Publications
Journal Articles
Year | Authors | Title | Journal | URL Link |
---|---|---|---|---|
2023 | Darine Ameyed, Fehmi Jaafar, Fabio Petrillo, Mohamed Cheriet | Quality and Security Frameworks for IoT-Architecture Models Evaluation | SN Computer Science | Link |
2022 | Amine Barrak, Fabio Petrillo, Fehmi Jaafar. | Serverless on Machine Learning: A systematic mapping study | IEEE | Link |
2022 | Fehmi Jaafar, Florent Avellaneda, Omer Nguena Timo, Mario Beaulieu, David Landry | Spot the hack: Intrusion detection systems for avionics networks using machine learning | Open Science | Link |
2021 | Sajid Habib Gill, Noor Ahmed Sheikh, Samina Rajpar, NZ Jhanjhi, Muneer Ahmad, Mirza Abdur Razzaq, Sultan S Alshamrani, Yasir Malik, Fehmi Jaafar. | Extended forgery detection framework for covid-19 medical data using convolutional neural network | Computers, Materials and Continua | Link |
2020 | Schallum Pierre, Fehmi Jaafar. | Médias sociaux: perspectives sur les défis liés à la cybersécurité, la gouvernementalité algorithmique et l'intelligence artificielle | Presses de l'Université Laval | Link |
2020 | Manel Grichi, Mouna Abidi, Fehmi Jaafar, Ellis E. Eghan, and Bram Adams. | On the Impact of Inter-language Dependencies in Multi-language Systems. | The IEEE Transactions on Reliability | Link |
2020 | Zeinab (Azadeh) Kermansaravi, Md. Saidur Rahman, Fehmi Jaafar, Foutse Khomh, and Yann-Gaël Guéhéneuc. | Investigating Design Patterns and Design Anti-pattern Mutations and their Change and Fault-proneness | The Empirical Software Engineering Journal | Link |
2018 | Darine Ameyed, Moeiz Miraoui, Atef Zaguia, Fehmi Jaafar, and Chakib Tadj. | Using Probabilistic Temporal Logic PCTL and Model Checking for Context Prediction | Computing and Informatics Journal | Link |
2017 | Fehmi Jaafar, Angela Lozano, Kim Mens, and Yann-Gaël Guéhéneuc. | Analyzing Software Evolution and Quality by Extracting Asynchrony Change-patterns. | Journal of Systems and Software | Link |
2017 | Mohammad Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu. | Protecting internet users from becoming victimized attackers of click-fraud. | Journal of Software : Evolution and Process. | Link |
2016 | Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, and Mohammad Zulkernine. | Evaluating the Impact of Design Pattern and Anti-pattern Dependencies on Faults and Changes. | Journal of Empirical Software Engineering. | Link |
2014 | Angela Lozano, Fehmi Jaafar, Kim Mens, and Yann-Gaël Guéhéneuc. | Clones and Macro Co-Changes | Journal of Electronic Communications of the European Association of Software Science and Technology. | Link |
2014 | Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel. | Detecting Asynchrony and Dephase Change Patterns by Mining Software Repositories. | Journal of Software : Evolution and Process. | Link |
The Conference Publications Table is too big for your Device. Please consider viewing the table on a device with a larger screen.
Conference Publications
Year | Authors | Title | Conference Information | URL Link |
---|---|---|---|---|
2023 | Fehmi Jaafar, Darine Amayed, Wissam Salhab, Hajer Bouani, Mohamed Cheriet | Blockchain-based consent management for privacy persevering and transparency in intelligent surveillance systems | 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA) | Link |
2023 | Amine Barrak, Ranim Trabelsi, Fehmi Jaafar, Fabio Petrillo | Exploring the impact of serverless computing on peer to peer training machine learning | 2023 IEEE International Conference on Cloud Engineering (IC2E) | Link |
2023 | Fehmi Jaafar, Darine Ameyed, Yasmine Bouzid, Abib Sy | On Securing Communications Between Connected Objects Using a Data-Centric Security Approach | 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) | Link |
2023 | Abubakr Ibrahim, Mohamed Mejri, Fehmi Jaafar | An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection | 2023 IEEE International Conference on Cyber Security and Resilience (CSR) | Link |
2023 | Amine Barrak, Mayssa Jaziri, Ranim Trabelsi, Fehmi Jaafar, Fabio Petrillo | SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training Architecture | 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security (QRS) | Link |
2022 | Hugo Bourreau, Emeric Guichet, Amine Barrak, Benoît Simon, Fehmi Jaafar. | On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography | 2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C) | Link |
2022 | Fehmi Jaafar, Yasir Malik, Johan Serre, Haoyu Wang, Tianqi Wang. | Lightweight Intrusion Detection in MQTT Based Sensor Network | 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) | Link |
2022 | Pratibha Singh, Hamman Samuel, Fehmi Jaafar, Darine Ameyed. | Enhancing Biometric Security with Combinatorial and Permutational Multi-Fingerprint Authentication Strategies | 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) | Link |
2021 | Darine Ameyed, Fehmi Jaafar, Francis Charette-Migneault, Mohamed Cheriet | Blockchain based model for consent management and data transparency assurance | 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C) | |
2020 | Fehmi Jaafar, Florent Avellaneda, and El-Hackemi Alikacem. | Demystifying the Cyber Attribution: An Exploratory Study | The IEEE Cyber Science and Technology Congress (CyberSciTech) | Link |
2020 | Fehmi Jaafar, Florent Avellaneda, El-Hackemi Alikacem | Demystifying the cyber attribution: An exploratory study | IEEE | Link |
2020 | Marcela G Dos Santos, Bianca M Napoleão, Fabio Petrillo, Darine Ameyed, Fehmi Jaafar | A preliminary systematic mapping on software engineering for robotic systems: A software quality perspective | IEEE | Link |
2020 | Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, Neelam Memon | Behavioral Study of Malware Affecting Financial Institutions and Clients | IEEE | Link |
2020 | Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, and Neelam Memon. | Behavioral Study of Malware Affecting Financial Institutions and Clients | The IEEE Cyber Science and Technology Congress (CyberSciTech) | Link |
2020 | Marcela dos Santos, Bianca Napoleao, Fabio Petrillo, Darine Ameyed and Fehmi Jaafar. | A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality Perspective | The 2nd International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2020) | Link |
2020 | Adegoke Babajide Seyi, Fehmi Jaafar and Ron Ruhl. | Securing the Authentication Process of LTE Base Stations | IEEE International Conference on Electrical, Communication and Computer Engineering | Link |
2020 | Walter Isharufe, Fehmi Jaafar, and Sergey Butakov. | Study of Security Issues in Platform -as a- Service (PaaS) Cloud Model | IEEE International Conference on Electrical, Communication and Computer Engineering | Link |
2019 | Carlos Renato Salim Campos, Fehmi Jaafar, and Yasir Malik. | Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis | IEEE International Workshop on Data-driven System Quality Assurance, QRS Companion 2019 | Link |
2019 | Anis Kothia, Bobby Swar, and Fehmi Jaafar. | Knowledge Extraction and Integration for Information Gathering in Penetration Testing | IEEE International Workshop on Software Engineering and Knowledge Management, QRS Companion 2019 | Link |
2019 | Naiji Zhang, Fehmi Jaafar, and Yasir Malik. | Low-Rate DoS Attack Detection Using PSD based Entropy and Machine Learning | The 6th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2019) | Link |
2019 | Florent Avellaneda, El-Hachemi Alikacem, and Fehmi Jaafar. | Using Attack Pattern for Cyber Attack Attribution | IEEE International Conference on Cybersecurity 2019 (ICoC2019) | Link |
2019 | Fehmi Jaafar, Asmaa Tellabi, Sabri Abdelbast, and Christoph Ruland. | On the Analysis of the Impact of Scheduling Plans in Safety Critical Requirements in Virtualization | IEEE International Conference on Cybersecurity 2019 (ICoC2019) | Link |
2019 | Samip Dhakal, Fehmi Jaafar, and Pavol Zavarsky. | Private Blockchain Network for IoT Device Firmware Integrity Verification and Update | HASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, China | Link |
2019 | Tunde Akeem Yekini, Pavol Zavarsky, and Fehmi Jafaar. | Study of Trust at Device Level of the Internet of Things Architecture | HASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, China | Link |
2019 | Ranbir Singh Bali, Fehmi Jaafar, and Pavol Zavarasky. | Lightweight Authentication for MQTT by using Topic-Based Self Key Agreement and Block Cipher | The International Conference on Cryptography, Security and Privacy (ICCSP 2019), Kuala Lumpur, Malaysia | Link |
2018 | Gagandeep Singh, Fehmi Jaafar, and Pavol Zavarsky. | An Analysis of Android Malware Behavior. | International Workshop on Information Assurance, Lisbon, Portugal | Link |
2018 | Caesar Jude Clemente, Fehmi Jaafar, and Yasir Malik. | Is Predicting Software Security Bugs using Deep Learning Better than the Traditional Machine Learning Algorithms? | IEEE International Conference on Software Quality, Reliability, and Security, Lisbon, Portugal | Link |
2018 | Pooja Rajendra Prasad, Sergey Butakov, and Fehmi Jaafar. | Information Security Considerations for Wireless Infusion Pumps. | IEEE International Workshop on Safety and Security in Cyber-Physical Systems, Lisbon, Portugal. | Link |
2018 | Gurjot Balraj Singh, Fehmi Jaafar, and Sergey Butakov. | Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud | IEEE International Conference on Control, Decision and Information Technologies, CoDIT, Thessaloniki, Greece | Link |
2018 | Jasmeen Kaur, Fehmi Jaafar, and Pavol Zavarsky. | Experimental Analysis of Behavior of Crypto Ransomware | The Thirteenth International Conference on Systems, ICONS, Athens, Greece | Link |
2018 | Mayank Jaiswal, Yasir Malik, and Fehmi Jaafar. | Android Gaming Malware Detection Using System Call Behaviour Analysis | The IEEE International Symposium on Digital Forensic and Security, ISDFS, Antalya, Turkey. | Link |
2018 | Manjinder Singh, Sergey Butakov, and Fehmi Jaafar. | Analyzing Overhead from Security and Administrative Functions in Virtual Environment | The IEEE 2018 International Conference on Platform Technology and Service, PlatCon, South Korea | Link |
2018 | Gurpreet Kaur, Fehmi Jaafar, and Yasir Malik. | Detecting Blind Cross-Site Attacks Using Machine Learning | The 2018 ACM International Conference on Signal Processing and Machine Learning, Shanghai, China | Link |
2017 | Maryam Davari, Mohammad Zulkernine, ans Fehmi Jaafar. | An Automatic Software Vulnerability Classification Framework | 2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USA | Link |
2017 | Fehmi Jaafar. | An Integrated Architecture for IoT Fingerprinting. | IEEE QRS Companion 2016. IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic. | Link |
2017 | Harjot Kaur, Pavol Zavarsky, and Fehmi Jaafar. | Unauthorized Data Leakage from an Organisation through Web Browser Fingerprinting Vulnerability. | The IEEE World Congress on Internet Security, London, United Kingdom | Link |
2017 | Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, and Kim Mens. | On the Analysis of Co-Occurrence of Anti-Patterns and Clones. | IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic | Link |
2016 | Fehmi Jaafar, Gabriela Nicolescu, and Christian Richard. | A Systematic Approach For Privilege Escalation Prevention. | IEEE International Conference on Software Quality, Reliability and Security, Companion, Vienna, Austria. | Link |
2016 | Md Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu. | Fighting Click-Fraud from User Side. | IEEE High Assurance Systems Engineering Symposium., Orlando, United States | Link |
2015 | Darine Ameyed, Fehmi Jaafar, and Jaouhar Fattahi. | A Slow Read attack Using Cloud. | The International Conference on Electronics, Computers and Artificial Intelligence, Bucharest, Romania. | Link |
2014 | Fehmi Jaafar,Foutse Khomh, and Yann-Gaël Guéhéneuc. | Anti-pattern Mutations and Fault-proneness. | The 14th International Conference on Quality Software., Dallas, United States | Link |
2013 | Fehmi Jaafar, Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Bram Adams. | On the Relationship Between Program Evolution and Fault-proneness. | European Conference on Software Maintenance and Reengineering., Genova, Italy | Link |
2013 | Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan. | Leveraging Historical Co-Change Information for Requirements Traceability. | The Working Conference on Reverse Engineering., Koblenz-Landau, Germany | Link |
2013 | Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh. | Mining the Relationship Between Anti-patterns Dependencies and Fault-proneness. | Working Conference on Reverse Engineering, Koblenz-Landau, Germany | Link |
2012 | Fehmi Jaafar. | On the analysis of evolution of software artefacts and programs. | The IEEE International Conference on Software Engineering. | Link |
2011 | Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel. | An Exploratory Study of Macro Co-Changes. | The Working Conference on Reverse Engineering, Ireland | Link> |
Books
Year | Authors | Title | Co-Editor | URL Link |
---|---|---|---|---|
2023 | Laurent Adatto, Fehmi Jaafar, Schallum Pierre | L’Intelligence Artificielle et les Technologies Quantiques au regard de la Cybersécurité-Introduction | Technologie et innovation | Link |
2023 | Schallum Pierre and Fehmi Jaafar | Blockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and IoTs. | Accepted, CRC Press | Taylor & Francis Group, Boca Raton, Florida, United States of America | Link |
2021 | Schallum Pierre And Fehmi Jaafar | Social Network and Cyber Security | Published, Laval University Press, Quebec, Canada | Link |
Book Chapter
Year | Authors | Title | Co-Editor | URL Link |
---|---|---|---|---|
2024 | Manel Grichi, Fehmi Jaafar | Demystifying the Digital Identity Challenges and the Blockchain Role | CRC Press | Link |
2023 | Darine Ameyed, Fehmi Jaafar, Riadh ben Chaabene, Mohamed Cheriet | Federated Learning and Blockchain: An Opportunity for Artificial Intelligence with Data Regulation | AI, Machine Learning and Deep Learning: A Security Perspective | Link |
2023 | Darine Amayed, Fehmi Jaafar, Riadh Ben Chaabene, Mohamed Cheriet | Security and corporate violation to privacy in the internet of things age | CRC Press | |
2023 | Darine Ameyed, Fehmi Jaafar, Riadh ben Chaabene and Mohamed Cheriet | Security and Corporate Violation to Privacy in The Internet Of Things Age. Blockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and IoTs | CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America | |
2023 | Manel Grichi and Fehmi Jaafar | Blockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and IoTs | CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America | |
2023 | Darine Amayed, Fehmi Jaafar, Riadh Ben Chaabene, and Mohamed Cheriet | Demystifying the Digital Identity Challenges and the Blockchain Role. Blockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and IoTs | CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America | |
2021 | Fehmi Jaafar and Jean Decian | Cyber Attacks Against Social Network: Lessons Learned. Social Network and Cyber Security | ||
2020 | Kolade Folayemi Awe, Yasir Malik, Pavol Zavarsky, and Fehmi Jaafar | Validating BGP Update Using Blockchain-Based Infrastructure | Springer Publishing, New York, United States of America |