BibTeX records: Fehmi Jaafar

download as .bib file

@article{DBLP:journals/sncs/AmeyedJPC23,
  author       = {Darine Ameyed and
                  Fehmi Jaafar and
                  F{\'{a}}bio Petrillo and
                  Mohamed Cheriet},
  title        = {Quality and Security Frameworks for IoT-Architecture Models Evaluation},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {4},
  pages        = {394},
  year         = {2023},
  url          = {https://doi.org/10.1007/s42979-023-01815-z},
  doi          = {10.1007/S42979-023-01815-Z},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/AmeyedJPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcca/JaafarASBC23,
  author       = {Fehmi Jaafar and
                  Darine Amayed and
                  Wissam Salhab and
                  Hajer Bouani and
                  Mohamed Cheriet},
  editor       = {Moayad Aloqaily and
                  Safa Otoum and
                  Ouns Bouachir and
                  Yaser Jararweh and
                  Ismaeel Al Ridhawi and
                  Khalid Al{-}Begain and
                  Mohammad A. Alsmirat},
  title        = {Blockchain-Based Consent Management for Privacy Persevering and Transparency
                  in Intelligent Surveillance Systems},
  booktitle    = {Fifth International Conference on Blockchain Computing and Applications,
                  {BCCA} 2023, Kuwait, Kuwait, October 24-26, 2023},
  pages        = {284--293},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BCCA58897.2023.10338938},
  doi          = {10.1109/BCCA58897.2023.10338938},
  timestamp    = {Thu, 18 Jan 2024 12:09:19 +0100},
  biburl       = {https://dblp.org/rec/conf/bcca/JaafarASBC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codit/ChaabeneAJRAC23,
  author       = {Riadh Ben Chaabene and
                  Darine Ameyed and
                  Fehmi Jaafar and
                  Alexis Roger and
                  Esma A{\"{\i}}meur and
                  Mohamed Cheriet},
  title        = {A Privacy-Preserving Federated Learning for IoT Intrusion Detection
                  System},
  booktitle    = {9th International Conference on Control, Decision and Information
                  Technologies, CoDIT 2023, Rome, Italy, July 3-6, 2023},
  pages        = {351--356},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CoDIT58514.2023.10284221},
  doi          = {10.1109/CODIT58514.2023.10284221},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codit/ChaabeneAJRAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/IbrahimMJ23,
  author       = {Abubakr Ibrahim and
                  Mohamed Mejri and
                  Fehmi Jaafar},
  title        = {An Explainable Artificial Intelligence Approach for a Trustworthy
                  Spam Detection},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSR57506.2023.10224956},
  doi          = {10.1109/CSR57506.2023.10224956},
  timestamp    = {Wed, 06 Sep 2023 08:09:39 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/IbrahimMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/BarrakTJP23,
  author       = {Amine Barrak and
                  Ranim Trabelsi and
                  Fehmi Jaafar and
                  F{\'{a}}bio Petrillo},
  title        = {Exploring the Impact of Serverless Computing on Peer To Peer Training
                  Machine Learning},
  booktitle    = {{IEEE} International Conference on Cloud Engineering, {IC2E} 2023,
                  Boston, MA, USA, September 25-29, 2023},
  pages        = {141--152},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IC2E59103.2023.00024},
  doi          = {10.1109/IC2E59103.2023.00024},
  timestamp    = {Tue, 21 Nov 2023 22:37:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/BarrakTJP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/JaafarATN23,
  author       = {Fehmi Jaafar and
                  Darine Ameyed and
                  Lavin Titare and
                  Md Nematullah},
  title        = {IoT Phishing Detection Using Hybrid {NLP} and Machine Learning Models
                  Enhanced with Contextual Embedding},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {340--349},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00088},
  doi          = {10.1109/QRS-C60940.2023.00088},
  timestamp    = {Tue, 05 Mar 2024 11:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/JaafarATN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/BarrakJTJP23,
  author       = {Amine Barrak and
                  Mayssa Jaziri and
                  Ranim Trabelsi and
                  Fehmi Jaafar and
                  F{\'{a}}bio Petrillo},
  title        = {{SPIRT:} {A} Fault-Tolerant and Reliable Peer-to-Peer Serverless {ML}
                  Training Architecture},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023, Chiang Mai, Thailand, October 22-26, 2023},
  pages        = {650--661},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS60937.2023.00069},
  doi          = {10.1109/QRS60937.2023.00069},
  timestamp    = {Tue, 23 Jan 2024 09:45:31 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/BarrakJTJP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-13995,
  author       = {Amine Barrak and
                  F{\'{a}}bio Petrillo and
                  Fehmi Jaafar},
  title        = {Architecting Peer-to-Peer Serverless Distributed Machine Learning
                  Training for Improved Fault Tolerance},
  journal      = {CoRR},
  volume       = {abs/2302.13995},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.13995},
  doi          = {10.48550/ARXIV.2302.13995},
  eprinttype    = {arXiv},
  eprint       = {2302.13995},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-13995.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-14139,
  author       = {Amine Barrak and
                  Ranim Trabelsi and
                  Fehmi Jaafar and
                  F{\'{a}}bio Petrillo},
  title        = {Exploring the Impact of Serverless Computing on Peer To Peer Training
                  Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2309.14139},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.14139},
  doi          = {10.48550/ARXIV.2309.14139},
  eprinttype    = {arXiv},
  eprint       = {2309.14139},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-14139.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-14148,
  author       = {Amine Barrak and
                  Mayssa Jaziri and
                  Ranim Trabelsi and
                  Fehmi Jaafar and
                  F{\'{a}}bio Petrillo},
  title        = {{SPIRT:} {A} Fault-Tolerant and Reliable Peer-to-Peer Serverless {ML}
                  Training Architecture},
  journal      = {CoRR},
  volume       = {abs/2309.14148},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.14148},
  doi          = {10.48550/ARXIV.2309.14148},
  eprinttype    = {arXiv},
  eprint       = {2309.14148},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-14148.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BarrakPJ22,
  author       = {Amine Barrak and
                  F{\'{a}}bio Petrillo and
                  Fehmi Jaafar},
  title        = {Serverless on Machine Learning: {A} Systematic Mapping Study},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {99337--99352},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3206366},
  doi          = {10.1109/ACCESS.2022.3206366},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BarrakPJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/SinghSJA22,
  author       = {Pratibha Singh and
                  Hamman Samuel and
                  Fehmi Jaafar and
                  Darine Ameyed},
  title        = {Enhancing Biometric Security with Combinatorial and Permutational
                  Multi-Fingerprint Authentication Strategies},
  booktitle    = {{IEEE} Intl. Conf. on Dependable, Autonomic and Secure Computing,
                  Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud
                  and Big Data Computing, Intl Conf on Cyber Science and Technology
                  Congress, DASC/PiCom/CBDCom/CyberSciTech 2022, Falerna, Italy, September
                  12-15, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927942},
  doi          = {10.1109/DASC/PICOM/CBDCOM/CY55231.2022.9927942},
  timestamp    = {Mon, 02 Jan 2023 14:34:28 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/SinghSJA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/BourreauGBSJ22,
  author       = {Hugo Bourreau and
                  Emeric Guichet and
                  Amine Barrak and
                  Beno{\^{\i}}t Simon and
                  Fehmi Jaafar},
  title        = {On Securing the Communication in IoT Infrastructure using Elliptic
                  Curve Cryptography},
  booktitle    = {22nd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9,
                  2022},
  pages        = {758--759},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/QRS-C57518.2022.00121},
  doi          = {10.1109/QRS-C57518.2022.00121},
  timestamp    = {Sat, 22 Apr 2023 17:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/BourreauGBSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/KermansaraviRKJ21,
  author       = {Zeinab Azadeh Kermansaravi and
                  Md. Saidur Rahman and
                  Foutse Khomh and
                  Fehmi Jaafar and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
  title        = {Investigating design anti-pattern and design pattern mutations and
                  their change- and fault-proneness},
  journal      = {Empir. Softw. Eng.},
  volume       = {26},
  number       = {1},
  pages        = {9},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10664-020-09900-0},
  doi          = {10.1007/S10664-020-09900-0},
  timestamp    = {Sun, 21 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ese/KermansaraviRKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/GrichiAJEA21,
  author       = {Manel Grichi and
                  Mouna Abidi and
                  Fehmi Jaafar and
                  Ellis E. Eghan and
                  Bram Adams},
  title        = {On the Impact of Interlanguage Dependencies in Multilanguage Systems
                  Empirical Case Study on Java Native Interface Applications {(JNI)}},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {70},
  number       = {1},
  pages        = {428--440},
  year         = {2021},
  url          = {https://doi.org/10.1109/TR.2020.3024873},
  doi          = {10.1109/TR.2020.3024873},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/GrichiAJEA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/JaafarABC21,
  author       = {Fehmi Jaafar and
                  Darine Ameyed and
                  Amine Barrak and
                  Mohamed Cheriet},
  title        = {Identification of Compromised IoT Devices: Combined Approach Based
                  on Energy Consumption and Network Traffic Analysis},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021, Hainan, China, December 6-10, 2021},
  pages        = {514--523},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS54544.2021.00062},
  doi          = {10.1109/QRS54544.2021.00062},
  timestamp    = {Wed, 16 Mar 2022 22:32:21 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/JaafarABC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/AmeyedJMC21,
  author       = {Darine Ameyed and
                  Fehmi Jaafar and
                  Francis Charette Migneault and
                  Mohamed Cheriet},
  title        = {Blockchain Based Model for Consent Management and Data Transparency
                  Assurance},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10,
                  2021},
  pages        = {1050--1059},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS-C55045.2021.00159},
  doi          = {10.1109/QRS-C55045.2021.00159},
  timestamp    = {Tue, 12 Apr 2022 17:57:49 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/AmeyedJMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-00058,
  author       = {Zeinab Azadeh Kermansaravi and
                  Md. Saidur Rahman and
                  Foutse Khomh and
                  Fehmi Jaafar and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
  title        = {Investigating Design Anti-pattern and Design Pattern Mutations and
                  Their Change- and Fault-proneness},
  journal      = {CoRR},
  volume       = {abs/2104.00058},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.00058},
  eprinttype    = {arXiv},
  eprint       = {2104.00058},
  timestamp    = {Tue, 25 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-00058.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/JaafarAA20,
  author       = {Fehmi Jaafar and
                  Florent Avellaneda and
                  El Hachemi Alikacem},
  title        = {Demystifying the Cyber Attribution: An Exploratory Study},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22,
                  2020},
  pages        = {35--40},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00022},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH49142.2020.00022},
  timestamp    = {Sun, 12 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/JaafarAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/MishraBJM20,
  author       = {Ruchi Mishra and
                  Sergey Butakov and
                  Fehmi Jaafar and
                  Neelam Memon},
  title        = {Behavioral Study of Malware Affecting Financial Institutions and Clients},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22,
                  2020},
  pages        = {79--86},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00028},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH49142.2020.00028},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/MishraBJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/SantosNPAJ20,
  author       = {Marcela G. dos Santos and
                  Bianca Minetto Napole{\~{a}}o and
                  F{\'{a}}bio Petrillo and
                  Darine Ameyed and
                  Fehmi Jaafar},
  title        = {A Preliminary Systematic Mapping on Software Engineering for Robotic
                  Systems: {A} Software Quality Perspective},
  booktitle    = {{ICSE} '20: 42nd International Conference on Software Engineering,
                  Workshops, Seoul, Republic of Korea, 27 June - 19 July, 2020},
  pages        = {647--654},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3387940.3392197},
  doi          = {10.1145/3387940.3392197},
  timestamp    = {Fri, 16 Oct 2020 11:06:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/SantosNPAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/GrichiAJEA20,
  author       = {Manel Grichi and
                  Mouna Abidi and
                  Fehmi Jaafar and
                  Ellis E. Eghan and
                  Bram Adams},
  title        = {On the Impact of Inter-language Dependencies in Multi-language Systems},
  booktitle    = {20th {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2020, Macau, China, December 11-14, 2020},
  pages        = {509},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/QRS51102.2020.00070},
  doi          = {10.1109/QRS51102.2020.00070},
  timestamp    = {Mon, 08 Feb 2021 12:13:14 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/GrichiAJEA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icmip/2020,
  editor       = {Wanyang Dai and
                  Xiangyang Hao and
                  T. Ramayah and
                  Fehmi Jaafar},
  title        = {{ICMIP} 2020: 5th International Conference on Multimedia and Image
                  Processing, Nanjing, China, January, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3381271},
  doi          = {10.1145/3381271},
  isbn         = {978-1-4503-7664-8},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmip/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-12936,
  author       = {Marcela G. dos Santos and
                  Darine Ameyed and
                  F{\'{a}}bio Petrillo and
                  Fehmi Jaafar and
                  Mohamed Cheriet},
  title        = {Internet of Things Architectures: {A} Comparative Study},
  journal      = {CoRR},
  volume       = {abs/2004.12936},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.12936},
  eprinttype    = {arXiv},
  eprint       = {2004.12936},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-12936.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/ZhangJM19,
  author       = {Naiji Zhang and
                  Fehmi Jaafar and
                  Yasir Malik},
  editor       = {Meikang Qiu},
  title        = {Low-Rate DoS Attack Detection Using {PSD} Based Entropy and Machine
                  Learning},
  booktitle    = {6th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2019 / 5th {IEEE} International Conference on Edge Computing
                  and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019},
  pages        = {59--62},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSCloud/EdgeCom.2019.00020},
  doi          = {10.1109/CSCLOUD/EDGECOM.2019.00020},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cscloud/ZhangJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/YekiniJZ19,
  author       = {Tunde Akeem Yekini and
                  Fehmi Jaafar and
                  Pavol Zavarsky},
  editor       = {Dongjin Yu and
                  Vu Nguyen and
                  Congfeng Jiang},
  title        = {Study of Trust at Device Level of the Internet of Things Architecture},
  booktitle    = {19th {IEEE} International Symposium on High Assurance Systems Engineering,
                  {HASE} 2019, Hangzhou, China, January 3-5, 2019},
  pages        = {150--155},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HASE.2019.00031},
  doi          = {10.1109/HASE.2019.00031},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/hase/YekiniJZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/DhakalJZ19,
  author       = {Samip Dhakal and
                  Fehmi Jaafar and
                  Pavol Zavarsky},
  editor       = {Dongjin Yu and
                  Vu Nguyen and
                  Congfeng Jiang},
  title        = {Private Blockchain Network for IoT Device Firmware Integrity Verification
                  and Update},
  booktitle    = {19th {IEEE} International Symposium on High Assurance Systems Engineering,
                  {HASE} 2019, Hangzhou, China, January 3-5, 2019},
  pages        = {164--170},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HASE.2019.00033},
  doi          = {10.1109/HASE.2019.00033},
  timestamp    = {Wed, 27 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/DhakalJZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/BaliJZ19,
  author       = {Ranbir Singh Bali and
                  Fehmi Jaafar and
                  Pavol Zavarsky},
  editor       = {Yulin Wang and
                  Chin{-}Chen Chang},
  title        = {Lightweight authentication for {MQTT} to improve the security of IoT
                  communication},
  booktitle    = {Proceedings of the 3rd International Conference on Cryptography, Security
                  and Privacy, {ICCSP} 2019, Kuala Lumpur, Malaysia, January 19-21,
                  2019},
  pages        = {6--12},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309074.3309081},
  doi          = {10.1145/3309074.3309081},
  timestamp    = {Sat, 13 Apr 2019 17:11:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/BaliJZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/MalikCJ19,
  author       = {Yasir Malik and
                  Carlos Renato Salim Campos and
                  Fehmi Jaafar},
  title        = {Detecting Android Security Vulnerabilities Using Machine Learning
                  and System Calls Analysis},
  booktitle    = {19th {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2019, Sofia, Bulgaria, July
                  22-26, 2019},
  pages        = {109--113},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/QRS-C.2019.00033},
  doi          = {10.1109/QRS-C.2019.00033},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/MalikCJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/KothiaSJ19,
  author       = {Anis Kothia and
                  Bobby Swar and
                  Fehmi Jaafar},
  title        = {Knowledge Extraction and Integration for Information Gathering in
                  Penetration Testing},
  booktitle    = {19th {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2019, Sofia, Bulgaria, July
                  22-26, 2019},
  pages        = {330--335},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/QRS-C.2019.00068},
  doi          = {10.1109/QRS-C.2019.00068},
  timestamp    = {Mon, 21 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/KothiaSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cai/AmeyedMZJT18,
  author       = {Darine Ameyed and
                  Moeiz Miraoui and
                  Atef Zaguia and
                  Fehmi Jaafar and
                  Chakib Tadj},
  title        = {Using Probabilistic Temporal Logic {PCTL} and Model Checking for Context
                  Prediction},
  journal      = {Comput. Informatics},
  volume       = {37},
  number       = {6},
  pages        = {1411--1442},
  year         = {2018},
  url          = {https://doi.org/10.4149/cai\_2018\_6\_1411},
  doi          = {10.4149/CAI\_2018\_6\_1411},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cai/AmeyedMZJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/IqbalZJG18,
  author       = {Md. Shahrear Iqbal and
                  Mohammad Zulkernine and
                  Fehmi Jaafar and
                  Yuan Gu},
  title        = {Protecting Internet users from becoming victimized attackers of click-fraud},
  journal      = {J. Softw. Evol. Process.},
  volume       = {30},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/smr.1871},
  doi          = {10.1002/SMR.1871},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/smr/IqbalZJG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codit/SinghJB18,
  author       = {Gurjot Balraj Singh and
                  Fehmi Jaafar and
                  Sergey Butakov},
  title        = {Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud},
  booktitle    = {5th International Conference on Control, Decision and Information
                  Technologies, CoDIT 2018, Thessaloniki, Greece, April 10-13, 2018},
  pages        = {952--958},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CoDIT.2018.8394946},
  doi          = {10.1109/CODIT.2018.8394946},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/codit/SinghJB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/ClementeJM18,
  author       = {Caesar Jude Clemente and
                  Fehmi Jaafar and
                  Yasir Malik},
  title        = {Is Predicting Software Security Bugs Using Deep Learning Better Than
                  the Traditional Machine Learning Algorithms?},
  booktitle    = {2018 {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2018, Lisbon, Portugal, July 16-20, 2018},
  pages        = {95--102},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/QRS.2018.00023},
  doi          = {10.1109/QRS.2018.00023},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/ClementeJM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/RajendraprasadB18,
  author       = {Pooja Rajendraprasad and
                  Sergey Butakov and
                  Fehmi Jaafar},
  title        = {Information Security Considerations for Wireless Infusion Pumps},
  booktitle    = {2018 {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2018, Lisbon, Portugal, July
                  16-20, 2018},
  pages        = {438--442},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/QRS-C.2018.00081},
  doi          = {10.1109/QRS-C.2018.00081},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/RajendraprasadB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/JaafarSZ18,
  author       = {Fehmi Jaafar and
                  Gagandeep Singh and
                  Pavol Zavarsky},
  title        = {An Analysis of Android Malware Behavior},
  booktitle    = {2018 {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2018, Lisbon, Portugal, July
                  16-20, 2018},
  pages        = {505--512},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/QRS-C.2018.00091},
  doi          = {10.1109/QRS-C.2018.00091},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/JaafarSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spml/KaurMSJ18,
  author       = {Gurpreet Kaur and
                  Yasir Malik and
                  Hamman Samuel and
                  Fehmi Jaafar},
  title        = {Detecting Blind Cross-Site Scripting Attacks Using Machine Learning},
  booktitle    = {Proceedings of the 2018 International Conference on Signal Processing
                  and Machine Learning, {SPML} 2018, Shanghai, China, November 28-30,
                  2018},
  pages        = {22--25},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3297067.3297096},
  doi          = {10.1145/3297067.3297096},
  timestamp    = {Thu, 23 Jan 2020 16:34:33 +0100},
  biburl       = {https://dblp.org/rec/conf/spml/KaurMSJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/JaafarLGM17,
  author       = {Fehmi Jaafar and
                  Angela Lozano and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and
                  Kim Mens},
  title        = {Analyzing software evolution and quality by extracting Asynchrony
                  change patterns},
  journal      = {J. Syst. Softw.},
  volume       = {131},
  pages        = {311--322},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jss.2017.05.047},
  doi          = {10.1016/J.JSS.2017.05.047},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/JaafarLGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/DavariZJ17,
  author       = {Maryam Davari and
                  Mohammad Zulkernine and
                  Fehmi Jaafar},
  title        = {An Automatic Software Vulnerability Classification Framework},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2017, Altoona, PA, USA, July 24-25, 2017},
  pages        = {44--49},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.27},
  doi          = {10.1109/ICSSA.2017.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/DavariZJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/JaafarLGM17,
  author       = {Fehmi Jaafar and
                  Angela Lozano and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and
                  Kim Mens},
  title        = {On the Analysis of Co-Occurrence of Anti-Patterns and Clones},
  booktitle    = {2017 {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2017, Prague, Czech Republic, July 25-29, 2017},
  pages        = {274--284},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/QRS.2017.38},
  doi          = {10.1109/QRS.2017.38},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/JaafarLGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/Jaafar17,
  author       = {Fehmi Jaafar},
  title        = {An Integrated Architecture for IoT Fingerprinting},
  booktitle    = {2017 {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS-C} 2017, Prague, Czech Republic, July
                  25-29, 2017},
  pages        = {601--602},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/QRS-C.2017.112},
  doi          = {10.1109/QRS-C.2017.112},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/Jaafar17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-01939,
  author       = {Darine Ameyed and
                  Fehmi Jaafar and
                  Jaouhar Fattahi},
  title        = {A Slow Read attack Using Cloud},
  journal      = {CoRR},
  volume       = {abs/1712.01939},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.01939},
  eprinttype    = {arXiv},
  eprint       = {1712.01939},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-01939.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/JaafarGHKZ16,
  author       = {Fehmi Jaafar and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and
                  Sylvie Hamel and
                  Foutse Khomh and
                  Mohammad Zulkernine},
  title        = {Evaluating the impact of design pattern and anti-pattern dependencies
                  on changes and faults},
  journal      = {Empir. Softw. Eng.},
  volume       = {21},
  number       = {3},
  pages        = {896--931},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10664-015-9361-0},
  doi          = {10.1007/S10664-015-9361-0},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/JaafarGHKZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/IqbalZJG16,
  author       = {Md. Shahrear Iqbal and
                  Mohammad Zulkernine and
                  Fehmi Jaafar and
                  Yuan Gu},
  editor       = {Radu F. Babiceanu and
                  H{\'{e}}l{\`{e}}ne Waeselynck and
                  Raymond A. Paul and
                  Bojan Cukic and
                  Jie Xu},
  title        = {FCFraud: Fighting Click-Fraud from the User Side},
  booktitle    = {17th {IEEE} International Symposium on High Assurance Systems Engineering,
                  {HASE} 2016, Orlando, FL, USA, January 7-9, 2016},
  pages        = {157--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HASE.2016.17},
  doi          = {10.1109/HASE.2016.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/IqbalZJG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/JaafarNR16,
  author       = {Fehmi Jaafar and
                  Gabriela Nicolescu and
                  Christian Richard},
  title        = {A Systematic Approach for Privilege Escalation Prevention},
  booktitle    = {2016 {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2016, Companion, Vienna, Austria, August 1-3,
                  2016},
  pages        = {101--108},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/QRS-C.2016.17},
  doi          = {10.1109/QRS-C.2016.17},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/JaafarNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai2/AmeyedJF15,
  author       = {Darine Ameyed and
                  Fehmi Jaafar and
                  Jaouhar Fattahi},
  title        = {A slow read attack using cloud},
  booktitle    = {2015 7th International Conference on Electronics, Computers and Artificial
                  Intelligence (ECAI), Bucharest, Romania, June 25-27, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECAI.2015.7301202},
  doi          = {10.1109/ECAI.2015.7301202},
  timestamp    = {Fri, 08 Apr 2022 09:38:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai2/AmeyedJF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/LozanoJMG14,
  author       = {Angela Lozano and
                  Fehmi Jaafar and
                  Kim Mens and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
  title        = {Clones and Macro co-changes},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {63},
  year         = {2014},
  url          = {https://doi.org/10.14279/tuj.eceasst.63.933},
  doi          = {10.14279/TUJ.ECEASST.63.933},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/LozanoJMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/JaafarGHA14,
  author       = {Fehmi Jaafar and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and
                  Sylvie Hamel and
                  Giuliano Antoniol},
  title        = {Detecting asynchrony and dephase change patterns by mining software
                  repositories},
  journal      = {J. Softw. Evol. Process.},
  volume       = {26},
  number       = {1},
  pages        = {77--106},
  year         = {2014},
  url          = {https://doi.org/10.1002/smr.1635},
  doi          = {10.1002/SMR.1635},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/smr/JaafarGHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qsic/JaafarKGZ14,
  author       = {Fehmi Jaafar and
                  Foutse Khomh and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and
                  Mohammad Zulkernine},
  title        = {Anti-pattern Mutations and Fault-proneness},
  booktitle    = {2014 14th International Conference on Quality Software, Allen, TX,
                  USA, October 2-3, 2014},
  pages        = {246--255},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/QSIC.2014.45},
  doi          = {10.1109/QSIC.2014.45},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/qsic/JaafarKGZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/JaafarGHK13,
  author       = {Fehmi Jaafar and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and
                  Sylvie Hamel and
                  Foutse Khomh},
  title        = {Analysing Anti-patterns Static Relationships with Design Patterns},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {59},
  year         = {2013},
  url          = {https://doi.org/10.14279/tuj.eceasst.59.930},
  doi          = {10.14279/TUJ.ECEASST.59.930},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/JaafarGHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/JaafarHGHA13,
  author       = {Fehmi Jaafar and
                  Salima Hassaine and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and
                  Sylvie Hamel and
                  Bram Adams},
  editor       = {Anthony Cleve and
                  Filippo Ricca and
                  Maura Cerioli},
  title        = {On the Relationship between Program Evolution and Fault-Proneness:
                  An Empirical Study},
  booktitle    = {17th European Conference on Software Maintenance and Reengineering,
                  {CSMR} 2013, Genova, Italy, March 5-8, 2013},
  pages        = {15--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CSMR.2013.12},
  doi          = {10.1109/CSMR.2013.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/JaafarHGHA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/JaafarGHK13,
  author       = {Fehmi Jaafar and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and
                  Sylvie Hamel and
                  Foutse Khomh},
  editor       = {Ralf L{\"{a}}mmel and
                  Rocco Oliveto and
                  Romain Robbes},
  title        = {Mining the relationship between anti-patterns dependencies and fault-proneness},
  booktitle    = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz,
                  Germany, October 14-17, 2013},
  pages        = {351--360},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCRE.2013.6671310},
  doi          = {10.1109/WCRE.2013.6671310},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/JaafarGHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/AliJH13,
  author       = {Nasir Ali and
                  Fehmi Jaafar and
                  Ahmed E. Hassan},
  editor       = {Ralf L{\"{a}}mmel and
                  Rocco Oliveto and
                  Romain Robbes},
  title        = {Leveraging historical co-change information for requirements traceability},
  booktitle    = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz,
                  Germany, October 14-17, 2013},
  pages        = {361--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCRE.2013.6671311},
  doi          = {10.1109/WCRE.2013.6671311},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/AliJH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Jaafar12,
  author       = {Fehmi Jaafar},
  editor       = {Martin Glinz and
                  Gail C. Murphy and
                  Mauro Pezz{\`{e}}},
  title        = {On the analysis of evolution of software artefacts and programs},
  booktitle    = {34th International Conference on Software Engineering, {ICSE} 2012,
                  June 2-9, 2012, Zurich, Switzerland},
  pages        = {1563--1566},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICSE.2012.6227036},
  doi          = {10.1109/ICSE.2012.6227036},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/Jaafar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/JaafarGHA11,
  author       = {Fehmi Jaafar and
                  Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and
                  Sylvie Hamel and
                  Giuliano Antoniol},
  editor       = {Martin Pinzger and
                  Denys Poshyvanyk and
                  Jim Buckley},
  title        = {An Exploratory Study of Macro Co-changes},
  booktitle    = {18th Working Conference on Reverse Engineering, {WCRE} 2011, Limerick,
                  Ireland, October 17-20, 2011},
  pages        = {325--334},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WCRE.2011.47},
  doi          = {10.1109/WCRE.2011.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/JaafarGHA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics