Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Fehmi Jaafar
@article{DBLP:journals/sncs/AmeyedJPC23, author = {Darine Ameyed and Fehmi Jaafar and F{\'{a}}bio Petrillo and Mohamed Cheriet}, title = {Quality and Security Frameworks for IoT-Architecture Models Evaluation}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {4}, pages = {394}, year = {2023}, url = {https://doi.org/10.1007/s42979-023-01815-z}, doi = {10.1007/S42979-023-01815-Z}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/AmeyedJPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcca/JaafarASBC23, author = {Fehmi Jaafar and Darine Amayed and Wissam Salhab and Hajer Bouani and Mohamed Cheriet}, editor = {Moayad Aloqaily and Safa Otoum and Ouns Bouachir and Yaser Jararweh and Ismaeel Al Ridhawi and Khalid Al{-}Begain and Mohammad A. Alsmirat}, title = {Blockchain-Based Consent Management for Privacy Persevering and Transparency in Intelligent Surveillance Systems}, booktitle = {Fifth International Conference on Blockchain Computing and Applications, {BCCA} 2023, Kuwait, Kuwait, October 24-26, 2023}, pages = {284--293}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BCCA58897.2023.10338938}, doi = {10.1109/BCCA58897.2023.10338938}, timestamp = {Thu, 18 Jan 2024 12:09:19 +0100}, biburl = {https://dblp.org/rec/conf/bcca/JaafarASBC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codit/ChaabeneAJRAC23, author = {Riadh Ben Chaabene and Darine Ameyed and Fehmi Jaafar and Alexis Roger and Esma A{\"{\i}}meur and Mohamed Cheriet}, title = {A Privacy-Preserving Federated Learning for IoT Intrusion Detection System}, booktitle = {9th International Conference on Control, Decision and Information Technologies, CoDIT 2023, Rome, Italy, July 3-6, 2023}, pages = {351--356}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CoDIT58514.2023.10284221}, doi = {10.1109/CODIT58514.2023.10284221}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codit/ChaabeneAJRAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/IbrahimMJ23, author = {Abubakr Ibrahim and Mohamed Mejri and Fehmi Jaafar}, title = {An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023}, pages = {160--167}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSR57506.2023.10224956}, doi = {10.1109/CSR57506.2023.10224956}, timestamp = {Wed, 06 Sep 2023 08:09:39 +0200}, biburl = {https://dblp.org/rec/conf/csr2/IbrahimMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/BarrakTJP23, author = {Amine Barrak and Ranim Trabelsi and Fehmi Jaafar and F{\'{a}}bio Petrillo}, title = {Exploring the Impact of Serverless Computing on Peer To Peer Training Machine Learning}, booktitle = {{IEEE} International Conference on Cloud Engineering, {IC2E} 2023, Boston, MA, USA, September 25-29, 2023}, pages = {141--152}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IC2E59103.2023.00024}, doi = {10.1109/IC2E59103.2023.00024}, timestamp = {Tue, 21 Nov 2023 22:37:14 +0100}, biburl = {https://dblp.org/rec/conf/ic2e/BarrakTJP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/JaafarATN23, author = {Fehmi Jaafar and Darine Ameyed and Lavin Titare and Md Nematullah}, title = {IoT Phishing Detection Using Hybrid {NLP} and Machine Learning Models Enhanced with Contextual Embedding}, booktitle = {23rd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October 22-26, 2023}, pages = {340--349}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QRS-C60940.2023.00088}, doi = {10.1109/QRS-C60940.2023.00088}, timestamp = {Tue, 05 Mar 2024 11:59:07 +0100}, biburl = {https://dblp.org/rec/conf/qrs/JaafarATN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/BarrakJTJP23, author = {Amine Barrak and Mayssa Jaziri and Ranim Trabelsi and Fehmi Jaafar and F{\'{a}}bio Petrillo}, title = {{SPIRT:} {A} Fault-Tolerant and Reliable Peer-to-Peer Serverless {ML} Training Architecture}, booktitle = {23rd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2023, Chiang Mai, Thailand, October 22-26, 2023}, pages = {650--661}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QRS60937.2023.00069}, doi = {10.1109/QRS60937.2023.00069}, timestamp = {Tue, 23 Jan 2024 09:45:31 +0100}, biburl = {https://dblp.org/rec/conf/qrs/BarrakJTJP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-13995, author = {Amine Barrak and F{\'{a}}bio Petrillo and Fehmi Jaafar}, title = {Architecting Peer-to-Peer Serverless Distributed Machine Learning Training for Improved Fault Tolerance}, journal = {CoRR}, volume = {abs/2302.13995}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.13995}, doi = {10.48550/ARXIV.2302.13995}, eprinttype = {arXiv}, eprint = {2302.13995}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-13995.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-14139, author = {Amine Barrak and Ranim Trabelsi and Fehmi Jaafar and F{\'{a}}bio Petrillo}, title = {Exploring the Impact of Serverless Computing on Peer To Peer Training Machine Learning}, journal = {CoRR}, volume = {abs/2309.14139}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.14139}, doi = {10.48550/ARXIV.2309.14139}, eprinttype = {arXiv}, eprint = {2309.14139}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-14139.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-14148, author = {Amine Barrak and Mayssa Jaziri and Ranim Trabelsi and Fehmi Jaafar and F{\'{a}}bio Petrillo}, title = {{SPIRT:} {A} Fault-Tolerant and Reliable Peer-to-Peer Serverless {ML} Training Architecture}, journal = {CoRR}, volume = {abs/2309.14148}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.14148}, doi = {10.48550/ARXIV.2309.14148}, eprinttype = {arXiv}, eprint = {2309.14148}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-14148.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BarrakPJ22, author = {Amine Barrak and F{\'{a}}bio Petrillo and Fehmi Jaafar}, title = {Serverless on Machine Learning: {A} Systematic Mapping Study}, journal = {{IEEE} Access}, volume = {10}, pages = {99337--99352}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3206366}, doi = {10.1109/ACCESS.2022.3206366}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BarrakPJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/SinghSJA22, author = {Pratibha Singh and Hamman Samuel and Fehmi Jaafar and Darine Ameyed}, title = {Enhancing Biometric Security with Combinatorial and Permutational Multi-Fingerprint Authentication Strategies}, booktitle = {{IEEE} Intl. Conf. on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2022, Falerna, Italy, September 12-15, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927942}, doi = {10.1109/DASC/PICOM/CBDCOM/CY55231.2022.9927942}, timestamp = {Mon, 02 Jan 2023 14:34:28 +0100}, biburl = {https://dblp.org/rec/conf/dasc/SinghSJA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/BourreauGBSJ22, author = {Hugo Bourreau and Emeric Guichet and Amine Barrak and Beno{\^{\i}}t Simon and Fehmi Jaafar}, title = {On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography}, booktitle = {22nd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9, 2022}, pages = {758--759}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/QRS-C57518.2022.00121}, doi = {10.1109/QRS-C57518.2022.00121}, timestamp = {Sat, 22 Apr 2023 17:02:06 +0200}, biburl = {https://dblp.org/rec/conf/qrs/BourreauGBSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/KermansaraviRKJ21, author = {Zeinab Azadeh Kermansaravi and Md. Saidur Rahman and Foutse Khomh and Fehmi Jaafar and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc}, title = {Investigating design anti-pattern and design pattern mutations and their change- and fault-proneness}, journal = {Empir. Softw. Eng.}, volume = {26}, number = {1}, pages = {9}, year = {2021}, url = {https://doi.org/10.1007/s10664-020-09900-0}, doi = {10.1007/S10664-020-09900-0}, timestamp = {Sun, 21 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ese/KermansaraviRKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/GrichiAJEA21, author = {Manel Grichi and Mouna Abidi and Fehmi Jaafar and Ellis E. Eghan and Bram Adams}, title = {On the Impact of Interlanguage Dependencies in Multilanguage Systems Empirical Case Study on Java Native Interface Applications {(JNI)}}, journal = {{IEEE} Trans. Reliab.}, volume = {70}, number = {1}, pages = {428--440}, year = {2021}, url = {https://doi.org/10.1109/TR.2020.3024873}, doi = {10.1109/TR.2020.3024873}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/GrichiAJEA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/JaafarABC21, author = {Fehmi Jaafar and Darine Ameyed and Amine Barrak and Mohamed Cheriet}, title = {Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021, Hainan, China, December 6-10, 2021}, pages = {514--523}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS54544.2021.00062}, doi = {10.1109/QRS54544.2021.00062}, timestamp = {Wed, 16 Mar 2022 22:32:21 +0100}, biburl = {https://dblp.org/rec/conf/qrs/JaafarABC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/AmeyedJMC21, author = {Darine Ameyed and Fehmi Jaafar and Francis Charette Migneault and Mohamed Cheriet}, title = {Blockchain Based Model for Consent Management and Data Transparency Assurance}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10, 2021}, pages = {1050--1059}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS-C55045.2021.00159}, doi = {10.1109/QRS-C55045.2021.00159}, timestamp = {Tue, 12 Apr 2022 17:57:49 +0200}, biburl = {https://dblp.org/rec/conf/qrs/AmeyedJMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-00058, author = {Zeinab Azadeh Kermansaravi and Md. Saidur Rahman and Foutse Khomh and Fehmi Jaafar and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc}, title = {Investigating Design Anti-pattern and Design Pattern Mutations and Their Change- and Fault-proneness}, journal = {CoRR}, volume = {abs/2104.00058}, year = {2021}, url = {https://arxiv.org/abs/2104.00058}, eprinttype = {arXiv}, eprint = {2104.00058}, timestamp = {Tue, 25 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-00058.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/JaafarAA20, author = {Fehmi Jaafar and Florent Avellaneda and El Hachemi Alikacem}, title = {Demystifying the Cyber Attribution: An Exploratory Study}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020}, pages = {35--40}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00022}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH49142.2020.00022}, timestamp = {Sun, 12 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/JaafarAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/MishraBJM20, author = {Ruchi Mishra and Sergey Butakov and Fehmi Jaafar and Neelam Memon}, title = {Behavioral Study of Malware Affecting Financial Institutions and Clients}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020}, pages = {79--86}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00028}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH49142.2020.00028}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/MishraBJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/SantosNPAJ20, author = {Marcela G. dos Santos and Bianca Minetto Napole{\~{a}}o and F{\'{a}}bio Petrillo and Darine Ameyed and Fehmi Jaafar}, title = {A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: {A} Software Quality Perspective}, booktitle = {{ICSE} '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June - 19 July, 2020}, pages = {647--654}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3387940.3392197}, doi = {10.1145/3387940.3392197}, timestamp = {Fri, 16 Oct 2020 11:06:55 +0200}, biburl = {https://dblp.org/rec/conf/icse/SantosNPAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/GrichiAJEA20, author = {Manel Grichi and Mouna Abidi and Fehmi Jaafar and Ellis E. Eghan and Bram Adams}, title = {On the Impact of Inter-language Dependencies in Multi-language Systems}, booktitle = {20th {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2020, Macau, China, December 11-14, 2020}, pages = {509}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/QRS51102.2020.00070}, doi = {10.1109/QRS51102.2020.00070}, timestamp = {Mon, 08 Feb 2021 12:13:14 +0100}, biburl = {https://dblp.org/rec/conf/qrs/GrichiAJEA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icmip/2020, editor = {Wanyang Dai and Xiangyang Hao and T. Ramayah and Fehmi Jaafar}, title = {{ICMIP} 2020: 5th International Conference on Multimedia and Image Processing, Nanjing, China, January, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3381271}, doi = {10.1145/3381271}, isbn = {978-1-4503-7664-8}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmip/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-12936, author = {Marcela G. dos Santos and Darine Ameyed and F{\'{a}}bio Petrillo and Fehmi Jaafar and Mohamed Cheriet}, title = {Internet of Things Architectures: {A} Comparative Study}, journal = {CoRR}, volume = {abs/2004.12936}, year = {2020}, url = {https://arxiv.org/abs/2004.12936}, eprinttype = {arXiv}, eprint = {2004.12936}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-12936.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/ZhangJM19, author = {Naiji Zhang and Fehmi Jaafar and Yasir Malik}, editor = {Meikang Qiu}, title = {Low-Rate DoS Attack Detection Using {PSD} Based Entropy and Machine Learning}, booktitle = {6th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2019 / 5th {IEEE} International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019}, pages = {59--62}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSCloud/EdgeCom.2019.00020}, doi = {10.1109/CSCLOUD/EDGECOM.2019.00020}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/cscloud/ZhangJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/YekiniJZ19, author = {Tunde Akeem Yekini and Fehmi Jaafar and Pavol Zavarsky}, editor = {Dongjin Yu and Vu Nguyen and Congfeng Jiang}, title = {Study of Trust at Device Level of the Internet of Things Architecture}, booktitle = {19th {IEEE} International Symposium on High Assurance Systems Engineering, {HASE} 2019, Hangzhou, China, January 3-5, 2019}, pages = {150--155}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HASE.2019.00031}, doi = {10.1109/HASE.2019.00031}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/hase/YekiniJZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/DhakalJZ19, author = {Samip Dhakal and Fehmi Jaafar and Pavol Zavarsky}, editor = {Dongjin Yu and Vu Nguyen and Congfeng Jiang}, title = {Private Blockchain Network for IoT Device Firmware Integrity Verification and Update}, booktitle = {19th {IEEE} International Symposium on High Assurance Systems Engineering, {HASE} 2019, Hangzhou, China, January 3-5, 2019}, pages = {164--170}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HASE.2019.00033}, doi = {10.1109/HASE.2019.00033}, timestamp = {Wed, 27 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/DhakalJZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/BaliJZ19, author = {Ranbir Singh Bali and Fehmi Jaafar and Pavol Zavarsky}, editor = {Yulin Wang and Chin{-}Chen Chang}, title = {Lightweight authentication for {MQTT} to improve the security of IoT communication}, booktitle = {Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, {ICCSP} 2019, Kuala Lumpur, Malaysia, January 19-21, 2019}, pages = {6--12}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309074.3309081}, doi = {10.1145/3309074.3309081}, timestamp = {Sat, 13 Apr 2019 17:11:48 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/BaliJZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/MalikCJ19, author = {Yasir Malik and Carlos Renato Salim Campos and Fehmi Jaafar}, title = {Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis}, booktitle = {19th {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2019, Sofia, Bulgaria, July 22-26, 2019}, pages = {109--113}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/QRS-C.2019.00033}, doi = {10.1109/QRS-C.2019.00033}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/qrs/MalikCJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/KothiaSJ19, author = {Anis Kothia and Bobby Swar and Fehmi Jaafar}, title = {Knowledge Extraction and Integration for Information Gathering in Penetration Testing}, booktitle = {19th {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2019, Sofia, Bulgaria, July 22-26, 2019}, pages = {330--335}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/QRS-C.2019.00068}, doi = {10.1109/QRS-C.2019.00068}, timestamp = {Mon, 21 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/KothiaSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cai/AmeyedMZJT18, author = {Darine Ameyed and Moeiz Miraoui and Atef Zaguia and Fehmi Jaafar and Chakib Tadj}, title = {Using Probabilistic Temporal Logic {PCTL} and Model Checking for Context Prediction}, journal = {Comput. Informatics}, volume = {37}, number = {6}, pages = {1411--1442}, year = {2018}, url = {https://doi.org/10.4149/cai\_2018\_6\_1411}, doi = {10.4149/CAI\_2018\_6\_1411}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cai/AmeyedMZJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/IqbalZJG18, author = {Md. Shahrear Iqbal and Mohammad Zulkernine and Fehmi Jaafar and Yuan Gu}, title = {Protecting Internet users from becoming victimized attackers of click-fraud}, journal = {J. Softw. Evol. Process.}, volume = {30}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/smr.1871}, doi = {10.1002/SMR.1871}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/smr/IqbalZJG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codit/SinghJB18, author = {Gurjot Balraj Singh and Fehmi Jaafar and Sergey Butakov}, title = {Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud}, booktitle = {5th International Conference on Control, Decision and Information Technologies, CoDIT 2018, Thessaloniki, Greece, April 10-13, 2018}, pages = {952--958}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CoDIT.2018.8394946}, doi = {10.1109/CODIT.2018.8394946}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/codit/SinghJB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/ClementeJM18, author = {Caesar Jude Clemente and Fehmi Jaafar and Yasir Malik}, title = {Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?}, booktitle = {2018 {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2018, Lisbon, Portugal, July 16-20, 2018}, pages = {95--102}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/QRS.2018.00023}, doi = {10.1109/QRS.2018.00023}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/qrs/ClementeJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/RajendraprasadB18, author = {Pooja Rajendraprasad and Sergey Butakov and Fehmi Jaafar}, title = {Information Security Considerations for Wireless Infusion Pumps}, booktitle = {2018 {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2018, Lisbon, Portugal, July 16-20, 2018}, pages = {438--442}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/QRS-C.2018.00081}, doi = {10.1109/QRS-C.2018.00081}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/qrs/RajendraprasadB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/JaafarSZ18, author = {Fehmi Jaafar and Gagandeep Singh and Pavol Zavarsky}, title = {An Analysis of Android Malware Behavior}, booktitle = {2018 {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2018, Lisbon, Portugal, July 16-20, 2018}, pages = {505--512}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/QRS-C.2018.00091}, doi = {10.1109/QRS-C.2018.00091}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/JaafarSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spml/KaurMSJ18, author = {Gurpreet Kaur and Yasir Malik and Hamman Samuel and Fehmi Jaafar}, title = {Detecting Blind Cross-Site Scripting Attacks Using Machine Learning}, booktitle = {Proceedings of the 2018 International Conference on Signal Processing and Machine Learning, {SPML} 2018, Shanghai, China, November 28-30, 2018}, pages = {22--25}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3297067.3297096}, doi = {10.1145/3297067.3297096}, timestamp = {Thu, 23 Jan 2020 16:34:33 +0100}, biburl = {https://dblp.org/rec/conf/spml/KaurMSJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/JaafarLGM17, author = {Fehmi Jaafar and Angela Lozano and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Kim Mens}, title = {Analyzing software evolution and quality by extracting Asynchrony change patterns}, journal = {J. Syst. Softw.}, volume = {131}, pages = {311--322}, year = {2017}, url = {https://doi.org/10.1016/j.jss.2017.05.047}, doi = {10.1016/J.JSS.2017.05.047}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/JaafarLGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/DavariZJ17, author = {Maryam Davari and Mohammad Zulkernine and Fehmi Jaafar}, title = {An Automatic Software Vulnerability Classification Framework}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2017, Altoona, PA, USA, July 24-25, 2017}, pages = {44--49}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.27}, doi = {10.1109/ICSSA.2017.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/DavariZJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/JaafarLGM17, author = {Fehmi Jaafar and Angela Lozano and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Kim Mens}, title = {On the Analysis of Co-Occurrence of Anti-Patterns and Clones}, booktitle = {2017 {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2017, Prague, Czech Republic, July 25-29, 2017}, pages = {274--284}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/QRS.2017.38}, doi = {10.1109/QRS.2017.38}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/JaafarLGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/Jaafar17, author = {Fehmi Jaafar}, title = {An Integrated Architecture for IoT Fingerprinting}, booktitle = {2017 {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS-C} 2017, Prague, Czech Republic, July 25-29, 2017}, pages = {601--602}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/QRS-C.2017.112}, doi = {10.1109/QRS-C.2017.112}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/qrs/Jaafar17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-01939, author = {Darine Ameyed and Fehmi Jaafar and Jaouhar Fattahi}, title = {A Slow Read attack Using Cloud}, journal = {CoRR}, volume = {abs/1712.01939}, year = {2017}, url = {http://arxiv.org/abs/1712.01939}, eprinttype = {arXiv}, eprint = {1712.01939}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-01939.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/JaafarGHKZ16, author = {Fehmi Jaafar and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Sylvie Hamel and Foutse Khomh and Mohammad Zulkernine}, title = {Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults}, journal = {Empir. Softw. Eng.}, volume = {21}, number = {3}, pages = {896--931}, year = {2016}, url = {https://doi.org/10.1007/s10664-015-9361-0}, doi = {10.1007/S10664-015-9361-0}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/JaafarGHKZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/IqbalZJG16, author = {Md. Shahrear Iqbal and Mohammad Zulkernine and Fehmi Jaafar and Yuan Gu}, editor = {Radu F. Babiceanu and H{\'{e}}l{\`{e}}ne Waeselynck and Raymond A. Paul and Bojan Cukic and Jie Xu}, title = {FCFraud: Fighting Click-Fraud from the User Side}, booktitle = {17th {IEEE} International Symposium on High Assurance Systems Engineering, {HASE} 2016, Orlando, FL, USA, January 7-9, 2016}, pages = {157--164}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HASE.2016.17}, doi = {10.1109/HASE.2016.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/IqbalZJG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/JaafarNR16, author = {Fehmi Jaafar and Gabriela Nicolescu and Christian Richard}, title = {A Systematic Approach for Privilege Escalation Prevention}, booktitle = {2016 {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2016, Companion, Vienna, Austria, August 1-3, 2016}, pages = {101--108}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/QRS-C.2016.17}, doi = {10.1109/QRS-C.2016.17}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/qrs/JaafarNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai2/AmeyedJF15, author = {Darine Ameyed and Fehmi Jaafar and Jaouhar Fattahi}, title = {A slow read attack using cloud}, booktitle = {2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Bucharest, Romania, June 25-27, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECAI.2015.7301202}, doi = {10.1109/ECAI.2015.7301202}, timestamp = {Fri, 08 Apr 2022 09:38:09 +0200}, biburl = {https://dblp.org/rec/conf/ecai2/AmeyedJF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/LozanoJMG14, author = {Angela Lozano and Fehmi Jaafar and Kim Mens and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc}, title = {Clones and Macro co-changes}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {63}, year = {2014}, url = {https://doi.org/10.14279/tuj.eceasst.63.933}, doi = {10.14279/TUJ.ECEASST.63.933}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/LozanoJMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/JaafarGHA14, author = {Fehmi Jaafar and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Sylvie Hamel and Giuliano Antoniol}, title = {Detecting asynchrony and dephase change patterns by mining software repositories}, journal = {J. Softw. Evol. Process.}, volume = {26}, number = {1}, pages = {77--106}, year = {2014}, url = {https://doi.org/10.1002/smr.1635}, doi = {10.1002/SMR.1635}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/smr/JaafarGHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qsic/JaafarKGZ14, author = {Fehmi Jaafar and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Mohammad Zulkernine}, title = {Anti-pattern Mutations and Fault-proneness}, booktitle = {2014 14th International Conference on Quality Software, Allen, TX, USA, October 2-3, 2014}, pages = {246--255}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/QSIC.2014.45}, doi = {10.1109/QSIC.2014.45}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/qsic/JaafarKGZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/JaafarGHK13, author = {Fehmi Jaafar and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Sylvie Hamel and Foutse Khomh}, title = {Analysing Anti-patterns Static Relationships with Design Patterns}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {59}, year = {2013}, url = {https://doi.org/10.14279/tuj.eceasst.59.930}, doi = {10.14279/TUJ.ECEASST.59.930}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/JaafarGHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/JaafarHGHA13, author = {Fehmi Jaafar and Salima Hassaine and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Sylvie Hamel and Bram Adams}, editor = {Anthony Cleve and Filippo Ricca and Maura Cerioli}, title = {On the Relationship between Program Evolution and Fault-Proneness: An Empirical Study}, booktitle = {17th European Conference on Software Maintenance and Reengineering, {CSMR} 2013, Genova, Italy, March 5-8, 2013}, pages = {15--24}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSMR.2013.12}, doi = {10.1109/CSMR.2013.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/JaafarHGHA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/JaafarGHK13, author = {Fehmi Jaafar and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Sylvie Hamel and Foutse Khomh}, editor = {Ralf L{\"{a}}mmel and Rocco Oliveto and Romain Robbes}, title = {Mining the relationship between anti-patterns dependencies and fault-proneness}, booktitle = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz, Germany, October 14-17, 2013}, pages = {351--360}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WCRE.2013.6671310}, doi = {10.1109/WCRE.2013.6671310}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/JaafarGHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/AliJH13, author = {Nasir Ali and Fehmi Jaafar and Ahmed E. Hassan}, editor = {Ralf L{\"{a}}mmel and Rocco Oliveto and Romain Robbes}, title = {Leveraging historical co-change information for requirements traceability}, booktitle = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz, Germany, October 14-17, 2013}, pages = {361--370}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WCRE.2013.6671311}, doi = {10.1109/WCRE.2013.6671311}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/AliJH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Jaafar12, author = {Fehmi Jaafar}, editor = {Martin Glinz and Gail C. Murphy and Mauro Pezz{\`{e}}}, title = {On the analysis of evolution of software artefacts and programs}, booktitle = {34th International Conference on Software Engineering, {ICSE} 2012, June 2-9, 2012, Zurich, Switzerland}, pages = {1563--1566}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICSE.2012.6227036}, doi = {10.1109/ICSE.2012.6227036}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Jaafar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/JaafarGHA11, author = {Fehmi Jaafar and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Sylvie Hamel and Giuliano Antoniol}, editor = {Martin Pinzger and Denys Poshyvanyk and Jim Buckley}, title = {An Exploratory Study of Macro Co-changes}, booktitle = {18th Working Conference on Reverse Engineering, {WCRE} 2011, Limerick, Ireland, October 17-20, 2011}, pages = {325--334}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WCRE.2011.47}, doi = {10.1109/WCRE.2011.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/JaafarGHA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.