|
Search the dblp DataBase
Mourad Debbabi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mourad Debbabi, Y. Legaré, Mohamed Mejri
An Environment for the Specification and Analysis of Cryptoprotocols. [Citation Graph (0, 0)][DBLP] ACSAC, 1998, pp:321-332 [Conf]
- Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
Java for Mobile Devices: A Security Study. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:235-244 [Conf]
- Azzam Mourad, Marc-Andre Laverdiere, Mourad Debbabi
Towards an Aspect Oriented Approach for the Security Hardening of Code. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:595-600 [Conf]
- Kamel Adi, Mourad Debbabi, Mohamed Mejri
A New Logic for Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP] AMAST, 2000, pp:499-513 [Conf]
- Mourad Debbabi, Abdelkader Benzakour, Béchir Ktari
A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes. [Citation Graph (0, 0)][DBLP] AMAST, 1998, pp:214-230 [Conf]
- Dominique Bolignano, Mourad Debbabi
A Coherent Type System for a Concurrent, Functional and Imperative Programming Language. [Citation Graph (0, 0)][DBLP] AMAST, 1993, pp:153-162 [Conf]
- Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya
Testing Intrusion Detection Systems in MANET: A Comprehensive Study. [Citation Graph (0, 0)][DBLP] CNSR, 2007, pp:364-371 [Conf]
- Anil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood
Secure E-commerce Protection Profile. [Citation Graph (0, 0)][DBLP] Security and Management, 2006, pp:279-285 [Conf]
- Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
Security Analysis of Mobile Java. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2005, pp:231-235 [Conf]
- Luay Alawneh, Mourad Debbabi, Yosr Jarraya, Andrei Soeanu, Fawzi Hassaïne
A Unified Approach for Verification and Validation of Systems and Software Engineering Models. [Citation Graph (0, 0)][DBLP] ECBS, 2006, pp:409-418 [Conf]
- Mourad Debbabi, Josee Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi
Secure Self-certified Code for Java. [Citation Graph (0, 0)][DBLP] FASec, 2002, pp:133-151 [Conf]
- Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne, Yosr Jarraya, Payam Shahi, Andrei Soeanu
Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models. [Citation Graph (0, 0)][DBLP] IASTED Conf. on Software Engineering, 2006, pp:282-287 [Conf]
- Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua
Method Call Acceleration in Embedded Java Virtual Machines. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science, 2003, pp:750-759 [Conf]
- Dominique Bolignano, Mourad Debbabi
A Denotational Model for the Integration of Concurrent, Functional, and Imperative Programming. [Citation Graph (0, 0)][DBLP] ICCI, 1993, pp:244-250 [Conf]
- Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
Formal Automatic Verification of Authentication Crytographic Protocols. [Citation Graph (0, 0)][DBLP] ICFEM, 1997, pp:50-59 [Conf]
- Mourad Debbabi, Mohamed Saleh
Game Semantics Model for Security Protocols. [Citation Graph (0, 0)][DBLP] ICFEM, 2005, pp:125-140 [Conf]
- Mourad Debbabi, Ali Faour, Nadia Tawbi
A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs. [Citation Graph (0, 0)][DBLP] Implementation of Functional Languages, 1996, pp:247-266 [Conf]
- Dominique Bolignano, Mourad Debbabi
Higher Order Communication Processes with Value-Passing, Assignment and Return of Results. [Citation Graph (0, 0)][DBLP] ISAAC, 1992, pp:319-331 [Conf]
- Hassan Issa, Chadi Assi, Mourad Debbabi
QoS-Aware Middleware for Web Services Composition - A Qualitative Approach. [Citation Graph (0, 0)][DBLP] ISCC, 2006, pp:359-364 [Conf]
- Nadia Belblidia, Mourad Debbabi
Towards a Formal Semantics for AspectJ Weaving. [Citation Graph (0, 0)][DBLP] JMLC, 2006, pp:155-171 [Conf]
- Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
Security Analysis of Wireless Java. [Citation Graph (0, 0)][DBLP] PST, 2005, pp:- [Conf]
- Mourad Debbabi, Azzam Mourad, Nadia Tawbi
Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:874-878 [Conf]
- Stephane Doyon, Mourad Debbabi
Verifying Object Initialization in the Java Bytecode Language. [Citation Graph (0, 0)][DBLP] SAC (2), 2000, pp:821-830 [Conf]
- Nadia Belblidia, Mourad Debbabi
Formalizing AspectJ Weaving for Static Pointcuts. [Citation Graph (0, 0)][DBLP] SEFM, 2006, pp:50-59 [Conf]
- Dominique Bolignano, Mourad Debbabi
A Semantic Theory for Concurrent ML. [Citation Graph (0, 0)][DBLP] TACS, 1994, pp:766-785 [Conf]
- Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi
Secure E-Commerce Transactions for Multicast Services. [Citation Graph (0, 0)][DBLP] CEC/EEE, 2006, pp:18- [Conf]
- Yahya Y. Al-Salqan, Nahid Shahmehri, Wu Wen, Mourad Debbabi
Final Summary Report on Enterprise Security. [Citation Graph (0, 0)][DBLP] WETICE, 1999, pp:134- [Conf]
- J. Bergeron, Mourad Debbabi, M. M. Erhioui, Béchir Ktari
Static Analysis of Binary Code to Isolate Malicious Behaviors. [Citation Graph (0, 0)][DBLP] WETICE, 1999, pp:184-189 [Conf]
- Mourad Debbabi, E. Giasson, Béchir Ktari, F. Michaud, Nadia Tawbi
Secure Self-Certified COTS. [Citation Graph (0, 0)][DBLP] WETICE, 2000, pp:183-188 [Conf]
- Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. [Citation Graph (0, 0)][DBLP] WETICE, 1997, pp:256-262 [Conf]
- Frédéric Painchaud, Mourad Debbabi
On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier. [Citation Graph (0, 0)][DBLP] WETICE, 2000, pp:189-194 [Conf]
- Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne, Andrei Soeanu
On the verification and validation of uml structural and behavioral diagrams. [Citation Graph (0, 0)][DBLP] ACST, 2006, pp:304-309 [Conf]
- Mourad Debbabi, M. Fourati
Sur la sémantique statique de Java. [Citation Graph (0, 0)][DBLP] LMO, 2000, pp:167-182 [Conf]
- Stephane Doyon, Mourad Debbabi
On object initialization in the Java bytecode. [Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:17, pp:1594-1605 [Journal]
- Kamel Adi, Mourad Debbabi
Abstract interpretation for proving secrecy properties in security protocols. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2001, v:55, n:1, pp:- [Journal]
- Mourad Debbabi, Zahia Aïdoud, Ali Faour
On the Inference od Structured Recursive Effects with Subtyping. [Citation Graph (0, 0)][DBLP] Journal of Functional and Logic Programming, 1997, v:1997, n:5, pp:- [Journal]
- Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
Security Evaluation of J2ME CLDC Embedded Java Platform. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2006, v:5, n:2, pp:125-154 [Journal]
- Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2005, v:4, n:1, pp:83-108 [Journal]
- Mourad Debbabi
A Model-Based Concurrent Specification Language Over CML: Semantic Foundations. [Citation Graph (0, 0)][DBLP] Parallel Processing Letters, 1997, v:7, n:3, pp:329-356 [Journal]
- Mourad Debbabi, Abdelouahed Gherbi, Azzam Mourad, Hamdi Yahyaoui
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2006, v:59, n:1-2, pp:38-63 [Journal]
- Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell
Security by typing. [Citation Graph (0, 0)][DBLP] STTT, 2003, v:4, n:4, pp:472-495 [Journal]
- Kamel Adi, Mourad Debbabi, Mohamed Mejri
A new logic for electronic commerce protocols. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:291, n:3, pp:223-283 [Journal]
- Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2007, pp:86- [Conf]
- Nadia Belblidia, Mourad Debbabi, Aiman Hanna, Zhenrong Yang
AOP Extension for Security Testing of Programs. [Citation Graph (0, 0)][DBLP] CCECE, 2006, pp:647-650 [Conf]
- Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi
A Survey of Secure B2C Commerce for Multicast Services. [Citation Graph (0, 0)][DBLP] CCECE, 2006, pp:288-293 [Conf]
- Marc-Andre Laverdiere, Azzam Mourad, Aiman Hanna, Mourad Debbabi
Security Design Patterns: Survey and Evaluation. [Citation Graph (0, 0)][DBLP] CCECE, 2006, pp:1605-1608 [Conf]
- Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines. [Citation Graph (0, 0)][DBLP] PPPJ, 2004, pp:107-113 [Conf]
- Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua
A dynamic compiler for embedded Java virtual machines. [Citation Graph (0, 0)][DBLP] PPPJ, 2004, pp:100-106 [Conf]
- M. Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Nadia Belblidia, Mourad Debbabi
A Dynamic Operational Semantics for JVML. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2007, v:6, n:3, pp:- [Journal]
Type and Effect Annotations for Safe Memory Access in C. [Citation Graph (, )][DBLP]
A Practical Framework for the Dataflow Pointcut in AspectJ. [Citation Graph (, )][DBLP]
A novel flow-sensitive type and effect analysis for securing C code. [Citation Graph (, )][DBLP]
A Hybrid Approach for Safe Memory Management in C. [Citation Graph (, )][DBLP]
The dataflow pointcut: a formal and practical framework. [Citation Graph (, )][DBLP]
Walking in the crowd: anonymizing trajectory data for pattern analysis. [Citation Graph (, )][DBLP]
Towards Automation of Testing High-Level Security Properties. [Citation Graph (, )][DBLP]
On the Meaning of SysML Activity Diagrams. [Citation Graph (, )][DBLP]
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams. [Citation Graph (, )][DBLP]
A framework for privacy-preserving cluster analysis. [Citation Graph (, )][DBLP]
Verification of CERT Secure Coding Rules: Case Studies. [Citation Graph (, )][DBLP]
A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities. [Citation Graph (, )][DBLP]
A Concurrent, Specification Language over CML. [Citation Graph (, )][DBLP]
Security crosscutting concerns and AspectJ. [Citation Graph (, )][DBLP]
Execution monitoring enforcement for limited-memory systems. [Citation Graph (, )][DBLP]
Security hardening of open source software. [Citation Graph (, )][DBLP]
Cross-Language Weaving Approach Targeting Software Security Hardening. [Citation Graph (, )][DBLP]
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. [Citation Graph (, )][DBLP]
A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL. [Citation Graph (, )][DBLP]
Targeting Security Vulnerabilities: From Specification to Detection (Short Paper). [Citation Graph (, )][DBLP]
Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. [Citation Graph (, )][DBLP]
e-mail authorship verification for forensic investigation. [Citation Graph (, )][DBLP]
Towards Language-Independent Approach for Security Concerns Weaving. [Citation Graph (, )][DBLP]
A High-Level Aspect-Oriented based Language for Software Security Hardening. [Citation Graph (, )][DBLP]
An AOP Extended Lambda-Calculus. [Citation Graph (, )][DBLP]
Verifying Security Properties of Cryptoprotocols: A Novel Approach. [Citation Graph (, )][DBLP]
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. [Citation Graph (, )][DBLP]
Verification of the Correctness in Composed UML Behavioural Diagrams. [Citation Graph (, )][DBLP]
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. [Citation Graph (, )][DBLP]
Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid. [Citation Graph (, )][DBLP]
File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis. [Citation Graph (, )][DBLP]
Towards a self-forensics property in the ASSL toolset. [Citation Graph (, )][DBLP]
Team Edit Automata for Testing Security Property. [Citation Graph (, )][DBLP]
Modeling Security Protocols as Games. [Citation Graph (, )][DBLP]
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. [Citation Graph (, )][DBLP]
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
An Efficient and Truthful Leader IDS Election Mechanism for MANET. [Citation Graph (, )][DBLP]
A Formal Approach for the Forensic Analysis of Logs. [Citation Graph (, )][DBLP]
Common Criteria Approach to J2ME CLDC Security Requirements. [Citation Graph (, )][DBLP]
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. [Citation Graph (, )][DBLP]
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. [Citation Graph (, )][DBLP]
lambda_SAOP: A Security AOP Calculus. [Citation Graph (, )][DBLP]
A game-theoretic intrusion detection model for mobile ad hoc networks. [Citation Graph (, )][DBLP]
Game theoretic models for detecting network intrusions. [Citation Graph (, )][DBLP]
An aspect-oriented approach for the systematic security hardening of code. [Citation Graph (, )][DBLP]
New aspect-oriented constructs for security hardening concerns. [Citation Graph (, )][DBLP]
Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid [Citation Graph (, )][DBLP]
Reasoning About an ACME Printer Case Investigation with Forensic Lucid [Citation Graph (, )][DBLP]
Towards an integrated e-mail forensic analysis framework. [Citation Graph (, )][DBLP]
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.009secs
|