The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mourad Debbabi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mourad Debbabi, Y. Legaré, Mohamed Mejri
    An Environment for the Specification and Analysis of Cryptoprotocols. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:321-332 [Conf]
  2. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Java for Mobile Devices: A Security Study. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:235-244 [Conf]
  3. Azzam Mourad, Marc-Andre Laverdiere, Mourad Debbabi
    Towards an Aspect Oriented Approach for the Security Hardening of Code. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:595-600 [Conf]
  4. Kamel Adi, Mourad Debbabi, Mohamed Mejri
    A New Logic for Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    AMAST, 2000, pp:499-513 [Conf]
  5. Mourad Debbabi, Abdelkader Benzakour, Béchir Ktari
    A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes. [Citation Graph (0, 0)][DBLP]
    AMAST, 1998, pp:214-230 [Conf]
  6. Dominique Bolignano, Mourad Debbabi
    A Coherent Type System for a Concurrent, Functional and Imperative Programming Language. [Citation Graph (0, 0)][DBLP]
    AMAST, 1993, pp:153-162 [Conf]
  7. Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya
    Testing Intrusion Detection Systems in MANET: A Comprehensive Study. [Citation Graph (0, 0)][DBLP]
    CNSR, 2007, pp:364-371 [Conf]
  8. Anil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood
    Secure E-commerce Protection Profile. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:279-285 [Conf]
  9. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Security Analysis of Mobile Java. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:231-235 [Conf]
  10. Luay Alawneh, Mourad Debbabi, Yosr Jarraya, Andrei Soeanu, Fawzi Hassaïne
    A Unified Approach for Verification and Validation of Systems and Software Engineering Models. [Citation Graph (0, 0)][DBLP]
    ECBS, 2006, pp:409-418 [Conf]
  11. Mourad Debbabi, Josee Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi
    Secure Self-certified Code for Java. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:133-151 [Conf]
  12. Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne, Yosr Jarraya, Payam Shahi, Andrei Soeanu
    Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2006, pp:282-287 [Conf]
  13. Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua
    Method Call Acceleration in Embedded Java Virtual Machines. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:750-759 [Conf]
  14. Dominique Bolignano, Mourad Debbabi
    A Denotational Model for the Integration of Concurrent, Functional, and Imperative Programming. [Citation Graph (0, 0)][DBLP]
    ICCI, 1993, pp:244-250 [Conf]
  15. Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
    Formal Automatic Verification of Authentication Crytographic Protocols. [Citation Graph (0, 0)][DBLP]
    ICFEM, 1997, pp:50-59 [Conf]
  16. Mourad Debbabi, Mohamed Saleh
    Game Semantics Model for Security Protocols. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2005, pp:125-140 [Conf]
  17. Mourad Debbabi, Ali Faour, Nadia Tawbi
    A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs. [Citation Graph (0, 0)][DBLP]
    Implementation of Functional Languages, 1996, pp:247-266 [Conf]
  18. Dominique Bolignano, Mourad Debbabi
    Higher Order Communication Processes with Value-Passing, Assignment and Return of Results. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1992, pp:319-331 [Conf]
  19. Hassan Issa, Chadi Assi, Mourad Debbabi
    QoS-Aware Middleware for Web Services Composition - A Qualitative Approach. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:359-364 [Conf]
  20. Nadia Belblidia, Mourad Debbabi
    Towards a Formal Semantics for AspectJ Weaving. [Citation Graph (0, 0)][DBLP]
    JMLC, 2006, pp:155-171 [Conf]
  21. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Security Analysis of Wireless Java. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  22. Mourad Debbabi, Azzam Mourad, Nadia Tawbi
    Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:874-878 [Conf]
  23. Stephane Doyon, Mourad Debbabi
    Verifying Object Initialization in the Java Bytecode Language. [Citation Graph (0, 0)][DBLP]
    SAC (2), 2000, pp:821-830 [Conf]
  24. Nadia Belblidia, Mourad Debbabi
    Formalizing AspectJ Weaving for Static Pointcuts. [Citation Graph (0, 0)][DBLP]
    SEFM, 2006, pp:50-59 [Conf]
  25. Dominique Bolignano, Mourad Debbabi
    A Semantic Theory for Concurrent ML. [Citation Graph (0, 0)][DBLP]
    TACS, 1994, pp:766-785 [Conf]
  26. Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi
    Secure E-Commerce Transactions for Multicast Services. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2006, pp:18- [Conf]
  27. Yahya Y. Al-Salqan, Nahid Shahmehri, Wu Wen, Mourad Debbabi
    Final Summary Report on Enterprise Security. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:134- [Conf]
  28. J. Bergeron, Mourad Debbabi, M. M. Erhioui, Béchir Ktari
    Static Analysis of Binary Code to Isolate Malicious Behaviors. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:184-189 [Conf]
  29. Mourad Debbabi, E. Giasson, Béchir Ktari, F. Michaud, Nadia Tawbi
    Secure Self-Certified COTS. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:183-188 [Conf]
  30. Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
    From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. [Citation Graph (0, 0)][DBLP]
    WETICE, 1997, pp:256-262 [Conf]
  31. Frédéric Painchaud, Mourad Debbabi
    On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:189-194 [Conf]
  32. Luay Alawneh, Mourad Debbabi, Fawzi Hassaïne, Andrei Soeanu
    On the verification and validation of uml structural and behavioral diagrams. [Citation Graph (0, 0)][DBLP]
    ACST, 2006, pp:304-309 [Conf]
  33. Mourad Debbabi, M. Fourati
    Sur la sémantique statique de Java. [Citation Graph (0, 0)][DBLP]
    LMO, 2000, pp:167-182 [Conf]
  34. Stephane Doyon, Mourad Debbabi
    On object initialization in the Java bytecode. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1594-1605 [Journal]
  35. Kamel Adi, Mourad Debbabi
    Abstract interpretation for proving secrecy properties in security protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:55, n:1, pp:- [Journal]
  36. Mourad Debbabi, Zahia Aïdoud, Ali Faour
    On the Inference od Structured Recursive Effects with Subtyping. [Citation Graph (0, 0)][DBLP]
    Journal of Functional and Logic Programming, 1997, v:1997, n:5, pp:- [Journal]
  37. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Security Evaluation of J2ME CLDC Embedded Java Platform. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2006, v:5, n:2, pp:125-154 [Journal]
  38. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi
    E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2005, v:4, n:1, pp:83-108 [Journal]
  39. Mourad Debbabi
    A Model-Based Concurrent Specification Language Over CML: Semantic Foundations. [Citation Graph (0, 0)][DBLP]
    Parallel Processing Letters, 1997, v:7, n:3, pp:329-356 [Journal]
  40. Mourad Debbabi, Abdelouahed Gherbi, Azzam Mourad, Hamdi Yahyaoui
    A selective dynamic compiler for embedded Java virtual machines targeting ARM processors. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2006, v:59, n:1-2, pp:38-63 [Journal]
  41. Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell
    Security by typing. [Citation Graph (0, 0)][DBLP]
    STTT, 2003, v:4, n:4, pp:472-495 [Journal]
  42. Kamel Adi, Mourad Debbabi, Mohamed Mejri
    A new logic for electronic commerce protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:291, n:3, pp:223-283 [Journal]
  43. Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya
    A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2007, pp:86- [Conf]
  44. Nadia Belblidia, Mourad Debbabi, Aiman Hanna, Zhenrong Yang
    AOP Extension for Security Testing of Programs. [Citation Graph (0, 0)][DBLP]
    CCECE, 2006, pp:647-650 [Conf]
  45. Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi
    A Survey of Secure B2C Commerce for Multicast Services. [Citation Graph (0, 0)][DBLP]
    CCECE, 2006, pp:288-293 [Conf]
  46. Marc-Andre Laverdiere, Azzam Mourad, Aiman Hanna, Mourad Debbabi
    Security Design Patterns: Survey and Evaluation. [Citation Graph (0, 0)][DBLP]
    CCECE, 2006, pp:1605-1608 [Conf]
  47. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua
    a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines. [Citation Graph (0, 0)][DBLP]
    PPPJ, 2004, pp:107-113 [Conf]
  48. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua
    A dynamic compiler for embedded Java virtual machines. [Citation Graph (0, 0)][DBLP]
    PPPJ, 2004, pp:100-106 [Conf]
  49. M. Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya
    A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  50. Nadia Belblidia, Mourad Debbabi
    A Dynamic Operational Semantics for JVML. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2007, v:6, n:3, pp:- [Journal]

  51. Type and Effect Annotations for Safe Memory Access in C. [Citation Graph (, )][DBLP]


  52. A Practical Framework for the Dataflow Pointcut in AspectJ. [Citation Graph (, )][DBLP]


  53. A novel flow-sensitive type and effect analysis for securing C code. [Citation Graph (, )][DBLP]


  54. A Hybrid Approach for Safe Memory Management in C. [Citation Graph (, )][DBLP]


  55. The dataflow pointcut: a formal and practical framework. [Citation Graph (, )][DBLP]


  56. Walking in the crowd: anonymizing trajectory data for pattern analysis. [Citation Graph (, )][DBLP]


  57. Towards Automation of Testing High-Level Security Properties. [Citation Graph (, )][DBLP]


  58. On the Meaning of SysML Activity Diagrams. [Citation Graph (, )][DBLP]


  59. Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams. [Citation Graph (, )][DBLP]


  60. A framework for privacy-preserving cluster analysis. [Citation Graph (, )][DBLP]


  61. Verification of CERT Secure Coding Rules: Case Studies. [Citation Graph (, )][DBLP]


  62. A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities. [Citation Graph (, )][DBLP]


  63. A Concurrent, Specification Language over CML. [Citation Graph (, )][DBLP]


  64. Security crosscutting concerns and AspectJ. [Citation Graph (, )][DBLP]


  65. Execution monitoring enforcement for limited-memory systems. [Citation Graph (, )][DBLP]


  66. Security hardening of open source software. [Citation Graph (, )][DBLP]


  67. Cross-Language Weaving Approach Targeting Software Security Hardening. [Citation Graph (, )][DBLP]


  68. Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. [Citation Graph (, )][DBLP]


  69. A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL. [Citation Graph (, )][DBLP]


  70. Targeting Security Vulnerabilities: From Specification to Detection (Short Paper). [Citation Graph (, )][DBLP]


  71. Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. [Citation Graph (, )][DBLP]


  72. e-mail authorship verification for forensic investigation. [Citation Graph (, )][DBLP]


  73. Towards Language-Independent Approach for Security Concerns Weaving. [Citation Graph (, )][DBLP]


  74. A High-Level Aspect-Oriented based Language for Software Security Hardening. [Citation Graph (, )][DBLP]


  75. An AOP Extended Lambda-Calculus. [Citation Graph (, )][DBLP]


  76. Verifying Security Properties of Cryptoprotocols: A Novel Approach. [Citation Graph (, )][DBLP]


  77. Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. [Citation Graph (, )][DBLP]


  78. Verification of the Correctness in Composed UML Behavioural Diagrams. [Citation Graph (, )][DBLP]


  79. New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. [Citation Graph (, )][DBLP]


  80. Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid. [Citation Graph (, )][DBLP]


  81. File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis. [Citation Graph (, )][DBLP]


  82. Towards a self-forensics property in the ASSL toolset. [Citation Graph (, )][DBLP]


  83. Team Edit Automata for Testing Security Property. [Citation Graph (, )][DBLP]


  84. Modeling Security Protocols as Games. [Citation Graph (, )][DBLP]


  85. A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. [Citation Graph (, )][DBLP]


  86. A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  87. An Efficient and Truthful Leader IDS Election Mechanism for MANET. [Citation Graph (, )][DBLP]


  88. A Formal Approach for the Forensic Analysis of Logs. [Citation Graph (, )][DBLP]


  89. Common Criteria Approach to J2ME CLDC Security Requirements. [Citation Graph (, )][DBLP]


  90. An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. [Citation Graph (, )][DBLP]


  91. A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. [Citation Graph (, )][DBLP]


  92. lambda_SAOP: A Security AOP Calculus. [Citation Graph (, )][DBLP]


  93. A game-theoretic intrusion detection model for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  94. Game theoretic models for detecting network intrusions. [Citation Graph (, )][DBLP]


  95. An aspect-oriented approach for the systematic security hardening of code. [Citation Graph (, )][DBLP]


  96. New aspect-oriented constructs for security hardening concerns. [Citation Graph (, )][DBLP]


  97. Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid [Citation Graph (, )][DBLP]


  98. Reasoning About an ACME Printer Case Investigation with Forensic Lucid [Citation Graph (, )][DBLP]


  99. Towards an integrated e-mail forensic analysis framework. [Citation Graph (, )][DBLP]


  100. Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. [Citation Graph (, )][DBLP]


Search in 0.032secs, Finished in 0.540secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002