|
|
Line 1: |
Line 1: |
− | {{cventry |[66]| Serguei A. Mokhov, Joey Paquet and Mourad Debbabi: MARFCAT: Fast code analysis for defects and vulnerabilities. In: Proceedings of the 1st IEEE International Workshop on Software Analytics, SWAN 2015, Montreal, QC, Canada, March 2, 2015. pp35-38, IEEE, April 2015. doi: 10.1109/SWAN.2015.7070488 [http://dx.doi.org/10.1109/SWAN.2015.7070488]}} | + | {{cventry |[66]| Amine Boukhtouta, Serguei A. Mokhov, Nour-Eddine Lakhdari, Mourad Debbabi and Joey Paquet: Network Malware Classification Comparison Using DPI and Flow Packet Headers. In: Journal of Computer Virology and Hacking Techniques. Springer. 2014-2015 To appear.}} |
| | | |
− | {{cventry |[65]| Amine Boukhtouta, Serguei A. Mokhov, Nour-Eddine Lakhdari, Mourad Debbabi and Joey Paquet: Network Malware Classification Comparison Using DPI and Flow Packet Headers. In: Journal of Computer Virology and Hacking Techniques. Springer. 2014-2015 To appear.}} | + | {{cventry |[65]| Touraj Laleh, Serguei A. Mokhov, Joey Paquet and Yuhong Yan: Context-Aware Cloud Service Brokerage: A Solution to the Problem of Data Integration Among SaaS Providers. In: Proceedings of the Eighth International C* Conference on Computer Science and Software Engineering (C3S2E'15), Yokohoma, Japan. ACM, July 2015. To appear.}} |
| | | |
− | {{cventry |[64]| Touraj Laleh, Serguei A. Mokhov, Joey Paquet and Yuhong Yan: Context-Aware Cloud Service Brokerage: A Solution to the Problem of Data Integration Among SaaS Providers. In: Proceedings of the Eighth International C* Conference on Computer Science and Software Engineering (C3S2E'15), Yokohoma, Japan. ACM, July 2015. To appear.}} | + | {{cventry |[64]|Serguei A. Mokhov, Michael J. Assels, Joey Paquet and Mourad Debbabi: Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. In: Foundations and Practice of Security - 7th International Symposium (FPS 2014), Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science No. 8930, pp168-183, Springer, April 2015. doi: 10.1007/978-3-319-17040-4 [http://dx.doi.org/10.1007/978-3-319-17040-4]}} |
| | | |
− | {{cventry |[63]|Serguei A. Mokhov, Michael J. Assels, Joey Paquet and Mourad Debbabi: Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. In: Foundations and Practice of Security - 7th International Symposium (FPS 2014), Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science No. 8930, pp168-183, Springer, April 2015. doi: 10.1007/978-3-319-17040-4 [http://dx.doi.org/10.1007/978-3-319-17040-4]}} | + | {{cventry |[63]| Sleiman Rabah, May El Barachi, Nadjia Kara, Rachida Dssouli and Joey Paquet: A service oriented broker-based approach for dynamic resource discovery in virtual networks. In: Journal of Cloud Computing, February 2015, 4:3. doi: 10.1186/s13677-015-0029-5 [http://dx.doi.org/10.1186/s13677-015-0029-5]}} |
| | | |
− | {{cventry |[62]| Sleiman Rabah, May El Barachi, Nadjia Kara, Rachida Dssouli and Joey Paquet: A service oriented broker-based approach for dynamic resource discovery in virtual networks. In: Journal of Cloud Computing, February 2015, 4:3. doi: 10.1186/s13677-015-0029-5 [http://dx.doi.org/10.1186/s13677-015-0029-5]}} | + | {{cventry |[62]| Serguei A. Mokhov, Joey Paquet and Mourad Debbabi: MARFCAT: Fast code analysis for defects and vulnerabilities. In: Proceedings of the 1st IEEE International Workshop on Software Analytics, SWAN 2015, Montreal, QC, Canada, March 2, 2015. pp35-38, IEEE, April 2015. doi: 10.1109/SWAN.2015.7070488 [http://dx.doi.org/10.1109/SWAN.2015.7070488]}} |
| | | |
| {{cventry |[61]|Serguei A. Mokhov, Michael J. Assels, Joey Paquet, Mourad Debbabi: Toward Automated MAC Spoofer Investigations. In: Proceedings of the Seventh International C* Conference on Computer Science and Software Engineering (C3S2E'14), Montreal, Canada. ACM, August 2014. p.27 doi: 10.1145/2641483.2641540 [http://doi.acm.org/10.1145/2641483.2641540]}} | | {{cventry |[61]|Serguei A. Mokhov, Michael J. Assels, Joey Paquet, Mourad Debbabi: Toward Automated MAC Spoofer Investigations. In: Proceedings of the Seventh International C* Conference on Computer Science and Software Engineering (C3S2E'14), Montreal, Canada. ACM, August 2014. p.27 doi: 10.1145/2641483.2641540 [http://doi.acm.org/10.1145/2641483.2641540]}} |