "95--105",
    	publisher = "IEEE Computer Society",
    	title = "On the Meaning of SysML Activity Diagrams",
    	year = 2009
    }
    
  83. V Lima, C Talhi, D Mouheb, M Debbabi, M Pourzandi and L Wang. Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. In 4th International Workshop on Systems Software Verification (SSV'09), Aachen, Germany, ENTCS, Volume 254. June 2009, 143–160. BibTeX

    @inproceedings{91030143,
    	author = "V. Lima and C. Talhi and D. Mouheb and M. Debbabi and M. Pourzandi and L. Wang",
    	booktitle = "4th International Workshop on Systems Software Verification (SSV'09), Aachen, Germany, ENTCS, Volume 254",
    	month = "Jun",
    	pages = "143--160",
    	title = "Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages",
    	year = 2009
    }
    
  84. D Mouheb, C Talhi, V Lima, M Debbabi, L Wang and M Pourzandi. Weaving Security Aspects into UML 2.0 Design Models. In 13th Aspect Oriented Modeling Workshop (AOM'09), at AOSD 2009, Charlottesville, Virginia, USA, ACM Press. March 2009, 7–12. BibTeX

    @inproceedings{488030003,
    	author = "D. Mouheb and C. Talhi and V. Lima and M. Debbabi and L. Wang and M. Pourzandi",
    	booktitle = "13th Aspect Oriented Modeling Workshop (AOM'09), at AOSD 2009, Charlottesville, Virginia, USA, ACM Press",
    	month = "Mar",
    	pages = "7--12",
    	publisher = "ACM Press",
    	title = "Weaving Security Aspects into UML 2.0 Design Models",
    	year = 2009
    }
    
  85. B C M Fung, K Wang, L Wang and M Debbabi. A Framework for Privacy-Preserving Cluster Analysis. In IEEE International Conference on Intelligence and Security Informatics (ISI'2008), Taipei, Taiwan, IEEE Press. June 2008, 46–51. BibTeX

    @inproceedings{1327695777,
    	author = "B. C. M. Fung and K. Wang and L. Wang and M. Debbabi",
    	booktitle = "IEEE International Conference on Intelligence and Security Informatics (ISI'2008), Taipei, Taiwan, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/ISI.2008.4565028",
    	month = "Jun",
    	pages = "46--51",
    	publisher = "IEEE",
    	title = "A Framework for Privacy-Preserving Cluster Analysis",
    	year = 2008
    }
    
  86. S Tlili, Z Yang, H Ling and M Debbabi. A Hybrid Approach for Safe Memory Management in C. In Intl. Conference on Algebraic Methodology and Software Technology (AMAST'2008), Urbana, IL, USA, Springer 5140. July 2008, 377–391. BibTeX

    @inproceedings{2055458846,
    	author = "S. Tlili and Z. Yang and H. Ling and M. Debbabi",
    	booktitle = "Intl. Conference on Algebraic Methodology and Software Technology (AMAST'2008), Urbana, IL, USA, Springer",
    	ee = "http://dx.doi.org/10.1007/978-3-540-79980-1_28",
    	isbn = "978-3-540-79979-5",
    	month = "Jul",
    	pages = "377--391",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "A Hybrid Approach for Safe Memory Management in C",
    	volume = 5140,
    	year = 2008
    }
    
  87. A Hanna, H Ling, J Furlong and M Debbabi. Towards Automation of Testing High-Level Security Properties. In DBSEC-2008 Conference, London, England, Lecture Notes in Computer Science, Springer Verlag 5094. July 2008, 268–282. BibTeX

    @inproceedings{419217426,
    	author = "A. Hanna and H. Ling and J. Furlong and M. Debbabi",
    	booktitle = "DBSEC-2008 Conference, London, England, Lecture Notes in Computer Science, Springer Verlag",
    	ee = "http://dx.doi.org/10.1007/978-3-540-70567-3_21",
    	isbn = "978-3-540-70566-6",
    	month = "Jul",
    	pages = "268--282",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Towards Automation of Testing High-Level Security Properties",
    	volume = 5094,
    	year = 2008
    }
    
  88. N Mohammed, H Otrok, L Wang, M Debbabi and P Bhattacharya. A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. In IEEE Wireless Communications & Networking Conference (WCNC'2008), Las Vegas, Nevada, USA, IEEE Press. March 2008, 2816–2821. BibTeX

    @inproceedings{428482368,
    	author = "N. Mohammed and H. Otrok and L. Wang and M. Debbabi and P. Bhattacharya",
    	booktitle = "IEEE Wireless Communications & Networking Conference (WCNC'2008), Las Vegas, Nevada, USA, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/WCNC.2008.493",
    	month = "Mar",
    	pages = "2816--2821",
    	publisher = "IEEE",
    	title = "A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET",
    	year = 2008
    }
    
  89. A Mourad, D Alhadidi and M Debbabi. Cross-Language Weaving Approach Targeting Software Security Hardening. In 6th Annual Conference on Privacy, Security and Trust (PST'2008), Fredericton, New Brunswick, Canada, IEEE/ACM Press. October 2008, 87–98. BibTeX

    @inproceedings{260812060,
    	author = "A. Mourad and D. Alhadidi and M. Debbabi",
    	booktitle = "6th Annual Conference on Privacy, Security and Trust (PST'2008), Fredericton, New Brunswick, Canada, IEEE/ACM Press",
    	ee = "http://dx.doi.org/10.1109/PST.2008.22",
    	month = "Oct",
    	pages = "87--98",
    	publisher = "IEEE",
    	title = "Cross-Language Weaving Approach Targeting Software Security Hardening",
    	year = 2008
    }
    
  90. R Hadjidj, X Yang, S Tlili and M Debbabi. Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. In 6th Annual Conference on Privacy, Security and Trust (PST'2008), Fredericton, New Brunswick, Canada, IEEE/ACM Press. October 2008, 133–142. BibTeX

    @inproceedings{362096038,
    	author = "R. Hadjidj and X. Yang and S. Tlili and M. Debbabi",
    	booktitle = "6th Annual Conference on Privacy, Security and Trust (PST'2008), Fredericton, New Brunswick, Canada, IEEE/ACM Press",
    	ee = "http://dx.doi.org/10.1109/PST.2008.21",
    	isbn = "978-0-7695-3390-2",
    	month = "Oct",
    	pages = "133--142",
    	publisher = "IEEE",
    	title = "Model-Checking for Software Vulnerabilities Detection with Multi-Language Support",
    	year = 2008
    }
    
  91. H Otrok, N Mohammed, L Wang, M Debbabi and P Bhattacharya. A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. In 4th IEEE Inter. Conference on Wireless and Mobile Computing, Networking and Communications (Security and Privacy Workshop - SecPri WiMob'2008), Avignon, France, IEEE Press. October 2008, 608–612. BibTeX

    @inproceedings{1221645162,
    	author = "H. Otrok and N. Mohammed and L. Wang and M. Debbabi and P. Bhattacharya",
    	booktitle = "4th IEEE Inter. Conference on Wireless and Mobile Computing, Networking and Communications (Security and Privacy Workshop - SecPri WiMob'2008), Avignon, France, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/WiMob.2008.21",
    	month = "Oct",
    	pages = "608--612",
    	publisher = "IEEE",
    	title = "A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs",
    	year = 2008
    }
    
  92. A Rachedi, A Benslimane, H Otrok, N Mohammed and M Debbabi. A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. In fourth IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'2008), Avignon, France, IEEE Press. October 2008, 417–422. BibTeX

    @inproceedings{319071288,
    	author = "A. Rachedi and A. Benslimane and H. Otrok and N. Mohammed and M. Debbabi",
    	booktitle = "fourth IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'2008), Avignon, France, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/WiMob.2008.77",
    	month = "Oct",
    	pages = "417--422",
    	publisher = "IEEE",
    	title = "A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks",
    	year = 2008
    }
    
  93. S Mokhov, J Paquet and M Debbabi. Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid. In 4th International Conference on IT Incident Management & IT Forensics (IMF'2008), Mannheim, Germany 140. September 2008, 197–216. BibTeX

    @inproceedings{976506283,
    	author = "S. Mokhov and J. Paquet and M. Debbabi",
    	booktitle = "4th International Conference on IT Incident Management & IT Forensics (IMF'2008), Mannheim, Germany",
    	ee = "http://subs.emis.de/LNI/Proceedings/Proceedings140/article2303.html",
    	isbn = "978-3-88579-234-5",
    	month = "Sep",
    	pages = "197--216",
    	publisher = "GI",
    	series = "LNI",
    	title = "Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid",
    	volume = 140,
    	year = 2008
    }
    
  94. A Mourad, D Alhadidi and M Debbabi. Towards Language-Independent Approach for Security Concerns Weaving. In International Conference on Security and Cryptography (ICETE-Secrypt 2008), Porto, Portugal, INSTICC Press. July 2008, 460–465. BibTeX

    @inproceedings{1612973666,
    	author = "A. Mourad and D. Alhadidi and M. Debbabi",
    	booktitle = "International Conference on Security and Cryptography (ICETE-Secrypt 2008), Porto, Portugal, INSTICC Press",
    	isbn = "978-989-8111-59-3",
    	month = "Jul",
    	pages = "460--465",
    	publisher = "INSTICC Press",
    	title = "Towards Language-Independent Approach for Security Concerns Weaving",
    	year = 2008
    }
    
  95. A Hanna, H Ling, J Furlong, Z Yang and M Debbabi. Targeting Security Vulnerabilities: From Specification to Detection. In Quality Software, International Conference (QSIC 2008), Oxford, England, IEEE Press. August 2008, 97–102. BibTeX

    @inproceedings{227980676,
    	author = "A. Hanna and H. Ling and J. Furlong and Z. Yang and M. Debbabi",
    	booktitle = "Quality Software, International Conference (QSIC 2008), Oxford, England, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/QSIC.2008.35",
    	isbn = "978-0-7695-3312-4",
    	month = "Aug",
    	pages = "97--102",
    	publisher = "IEEE Computer Society",
    	title = "Targeting Security Vulnerabilities: From Specification to Detection",
    	year = 2008
    }
    
  96. B Fung, I Farkhund, R Hadjidj and M Debbabi. A Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail Forensics. In 8th Digital Forensic Research Workshop (DFRWS'2008), Baltimore, MD, Elsevier Press. August 2008, S42–S51. BibTeX

    @inproceedings{502132703,
    	author = "B. Fung and I. Farkhund and R. Hadjidj and M. Debbabi",
    	booktitle = "8th Digital Forensic Research Workshop (DFRWS'2008), Baltimore, MD, Elsevier Press",
    	ee = "http://dx.doi.org/10.1016/j.diin.2008.05.001",
    	issn = "1742-2876",
    	month = "Aug",
    	pages = "S42--S51",
    	publisher = "Elsevier",
    	title = "A Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail Forensics",
    	year = 2008
    }
    
  97. S Tlili, Z Yang, H Ling and M Debbabi. A Hybrid Approach for Safe Memory Management in C. In 12th International Conference on Algebraic Methodology, Software Technology - (AMAST 2008), Urbana, IL, USA, LNCS, Volume 5140, Springer Press 5140. July 2008, 377–391. BibTeX

    @inproceedings{1593531269,
    	author = "S. Tlili and Z. Yang and H. Ling and M. Debbabi",
    	booktitle = "12th International Conference on Algebraic Methodology, Software Technology - (AMAST 2008), Urbana, IL, USA, LNCS, Volume 5140, Springer Press",
    	ee = "http://dx.doi.org/10.1007/978-3-540-79980-1_28",
    	isbn = "978-3-540-79979-5",
    	month = "Jul",
    	pages = "377--391",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "A Hybrid Approach for Safe Memory Management in C",
    	volume = 5140,
    	year = 2008
    }
    
  98. S Tlili and M Debbabi. Type and Effect Annotations for Safe Memory Access in C. In 3rd International Conference on Availability, Reliability, and Security (ARES'2008), Barcelona, Spain, IEEE Press. March 2008, 302–309. BibTeX

    @inproceedings{61185806,
    	author = "S. Tlili and M. Debbabi",
    	booktitle = "3rd International Conference on Availability, Reliability, and Security (ARES'2008), Barcelona, Spain, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/ARES.2008.18",
    	month = "Mar",
    	pages = "302--309",
    	publisher = "IEEE Computer Society",
    	title = "Type and Effect Annotations for Safe Memory Access in C",
    	year = 2008
    }
    
  99. S Tlili and M Debbabi. Novel Flow-Sensitive Type and Effect Analysis for Securing C Code. In ACS/IEEE International Conference on Computer Systems and Applications (AICCSA'08), Security and Information Assurance Track, Doha, Qatar, IEEE Press. March 2008, 661–668. BibTeX

    @inproceedings{2134565553,
    	author = "S. Tlili and M. Debbabi",
    	booktitle = "ACS/IEEE International Conference on Computer Systems and Applications (AICCSA'08), Security and Information Assurance Track, Doha, Qatar, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/AICCSA.2008.4493600",
    	month = "Mar",
    	pages = "661--668",
    	publisher = "IEEE",
    	title = "Novel Flow-Sensitive Type and Effect Analysis for Securing C Code",
    	year = 2008
    }
    
  100. H Otrok, N Mohammed, L Wang, M Debbabi and P Bhattacharya. An Efficient and Truthful Leader IDS Election Mechanism for MANET. In 3rd IEEE Wireless and Mobile Computing, Networking and Communications, WIMOB'2007 Conference, New York, Pages 78, IEEE Press. October 2007, 78. BibTeX

    @inproceedings{110176875,
    	author = "H. Otrok and N. Mohammed and L. Wang and M. Debbabi and P. Bhattacharya",
    	booktitle = "3rd IEEE Wireless and Mobile Computing, Networking and Communications, WIMOB'2007 Conference, New York, Pages 78, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/WIMOB.2007.19",
    	isbn = "0-7695-2889-9",
    	month = "Oct",
    	pages = 78,
    	publisher = "IEEE Computer Society",
    	title = "An Efficient and Truthful Leader IDS Election Mechanism for MANET",
    	year = 2007
    }
    
  101. H Yahyaoui, M Debbabi and N Tawbi. A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL. In Seventh International Conference on Quality Software (QSIC'07), Portland, Oregon, USA, IEEE Computer Society. October 2007, 348–355. BibTeX

    @inproceedings{563336305,
    	author = "H. Yahyaoui and M. Debbabi and N. Tawbi",
    	booktitle = "Seventh International Conference on Quality Software (QSIC'07), Portland, Oregon, USA, IEEE Computer Society",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/QSIC.2007.2",
    	month = "Oct",
    	pages = "348--355",
    	publisher = "IEEE Computer Society",
    	title = "A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL",
    	year = 2007
    }
    
  102. M Saleh and M Debbabi. Verifying Security Properties of Cryptoprotocols: A Novel Approach. In Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM'2007), London, England, IEEE Press. September 2007, 349–360. BibTeX

    @inproceedings{953868512,
    	author = "M. Saleh and M. Debbabi",
    	booktitle = "Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM'2007), London, England, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/SEFM.2007.46",
    	isbn = "978-0-7695-2884-7",
    	month = "Sep",
    	pages = "349--360",
    	publisher = "IEEE Computer Society",
    	title = "Verifying Security Properties of Cryptoprotocols: A Novel Approach",
    	year = 2007
    }
    
  103. D Alhadidi, N Belblidia and M Debbabi. An AOP Extended Lambda-Calculus. In IEEE International Conference on Software Engineering and Formal Methods (SEFM'2007), London, England, IEEE Press. September 2007, 183–194. BibTeX

    @inproceedings{427382274,
    	author = "D. Alhadidi and N. Belblidia and M. Debbabi",
    	booktitle = "IEEE International Conference on Software Engineering and Formal Methods (SEFM'2007), London, England, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/SEFM.2007.5",
    	isbn = "978-0-7695-2884-7",
    	month = "Sep",
    	pages = "183--194",
    	publisher = "IEEE Computer Society",
    	title = "An AOP Extended Lambda-Calculus",
    	year = 2007
    }
    
  104. A Mourad, M-A Laverdière and M Debbabi. A High-Level Aspect-Oriented Based Language for Software Security Hardening. In International Conference on Security and Cryptography (Secrypt'2007), Barcelona, Spain. July 2007, 363–370. BibTeX

    @inproceedings{2060187092,
    	author = "A. Mourad and M-A. Laverdière and M. Debbabi",
    	booktitle = "International Conference on Security and Cryptography (Secrypt'2007), Barcelona, Spain",
    	isbn = "978-989-8111-12-8",
    	month = "Jul",
    	pages = "363--370",
    	publisher = "INSTICC Press",
    	title = "A High-Level Aspect-Oriented Based Language for Software Security Hardening",
    	year = 2007
    }
    
  105. A Mourad, M-A Laverdière and M Debbabi. New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. In 9th International Conference on Enterprise Information Systems, Security in Information Systems Symposium (ICEIS-WOSIS 2007), Funchal, Madeira, Portugal, INSTICC Press. June 2007, 123–130. BibTeX

    @inproceedings{1464709691,
    	author = "A. Mourad and M-A. Laverdière and M. Debbabi",
    	booktitle = "9th International Conference on Enterprise Information Systems, Security in Information Systems Symposium (ICEIS-WOSIS 2007), Funchal, Madeira, Portugal, INSTICC Press",
    	isbn = "978-972-8865-96-2",
    	month = "Jun",
    	pages = "123--130",
    	publisher = "INSTICC Press",
    	title = "New Primitives to AOP Weaving Capabilities for Security Hardening Concerns",
    	year = 2007
    }
    
  106. M-A Laverdière, A Mourad, A Soeanu and M Debbabi. Control Flow Based Pointcuts for Security Hardening Concerns. In Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2007), Moncton, New Brunswick, Canada, IFIP/Springer Press. July 2007. BibTeX

    @inproceedings{399436032,
    	author = "M-A. Laverdière and A. Mourad and A. Soeanu and M. Debbabi",
    	booktitle = "Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2007), Moncton, New Brunswick, Canada, IFIP/Springer Press",
    	month = "Jul",
    	publisher = "IFIP/Springer Press",
    	title = "Control Flow Based Pointcuts for Security Hardening Concerns",
    	year = 2007
    }
    
  107. H Otrok, M Debbabi, C Assi and P Bhattacharya. A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks. In 27th International Conference on Distributed Computing Systems - Workshops (ICDCS Workshops 2007), Toronto, ON, Canada, Pages 86, IEEE Press. June 2007, 86. BibTeX

    @inproceedings{2061919285,
    	author = "H. Otrok and M. Debbabi and C. Assi and P. Bhattacharya",
    	booktitle = "27th International Conference on Distributed Computing Systems - Workshops (ICDCS Workshops 2007), Toronto, ON, Canada, Pages 86, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/ICDCSW.2007.91",
    	month = "Jun",
    	pages = 86,
    	publisher = "IEEE Computer Society",
    	title = "A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks",
    	year = 2007
    }
    
  108. H Otrok, J Paquet, M Debbabi and P Bhattacharya. Testing Intrusion Detection Systems in in MANET: A Comprehensive Study. In Communication Networks and Services Research Conference (CNSR 2007), Fredericton, NB, Canada, IEEE Press. May 2007, 364–371. BibTeX

    @inproceedings{1895593113,
    	author = "H. Otrok and J. Paquet and M. Debbabi and P. Bhattacharya",
    	booktitle = "Communication Networks and Services Research Conference (CNSR 2007), Fredericton, NB, Canada, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/CNSR.2007.62",
    	month = "May",
    	pages = "364--371",
    	publisher = "IEEE Computer Society",
    	title = "Testing Intrusion Detection Systems in in MANET: A Comprehensive Study",
    	year = 2007
    }
    
  109. A Mourad, M-A Laverdière and M Debbabi. Towards an Aspect Oriented Approach for the Security Hardening of Code. In IEEE 21st International Conference on Advanced Information Networking and Applications, Security in Networks and Distributed Systems Symposium (AINA-SSNDS), Niagara Falls, Canada, IEEE Press. May 2007, 595–600. BibTeX

    @inproceedings{238855306,
    	author = "A. Mourad and M-A. Laverdière and M. Debbabi",
    	booktitle = "IEEE 21st International Conference on Advanced Information Networking and Applications, Security in Networks and Distributed Systems Symposium (AINA-SSNDS), Niagara Falls, Canada, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/AINAW.2007.355",
    	month = "May",
    	pages = "595--600",
    	publisher = "IEEE Computer Society",
    	title = "Towards an Aspect Oriented Approach for the Security Hardening of Code",
    	year = 2007
    }
    
  110. M-A Laverdière, A Mourad, A Soeanu and M Debbabi. Points de Coupure pour les Préoccupations de Renforcement de Sécurité Utilisant le Flot de Contrôle. In 3me Journée Francophone sur le Dveloppement de Logiciels Par Aspects (JFDLPA 2007, AOSD), Toulouse, France. March 2007. BibTeX

    @inproceedings{2080816889,
    	author = "M-A. Laverdière and A. Mourad and A. Soeanu and M. Debbabi",
    	booktitle = "3me Journée Francophone sur le Dveloppement de Logiciels Par Aspects (JFDLPA 2007, AOSD), Toulouse, France",
    	month = "Mar",
    	title = "Points de Coupure pour les Préoccupations de Renforcement de Sécurité Utilisant le Flot de Contrôle",
    	year = 2007
    }
    
  111. Y Jarraya, A Soeanu, M Debbabi and F Hassaine. Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams. In 14th IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS'07), IEEE Press. March 2007, 515–522. BibTeX

    @inproceedings{585825185,
    	author = "Y. Jarraya and A. Soeanu and M. Debbabi and F. Hassaine",
    	booktitle = "14th IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS'07), IEEE Press",
    	ee = "http://dx.doi.org/10.1109/ECBS.2007.22",
    	isbn = "0-7695-2772-8",
    	month = "Mar",
    	pages = "515--522",
    	publisher = "IEEE Computer Society",
    	title = "Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams",
    	year = 2007
    }
    
  112. A R Arasteh, M Debbabi and A Sakha. A Formal Approach for the Forensic Analysis of Logs. In 5th International Conference on Software Methodologies, Tools and Techniques (SOMET'2006), Québec, Canada, Pages 159- 176, IOS Press 147. October 2006, 159–176. BibTeX

    @inproceedings{1734811858,
    	author = "A. R. Arasteh and M. Debbabi and A. Sakha",
    	booktitle = "5th International Conference on Software Methodologies, Tools and Techniques (SOMET'2006), Québec, Canada, Pages 159- 176, IOS Press",
    	isbn = "978-1-58603-673-7",
    	month = "Oct",
    	pages = "159--176",
    	publisher = "IOS Press",
    	series = "Frontiers in Artificial Intelligence and Applications",
    	title = "A Formal Approach for the Forensic Analysis of Logs",
    	volume = 147,
    	year = 2006
    }
    
  113. A R Arasteh and M Debbabi. Forensic Memory Analysis: From Stack and Code to Execution History. In 7th Annual Digital Forensics Research Workshop (DFRWS'2007), Pittsburgh, PA, USA, Elsevier. August 2007, 114–125. BibTeX

    @inproceedings{687829312,
    	author = "A. R. Arasteh and M. Debbabi",
    	booktitle = "7th Annual Digital Forensics Research Workshop (DFRWS'2007), Pittsburgh, PA, USA, Elsevier",
    	month = "Aug",
    	pages = "114--125",
    	publisher = "Elsevier",
    	title = "Forensic Memory Analysis: From Stack and Code to Execution History",
    	year = 2007
    }
    
  114. A R Arasteh, M Debbabi, A Sakha and M Saleh. Analyzing Multiple Logs for Forensic Evidence. In 7th Annual Digital Forensics Research Workshop (DFRWS'2007), Pittsburgh, PA, USA, Elsevier. August 2007, 82–91. BibTeX

    @inproceedings{274148444,
    	author = "A. R. Arasteh and M. Debbabi and A. Sakha and M. Saleh",
    	booktitle = "7th Annual Digital Forensics Research Workshop (DFRWS'2007), Pittsburgh, PA, USA, Elsevier",
    	month = "Aug",
    	pages = "82--91",
    	publisher = "Elsevier",
    	title = "Analyzing Multiple Logs for Forensic Evidence",
    	year = 2007
    }
    
  115. Z Yang, A Hanna and M Debbabi. Team Edit Automata for Testing Security Property. In 3rd International Symposium on Information Assurance and Security (IAS'2007), Manchester, United Kingdom, IEEE Press. August 2007, 235–240. BibTeX

    @inproceedings{1187113556,
    	author = "Z. Yang and A. Hanna and M. Debbabi",
    	booktitle = "3rd International Symposium on Information Assurance and Security (IAS'2007), Manchester, United Kingdom, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/IAS.2007.82",
    	month = "Aug",
    	pages = "235--240",
    	publisher = "IEEE Computer Society",
    	title = "Team Edit Automata for Testing Security Property",
    	year = 2007
    }
    
  116. M Saleh and M Debbabi. Modeling Security Protocols as Games. In 3rd International Symposium on Information Assurance and Security (IAS'2007), Manchester, United Kingdom, IEEE Press. August 2007, 253–260. BibTeX

    @inproceedings{1852409528,
    	author = "M. Saleh and M. Debbabi",
    	booktitle = "3rd International Symposium on Information Assurance and Security (IAS'2007), Manchester, United Kingdom, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/IAS.2007.59",
    	month = "Aug",
    	pages = "253--260",
    	publisher = "IEEE Computer Society",
    	title = "Modeling Security Protocols as Games",
    	year = 2007
    }
    
  117. M Mehrandish, H Otrok, M Debbabi and C Assi. A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario. In IEEE Global Telecommunications Conference, GLOBECOM'2006, San Francisco, California, USA, IEEE Press. November 2006, 1–5. BibTeX

    @inproceedings{876246694,
    	author = "M. Mehrandish and H. Otrok and M. Debbabi and C. Assi",
    	booktitle = "IEEE Global Telecommunications Conference, GLOBECOM'2006, San Francisco, California, USA, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/GLOCOM.2006.293",
    	month = "Nov",
    	pages = "1--5",
    	publisher = "IEEE",
    	title = "A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario",
    	year = 2006
    }
    
  118. N Belblidia and M Debbabi. Towards a Formal Semantics for AspectJ Weaving. In Joint Modular Languages Conference (JMLC'2006), Jesus College, Oxford, UK, Lecture Notes in Computer Science, LNCS, Volume 4228, Springer Verlag 4228. September 2006, 155–171. BibTeX

    @inproceedings{1780928181,
    	author = "N. Belblidia and M. Debbabi",
    	booktitle = "Joint Modular Languages Conference (JMLC'2006), Jesus College, Oxford, UK, Lecture Notes in Computer Science, LNCS, Volume 4228, Springer Verlag",
    	ee = "http://dx.doi.org/10.1007/11860990_11",
    	isbn = "3-540-40927-0",
    	month = "Sep",
    	pages = "155--171",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Towards a Formal Semantics for AspectJ Weaving",
    	volume = 4228,
    	year = 2006
    }
    
  119. N Belblidia and M Debbabi. Formalizing AspectJ Weaving for Static Pointcuts. In IEEE International Conference on Software Engineering and Formal Methods (SEFM'2006), Pune, India, IEEE Press. September 2006, 50–59. BibTeX

    @inproceedings{1323117272,
    	author = "N. Belblidia and M. Debbabi",
    	booktitle = "IEEE International Conference on Software Engineering and Formal Methods (SEFM'2006), Pune, India, IEEE Press",
    	month = "Sep",
    	pages = "50--59",
    	publisher = "IEEE Press",
    	title = "Formalizing AspectJ Weaving for Static Pointcuts",
    	year = 2006
    }
    
  120. J Berger, A Boukhtouta and M Debbabi. A Middleware Solution for Data and Service Integration in Network Centric Information Systems. In European Conference on Information Warfare and Security (ECIW'2006), National Defence College, Helsinki, Finland, Academic Conferences Limited. June 2006. BibTeX

    @inproceedings{1442426596,
    	author = "J. Berger and A. Boukhtouta and M. Debbabi",
    	booktitle = "European Conference on Information Warfare and Security (ECIW'2006), National Defence College, Helsinki, Finland, Academic Conferences Limited",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/SEFM.2006.19",
    	isbn = "0-7695-2678-0",
    	month = "Jun",
    	publisher = "IEEE Computer Society",
    	title = "A Middleware Solution for Data and Service Integration in Network Centric Information Systems",
    	year = 2006
    }
    
  121. J Berger, A Boukhtouta, A C Boury-Brisset, M Debbabi, H Issa, S Ray and S Dalouche. A Network Centric Infrastructure for Decision Support Based on Service Integration. In International Command and Control Research and Technology Symposium (ICCRTS'2006), De Vere University Arms, Cambridge, UK, DoD CCRP Publishing. September 2006. BibTeX

    @inproceedings{1598380949,
    	author = "J. Berger and A. Boukhtouta and A. C. Boury-Brisset and M. Debbabi and H. Issa and S. Ray and S. Dalouche",
    	booktitle = "International Command and Control Research and Technology Symposium (ICCRTS'2006), De Vere University Arms, Cambridge, UK, DoD CCRP Publishing",
    	month = "Sep",
    	publisher = "DoD CCRP Publishing",
    	title = "A Network Centric Infrastructure for Decision Support Based on Service Integration",
    	year = 2006
    }
    
  122. C Talhi, N Tawbi and M Debbabi. Execution Monitoring Enforcement for Limited-Memory Systems. In International Conference on Privacy, Security and Trust (PST'2006), Markham, Ontario, Canada, McGraw-Hill 380. October 2006, 1–12. BibTeX

    @inproceedings{1994923630,
    	author = "C. Talhi and N. Tawbi and M. Debbabi",
    	booktitle = "International Conference on Privacy, Security and Trust (PST'2006), Markham, Ontario, Canada, McGraw-Hill",
    	ee = "http://doi.acm.org/10.1145/1501434.1501480",
    	month = "Oct",
    	pages = "1--12",
    	publisher = "ACM",
    	series = "ACM International Conference Proceeding Series",
    	title = "Execution Monitoring Enforcement for Limited-Memory Systems",
    	volume = 380,
    	year = 2006
    }
    
  123. C Talhi, N Tawbi and M Debbabi. Execution Monitoring Enforcement under Memory Limitation Constraints. In Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, Seattle, USA. August 2006. BibTeX

    @inproceedings{1561897017,
    	author = "C. Talhi and N. Tawbi and M. Debbabi",
    	booktitle = "Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, Seattle, USA",
    	month = "Aug",
    	title = "Execution Monitoring Enforcement under Memory Limitation Constraints",
    	year = 2006
    }
    
  124. D Alhadidi, N Belblidia and M Debbabi. Security Crosscutting Concerns and AspectJ. In International Conference on Privacy, Security and Trust, PST'2006, Markham, Ontario, Canada, McGraw-Hill 380. October 2006, 45. BibTeX

    @inproceedings{1028248926,
    	author = "D. Alhadidi and N. Belblidia and M. Debbabi",
    	booktitle = "International Conference on Privacy, Security and Trust, PST'2006, Markham, Ontario, Canada, McGraw-Hill",
    	ee = "http://doi.acm.org/10.1145/1501434.1501488",
    	month = "Oct",
    	pages = 45,
    	publisher = "ACM",
    	series = "ACM International Conference Proceeding Series",
    	title = "Security Crosscutting Concerns and AspectJ",
    	volume = 380,
    	year = 2006
    }
    
  125. Mourad, M-A Laverdière and M Debbabi. Security Hardening of Open Source Software. In International Conference on Privacy, Security and Trust, PST'2006, Markham, Ontario, Canada, McGraw-Hill 380. October 2006, 43. BibTeX

    @inproceedings{592817979,
    	author = "Mourad and M-A. Laverdière and M. Debbabi",
    	booktitle = "International Conference on Privacy, Security and Trust, PST'2006, Markham, Ontario, Canada, McGraw-Hill",
    	ee = "http://doi.acm.org/10.1145/1501434.1501486",
    	month = "Oct",
    	pages = 43,
    	publisher = "ACM",
    	series = "ACM International Conference Proceeding Series",
    	title = "Security Hardening of Open Source Software",
    	volume = 380,
    	year = 2006
    }
    
  126. D Alhadidi, N Belblidia and M Debbabi. AspectJ Assessment from a Security Perspective. In Workshop on Practice and Theory of IT Security, PTITS'2006, Montreal, Quebec, Canada. May 2006. BibTeX

    @inproceedings{326072159,
    	author = "D. Alhadidi and N. Belblidia and M. Debbabi",
    	booktitle = "Workshop on Practice and Theory of IT Security, PTITS'2006, Montreal, Quebec, Canada",
    	month = "May",
    	title = "AspectJ Assessment from a Security Perspective",
    	year = 2006
    }
    
  127. M Debbabi, M Saleh, C Talhi and S Zhioua. Common Criteria Approach to J2ME CLDC Security Requirements. In International Conference on Software Methodologies, Tools and Techniques, SoMeT'2006, Québec, Canada, IOS Press 147. October 2006, 177–194. BibTeX

    @inproceedings{2010745261,
    	author = "M. Debbabi and M. Saleh and C. Talhi and S. Zhioua",
    	booktitle = "International Conference on Software Methodologies, Tools and Techniques, SoMeT'2006, Québec, Canada, IOS Press",
    	ee = "http://www.booksonline.iospress.nl/Content/View.aspx?piid",
    	isbn = "978-1-58603-673-7",
    	month = "Oct",
    	pages = "177--194",
    	publisher = "IOS Press",
    	series = "Frontiers in Artificial Intelligence and Applications",
    	title = "Common Criteria Approach to J2ME CLDC Security Requirements",
    	volume = 147,
    	year = 2006
    }
    
  128. M Mehrandish, C Assi and M Debbabi. A Game Theoretic Model to Handle Network Intrusions over Multiple Packets. In IEEE International Conference on Communications, ICC'2006, Pages 2189 - 2194, Istanbul, Turkey, IEEE Press. June 2006, 2189–2194. BibTeX

    @inproceedings{115596640,
    	author = "M. Mehrandish and C. Assi and M. Debbabi",
    	booktitle = "IEEE International Conference on Communications, ICC'2006, Pages 2189 - 2194, Istanbul, Turkey, IEEE Press",
    	ee = "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber",
    	isbn = "1-4244-0355-3",
    	month = "Jun",
    	pages = "2189--2194",
    	publisher = "IEEE",
    	title = "A Game Theoretic Model to Handle Network Intrusions over Multiple Packets",
    	year = 2006
    }
    
  129. A K Venkataiahgari, M Debbabi and J W Atwood. Secure E-Commerce Protection Profile. In International Conference on Security and Management, SAM'2006, Las Vegas, Nevada, USA. June 2006, 279–285. BibTeX

    @inproceedings{1194305395,
    	author = "A. K. Venkataiahgari and M. Debbabi and J. W. Atwood",
    	booktitle = "International Conference on Security and Management, SAM'2006, Las Vegas, Nevada, USA",
    	isbn = "1-60132-001-9",
    	month = "Jun",
    	pages = "279--285",
    	publisher = "CSREA Press",
    	title = "Secure E-Commerce Protection Profile",
    	year = 2006
    }
    
  130. A K Venkataiahgari, J W Atwood and M Debbabi. Secure E-Commerce Transactions for Multicast Services. In IEEE Conference on E-Commerce Technology, CEC'2006, Palo Alto, CA, USA, Pages 18, IEEE Press. June 2006, 18. BibTeX

    @inproceedings{1160337609,
    	author = "A. K. Venkataiahgari and J. W. Atwood and M. Debbabi",
    	booktitle = "IEEE Conference on E-Commerce Technology, CEC'2006, Palo Alto, CA, USA, Pages 18, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/CEC-EEE.2006.77",
    	isbn = "0-7695-2511-3",
    	month = "Jun",
    	pages = 18,
    	publisher = "IEEE Computer Society",
    	title = "Secure E-Commerce Transactions for Multicast Services",
    	year = 2006
    }
    
  131. M Debbabi, M Saleh, C Talhi and S Zhioua. Security Analysis of Wireless Java. In 3rd Annual Conference on Privacy, Security and Trust, PST'05, Saint Andrews, New Brunswick, Canada. August 2005, 1–11. BibTeX

    @inproceedings{611171433,
    	author = "M. Debbabi and M. Saleh and C. Talhi and S. Zhioua",
    	booktitle = "3rd Annual Conference on Privacy, Security and Trust, PST'05, Saint Andrews, New Brunswick, Canada",
    	ee = "http://www.lib.unb.ca/Texts/PST/2005/pdf/debbabi.pdf",
    	month = "Aug",
    	pages = "1--11",
    	title = "Security Analysis of Wireless Java",
    	year = 2005
    }
    
  132. A K Venkataiahgari, J W Atwood and M Debbabi. A Survey of Secure B2C Commerce for Multicast Services. In IEEE Canadian Conference on Electrical and Computer Engineering, CCECE'2006, Ottawa, Ontario, Canada, IEEE Press. May 2006, 288–293. BibTeX

    @inproceedings{637475006,
    	author = "A. K. Venkataiahgari and J. W. Atwood and M. Debbabi",
    	booktitle = "IEEE Canadian Conference on Electrical and Computer Engineering, CCECE'2006, Ottawa, Ontario, Canada, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/CCECE.2006.277329",
    	month = "May",
    	pages = "288--293",
    	publisher = "IEEE",
    	title = "A Survey of Secure B2C Commerce for Multicast Services",
    	year = 2006
    }
    
  133. N Belblidia, M Debbabi, A Hanna and Z Yang. AOP Extension for Security Testing of Programs. In IEEE Canadian Conference on Electrical and Computer Engineering, CCECE'2006, Ottawa, Ontario, Canada, IEEE Press. May 2006, 647–650. BibTeX

    @inproceedings{327698991,
    	author = "N. Belblidia and M. Debbabi and A. Hanna and Z. Yang",
    	booktitle = "IEEE Canadian Conference on Electrical and Computer Engineering, CCECE'2006, Ottawa, Ontario, Canada, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/CCECE.2006.277318",
    	month = "May",
    	pages = "647--650",
    	publisher = "IEEE",
    	title = "AOP Extension for Security Testing of Programs",
    	year = 2006
    }
    
  134. M-A Laverdière, A Mourad, A Hanna and M Debbabi. Security Design Patterns: Survey and Evaluation. In IEEE Canadian Conference on Electrical and Computer Engineering, CCECE'2006, Ottawa, Ontario, Canada, IEEE Press. May 2006, 1605–1608. BibTeX

    @inproceedings{939820075,
    	author = "M-A. Laverdière and A. Mourad and A. Hanna and M. Debbabi",
    	booktitle = "IEEE Canadian Conference on Electrical and Computer Engineering, CCECE'2006, Ottawa, Ontario, Canada, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/CCECE.2006.277727",
    	month = "May",
    	pages = "1605--1608",
    	publisher = "IEEE",
    	title = "Security Design Patterns: Survey and Evaluation",
    	year = 2006
    }
    
  135. H Issa, C Assi and M Debbabi. QoS-Aware Middleware for Web Services Composition: A Qualitative Approach. In IEEE Symposium on Computers and Communications, ISCC'2006, IEEE Press. June 2006, 359–364. BibTeX

    @inproceedings{335283308,
    	author = "H. Issa and C. Assi and M. Debbabi",
    	booktitle = "IEEE Symposium on Computers and Communications, ISCC'2006, IEEE Press",
    	ee = "10.1109/ISCC.2006.135",
    	month = "Jun",
    	pages = "359--364",
    	publisher = "IEEE Press",
    	title = "QoS-Aware Middleware for Web Services Composition: A Qualitative Approach",
    	year = 2006
    }
    
  136. L Alawneh, M Debbabi, F Hassaine, Y Jarraya, P Shahi and A Soeanu. Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models. In International Conference on Software Engineering, SE'2006, Innsbruck, Austria, ACTA Press, ISBN 0-88986-574-4. February 2006, 282–287. BibTeX

    @inproceedings{1264919502,
    	author = "L. Alawneh and M. Debbabi and F. Hassaine and Y. Jarraya and P. Shahi and A. Soeanu",
    	booktitle = "International Conference on Software Engineering, SE'2006, Innsbruck, Austria, ACTA Press, ISBN 0-88986-574-4",
    	isbn = "0-88986-574-4",
    	month = "Feb",
    	pages = "282--287",
    	publisher = "IASTED/ACTA Press",
    	title = "Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models",
    	year = 2006
    }
    
  137. L Alawneh, M Debbabi, F Hassaine and A Soeanu. On the Verification and Validation of UML Structural and Behavioral Diagrams. In International Conference on Advances in Computer Science and Technology, ACST'2006, Puerto Vallarta, Mexico, ACTA Press, ISBN 0-88986-545-0. January 2006, 304–309. BibTeX

    @inproceedings{1520233914,
    	author = "L. Alawneh and M. Debbabi and F. Hassaine and A. Soeanu",
    	booktitle = "International Conference on Advances in Computer Science and Technology, ACST'2006, Puerto Vallarta, Mexico, ACTA Press, ISBN 0-88986-545-0",
    	isbn = "0-88986-547-7",
    	month = "Jan",
    	pages = "304--309",
    	publisher = "IASTED/ACTA Press",
    	title = "On the Verification and Validation of UML Structural and Behavioral Diagrams",
    	year = 2006
    }
    
  138. L Alawneh, M Debbabi, Y Jarraya, A Soeanu and F Hassaine. A Unified Approach for Verification and Validation of Systems and Software Engineering Models. In 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems, ECBS'2006, 27-30 ISBN 0-7695-2546-6. March 2006, 409–418. BibTeX

    @inproceedings{261154041,
    	author = "L. Alawneh and M. Debbabi and Y. Jarraya and A. Soeanu and F. Hassaine",
    	booktitle = "13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems, ECBS'2006, 27-30 ISBN 0-7695-2546-6",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/ECBS.2006.17",
    	isbn = "0-7695-2546-6",
    	month = "Mar",
    	pages = "409--418",
    	publisher = "IEEE Computer Society",
    	title = "A Unified Approach for Verification and Validation of Systems and Software Engineering Models",
    	year = 2006
    }
    
  139. M Debbabi, M Saleh, C Talhi and S Zhioua. Java for Mobile Devices: A Security Study. In Annual Computer Security Applications Conference, ACSAC'05, Tucson, Arizona, USA, IEEE Press. December 2005, 235–244. BibTeX

    @inproceedings{1255421755,
    	author = "M. Debbabi and M. Saleh and C. Talhi and S. Zhioua",
    	booktitle = "Annual Computer Security Applications Conference, ACSAC'05, Tucson, Arizona, USA, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/CSAC.2005.34",
    	isbn = "0-7695-2461-3",
    	month = "Dec",
    	pages = "235--244",
    	publisher = "IEEE Computer Society",
    	title = "Java for Mobile Devices: A Security Study",
    	year = 2005
    }
    
  140. M Debbabi, M Saleh, C Talhi and S Zhioua. Security Analysis of Wireless Java. In 3rd Annual Conference on Privacy, Security and Trust, PST'05, Saint Andrews, New Brunswick, Canada. August 2005, 1–11. BibTeX

    @inproceedings{621013950,
    	author = "M. Debbabi and M. Saleh and C. Talhi and S. Zhioua",
    	booktitle = "3rd Annual Conference on Privacy, Security and Trust, PST'05, Saint Andrews, New Brunswick, Canada",
    	ee = "http://www.lib.unb.ca/Texts/PST/2005/pdf/debbabi.pdf",
    	month = "Aug",
    	pages = "1--11",
    	title = "Security Analysis of Wireless Java",
    	year = 2005
    }
    
  141. M Debbabi, M Saleh, C Talhi and S Zhioua. Security Analysis of Mobile Java. In 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), Copenhagen, Denmark, IEEE Press. August 2005, 231–235. BibTeX

    @inproceedings{1515960467,
    	author = "M. Debbabi and M. Saleh and C. Talhi and S. Zhioua",
    	booktitle = "16th International Workshop on Database and Expert Systems Applications (DEXA 2005), Copenhagen, Denmark, IEEE Press",
    	ee = "http://dx.doi.org/10.1109/DEXA.2005.172",
    	isbn = "0-7695-2424-9",
    	month = "Aug",
    	pages = "231--235",
    	publisher = "IEEE Computer Society",
    	title = "Security Analysis of Mobile Java",
    	year = 2005
    }
    
  142. A Benssam, A Boukhtouta, M Debbabi, H Issa, S Ray and A Sahi. A Message-Based Middleware for Asynchronous Operations: Issues and Experience. In Nouvelles Technologies de la Répartition Conference, NOTERE'05, Université de Québec en Outaouais, QC, Canada. August 2005, 1–10. BibTeX

    @inproceedings{1682126568,
    	author = "A. Benssam and A. Boukhtouta and M. Debbabi and H. Issa and S. Ray and A. Sahi",
    	booktitle = "Nouvelles Technologies de la Répartition Conference, NOTERE'05, Université de Québec en Outaouais, QC, Canada",
    	month = "Aug",
    	pages = "1--10",
    	title = "A Message-Based Middleware for Asynchronous Operations: Issues and Experience",
    	year = 2005
    }
    
  143. P Bhattacharya, M Debbabi and H Otrok. Improving the Diffie-Hellman Secure Key Exchange. In IEEE Conference on Wireless Networks, Communications, and Mobile Computing, Wirelesscom'2005, Maui, Hawaii, USA, IEEE Press. June 2005, 1–6. BibTeX

    @inproceedings{1961657408,
    	author = "P. Bhattacharya and M. Debbabi and H. Otrok",
    	booktitle = "IEEE Conference on Wireless Networks, Communications, and Mobile Computing, Wirelesscom'2005, Maui, Hawaii, USA, IEEE Press",
    	month = "Jun",
    	pages = "1--6",
    	publisher = "IEEE Press",
    	title = "Improving the Diffie-Hellman Secure Key Exchange",
    	year = 2005
    }
    
  144. H Otrok, A Mourad, M Debbabi and C Assi. Improving the Security of SNMP in Wireless Networks. In IEEE Conference on Wireless Networks, Communications, and Mobile Computing, Wirelesscom'2005, Maui, Hawaii, USA, IEEE Press. June 2005, 1–5. BibTeX

    @inproceedings{1980658433,
    	author = "H. Otrok and A. Mourad and M. Debbabi and C. Assi",
    	booktitle = "IEEE Conference on Wireless Networks, Communications, and Mobile Computing, Wirelesscom'2005, Maui, Hawaii, USA, IEEE Press",
    	month = "Jun",
    	pages = "1--5",
    	publisher = "IEEE Press",
    	title = "Improving the Security of SNMP in Wireless Networks",
    	year = 2005
    }
    
  145. O Moselhi, A Hammad, S Alkass, C Assi, M Debbabi and M Haider. Vulnerability Assessment of Civil Infrastructure Systems: A Network Approach. In first CSCE Specialty Conference on Infrastructure Technologies, Management and Policy, Toronto, Ontario, Canada. June 2005, 1–8. BibTeX

    @inproceedings{1042798539,
    	author = "O. Moselhi and A. Hammad and S. Alkass and C. Assi and M. Debbabi and M. Haider",
    	booktitle = "first CSCE Specialty Conference on Infrastructure Technologies, Management and Policy, Toronto, Ontario, Canada",
    	month = "Jun",
    	pages = "1--8",
    	title = "Vulnerability Assessment of Civil Infrastructure Systems: A Network Approach",
    	year = 2005
    }
    
  146. M Debbabi, A Mourad and N Tawbi. Armed E-Bunny: A Selective Dynamic Compiler for Embedded Java Virtual Machine Targeting ARM Processors. In ACM Symposium on Applied Computing, SAC'2005, Santa Fe, New Mexico, USA, ACM Press. March 2005, 874–878. BibTeX

    @inproceedings{1416090161,
    	author = "M. Debbabi and A. Mourad and N. Tawbi",
    	booktitle = "ACM Symposium on Applied Computing, SAC'2005, Santa Fe, New Mexico, USA, ACM Press",
    	ee = "http://doi.acm.org/10.1145/1066677.1066876",
    	isbn = "1-58113-964-0",
    	month = "Mar",
    	pages = "874--878",
    	publisher = "ACM",
    	title = "Armed E-Bunny: A Selective Dynamic Compiler for Embedded Java Virtual Machine Targeting ARM Processors",
    	year = 2005
    }
    
  147. M Debbabi and M Saleh. Game Semantics Model for Security Protocols. In 7th International Conference on Formal Engineering Methods, ICFEM'2005, Manchester, UK, LNCS, Volume 3785, Springer Berlin/Heidelberg 3785. November 2005, 125–140. BibTeX

    @inproceedings{1138691226,
    	author = "M. Debbabi and M. Saleh",
    	booktitle = "7th International Conference on Formal Engineering Methods, ICFEM'2005, Manchester, UK, LNCS, Volume 3785, Springer Berlin/Heidelberg",
    	ee = "http://dx.doi.org/10.1007/11576280_10",
    	isbn = "3-540-29797-9",
    	month = "Nov",
    	pages = "125--140",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Game Semantics Model for Security Protocols",
    	volume = 3785,
    	year = 2005
    }
    
  148. A Benssam, S Ray, A Boukhtouta, F Guerroumi, C Assi and M Debbabi. A new Paradigm for Information Systems Integration. In Montreal Conference on e-Technologies, MCETECH'05, Montreal, Quebec, Canada. January 2005, 63–72. BibTeX

    @inproceedings{554140284,
    	author = "A. Benssam and S. Ray and A. Boukhtouta and F. Guerroumi and C. Assi and M. Debbabi",
    	booktitle = "Montreal Conference on e-Technologies, MCETECH'05, Montreal, Quebec, Canada",
    	month = "Jan",
    	pages = "63--72",
    	title = "A new Paradigm for Information Systems Integration",
    	year = 2005
    }
    
  149. M Debbabi, A Gherbi, L Ketari, C Talhi, N Tawbi, H Yahyaoui and S Zhioua. A Dynamic Compiler for Embedded Java Virtual Machines. In 3rd International Conference on Principles and Practice of Programming in Java, ACM PPPJ'2004, Las Vegas, Nevada, USA, ACM Press 91. June 2004, 100–106. BibTeX

    @inproceedings{1932766331,
    	author = "M. Debbabi and A. Gherbi and L. Ketari and C. Talhi and N. Tawbi and H. Yahyaoui and S. Zhioua",
    	booktitle = "3rd International Conference on Principles and Practice of Programming in Java, ACM PPPJ'2004, Las Vegas, Nevada, USA, ACM Press",
    	ee = "http://doi.acm.org/10.1145/1071565.1071584",
    	isbn = "1-59593-171-6",
    	month = "Jun",
    	pages = "100--106",
    	publisher = "ACM",
    	series = "ACM International Conference Proceeding Series",
    	title = "A Dynamic Compiler for Embedded Java Virtual Machines",
    	volume = 91,
    	year = 2004
    }
    
  150. M Debbabi, A Gherbi, L Ketari, C Talhi, N Tawbi, H Yahyaoui and S Zhioua. A Synergy between Efficient Interpretation and Fast Selective Dynamic Compilation for the Acceleration of Embedded Java Virtual Machines. In 3rd International Conference on Principles and Practice of Programming in Java, ACM PPPJ'04, Las Vegas, Nevada, USA, ACM Press 91. June 2004, 107–113. BibTeX

    @inproceedings{1374230294,
    	author = "M. Debbabi and A. Gherbi and L. Ketari and C. Talhi and N. Tawbi and H. Yahyaoui and S. Zhioua",
    	booktitle = "3rd International Conference on Principles and Practice of Programming in Java, ACM PPPJ'04, Las Vegas, Nevada, USA, ACM Press",
    	ee = "http://doi.acm.org/10.1145/1071565.1071585",
    	isbn = "1-59593-171-6",
    	month = "Jun",
    	pages = "107--113",
    	publisher = "ACM",
    	series = "ACM International Conference Proceeding Series",
    	title = "A Synergy between Efficient Interpretation and Fast Selective Dynamic Compilation for the Acceleration of Embedded Java Virtual Machines",
    	volume = 91,
    	year = 2004
    }
    
  151. M Debbabi, A Gherbi, L Ketari, C Talhi, H Yahyaoui and S Zhioua. Fast and Lightweight Dynamic Compilation by Code Reuse in Embedded Java Virtual Machines. In Nouvelles Technologies de la Répartition, NOTERE'2004, Saidia, Morocco. June 2004, 116–130. BibTeX

    @inproceedings{1781292435,
    	author = "M. Debbabi and A. Gherbi and L. Ketari and C. Talhi and H. Yahyaoui and S. Zhioua",
    	booktitle = "Nouvelles Technologies de la Répartition, NOTERE'2004, Saidia, Morocco",
    	month = "Jun",
    	pages = "116--130",
    	title = "Fast and Lightweight Dynamic Compilation by Code Reuse in Embedded Java Virtual Machines",
    	year = 2004
    }
    
  152. M Debbabi and M Rahman. The War of Presence and Instant Messaging: Right Protocols and APIs. In IEEE Consumer Communications and Networking Conference, CCNC'2004, Las Vegas, Nevada, USA, IEEE Press. January 2004, 341–346. BibTeX

    @inproceedings{35961047,
    	author = "M. Debbabi and M. Rahman",
    	booktitle = "IEEE Consumer Communications and Networking Conference, CCNC'2004, Las Vegas, Nevada, USA, IEEE Press",
    	month = "Jan",
    	pages = "341--346",
    	publisher = "IEEE Press",
    	title = "The War of Presence and Instant Messaging: Right Protocols and APIs",
    	year = 2004
    }
    
  153. M Debbabi, L Ketari and H Yahyaoui. A Java SIP Interface for Connected Limited Devices. In Wireless and Optical Communications'2003, Banff, Canada, ISBN 0889863741. July 2003, 560–565. BibTeX

    @inproceedings{142211156,
    	author = "M. Debbabi and L. Ketari and H. Yahyaoui",
    	booktitle = "Wireless and Optical Communications'2003, Banff, Canada, ISBN 0889863741",
    	month = "Jul",
    	pages = "560--565",
    	title = "A Java SIP Interface for Connected Limited Devices",
    	year = 2003
    }
    
  154. A Boukhtouta, M Debbabi and N Tawbi. A New Paradigm for Decision-Making: Business Intelligence and Digital Cockpits. In 10th ISPE International Conference on Concurrent Engineering: Research and Applications, Balkema Publishers. July 2003, 1247–1254. BibTeX

    @inproceedings{1381034603,
    	author = "A. Boukhtouta and M. Debbabi and N. Tawbi",
    	booktitle = "10th ISPE International Conference on Concurrent Engineering: Research and Applications, Balkema Publishers",
    	month = "Jul",
    	pages = "1247--1254",
    	publisher = "Balkema Publishers",
    	title = "A New Paradigm for Decision-Making: Business Intelligence and Digital Cockpits",
    	year = 2003
    }
    
  155. M Debbabi, J Desharnais, B Ktari, F Michaud and N Tawbi. A Framework for the Certification of COTS. In SAR'2003, Nancy, France. June 2003, 275–284. BibTeX

    @inproceedings{1988612040,
    	author = "M. Debbabi and J. Desharnais and B. Ktari and F. Michaud and N. Tawbi",
    	booktitle = "SAR'2003, Nancy, France",
    	month = "Jun",
    	pages = "275--284",
    	title = "A Framework for the Certification of COTS",
    	year = 2003
    }
    
  156. M Debbabi, M Erhioui, L Ketari, N Tawbi, H Yahyaoui and S Zhioua. Method Call Acceleration in Embedded Java Virtual Machines. In International Conference on Computational Science, ICCS'03, Lecture Notes in Computer Science, LNCS, Volume 2659, Melbourne, Australia, Springer Verlag 2659. June 2003, 750–759. BibTeX

    @inproceedings{1946973597,
    	author = "M. Debbabi and M. Erhioui and L. Ketari and N. Tawbi and H. Yahyaoui and S. Zhioua",
    	booktitle = "International Conference on Computational Science, ICCS'03, Lecture Notes in Computer Science, LNCS, Volume 2659, Melbourne, Australia, Springer Verlag",
    	ee = "http://dx.doi.org/10.1007/3-540-44863-2_73",
    	isbn = "3-540-40196-2",
    	month = "Jun",
    	pages = "750--759",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Method Call Acceleration in Embedded Java Virtual Machines",
    	volume = 2659,
    	year = 2003
    }
    
  157. K Adi and M Debbabi. A Game Semantics Approach for Security Protocols. In International Symposium on Programming and Systems, ISPS'2003, Algiers, Algeria. May 2003, 209–227. BibTeX

    @inproceedings{481798050,
    	author = "K. Adi and M. Debbabi",
    	booktitle = "International Symposium on Programming and Systems, ISPS'2003, Algiers, Algeria",
    	month = "May",
    	pages = "209--227",
    	title = "A Game Semantics Approach for Security Protocols",
    	year = 2003
    }
    
  158. M Debbabi and M Mejri. Towards the Correctness of Security Protocols. In Mathematical Foundations of Programming Semantics, MFPS XIX, Montreal, Canada. March 2003, 213–285. BibTeX

    @inproceedings{558081536,
    	author = "M. Debbabi and M. Mejri",
    	booktitle = "Mathematical Foundations of Programming Semantics, MFPS XIX, Montreal, Canada",
    	month = "Mar",
    	pages = "213--285",
    	title = "Towards the Correctness of Security Protocols",
    	year = 2003
    }
    
  159. M Debbabi, J Desharnais, M Fourati, E Menif, F Painchaud and Nadia Tawbi. Secure Self-Certified Code for Java. In Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers 2629. December 2002, 133–151. BibTeX

    @inproceedings{89098762,
    	author = "M. Debbabi and J. Desharnais and M. Fourati and E. Menif and F. Painchaud and Nadia Tawbi",
    	booktitle = "Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers",
    	ee = "http://dx.doi.org/10.1007/978-3-540-40981-6_12",
    	isbn = "3-540-20693-0",
    	month = "Dec",
    	pages = "133--151",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Secure Self-Certified Code for Java",
    	volume = 2629,
    	year = 2002
    }
    
  160. M Debbabi, M Rahman, W Lin, J Gopal and K Sridhar. Standard Java SIP APIs for Presence and Instant Messaging in Mobile Devices. In 5th International IEEE Workshop on Networked Appliances, IWNA'2002, Liverpool, UK, IEEE Press. November 2002, 59–64. BibTeX

    @inproceedings{1308792542,
    	author = "M. Debbabi and M. Rahman and W. Lin and J. Gopal and K. Sridhar",
    	booktitle = "5th International IEEE Workshop on Networked Appliances, IWNA'2002, Liverpool, UK, IEEE Press",
    	month = "Nov",
    	pages = "59--64",
    	publisher = "IEEE Press",
    	title = "Standard Java SIP APIs for Presence and Instant Messaging in Mobile Devices",
    	year = 2002
    }
    
  161. J Bergeron, R Charpentier, M Debbabi, J Desharnais, E Giasson, B Ktari, F Michaud, M Salois and N Tawbi. Secure Integration of Critical Software via Certifying compilers. In 13th Annual Canadian Information Technology Security Symposium, Computer Security Establishment CSE, Ottawa, Canada. June 2001. BibTeX

    @inproceedings{963074124,
    	author = "J. Bergeron and R. Charpentier and M. Debbabi and J. Desharnais and E. Giasson and B. Ktari and F. Michaud and M. Salois and N. Tawbi",
    	booktitle = "13th Annual Canadian Information Technology Security Symposium, Computer Security Establishment CSE, Ottawa, Canada",
    	month = "Jun",
    	title = "Secure Integration of Critical Software via Certifying compilers",
    	year = 2001
    }
    
  162. J Bergeron, M Debbabi, J Desharnais, M Erhioui, Y Lavoie and N Tawbi. Static Detection of Malicious Code in Executable Programs. In International Symposium on Requirements Engineering for Information Security SREIS'01, Indianapolis, Indiana, USA. March 2001, 1–8. BibTeX

    @inproceedings{1048833607,
    	author = "J. Bergeron and M. Debbabi and J. Desharnais and M. Erhioui and Y. Lavoie and N. Tawbi",
    	booktitle = "International Symposium on Requirements Engineering for Information Security SREIS'01, Indianapolis, Indiana, USA",
    	month = "Mar",
    	pages = "1--8",
    	title = "Static Detection of Malicious Code in Executable Programs",
    	year = 2001
    }
    
  163. M Debbabi, M Girard, L Poulin and M Salois. Dynamic Monitoring of Malicious Activity in Software Systems. In International Symposium on Requirements Engineering for Information Security, SREIS'01, Indianapolis, Indiana, USA. March 2001, 1–15. BibTeX

    @inproceedings{1524615925,
    	author = "M. Debbabi and M. Girard and L. Poulin and M. Salois",
    	booktitle = "International Symposium on Requirements Engineering for Information Security, SREIS'01, Indianapolis, Indiana, USA",
    	month = "Mar",
    	pages = "1--15",
    	title = "Dynamic Monitoring of Malicious Activity in Software Systems",
    	year = 2001
    }
    
  164. M Debbabi and S Doyon. On the Java Bytecode Verifier. In 12th Annual Canadian Information Technology Security Symposium, Computer Security Establishment CSE, Ottawa, Canada. June 2000. BibTeX

    @inproceedings{1187647669,
    	author = "M. Debbabi and S. Doyon",
    	booktitle = "12th Annual Canadian Information Technology Security Symposium, Computer Security Establishment CSE, Ottawa, Canada",
    	month = "Jun",
    	title = "On the Java Bytecode Verifier",
    	year = 2000
    }
    
  165. M Debbabi and F Painchaud. On the Implementation of a Standalone Java Bytecode Verifier. In IEEE 9th International Workshop on Enterprise Security, WETICE'2000, National Institute of Standards and Technology NIST, Maryland, USA, IEEE Press. June 2000, 189–194. BibTeX

    @inproceedings{711533785,
    	author = "M. Debbabi and F. Painchaud",
    	booktitle = "IEEE 9th International Workshop on Enterprise Security, WETICE'2000, National Institute of Standards and Technology NIST, Maryland, USA, IEEE Press",
    	month = "Jun",
    	pages = "189--194",
    	publisher = "IEEE Press",
    	title = "On the Implementation of a Standalone Java Bytecode Verifier",
    	year = 2000
    }
    
  166. M Debbabi, E Giasson, B Ktari, F Michaud and Nadia Tawbi. Secure Self-Certified Code. In IEEE 9th International Workshops on Enterprise Security, WETICE'2000, National Institute of Standards and Technology NIST, Maryland, USA, IEEE Press. June 2000, 183–188. BibTeX

    @inproceedings{1328814807,
    	author = "M. Debbabi and E. Giasson and B. Ktari and F. Michaud and Nadia Tawbi",
    	booktitle = "IEEE 9th International Workshops on Enterprise Security, WETICE'2000, National Institute of Standards and Technology NIST, Maryland, USA, IEEE Press",
    	month = "Jun",
    	pages = "183--188",
    	publisher = "IEEE Press",
    	title = "Secure Self-Certified Code",
    	year = 2000
    }
    
  167. K Adi, M Debbabi and M Mejri. A New Logic for Electronic Commerce Protocols. In 8th International Conference on Algebraic Methodology and Software Technology, AMAST'2000, Lecture Notes in Computer Science, LNCS, Volume 1816, Iowa City, Iowa, USA, Springer Verlag 1816. May 2000, 499–513. BibTeX

    @inproceedings{1645291431,
    	author = "K. Adi and M. Debbabi and M. Mejri",
    	booktitle = "8th International Conference on Algebraic Methodology and Software Technology, AMAST'2000, Lecture Notes in Computer Science, LNCS, Volume 1816, Iowa City, Iowa, USA, Springer Verlag",
    	ee = "http://dx.doi.org/10.1007/3-540-45499-3_35",
    	isbn = "3-540-67530-2",
    	month = "May",
    	pages = "499--513",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "A New Logic for Electronic Commerce Protocols",
    	volume = 1816,
    	year = 2000
    }
    
  168. S Doyon and M Debbabi. Verifying Object Initialization in the Java Bytecode Language. In ACM Symposium on Applied Computing, ACM SAC'2000, Volume 2, Como, Italy, ACM Press. March 2000, 821–830. BibTeX

    @inproceedings{667931992,
    	author = "S. Doyon and M. Debbabi",
    	booktitle = "ACM Symposium on Applied Computing, ACM SAC'2000, Volume 2, Como, Italy, ACM Press",
    	month = "Mar",
    	pages = "821--830",
    	publisher = "ACM Press",
    	title = "Verifying Object Initialization in the Java Bytecode Language",
    	year = 2000
    }
    
  169. M Debbabi and S Doyon. On the Java Bytecode Verifier. In International Conference on Parallel and Distributed Computing and Systems, PDCS'99, MIT, Boston, USA. November 1999. BibTeX

    @inproceedings{1075137640,
    	author = "M. Debbabi and S. Doyon",
    	booktitle = "International Conference on Parallel and Distributed Computing and Systems, PDCS'99, MIT, Boston, USA",
    	month = "Nov",
    	title = "On the Java Bytecode Verifier",
    	year = 1999
    }
    
  170. J Bergeron, M Debbabi, M M Erhioui and B Ktari. Static Analysis of Binary Code to Isolate Malicious Behaviors. In IEEE 4th International Workshop on Enterprise Security, WETICE'99, Stanford University, California, USA, IEEE Press. June 1999, 184–189. BibTeX

    @inproceedings{1307325293,
    	author = "J. Bergeron and M. Debbabi and M. M. Erhioui and B. Ktari",
    	booktitle = "IEEE 4th International Workshop on Enterprise Security, WETICE'99, Stanford University, California, USA, IEEE Press",
    	ee = "http://computer.org/proceedings/wetice/0365/03650184abs.htm",
    	isbn = "0-7695-0365-9",
    	month = "Jun",
    	pages = "184--189",
    	publisher = "IEEE Computer Society",
    	title = "Static Analysis of Binary Code to Isolate Malicious Behaviors",
    	year = 1999
    }
    
  171. Y Al-Salqan, N Shahmehri, W Wen and M Debbabi. Enabling Technologies: Infrastructure for Collaborative Enterprises. In International Workshop on Enterprise Security, WETICE'99, Stanford University, California, USA, IEEE Press. June 1999, 134–135. BibTeX

    @inproceedings{2083462111,
    	author = "Y. Al-Salqan and N. Shahmehri and W. Wen and M. Debbabi",
    	booktitle = "International Workshop on Enterprise Security, WETICE'99, Stanford University, California, USA, IEEE Press",
    	month = "Jun",
    	pages = "134--135",
    	publisher = "IEEE Press",
    	title = "Enabling Technologies: Infrastructure for Collaborative Enterprises",
    	year = 1999
    }
    
  172. J Bergeron, M Debbabi, J Desharnais, B Ktari, M Salois and N Tawbi. Detection of Malicious Code in COTS Software: A Short Survey. In 1st International Software Assurance Certification Conference, ISACC'99, Washington D.C, USA, IEEE Press. March 1999. BibTeX

    @inproceedings{1094931522,
    	author = "J. Bergeron and M. Debbabi and J. Desharnais and B. Ktari and M. Salois and N. Tawbi",
    	booktitle = "1st International Software Assurance Certification Conference, ISACC'99, Washington D.C, USA, IEEE Press",
    	month = "Mar",
    	publisher = "IEEE Press",
    	title = "Detection of Malicious Code in COTS Software: A Short Survey",
    	year = 1999
    }
    
  173. M Debbabi, A Benzakour and B Ktari. A Synergy between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes. In International Conference on Algebraic Methodology and Software Technology, AMAST'98, Volume 1548, Lecture Notes in Computer Science, LNCS, Manaus, Amazonia, Brazil, Springer Verlag 1548. January 1999, 214–230. BibTeX

    @inproceedings{562633528,
    	author = "M. Debbabi and A. Benzakour and B. Ktari",
    	booktitle = "International Conference on Algebraic Methodology and Software Technology, AMAST'98, Volume 1548, Lecture Notes in Computer Science, LNCS, Manaus, Amazonia, Brazil, Springer Verlag",
    	ee = "http://dx.doi.org/10.1007/3-540-49253-4_17",
    	isbn = "3-540-65462-3",
    	month = "Jan",
    	pages = "214--230",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "A Synergy between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes",
    	volume = 1548,
    	year = 1999
    }
    
  174. M Debbabi, Y Légaré and M Mejri. An Environment for the Specification and Analysis of Cryptoprotocols. In IEEE 14th Annual Computer Security Applications Conference, Scottsdale, Phoenix, Arizona, USA, IEEE Press. December 1998, 321–332. BibTeX

    @inproceedings{1689491932,
    	author = "M. Debbabi and Y. Légaré and M. Mejri",
    	booktitle = "IEEE 14th Annual Computer Security Applications Conference, Scottsdale, Phoenix, Arizona, USA, IEEE Press",
    	ee = "http://doi.ieeecomputersociety.org/10.1109/CSAC.1998.738652",
    	isbn = "0-8186-8789-4",
    	month = "Dec",
    	pages = "321--332",
    	publisher = "IEEE Computer Society",
    	title = "An Environment for the Specification and Analysis of Cryptoprotocols",
    	year = 1998
    }
    
  175. M Debbabi, M Mejri, N Tawbi and I Yahmadi. Formal Automatic Verification of Authentication Cryptographic Protocols. In 1st IEEE International Conference on Formal Engineering Methods, ICFEM'97, Hiroshima International Convention Center, Japan, IEEE Press.(PDF BibTex). November 1997, 50–59. BibTeX

    @inproceedings{1583842304,
    	author = "M. Debbabi and M. Mejri and N. Tawbi and I. Yahmadi",
    	booktitle = "1st IEEE International Conference on Formal Engineering Methods, ICFEM'97, Hiroshima International Convention Center, Japan, IEEE Press.(PDF BibTex)",
    	month = "Nov",
    	pages = "50--59",
    	publisher = "IEEE Press",
    	title = "Formal Automatic Verification of Authentication Cryptographic Protocols",
    	year = 1997
    }
    
  176. M Debbabi, M Mejri, N Tawbi and I Yahmadi. A New Algorithm for the Automatic Verification of Authentication Protocols. In International DIMACS Workshop on Design and Formal Verification of Security Protocols, DIMACS Center, Core Building, Rutgers University, New Jersey, USA. September 1997, 1–19. BibTeX

    @inproceedings{1525696675,
    	author = "M. Debbabi and M. Mejri and N. Tawbi and I. Yahmadi",
    	booktitle = "International DIMACS Workshop on Design and Formal Verification of Security Protocols, DIMACS Center, Core Building, Rutgers University, New Jersey, USA",
    	month = "Sep",
    	pages = "1--19",
    	title = "A New Algorithm for the Automatic Verification of Authentication Protocols",
    	year = 1997
    }
    
  177. M Debbabi, M Mejri, N Tawbi and I Yahmadi. From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. In Second International Workshop on Enterprise Security, Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts, USA, IEEE Press. June 1997, 256–262. BibTeX

    @inproceedings{1491521318,
    	author = "M. Debbabi and M. Mejri and N. Tawbi and I. Yahmadi",
    	booktitle = "Second International Workshop on Enterprise Security, Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts, USA, IEEE Press",
    	ee = "http://computer.org/proceedings/wet-ice/7967/79670256abs.htm",
    	isbn = "0-8186-7967-0",
    	month = "Jun",
    	pages = "256--262",
    	publisher = "IEEE Computer Society",
    	title = "From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm",
    	year = 1997
    }
    
  178. M Debbabi, Z Aidoud and A Faour. On the Inference of Structured Recursive Effects with Subtyping. In International Workshop on Functional and Logic Programming, Shonan Center, Japan. November 1996, 123–142. BibTeX

    @inproceedings{1807885549,
    	author = "M. Debbabi and Z. Aidoud and A. Faour",
    	booktitle = "International Workshop on Functional and Logic Programming, Shonan Center, Japan",
    	month = "Nov",
    	pages = "123--142",
    	title = "On the Inference of Structured Recursive Effects with Subtyping",
    	year = 1996
    }
    
  179. M Debbabi, A Faour and N Tawbi. A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs. In 8th International Workshop on Implementation of Functional Languages, IFL'96, Bad Godesberg, Germany 1268. September 1996, 247–266. BibTeX

    @inproceedings{775604409,
    	author = "M. Debbabi and A. Faour and N. Tawbi",
    	booktitle = "8th International Workshop on Implementation of Functional Languages, IFL'96, Bad Godesberg, Germany",
    	ee = "http://dx.doi.org/10.1007/3-540-63237-9_29",
    	isbn = "3-540-63237-9",
    	month = "Sep",
    	pages = "247--266",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs",
    	volume = 1268,
    	year = 1996
    }
    
  180. D Bolignano and M Debbabi. A Coherent Type System for a Concurrent, Functional and Imperative Programming Language. In 3rd International Conference on Algebraic Methodology and Software Technology, AMAST'93, Twente, Netherlands. June 1993, 153–162. BibTeX

    @inproceedings{1830879289,
    	author = "D. Bolignano and M. Debbabi",
    	booktitle = "3rd International Conference on Algebraic Methodology and Software Technology, AMAST'93, Twente, Netherlands",
    	isbn = "3-540-19852-0",
    	month = "Jun",
    	pages = "153--162",
    	publisher = "Springer",
    	series = "Workshops in Computing",
    	title = "A Coherent Type System for a Concurrent, Functional and Imperative Programming Language",
    	year = 1993
    }
    
  181. M Debbabi. From CML to A Model-Based Concurrent Specification Language. In International Workshop on Formal Methods for Parallel Programming: Theory and Applications, FMPPTA'96, Waikiki, Honolulu, Hawaii, USA. April 1996, 1–21. BibTeX

    @inproceedings{381176501,
    	author = "M. Debbabi",
    	booktitle = "International Workshop on Formal Methods for Parallel Programming: Theory and Applications, FMPPTA'96, Waikiki, Honolulu, Hawaii, USA",
    	month = "Apr",
    	pages = "1--21",
    	title = "From CML to A Model-Based Concurrent Specification Language",
    	year = 1996
    }
    
  182. M Debbabi. A Concurrent, Specification Language over CML. In International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'95, Georgia, USA, CSREA Press. November 1995, 541–550. BibTeX

    @inproceedings{1241568996,
    	author = "M. Debbabi",
    	booktitle = "International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'95, Georgia, USA, CSREA Press",
    	isbn = "0-9648666-0-9",
    	month = "Nov",
    	pages = "541--550",
    	publisher = "CSREA Press",
    	title = "A Concurrent, Specification Language over CML",
    	year = 1995
    }
    
  183. D Bolignano and M Debbabi. A Semantic Theory for Concurrent ML. In International Symposium on Theoretical Aspects of Computer Software, TACS'94, Tohoku University, Sendai, Japan, Lecture Notes in Computer Science, LNCS, Volume 789, Springer Verlag 789. April 1994, 766–785. BibTeX

    @inproceedings{502627687,
    	author = "D. Bolignano and M. Debbabi",
    	booktitle = "International Symposium on Theoretical Aspects of Computer Software, TACS'94, Tohoku University, Sendai, Japan, Lecture Notes in Computer Science, LNCS, Volume 789, Springer Verlag",
    	ee = "http://dx.doi.org/10.1007/3-540-57887-0_124",
    	isbn = "3-540-57887-0",
    	month = "Apr",
    	pages = "766--785",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "A Semantic Theory for Concurrent ML",
    	volume = 789,
    	year = 1994
    }
    
  184. D Bolignano and M Debbabi. A Denotational Model for ML Higher Order Synchronous Primitives. In North American Process Algebra Workshop, NAPAW'93, Cornell University, Ithaca, NY, Bard Bloom Editor, Technical Report, TR93-1369, Cornell University. August 1993. BibTeX

    @inproceedings{118147723,
    	author = "D. Bolignano and M. Debbabi",
    	booktitle = "North American Process Algebra Workshop, NAPAW'93, Cornell University, Ithaca, NY, Bard Bloom Editor, Technical Report, TR93-1369, Cornell University",
    	month = "Aug",
    	title = "A Denotational Model for ML Higher Order Synchronous Primitives",
    	year = 1993
    }
    
  185. D Bolignano and M Debbabi. Higher Order Communication Processes with Value-Passing, Assignment and Return of Results. In International Symposium on Algorithms and Computation, ISAAC'92, Nagoya, Japan, Lecture Notes in Computer Science, LNCS, Volume 650, Springer Verlag 650. December 1992, 319–331. BibTeX

    @inproceedings{1896884260,
    	author = "D. Bolignano and M. Debbabi",
    	booktitle = "International Symposium on Algorithms and Computation, ISAAC'92, Nagoya, Japan, Lecture Notes in Computer Science, LNCS, Volume 650, Springer Verlag",
    	ee = "http://dx.doi.org/10.1007/3-540-56279-6_85",
    	isbn = "3-540-56279-6",
    	month = "Dec",
    	pages = "319--331",
    	publisher = "Springer",
    	series = "Lecture Notes in Computer Science",
    	title = "Higher Order Communication Processes with Value-Passing, Assignment and Return of Results",
    	volume = 650,
    	year = 1992
    }
    

 

 


TOP

THEME OPTIONS

Header type:
Theme Colors:
Color suggestions *
THEME
* May not have full accuracy!