Les publications

Articles de Journaux

AnnéeAuteursTitreJournalLien URL
2020Manel Grichi, Mouna Abidi, Fehmi Jaafar, Ellis E. Eghan, and Bram Adams.On the Impact of Inter-language Dependencies in Multi-language Systems.The IEEE Transactions on ReliabilityLien
2020Zeinab (Azadeh) Kermansaravi, Md. Saidur Rahman, Fehmi Jaafar, Foutse Khomh, and Yann-Gaël Guéhéneuc.Investigating Design Patterns and Design Anti-pattern Mutations and their Change and Fault-pronenessThe Empirical Software Engineering JournalTo appear
2018Darine Ameyed, Moeiz Miraoui, Atef Zaguia, Fehmi Jaafar, and Chakib Tadj.Using Probabilistic Temporal Logic PCTL and Model Checking for Context Prediction.Computing and Informatics JournalLien
2017Fehmi Jaafar, Angela Lozano, Kim Mens, and Yann-Gaël Guéhéneuc.Analyzing Software Evolution and Quality by Extracting Asynchrony Change-patterns.Journal of Systems and SoftwareLien
2017Mohammad Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Protecting internet users from becoming victimized attackers of click-fraud.Journal of Software : Evolution and Process.Lien
2016Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, and Mohammad Zulkernine.Evaluating the Impact of Design Pattern and Anti-pattern Dependencies on Faults and Changes.Journal of Empirical Software Engineering.Lien
2014Angela Lozano, Fehmi Jaafar, Kim Mens, and Yann-Gaël Guéhéneuc.Clones and Macro Co-Changes.Journal of Electronic Communications of the European Association of Software Science and Technology.Lien
2014Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.Detecting Asynchrony and Dephase Change Patterns by Mining Software Repositories.Journal of Software : Evolution and Process.Lien
2013Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh.Analysing Anti-patterns Static Relationships with Design Patterns.Journal of Electronic Communication of the European Association of Software Science and Technology.Lien

Articles de conférences

AnnéeAuteursTitreConférenceLien URL
2020Fehmi Jaafar, Florent Avellaneda, and El-Hackemi Alikacem.Demystifying the Cyber Attribution: An Exploratory StudyThe IEEE Cyber Science and Technology Congress (CyberSciTech)Lien
2020Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, and Neelam Memon.Behavioral Study of Malware Affecting Financial Institutions and ClientsThe IEEE Cyber Science and Technology Congress (CyberSciTech)Lien
2020Marcela dos Santos, Bianca Napoleao, Fabio Petrillo, Darine Ameyed and Fehmi Jaafar.A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality PerspectiveThe 2nd International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2020)Lien
2020Adegoke Babajide Seyi, Fehmi Jaafar and Ron Ruhl.Securing the Authentication Process of LTE Base StationsIEEE International Conference on Electrical, Communication and Computer EngineeringLien
2020Walter Isharufe, Fehmi Jaafar, and Sergey Butakov.Study of Security Issues in Platform -as a- Service (PaaS) Cloud ModelIEEE International Conference on Electrical, Communication and Computer EngineeringLien
2019Carlos Renato Salim Campos, Fehmi Jaafar, and Yasir Malik.Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis IEEE International Workshop on Data-driven System Quality Assurance, QRS Companion 2019Lien
2019Anis Kothia, Bobby Swar, and Fehmi Jaafar.Knowledge Extraction and Integration for Information Gathering in Penetration Testing IEEE International Workshop on Software Engineering and Knowledge Management, QRS Companion 2019Lien
2019Naiji Zhang, Fehmi Jaafar, and Yasir Malik.Low-Rate DoS Attack Detection Using PSD based Entropy and Machine LearningThe 6th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2019)Lien
2019Florent Avellaneda, El-Hachemi Alikacem, and Fehmi Jaafar.Using Attack Pattern for Cyber Attack AttributionIEEE International Conference on Cybersecurity 2019 (ICoC2019)Lien
2019Fehmi Jaafar, Asmaa Tellabi, Sabri Abdelbast, and Christoph Ruland. On the Analysis of the Impact of Scheduling Plans in Safety Critical Requirements in Virtualization IEEE International Conference on Cybersecurity 2019 (ICoC2019)Lien
2019Samip Dhakal, Fehmi Jaafar, and Pavol Zavarsky.Private Blockchain Network for IoT Device Firmware Integrity Verification and Update.HASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, ChinaLien
2019Tunde Akeem Yekini, Pavol Zavarsky, and Fehmi Jafaar.Study of Trust at Device Level of the Internet of Things Architecture.HASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, ChinaLien
2019Ranbir Singh Bali, Fehmi Jaafar, and Pavol Zavarasky.Lightweight Authentication for MQTT by using Topic-Based Self Key Agreement and Block Cipher.The International Conference on Cryptography, Security and Privacy (ICCSP 2019), Kuala Lumpur, Malaysia.Lien
2018Gagandeep Singh, Fehmi Jaafar, and Pavol Zavarsky.An Analysis of Android Malware Behavior.International Workshop on Information Assurance, Lisbon, Portugal.Lien
2018Caesar Jude Clemente, Fehmi Jaafar, and Yasir Malik. Is Predicting Software Security Bugs using Deep Learning Better than the Traditional Machine Learning Algorithms?IEEE International Conference on Software Quality, Reliability, and Security, Lisbon, Portugal.Lien
2018Pooja Rajendra Prasad, Sergey Butakov, and Fehmi Jaafar.Information Security Considerations for Wireless Infusion Pumps.IEEE International Workshop on Safety and Security in Cyber-Physical Systems, Lisbon, Portugal.Lien
2018Gurjot Balraj Singh, Fehmi Jaafar, and Sergey Butakov.Analyse des frais causés par les mécanismes de sécurité dans IaaS Cloud.IEEE International Conference on Control, Decision and Information Technologies, CoDIT, Thessaloniki, Greece.Lien
2018Jasmeen Kaur, Fehmi Jaafar, and Pavol Zavarsky.Experimental Analysis of Behavior of Crypto Ransomware.The Thirteenth International Conference on Systems, ICONS, Athens, Greece.Lien
2018Mayank Jaiswal, Yasir Malik, and Fehmi Jaafar.Android Gaming Malware Detection Using System Call Behaviour Analysis.The IEEE International Symposium on Digital Forensic and Security, ISDFS, Antalya, Turkey.Lien
2018Manjinder Singh, Sergey Butakov, and Fehmi Jaafar.Analyzing Overhead from Security and Administrative Functions in Virtual Environment.The IEEE 2018 International Conference on Platform Technology and Service, PlatCon, South Korea.Lien
2018Gurpreet Kaur, Fehmi Jaafar, and Yasir Malik.Detecting Blind Cross-Site Attacks Using Machine Learning.The 2018 ACM International Conference on Signal Processing and Machine Learning, Shanghai, China.Lien
2017Maryam Davari, Mohammad Zulkernine, ans Fehmi Jaafar.An Automatic Software Vulnerability Classification Framework.2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USA.Lien
2017Fehmi Jaafar.An Integrated Architecture for IoT Fingerprinting.IEEE QRS Companion 2016. IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic.Lien
2017Harjot Kaur, Pavol Zavarsky, and Fehmi Jaafar.Unauthorized Data Leakage from an Organisation through Web Browser Fingerprinting Vulnerability.The IEEE World Congress on Internet Security, London, United Kingdom.Lien
2017Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, and Kim Mens.On the Analysis of Co-Occurrence of Anti-Patterns and Clones.IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic.Lien
2016Fehmi Jaafar, Gabriela Nicolescu, and Christian Richard.A Systematic Approach For Privilege Escalation Prevention.IEEE International Conference on Software Quality, Reliability and Security, Companion, Vienna, Austria.Lien
2016Md Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Fighting Click-Fraud from User Side.IEEE High Assurance Systems Engineering Symposium., Orlando, United States.Lien
2015Darine Ameyed, Fehmi Jaafar, and Jaouhar Fattahi.A Slow Read attack Using Cloud.The International Conference on Electronics, Computers and Artificial Intelligence, Bucharest, Romania.Lien
2014Fehmi Jaafar,Foutse Khomh, and Yann-Gaël Guéhéneuc.Anti-pattern Mutations and Fault-proneness.The 14th International Conference on Quality Software., Dallas, United States.Lien
2013Fehmi Jaafar, Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Bram Adams.On the Relationship Between Program Evolution and Fault-proneness.European Conference on Software Maintenance and Reengineering., Genova, Italy.Lien
2013Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan.Leveraging Historical Co-Change Information for Requirements Traceability.The Working Conference on Reverse Engineering., Koblenz-Landau, Germany.Lien
2013Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh.Mining the Relationship Between Anti-patterns Dependencies and Fault-proneness.Working Conference on Reverse Engineering, Koblenz-Landau, Germany.Lien
2012Fehmi Jaafar.On the analysis of evolution of software artefacts and programs.The IEEE International Conference on Software Engineering.Lien
2011Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.An Exploratory Study of Macro Co-Changes.The Working Conference on Reverse Engineering, Ireland.Lien

Close Menu
fr_CAFrench
en_USEnglish fr_CAFrench