Les publications

Articles de Journaux

AnnéeAuteursTitreJournalLien URL
2023Darine Ameyed, Fehmi Jaafar, Fabio Petrillo, Mohamed CherietQualité et sécurité des frameworks pour l'évaluation des modèles d'architecture de l'IdOSN Computer ScienceLien
2022Amine Barrak, Fabio Petrillo, Fehmi Jaafar.Serverless sur l'apprentissage automatique : Une étude de cartographie systématiqueIEEELien
2022Fehmi Jaafar, Florent Avellaneda, Omer Nguena Timo, Mario Beaulieu, David LandrySpot the hack: Intrusion detection systems for avionics networks using machine learningOpen ScienceLien
2021Sajid Habib Gill, Noor Ahmed Sheikh, Samina Rajpar, NZ Jhanjhi, Muneer Ahmad, Mirza Abdur Razzaq, Sultan S Alshamrani, Yasir Malik, Fehmi Jaafar.Cadre étendu de détection des falsifications pour les données médicales covid-19 à l'aide d'un réseau neuronal convolutionnelComputers, Materials and ContinuaLien
2020Schallum Pierre, Fehmi Jaafar.Médias sociaux: perspectives sur les défis liés à la cybersécurité, la gouvernementalité algorithmique et l'intelligence artificiellePresses de l'Université LavalLien
2020Manel Grichi, Mouna Abidi, Fehmi Jaafar, Ellis E. Eghan, and Bram Adams.L'impact des dépendances inter-langues dans les systèmes multi-langues.The IEEE Transactions on ReliabilityLien
2020Zeinab (Azadeh) Kermansaravi, Md. Saidur Rahman, Fehmi Jaafar, Foutse Khomh, and Yann-Gaël Guéhéneuc.Investigation des modèles de conception et des mutations d'anti-modèles de conception et de leur capacité de changement et de défaillanceThe Empirical Software Engineering JournalLien
2018Darine Ameyed, Moeiz Miraoui, Atef Zaguia, Fehmi Jaafar, and Chakib Tadj.Utilisation de la logique temporelle probabiliste PCTL et de la vérification de modèle pour la prédiction de contexteComputing and Informatics JournalLien
2017Fehmi Jaafar, Angela Lozano, Kim Mens, and Yann-Gaël Guéhéneuc.Analyse de l'évolution et de la qualité des logiciels par l'extraction de modèles de changement asynchrones.Journal of Systems and SoftwareLien
2017Mohammad Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Protéger les internautes contre les attaques de fraude au clic.Journal of Software : Evolution and Process.Lien
2016Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, and Mohammad Zulkernine.Évaluation de l'impact des dépendances des modèles de conception et des anti-modèles sur les erreurs et les changements.Journal of Empirical Software Engineering.Lien
2014Angela Lozano, Fehmi Jaafar, Kim Mens, and Yann-Gaël Guéhéneuc.Clones et macro-changementsJournal of Electronic Communications of the European Association of Software Science and Technology.Lien
2014Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.Détection de l'asynchronisme et des modèles de changement de phase par l'exploration des référentiels logiciels.Journal of Software : Evolution and Process.Lien

Articles de conférences

AnnéeAuteursTitreConférenceLien URL
2023Fehmi Jaafar, Darine Amayed, Wissam Salhab, Hajer Bouani, Mohamed CherietBlockchain-based consent management for privacy persevering and transparency in intelligent surveillance systems2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)Lien
2023Amine Barrak, Ranim Trabelsi, Fehmi Jaafar, Fabio PetrilloExploring the impact of serverless computing on peer to peer training machine learning2023 IEEE International Conference on Cloud Engineering (IC2E)Lien
2023Fehmi Jaafar, Darine Ameyed, Yasmine Bouzid, Abib SyOn Securing Communications Between Connected Objects Using a Data-Centric Security Approach2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)Lien
2023Abubakr Ibrahim, Mohamed Mejri, Fehmi JaafarAn Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection2023 IEEE International Conference on Cyber Security and Resilience (CSR)Lien
2023
Amine Barrak, Mayssa Jaziri, Ranim Trabelsi, Fehmi Jaafar, Fabio Petrillo
SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training Architecture2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security (QRS)Lien
2022Hugo Bourreau, Emeric Guichet, Amine Barrak, Benoît Simon, Fehmi Jaafar.Sécurisation des communications dans les infrastructures IoT à l'aide de la cryptographie à courbe elliptique2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)Lien
2022Fehmi Jaafar, Yasir Malik, Johan Serre, Haoyu Wang, Tianqi Wang.Détection d'intrusion légère dans un réseau de capteurs basé sur MQTT2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)Lien
2022Pratibha Singh, Hamman Samuel, Fehmi Jaafar, Darine Ameyed.Amélioration de la sécurité bio-métrique avec les stratégies d'authentification d'empreintes digitales combinatoires2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)Lien
2021Darine Ameyed, Fehmi Jaafar, Francis Charette-Migneault, Mohamed CherietModèle basé sur la blockchain pour la gestion du consentement et l'assurance de la transparence des données.2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C)
2020Fehmi Jaafar, Florent Avellaneda, and El-Hackemi Alikacem.Démystifier la cyberattribution : Une étude exploratoireThe IEEE Cyber Science and Technology Congress (CyberSciTech)Lien
2020Fehmi Jaafar, Florent Avellaneda, El-Hackemi AlikacemDémystifier la cyberattribution : Une étude exploratoireIEEELien
2020Marcela G Dos Santos, Bianca M Napoleão, Fabio Petrillo, Darine Ameyed, Fehmi JaafarUne cartographie systématique préliminaire de l'ingénierie logicielle pour les systèmes robotiques : Une perspective de qualité logicielleIEEELien
2020Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, Neelam MemonÉtude comportementale des malwares ayant un impact sur les institutions financières et les clientsIEEELien
2020Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, and Neelam Memon.Étude comportementale des malwares ayant un impact sur les institutions financières et les clientsThe IEEE Cyber Science and Technology Congress (CyberSciTech)Lien
2020Marcela dos Santos, Bianca Napoleao, Fabio Petrillo, Darine Ameyed and Fehmi Jaafar.A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality PerspectiveThe 2nd International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2020)Lien
2020Adegoke Babajide Seyi, Fehmi Jaafar and Ron Ruhl.Securing the Authentication Process of LTE Base StationsIEEE International Conference on Electrical, Communication and Computer EngineeringLien
2020Walter Isharufe, Fehmi Jaafar, and Sergey Butakov.Study of Security Issues in Platform -as a- Service (PaaS) Cloud ModelIEEE International Conference on Electrical, Communication and Computer EngineeringLien
2019Carlos Renato Salim Campos, Fehmi Jaafar, and Yasir Malik.Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis IEEE International Workshop on Data-driven System Quality Assurance, QRS Companion 2019Lien
2019Anis Kothia, Bobby Swar, and Fehmi Jaafar.Knowledge Extraction and Integration for Information Gathering in Penetration Testing IEEE International Workshop on Software Engineering and Knowledge Management, QRS Companion 2019Lien
2019Naiji Zhang, Fehmi Jaafar, and Yasir Malik.Low-Rate DoS Attack Detection Using PSD based Entropy and Machine LearningThe 6th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2019)Lien
2019Florent Avellaneda, El-Hachemi Alikacem, and Fehmi Jaafar.Using Attack Pattern for Cyber Attack AttributionIEEE International Conference on Cybersecurity 2019 (ICoC2019)Lien
2019Fehmi Jaafar, Asmaa Tellabi, Sabri Abdelbast, and Christoph Ruland. On the Analysis of the Impact of Scheduling Plans in Safety Critical Requirements in Virtualization IEEE International Conference on Cybersecurity 2019 (ICoC2019)Lien
2019Samip Dhakal, Fehmi Jaafar, and Pavol Zavarsky.Private Blockchain Network for IoT Device Firmware Integrity Verification and Update.HASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, ChinaLien
2019Tunde Akeem Yekini, Pavol Zavarsky, and Fehmi Jafaar.Study of Trust at Device Level of the Internet of Things Architecture.HASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, ChinaLien
2019Ranbir Singh Bali, Fehmi Jaafar, and Pavol Zavarasky.Lightweight Authentication for MQTT by using Topic-Based Self Key Agreement and Block Cipher.The International Conference on Cryptography, Security and Privacy (ICCSP 2019), Kuala Lumpur, Malaysia.Lien
2018Gagandeep Singh, Fehmi Jaafar, and Pavol Zavarsky.An Analysis of Android Malware Behavior.International Workshop on Information Assurance, Lisbon, Portugal.Lien
2018Caesar Jude Clemente, Fehmi Jaafar, and Yasir Malik. Is Predicting Software Security Bugs using Deep Learning Better than the Traditional Machine Learning Algorithms?IEEE International Conference on Software Quality, Reliability, and Security, Lisbon, Portugal.Lien
2018Pooja Rajendra Prasad, Sergey Butakov, and Fehmi Jaafar.Information Security Considerations for Wireless Infusion Pumps.IEEE International Workshop on Safety and Security in Cyber-Physical Systems, Lisbon, Portugal.Lien
2018Gurjot Balraj Singh, Fehmi Jaafar, and Sergey Butakov.Analyse des frais causés par les mécanismes de sécurité dans IaaS Cloud.IEEE International Conference on Control, Decision and Information Technologies, CoDIT, Thessaloniki, Greece.Lien
2018Jasmeen Kaur, Fehmi Jaafar, and Pavol Zavarsky.Experimental Analysis of Behavior of Crypto Ransomware.The Thirteenth International Conference on Systems, ICONS, Athens, Greece.Lien
2018Mayank Jaiswal, Yasir Malik, and Fehmi Jaafar.Android Gaming Malware Detection Using System Call Behaviour Analysis.The IEEE International Symposium on Digital Forensic and Security, ISDFS, Antalya, Turkey.Lien
2018Manjinder Singh, Sergey Butakov, and Fehmi Jaafar.Analyzing Overhead from Security and Administrative Functions in Virtual Environment.The IEEE 2018 International Conference on Platform Technology and Service, PlatCon, South Korea.Lien
2018Gurpreet Kaur, Fehmi Jaafar, and Yasir Malik.Detecting Blind Cross-Site Attacks Using Machine Learning.The 2018 ACM International Conference on Signal Processing and Machine Learning, Shanghai, China.Lien
2017Maryam Davari, Mohammad Zulkernine, ans Fehmi Jaafar.An Automatic Software Vulnerability Classification Framework.2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USA.Lien
2017Fehmi Jaafar.An Integrated Architecture for IoT Fingerprinting.IEEE QRS Companion 2016. IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic.Lien
2017Harjot Kaur, Pavol Zavarsky, and Fehmi Jaafar.Unauthorized Data Leakage from an Organisation through Web Browser Fingerprinting Vulnerability.The IEEE World Congress on Internet Security, London, United Kingdom.Lien
2017Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, and Kim Mens.On the Analysis of Co-Occurrence of Anti-Patterns and Clones.IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic.Lien
2016Fehmi Jaafar, Gabriela Nicolescu, and Christian Richard.A Systematic Approach For Privilege Escalation Prevention.IEEE International Conference on Software Quality, Reliability and Security, Companion, Vienna, Austria.Lien
2016Md Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Fighting Click-Fraud from User Side.IEEE High Assurance Systems Engineering Symposium., Orlando, United States.Lien
2015Darine Ameyed, Fehmi Jaafar, and Jaouhar Fattahi.A Slow Read attack Using Cloud.The International Conference on Electronics, Computers and Artificial Intelligence, Bucharest, Romania.Lien
2014Fehmi Jaafar,Foutse Khomh, and Yann-Gaël Guéhéneuc.Anti-pattern Mutations and Fault-proneness.The 14th International Conference on Quality Software., Dallas, United States.Lien
2013Fehmi Jaafar, Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Bram Adams.On the Relationship Between Program Evolution and Fault-proneness.European Conference on Software Maintenance and Reengineering., Genova, Italy.Lien
2013Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan.Leveraging Historical Co-Change Information for Requirements Traceability.The Working Conference on Reverse Engineering., Koblenz-Landau, Germany.Lien
2013Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh.Mining the Relationship Between Anti-patterns Dependencies and Fault-proneness.Working Conference on Reverse Engineering, Koblenz-Landau, Germany.Lien
2012Fehmi Jaafar.On the analysis of evolution of software artefacts and programs.The IEEE International Conference on Software Engineering.Lien
2011Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.An Exploratory Study of Macro Co-Changes.The Working Conference on Reverse Engineering, Ireland.Lien

Books

AnnéeAuteursTitreCo-EditorLien URL
2023Laurent Adatto, Fehmi Jaafar, Schallum PierreL’Intelligence Artificielle et les Technologies Quantiques au regard de la Cybersécurité-IntroductionTechnologie et innovationLien
2023Schallum Pierre and Fehmi JaafarBlockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and IoTs.Accepted, CRC Press | Taylor & Francis Group, Boca Raton, Florida, United States of AmericaLien
2021Schallum Pierre And Fehmi JaafarSocial Network and Cyber SecurityPublished, Laval University Press, Quebec, CanadaLien

Book Chapter

AnnéeAuteursTitreCo-EditorLien URL
2024Manel Grichi, Fehmi JaafarDemystifying the Digital Identity Challenges and the Blockchain RoleCRC PressLien
2023Darine Ameyed, Fehmi Jaafar, Riadh ben Chaabene, Mohamed CherietFederated Learning and Blockchain: An Opportunity for Artificial Intelligence with Data RegulationAI, Machine Learning and Deep Learning: A Security PerspectiveLien
2023Darine Amayed, Fehmi Jaafar, Riadh Ben Chaabene, Mohamed CherietSecurity and corporate violation to privacy in the internet of things ageCRC Press
2023Darine Ameyed, Fehmi Jaafar, Riadh ben Chaabene and Mohamed CherietSecurity and
Corporate Violation to Privacy in The Internet Of Things Age. Blockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and IoTs
CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America
2023Manel Grichi and Fehmi JaafarBlockchain and Artificial Intelligence
Based Solution to Enhance the Privacy in Digital Identity and IoTs
CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America
2023Darine Amayed, Fehmi Jaafar, Riadh Ben Chaabene, and Mohamed CherietDemystifying the Digital Identity Challenges and the Blockchain
Role. Blockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and
IoTs
CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America
2021 Fehmi Jaafar and Jean DecianCyber Attacks Against Social Network: Lessons Learned. Social
Network and Cyber Security
2020Kolade Folayemi Awe, Yasir Malik, Pavol Zavarsky, and Fehmi JaafarValidation de la mise à jour BGP
Utilisation d'une infrastructure basée sur la blockchain
Springer Publishing, New York, United States of America