2020 | Fehmi Jaafar, Florent Avellaneda, and El-Hackemi Alikacem. | Demystifying the Cyber Attribution: An Exploratory Study | The IEEE Cyber Science and Technology Congress (CyberSciTech) | Lien |
2020 | Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, and Neelam Memon. | Behavioral Study of Malware Affecting Financial Institutions and Clients | The IEEE Cyber Science and Technology Congress (CyberSciTech) | Lien |
2020 | Marcela dos Santos, Bianca Napoleao, Fabio Petrillo, Darine Ameyed and Fehmi Jaafar. | A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality Perspective | The 2nd International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2020) | Lien |
2020 | Adegoke Babajide Seyi, Fehmi Jaafar and Ron Ruhl. | Securing the Authentication Process of LTE Base Stations | IEEE International Conference on Electrical, Communication and Computer Engineering | Lien |
2020 | Walter Isharufe, Fehmi Jaafar, and Sergey Butakov. | Study of Security Issues in Platform -as a- Service (PaaS) Cloud Model | IEEE International Conference on Electrical, Communication and Computer Engineering | Lien |
2019 | Carlos Renato Salim Campos, Fehmi Jaafar, and Yasir Malik. | Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis | IEEE International Workshop on Data-driven System Quality Assurance, QRS Companion 2019 | Lien |
2019 | Anis Kothia, Bobby Swar, and Fehmi Jaafar. | Knowledge Extraction and Integration for Information Gathering in Penetration Testing | IEEE International Workshop on Software Engineering and Knowledge Management, QRS Companion 2019 | Lien |
2019 | Naiji Zhang, Fehmi Jaafar, and Yasir Malik. | Low-Rate DoS Attack Detection Using PSD based Entropy and Machine Learning | The 6th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2019) | Lien |
2019 | Florent Avellaneda, El-Hachemi Alikacem, and Fehmi Jaafar. | Using Attack Pattern for Cyber Attack Attribution | IEEE International Conference on Cybersecurity 2019 (ICoC2019) | Lien |
2019 | Fehmi Jaafar, Asmaa Tellabi, Sabri Abdelbast, and Christoph Ruland. | On the Analysis of the Impact of Scheduling Plans in Safety Critical Requirements in Virtualization | IEEE International Conference on Cybersecurity 2019 (ICoC2019) | Lien |
2019 | Samip Dhakal, Fehmi Jaafar, and Pavol Zavarsky. | Private Blockchain Network for IoT Device Firmware Integrity Verification and Update. | HASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, China | Lien |
2019 | Tunde Akeem Yekini, Pavol Zavarsky, and Fehmi Jafaar. | Study of Trust at Device Level of the Internet of Things Architecture. | HASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, China | Lien |
2019 | Ranbir Singh Bali, Fehmi Jaafar, and Pavol Zavarasky. | Lightweight Authentication for MQTT by using Topic-Based Self Key Agreement and Block Cipher. | The International Conference on Cryptography, Security and Privacy (ICCSP 2019), Kuala Lumpur, Malaysia. | Lien |
2018 | Gagandeep Singh, Fehmi Jaafar, and Pavol Zavarsky. | An Analysis of Android Malware Behavior. | International Workshop on Information Assurance, Lisbon, Portugal. | Lien |
2018 | Caesar Jude Clemente, Fehmi Jaafar, and Yasir Malik. | Is Predicting Software Security Bugs using Deep Learning Better than the Traditional Machine Learning Algorithms? | IEEE International Conference on Software Quality, Reliability, and Security, Lisbon, Portugal. | Lien |
2018 | Pooja Rajendra Prasad, Sergey Butakov, and Fehmi Jaafar. | Information Security Considerations for Wireless Infusion Pumps. | IEEE International Workshop on Safety and Security in Cyber-Physical Systems, Lisbon, Portugal. | Lien |
2018 | Gurjot Balraj Singh, Fehmi Jaafar, and Sergey Butakov. | Analyse des frais causés par les mécanismes de sécurité dans IaaS Cloud. | IEEE International Conference on Control, Decision and Information Technologies, CoDIT, Thessaloniki, Greece. | Lien |
2018 | Jasmeen Kaur, Fehmi Jaafar, and Pavol Zavarsky. | Experimental Analysis of Behavior of Crypto Ransomware. | The Thirteenth International Conference on Systems, ICONS, Athens, Greece. | Lien |
2018 | Mayank Jaiswal, Yasir Malik, and Fehmi Jaafar. | Android Gaming Malware Detection Using System Call Behaviour Analysis. | The IEEE International Symposium on Digital Forensic and Security, ISDFS, Antalya, Turkey. | Lien |
2018 | Manjinder Singh, Sergey Butakov, and Fehmi Jaafar. | Analyzing Overhead from Security and Administrative Functions in Virtual Environment. | The IEEE 2018 International Conference on Platform Technology and Service, PlatCon, South Korea. | Lien |
2018 | Gurpreet Kaur, Fehmi Jaafar, and Yasir Malik. | Detecting Blind Cross-Site Attacks Using Machine Learning. | The 2018 ACM International Conference on Signal Processing and Machine Learning, Shanghai, China. | Lien |
2017 | Maryam Davari, Mohammad Zulkernine, ans Fehmi Jaafar. | An Automatic Software Vulnerability Classification Framework. | 2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USA. | Lien |
2017 | Fehmi Jaafar. | An Integrated Architecture for IoT Fingerprinting. | IEEE QRS Companion 2016. IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic. | Lien |
2017 | Harjot Kaur, Pavol Zavarsky, and Fehmi Jaafar. | Unauthorized Data Leakage from an Organisation through Web Browser Fingerprinting Vulnerability. | The IEEE World Congress on Internet Security, London, United Kingdom. | Lien |
2017 | Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, and Kim Mens. | On the Analysis of Co-Occurrence of Anti-Patterns and Clones. | IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic. | Lien |
2016 | Fehmi Jaafar, Gabriela Nicolescu, and Christian Richard. | A Systematic Approach For Privilege Escalation Prevention. | IEEE International Conference on Software Quality, Reliability and Security, Companion, Vienna, Austria. | Lien |
2016 | Md Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu. | Fighting Click-Fraud from User Side. | IEEE High Assurance Systems Engineering Symposium., Orlando, United States. | Lien |
2015 | Darine Ameyed, Fehmi Jaafar, and Jaouhar Fattahi. | A Slow Read attack Using Cloud. | The International Conference on Electronics, Computers and Artificial Intelligence, Bucharest, Romania. | Lien |
2014 | Fehmi Jaafar,Foutse Khomh, and Yann-Gaël Guéhéneuc. | Anti-pattern Mutations and Fault-proneness. | The 14th International Conference on Quality Software., Dallas, United States. | Lien |
2013 | Fehmi Jaafar, Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Bram Adams. | On the Relationship Between Program Evolution and Fault-proneness. | European Conference on Software Maintenance and Reengineering., Genova, Italy. | Lien |
2013 | Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan. | Leveraging Historical Co-Change Information for Requirements Traceability. | The Working Conference on Reverse Engineering., Koblenz-Landau, Germany. | Lien |
2013 | Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh. | Mining the Relationship Between Anti-patterns Dependencies and Fault-proneness. | Working Conference on Reverse Engineering, Koblenz-Landau, Germany. | Lien |
2012 | Fehmi Jaafar. | On the analysis of evolution of software artefacts and programs. | The IEEE International Conference on Software Engineering. | Lien |
2011 | Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel. | An Exploratory Study of Macro Co-Changes. | The Working Conference on Reverse Engineering, Ireland. | Lien> |