Publications

Articles de Journaux

AnAuteursTitreJournalURL Lien
2018Darine Ameyed, Moeiz Miraoui, Atef Zaguia, Fehmi Jaafar, and Chakib TadjUsing Probabilistic Temporal Logic PCTL and Model Checking for Context PredictionComputing and Informatics Journal
2017Fehmi Jaafar, Angela Lozano, Kim Mens, and Yann-Gaël Guéhéneuc.Analyzing Software Evolution and Quality by Extracting Asynchrony Change-patterns.Journal of Systems and Software Volume 131Lien
2017Mohammad Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Protecting internet users from becoming victimized attackers of click-fraud.Journal of Software : Evolution and Process.Lien
2016Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, and Mohammad ZulkernineEvaluating the Impact of Design Pattern and Anti-pattern Dependencies on Faults and Changes.Journal of Empirical Software Engineering.Lien
2014Angela Lozano, Fehmi Jaafar, Kim Mens, and Yann-Gaël Guéhéneuc.Clones and Macro Co-ChangesJournal of Electronic Communications of the European Association of Software Science and Technology.Lien
2014Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.Detecting Asynchrony and Dephase Change Patterns by Mining Software Repositories.Journal of Software : Evolution and Process.Lien
2013Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse KhomhAnalysing Anti-patterns Static Relationships with Design PatternsElectronic Communication of the European Association of Software Science and Technology, Volume 59Lien

Publications de la conférence

AnAuteursTitreInformations sur la conférenceURL Lien
2019Samip Dhakal, Fehmi Jaafar, and Pavol ZavarskyPrivate Blockchain Network for IoT Device Firmware Integrity Verification and UpdateASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, China
2019Tunde Akeem Yekini, Pavol Zavarsky, and Fehmi JafaarEtude de la confiance au niveau des appareils de l'architecture de l'Internet des objetsASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, China
2019Ranbir Singh Bali, Fehmi Jaafar and Pavol ZavaraskyAuthentification légère pour MQTT à l'aide d'un accord de clé individuelle et d'un code de chiffrement basés sur des sujetsThe International Conference on Cryptography, Security and Privacy (ICCSP 2019), Kuala Lumpur, Malaysia
2018Gagandeep Singh, Fehmi Jaafar, Pavol ZavarskyAn Analysis of Android Malware Behavior.International Workshop on Information Assurance, Lisbon, PortugalLien
2018Caesar Jude Clemente, Fehmi Jaafar, and Yasir Malik. Is Predicting Software Security Bugs using Deep Learning Better than the Traditional Machine Learning Algorithms?IEEE International Conference on Software Quality, Reliability, and Security, Lisbon, PortugalLien
2018Pooja Rajendra Prasad, Sergey Butakov, and Fehmi Jaafar.Information Security Considerations for Wireless Infusion Pumps.IEEE International Workshop on Safety and Security in Cyber-Physical Systems, Lisbon, Portugal.Lien
2018Gurjot Balraj Singh, Fehmi Jaafar, and Sergey ButakovAnalyse des frais généraux causés par les mécanismes de sécurité dans le cloud IaaSIEEE International Conference on Control, Decision and Information Technologies, CoDIT, Thessaloniki, GreeceLien
2018Jasmeen Kaur, Fehmi Jaafar, and Pavol Zavarsky.Experimental Analysis of Behavior of Crypto RansomwareThe Thirteenth International Conference on Systems, ICONS, Athens, GreeceLien
2018Mayank Jaiswal, Yasir Malik, and Fehmi JaafarAndroid Gaming Malware Detection Using System Call Behaviour AnalysisThe IEEE International Symposium on Digital Forensic and Security, ISDFS, Antalya, Turkey.Lien
2018Manjinder Singh, Sergey Butakov and Fehmi JaafarAnalyzing Overhead from Security and Administrative Functions in Virtual EnvironmentThe IEEE 2018 International Conference on Platform Technology and Service, PlatCon, South Koreahttps://ieeexplore.ieee.org/document/8472755
2018Gurpreet Kaur, Fehmi Jaafar and Yasir MalikDétection des attaques aveugles entre sites à l'aide du Machine LearningThe 2018 ACM International Conference on Signal Processing and Machine Learning, Shanghai, China
2017Maryam Davari, Mohammad Zulkernine, Fehmi JaafarAn Automatic Software Vulnerability Classification Framework2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USALien
2017Fehmi JaafarAn Integrated Architecture for IoT Fingerprinting.IEEE QRS Companion 2016. IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic.Lien
2017Harjot Kaur, Pavol Zavarsky, and Fehmi JaafarUnauthorized Data Leakage from an Organisation through Web Browser Fingerprinting Vulnerability.The IEEE World Congress on Internet Security, London, United KingdomLien
2017Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, and Kim Mens.On the Analysis of Co-Occurrence of Anti-Patterns and Clones.IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech RepublicLien
2016Fehmi Jaafar, Gabriela Nicolescu, and Christian Richard.A Systematic Approach For Privilege Escalation Prevention.IEEE International Conference on Software Quality, Reliability and Security, Companion, Vienna, Austria.Lien
2016Md Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Fighting Click-Fraud from User Side.IEEE High Assurance Systems Engineering Symposium., Orlando, United StatesLien
2015Darine Ameyed, Fehmi Jaafar, and Jaouhar Fattahi.A Slow Read attack Using Cloud.The International Conference on Electronics, Computers and Artificial Intelligence, Bucharest, Romania.Lien
2014Fehmi Jaafar,Foutse Khomh,Yann-Gaël GuéhéneucAnti-pattern Mutations and Fault-proneness.The 14th International Conference on Quality Software., Dallas, United StatesLien
2013Fehmi Jaafar, Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Bram Adams.On the Relationship Between Program Evolution and Fault-proneness.European Conference on Software Maintenance and Reengineering., Genova, ItalyLien
2013Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan.Leveraging Historical Co-Change Information for Requirements Traceability.The Working Conference on Reverse Engineering., Koblenz-Landau, GermanyLien
2013Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh.Mining the Relationship Between Anti-patterns Dependencies and Fault-proneness.Working Conference on Reverse Engineering, Koblenz-Landau, GermanyLien
2012Fehmi JaafarOn the analysis of evolution of software artefacts and programs.The IEEE International Conference on Software Engineering.Lien
2011Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.An Exploratory Study of Macro Co-Changes.The Working Conference on Reverse Engineering, IrelandLien
Close Menu
fr_CAFrench
en_USEnglish fr_CAFrench