|
|
(32 intermediate revisions by one user not shown) |
Line 1: |
Line 1: |
− | ==2015== | + | ==2023== |
− | {{cventry |[66]| Amine Boukhtouta, Serguei A. Mokhov, Nour-Eddine Lakhdari, Mourad Debbabi and Joey Paquet: Network Malware Classification Comparison Using DPI and Flow Packet Headers. In: Journal of Computer Virology and Hacking Techniques. Volume 11, Number 3. Springer. July 2015. doi: 10.1007/s11416-015-0247-x [http://dx.doi.org/10.1007/s11416-015-0247-x]}}
| + | |
| | | |
− | {{cventry |[65]| Touraj Laleh, Serguei A. Mokhov, Joey Paquet and Yuhong Yan: Context-Aware Cloud Service Brokerage: A Solution to the Problem of Data Integration Among SaaS Providers. In: Proceedings of the Eighth International C* Conference on Computer Science and Software Engineering (C3S2E'15), Yokohoma, Japan. ACM, July 2015. To appear.}} | + | {{cventry |[78]| Solmaz Jaberi, J. William Atwood, Joey Paquet. ASSL as an Intent Expression Language for Autonomic Intent-Driven Networking. In Proceedings of the 19th International Conference on Network and Service Management (CNSM 2023). doi: 10.23919/CNSM59352.2023.10327860 [https://doi.org/10.23919/CNSM59352.2023.10327860] }} |
| + | |
| + | {{cventry |[77]| Pouria Zahraei, Serguei Mokhov, Joey Paquet. A Kubernetes Underlay for OpenTDIP Forensic Computing Backend. In Proceedings of the Symposium on Electronic Crime Research 2023 (eCrime 2023). doi: 10.1109/ISNCC49221.2020.9297280 [https://doi.org/10.1109/eCrime61234.2023.10485551] }} |
| + | |
| + | ==2020== |
| + | |
| + | {{cventry |[76]| Rostislav Axamitnyy, Alexander Aric, Serguei A. Mokhov, Joey Paquet, and Sudhir P. Mudur. OpenISS IoT Camera Simulation Environment for Real-time IoT Forensics and Incident Response. ISNCC 2020. doi: 10.1109/ISNCC49221.2020.9297280 [https://doi.org/10.1109/ISNCC49221.2020.9297280] }} |
| + | |
| + | {{cventry |[75]| Peyman Derafshkavian, Serguei A. Mokhov and Joey Paquet. Toward Scalable Demand-Driven JSON-to-Forensic Lucid Encoder in GIPSY. ISNCC 2020. doi: 10.1109/ISNCC49221.2020.9297224 [https://doi.org/10.1109/ISNCC49221.2020.9297224] }} |
| + | |
| + | {{cventry |[74]| Jashanjot Singh, Serguei A. Mokhov and Joey Paquet. Enabling Real-time Gesture Recognition Data Delivery over ROS and OpenISS. ISNCC 2020. doi: 10.1109/ISNCC49221.2020.9297239 [https://doi.org/10.1109/ISNCC49221.2020.9297239] }} |
| + | |
| + | {{cventry |[73]| Serguei A. Mokhov, Jashanjot Singh, Haotao Lai, Konstantinos Psimoulis and Joey Paquet. OpenISS as a Near-Realtime Composable Broadcast Service for Performing Arts and Beyond. ISNCC 2020. doi: 10.1109/ISNCC49221.2020.9297201 [https://doi.org/10.1109/ISNCC49221.2020.9297201] }} |
| + | |
| + | {{cventry |[72]| Jyotsana Gupta, Joey Paquet, Serguei A. Mokhov. Composite Web Services as Dataflow Graphs for Constraint Verification. CLOSER 2020: 282-291. doi: 10.5220/0009342302820291 [https://doi.org/10.5220/0009342302820291]}} |
| + | |
| + | ==2018== |
| + | |
| + | {{cventry |[71]| Touraj Laleh, Joey Paquet, Serguei A. Mokhov, Yuhong Yan. Constraint verification failure recovery in web service composition. Future Generation Comp. Syst. 89: 387-401 (2018). doi: 10.1016/j.future.2018.06.037 [https://doi.org/10.1016/j.future.2018.06.037]}} |
| + | |
| + | ==2017== |
| + | |
| + | {{cventry |[70]| Touraj Laleh, Joey Paquet, Serguei Mokhov, Yuhong Yan. Constraint Adaptation in Web Service Composition. The 14th IEEE International Conference on Services Computing (SCC 2017), Honolulu, Hawaii, USA, June 2017. doi: 10.1109/SCC.2017.27 [http://dx.doi.org/10.1109/SCC.2017.27]}} |
| + | |
| + | {{cventry |[69]| Touraj Laleh, Joey Paquet, Serguei Mokhov, Yuhong Yan. Predictive Failure Recovery in Constraint-aware Web Service Composition. The 7th International Conference on Cloud Computing and Services Science. Porto, Portugal, April 2017. doi: 10.5220/0006313802410252 [http://dx.doi.org/10.5220/0006313802410252]}} |
| + | |
| + | ==2016== |
| + | |
| + | {{cventry |[68]| Touraj Laleh, Esteban Garro, Jashanjot Singh, Gurpreet Raju, Muhammad Usman, Serguei A. Mokhov, Joey Paquet. Demand-Driven SOA Simulation Platform Based on GIPSY for Context-Based Brokerage (poster). The 14th International Conference on Service Oriented Computing (ICSOC 2016), Banff, Canada, October 2016.}} |
| + | |
| + | {{cventry |[67]| Touraj Laleh, Joey Paquet, Serguei Mokhov, Yuhong Yan. (2016). Efficient Constraint Verification in Service Composition Design and Execution. Lecture Notes in Computer Science 10033. CoopIS 2016: 24th International Conference on Cooperative Information Systems, Rhodes, Greece. doi: 10.1007/978-3-319-48472-3_26 [http://dx.doi.org/10.1007/978-3-319-48472-3_26]}} |
| + | |
| + | {{cventry |[66]| Amine Boukhtouta, Serguei A. Mokhov, Nour-Eddine Lakhdari, Mourad Debbabi and Joey Paquet: Network Malware Classification Comparison Using DPI and Flow Packet Headers. In: Journal of Computer Virology and Hacking Techniques. Volume 11, Number 3. Springer. May 2016. doi: 10.1007/s11416-015-0247-x [http://dx.doi.org/10.1007/s11416-015-0247-x]}} |
| + | |
| + | ==2015== |
| + | {{cventry |[65]| Touraj Laleh, Serguei A. Mokhov, Joey Paquet and Yuhong Yan: Context-Aware Cloud Service Brokerage: A Solution to the Problem of Data Integration Among SaaS Providers. In: Proceedings of the Eighth International C* Conference on Computer Science and Software Engineering (C3S2E'15), Yokohoma, Japan. ACM, July 2015. doi: 10.1145/2790798.2790804 [http://dx.doi.org/10.1145/2790798.2790804]}} |
| | | |
| {{cventry |[64]|Serguei A. Mokhov, Michael J. Assels, Joey Paquet and Mourad Debbabi: Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. In: Foundations and Practice of Security - 7th International Symposium (FPS 2014), Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science No. 8930, pp168-183, Springer, April 2015. doi: 10.1007/978-3-319-17040-4 [http://link.springer.com/chapter/10.1007/978-3-319-17040-4_11]}} | | {{cventry |[64]|Serguei A. Mokhov, Michael J. Assels, Joey Paquet and Mourad Debbabi: Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. In: Foundations and Practice of Security - 7th International Symposium (FPS 2014), Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science No. 8930, pp168-183, Springer, April 2015. doi: 10.1007/978-3-319-17040-4 [http://link.springer.com/chapter/10.1007/978-3-319-17040-4_11]}} |
Line 18: |
Line 52: |
| | | |
| ==2013== | | ==2013== |
− | {{cventry |[58]|M. El Barachi et al. "A multi-service multi-role integrated information model for dynamic resource discovery in virtual networks". In: Wireless Communications and Networking Conference (WCNC 2013), Shanghai, China. IEEE Computer Society, Apr. 2013, pp. 4777-4782. doi: 10.1109/WCNC.2013.6555349. [http://dx.doi.org/10.1109/WCNC.2013.6555349]}} | + | {{cventry |[58]|El Barachi, M., Rabah, S., Kara, N., Dssouli, R., Paquet, J. "A multi-service multi-role integrated information model for dynamic resource discovery in virtual networks". In: Wireless Communications and Networking Conference (WCNC 2013), Shanghai, China. IEEE Computer Society, Apr. 2013, pp. 4777-4782. doi: 10.1109/WCNC.2013.6555349. [http://dx.doi.org/10.1109/WCNC.2013.6555349]}} |
| | | |
| {{cventry |[57]|Sleiman Rabah, Serguei Mokhov, Joey Paquet. "An Interactive Graph-Based Automation Assistant: A Case Study to Manage the GIPSY's Distributed Multi-tier Run-Time System". In: Proceedings of the 2013 Conference on Research in Adaptive and Convergent Systems (RACS 2013), Montreal, Canada. Oct. 2013. doi: 10.1145/2513228.2513286. [http://dx.doi.org/10.1145/2513228.2513286]}} | | {{cventry |[57]|Sleiman Rabah, Serguei Mokhov, Joey Paquet. "An Interactive Graph-Based Automation Assistant: A Case Study to Manage the GIPSY's Distributed Multi-tier Run-Time System". In: Proceedings of the 2013 Conference on Research in Adaptive and Convergent Systems (RACS 2013), Montreal, Canada. Oct. 2013. doi: 10.1145/2513228.2513286. [http://dx.doi.org/10.1145/2513228.2513286]}} |
Line 57: |
Line 91: |
| | | |
| ==2008== | | ==2008== |
− | {{cventry |[42]|Emil Vassev, Amir Hossein Pourteymour and Joey Paquet. "Design and Implementation of Demand Migration Systems in GIPSY". In: Proceedings of the 2008 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'08), Las Vegas, USA. CSREA Press, July 2008, pp. 900-907. isbn: 1-60132-084-1.}} | + | {{cventry |[42]|Emil Vassev, Amir Hossein Pourteymour and Joey Paquet. "Design and Implementation of Demand Migration Systems in GIPSY". In: Proceedings of the 2008 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'08), Las Vegas, USA. CSREA Press, July 2008, pp. 900-907. isbn: 1-60132-084-1. [https://www.researchgate.net/publication/221134114_Design_and_Implementation_of_Demand_Migration_Systems_in_GIPSY]}} |
| | | |
| {{cventry |[41]|Serguei A. Mokhov, Joey Paquet, and Mourad Debbabi. "Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid". In: Proceedings of the IT Incident Management and IT Forensics (IMF'08), Mannheim, Germany. Ed. by Oliver Gobel et al. Vol. 140. LNI. GI, Sept. 2008, pp. 197-216. isbn: 978-3-88579-234-5.[http://www.researchgate.net/publication/221002702_Formally_Specifying_Operational_Semantics_and_Language_Constructs_of_Forensic_Lucid]}} | | {{cventry |[41]|Serguei A. Mokhov, Joey Paquet, and Mourad Debbabi. "Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid". In: Proceedings of the IT Incident Management and IT Forensics (IMF'08), Mannheim, Germany. Ed. by Oliver Gobel et al. Vol. 140. LNI. GI, Sept. 2008, pp. 197-216. isbn: 978-3-88579-234-5.[http://www.researchgate.net/publication/221002702_Formally_Specifying_Operational_Semantics_and_Language_Constructs_of_Forensic_Lucid]}} |
Line 72: |
Line 106: |
| {{cventry |[36]|Hadi Otrok et al. "Testing Intrusion Detection Systems in MANET: A Comprehensive Study". In: Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR'07), Fredericton, Canada. May 2007, pp. 364-371. isbn: 0-7695-2835-X. doi: 10.1109/CNSR.2007.62. [http://dx.doi.org/10.1109/CNSR.2007.62]}} | | {{cventry |[36]|Hadi Otrok et al. "Testing Intrusion Detection Systems in MANET: A Comprehensive Study". In: Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR'07), Fredericton, Canada. May 2007, pp. 364-371. isbn: 0-7695-2835-X. doi: 10.1109/CNSR.2007.62. [http://dx.doi.org/10.1109/CNSR.2007.62]}} |
| | | |
− | {{cventry |[35]|Amir Hossein Pourteymour, Emil Vassev, and Joey Paquet. "Towards a New Demand-Driven Message-Oriented Middleware in GIPSY". In: Proceedings of The 2007 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'07), Las Vegas, USA. Vol. 1. CSREA Press, June 2007, pp. 91-97. isbn: 1-60132-020-5.}} | + | {{cventry |[35]|Amir Hossein Pourteymour, Emil Vassev, and Joey Paquet. "Towards a New Demand-Driven Message-Oriented Middleware in GIPSY". In: Proceedings of The 2007 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'07), Las Vegas, USA. Vol. 1. CSREA Press, June 2007, pp. 91-97. isbn: 1-60132-020-5. [https://www.researchgate.net/publication/221132664_Towards_a_new_Demand-Driven_Message-Oriented_Middleware_in_GIPSY]}} |
| | | |
| {{cventry |[34]|Emil Vassev, Olga Ormandjieva, and Joey Paquet. "ASSL Specification of Reliability Self-Assessment in the AS-TRM". In: Proceedings of the Second International Conference on Software and Data Technologies (ICSOFT 2007), Barcelona, Spain. July 2007, pp. 198-206. isbn: 978-989-8111-06-7.[http://www.researchgate.net/profile/Olga_Ormandjieva/publication/220738581_Assl_Specification_of_Reliability_Self-Assessment_in_the_As-Trm/links/0912f50b37ef0a15ea000000.pdf]}} | | {{cventry |[34]|Emil Vassev, Olga Ormandjieva, and Joey Paquet. "ASSL Specification of Reliability Self-Assessment in the AS-TRM". In: Proceedings of the Second International Conference on Software and Data Technologies (ICSOFT 2007), Barcelona, Spain. July 2007, pp. 198-206. isbn: 978-989-8111-06-7.[http://www.researchgate.net/profile/Olga_Ormandjieva/publication/220738581_Assl_Specification_of_Reliability_Self-Assessment_in_the_As-Trm/links/0912f50b37ef0a15ea000000.pdf]}} |