Publications

Journal Articles

YearAuthorsTitleJournalURL Link
2023Darine Ameyed, Fehmi Jaafar, Fabio Petrillo, Mohamed CherietQuality and Security Frameworks for IoT-Architecture Models EvaluationSN Computer ScienceLink
2023Darine Ameyed, Fehmi Jaafar, Riadh ben Chaabene, Mohamed CherietFederated Learning and Blockchain: An Opportunity for Artificial Intelligence with Data RegulationAI, Machine Learning and Deep Learning: A Security PerspectiveLink
2023Amine Barrak, Fabio Petrillo, Fehmi JaafarArchitecting Peer-to-Peer Serverless Distributed Machine Learning Training for Improved Fault TolerancearXiv preprint arXiv:2302.13995Link
2023Laurent Adatto, Fehmi Jaafar, Schallum PierreL’Intelligence Artificielle et les Technologies Quantiques au regard de la Cybersécurité-IntroductionTechnologie et innovationLink
2022Amine Barrak, Fabio Petrillo, Fehmi Jaafar.Serverless on Machine Learning: A systematic mapping studyIEEELink
2022Fehmi Jaafar, Florent Avellaneda, Omer Nguena Timo, Mario Beaulieu, David LandrySpot the hack: Intrusion detection systems for avionics networks using machine learningOpen ScienceLink
2021Sajid Habib Gill, Noor Ahmed Sheikh, Samina Rajpar, NZ Jhanjhi, Muneer Ahmad, Mirza Abdur Razzaq, Sultan S Alshamrani, Yasir Malik, Fehmi Jaafar.Extended forgery detection framework for covid-19 medical data using convolutional neural networkComputers, Materials and ContinuaLink
2020Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, Neelam MemonBehavioral Study of Malware Affecting Financial Institutions and ClientsIEEELink
2020Fehmi Jaafar, Florent Avellaneda, El-Hackemi AlikacemDemystifying the cyber attribution: An exploratory studyIEEELink
2020Marcela G Dos Santos, Bianca M Napoleão, Fabio Petrillo, Darine Ameyed, Fehmi JaafarA preliminary systematic mapping on software engineering for robotic systems: A software quality perspectiveIEEELink
2020Marcela G dos Santos1a, Darine Ameyed2b, Fabio Petrillo1c, Fehmi Jaafar3d, Mohamed Cheriet2eInternet of things architectures: A comparative studyResearch GateLink
2020Schallum Pierre, Fehmi Jaafar.Médias sociaux: perspectives sur les défis liés à la cybersécurité, la gouvernementalité algorithmique et l'intelligence artificiellePresses de l'Université LavalLink
2020Manel Grichi, Mouna Abidi, Fehmi Jaafar, Ellis E. Eghan, and Bram Adams.On the Impact of Inter-language Dependencies in Multi-language Systems.The IEEE Transactions on ReliabilityLink
2020Zeinab (Azadeh) Kermansaravi, Md. Saidur Rahman, Fehmi Jaafar, Foutse Khomh, and Yann-Gaël Guéhéneuc.Investigating Design Patterns and Design Anti-pattern Mutations and their Change and Fault-pronenessThe Empirical Software Engineering JournalLink
2018Darine Ameyed, Moeiz Miraoui, Atef Zaguia, Fehmi Jaafar, and Chakib Tadj.Using Probabilistic Temporal Logic PCTL and Model Checking for Context PredictionComputing and Informatics JournalLink
2017Fehmi Jaafar, Angela Lozano, Kim Mens, and Yann-Gaël Guéhéneuc.Analyzing Software Evolution and Quality by Extracting Asynchrony Change-patterns.Journal of Systems and SoftwareLink
2017Mohammad Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Protecting internet users from becoming victimized attackers of click-fraud.Journal of Software : Evolution and Process.Link
2016Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, and Mohammad Zulkernine.Evaluating the Impact of Design Pattern and Anti-pattern Dependencies on Faults and Changes.Journal of Empirical Software Engineering.Link
2014Angela Lozano, Fehmi Jaafar, Kim Mens, and Yann-Gaël Guéhéneuc.Clones and Macro Co-ChangesJournal of Electronic Communications of the European Association of Software Science and Technology.Link
2014Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.Detecting Asynchrony and Dephase Change Patterns by Mining Software Repositories.Journal of Software : Evolution and Process.Link
2013Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh.Analysing Anti-patterns Static Relationships with Design PatternsJournal of Electronic Communication of the European Association of Software Science and Technology.Link

Conference Publications

YearAuthorsTitleConference InformationURL Link
2023Fehmi Jaafar, Darine Ameyed, Yasmine Bouzid, Abib SyOn Securing Communications Between Connected Objects Using a Data-Centric Security Approach2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)Link
2023Abubakr Ibrahim, Mohamed Mejri, Fehmi JaafarAn Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection2023 IEEE International Conference on Cyber Security and Resilience (CSR)Link
2023
Amine Barrak, Mayssa Jaziri, Ranim Trabelsi, Fehmi Jaafar, Fabio Petrillo
SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training Architecture2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security (QRS)Link
2022Hugo Bourreau, Emeric Guichet, Amine Barrak, Benoît Simon, Fehmi Jaafar.On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)Link
2022Fehmi Jaafar, Yasir Malik, Johan Serre, Haoyu Wang, Tianqi Wang.Lightweight Intrusion Detection in MQTT Based Sensor Network2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)Link
2022Pratibha Singh, Hamman Samuel, Fehmi Jaafar, Darine Ameyed.Enhancing Biometric Security with Combinatorial and Permutational Multi-Fingerprint Authentication Strategies2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)Link
2021Darine Ameyed, Fehmi Jaafar, Francis Charette-Migneault, Mohamed CherietBlockchain based model for consent management and data transparency assurance2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C)
2020Fehmi Jaafar, Florent Avellaneda, and El-Hackemi Alikacem.Demystifying the Cyber Attribution: An Exploratory StudyThe IEEE Cyber Science and Technology Congress (CyberSciTech)Link
2020Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, and Neelam Memon.Behavioral Study of Malware Affecting Financial Institutions and ClientsThe IEEE Cyber Science and Technology Congress (CyberSciTech)Link
2020Marcela dos Santos, Bianca Napoleao, Fabio Petrillo, Darine Ameyed and Fehmi Jaafar.A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality PerspectiveThe 2nd International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2020)Link
2020Adegoke Babajide Seyi, Fehmi Jaafar and Ron Ruhl.Securing the Authentication Process of LTE Base StationsIEEE International Conference on Electrical, Communication and Computer EngineeringLink
2020Walter Isharufe, Fehmi Jaafar, and Sergey Butakov.Study of Security Issues in Platform -as a- Service (PaaS) Cloud ModelIEEE International Conference on Electrical, Communication and Computer EngineeringLink
2019Carlos Renato Salim Campos, Fehmi Jaafar, and Yasir Malik.Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis IEEE International Workshop on Data-driven System Quality Assurance, QRS Companion 2019Link
2019Anis Kothia, Bobby Swar, and Fehmi Jaafar.Knowledge Extraction and Integration for Information Gathering in Penetration Testing IEEE International Workshop on Software Engineering and Knowledge Management, QRS Companion 2019Link
2019Naiji Zhang, Fehmi Jaafar, and Yasir Malik.Low-Rate DoS Attack Detection Using PSD based Entropy and Machine LearningThe 6th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2019)Link
2019Florent Avellaneda, El-Hachemi Alikacem, and Fehmi Jaafar.Using Attack Pattern for Cyber Attack AttributionIEEE International Conference on Cybersecurity 2019 (ICoC2019)Link
2019Fehmi Jaafar, Asmaa Tellabi, Sabri Abdelbast, and Christoph Ruland. On the Analysis of the Impact of Scheduling Plans in Safety Critical Requirements in Virtualization IEEE International Conference on Cybersecurity 2019 (ICoC2019)Link
2019Samip Dhakal, Fehmi Jaafar, and Pavol Zavarsky.Private Blockchain Network for IoT Device Firmware Integrity Verification and UpdateHASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, ChinaLink
2019Tunde Akeem Yekini, Pavol Zavarsky, and Fehmi Jafaar.Study of Trust at Device Level of the Internet of Things ArchitectureHASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, ChinaLink
2019Ranbir Singh Bali, Fehmi Jaafar, and Pavol Zavarasky.Lightweight Authentication for MQTT by using Topic-Based Self Key Agreement and Block CipherThe International Conference on Cryptography, Security and Privacy (ICCSP 2019), Kuala Lumpur, MalaysiaLink
2018Gagandeep Singh, Fehmi Jaafar, and Pavol Zavarsky.An Analysis of Android Malware Behavior.International Workshop on Information Assurance, Lisbon, PortugalLink
2018Caesar Jude Clemente, Fehmi Jaafar, and Yasir Malik. Is Predicting Software Security Bugs using Deep Learning Better than the Traditional Machine Learning Algorithms?IEEE International Conference on Software Quality, Reliability, and Security, Lisbon, PortugalLink
2018Pooja Rajendra Prasad, Sergey Butakov, and Fehmi Jaafar.Information Security Considerations for Wireless Infusion Pumps.IEEE International Workshop on Safety and Security in Cyber-Physical Systems, Lisbon, Portugal.Link
2018Gurjot Balraj Singh, Fehmi Jaafar, and Sergey Butakov.Analysis of Overhead Caused by Security Mechanisms in IaaS CloudIEEE International Conference on Control, Decision and Information Technologies, CoDIT, Thessaloniki, GreeceLink
2018Jasmeen Kaur, Fehmi Jaafar, and Pavol Zavarsky.Experimental Analysis of Behavior of Crypto RansomwareThe Thirteenth International Conference on Systems, ICONS, Athens, GreeceLink
2018Mayank Jaiswal, Yasir Malik, and Fehmi Jaafar.Android Gaming Malware Detection Using System Call Behaviour AnalysisThe IEEE International Symposium on Digital Forensic and Security, ISDFS, Antalya, Turkey.Link
2018Manjinder Singh, Sergey Butakov, and Fehmi Jaafar.Analyzing Overhead from Security and Administrative Functions in Virtual EnvironmentThe IEEE 2018 International Conference on Platform Technology and Service, PlatCon, South KoreaLink
2018Gurpreet Kaur, Fehmi Jaafar, and Yasir Malik.Detecting Blind Cross-Site Attacks Using Machine LearningThe 2018 ACM International Conference on Signal Processing and Machine Learning, Shanghai, ChinaLink
2017Maryam Davari, Mohammad Zulkernine, ans Fehmi Jaafar.An Automatic Software Vulnerability Classification Framework2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USALink
2017Fehmi Jaafar.An Integrated Architecture for IoT Fingerprinting.IEEE QRS Companion 2016. IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic.Link
2017Harjot Kaur, Pavol Zavarsky, and Fehmi Jaafar.Unauthorized Data Leakage from an Organisation through Web Browser Fingerprinting Vulnerability.The IEEE World Congress on Internet Security, London, United KingdomLink
2017Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, and Kim Mens.On the Analysis of Co-Occurrence of Anti-Patterns and Clones.IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech RepublicLink
2016Fehmi Jaafar, Gabriela Nicolescu, and Christian Richard.A Systematic Approach For Privilege Escalation Prevention.IEEE International Conference on Software Quality, Reliability and Security, Companion, Vienna, Austria.Link
2016Md Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Fighting Click-Fraud from User Side.IEEE High Assurance Systems Engineering Symposium., Orlando, United StatesLink
2015Darine Ameyed, Fehmi Jaafar, and Jaouhar Fattahi.A Slow Read attack Using Cloud.The International Conference on Electronics, Computers and Artificial Intelligence, Bucharest, Romania.Link
2014Fehmi Jaafar,Foutse Khomh, and Yann-Gaël Guéhéneuc.Anti-pattern Mutations and Fault-proneness.The 14th International Conference on Quality Software., Dallas, United StatesLink
2013Fehmi Jaafar, Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Bram Adams.On the Relationship Between Program Evolution and Fault-proneness.European Conference on Software Maintenance and Reengineering., Genova, ItalyLink
2013Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan.Leveraging Historical Co-Change Information for Requirements Traceability.The Working Conference on Reverse Engineering., Koblenz-Landau, GermanyLink
2013Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh.Mining the Relationship Between Anti-patterns Dependencies and Fault-proneness.Working Conference on Reverse Engineering, Koblenz-Landau, GermanyLink
2012Fehmi Jaafar.On the analysis of evolution of software artefacts and programs.The IEEE International Conference on Software Engineering.Link
2011Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.An Exploratory Study of Macro Co-Changes.The Working Conference on Reverse Engineering, IrelandLink

Books

YearAuthorsTitleCo-EditorURL Link
2023Fehmi Jaafar and Schallum PierreBlockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and IoTs.Accepted, CRC Press | Taylor & Francis Group, Boca Raton, Florida, United States of AmericaLink
2021Fehmi Jaafar and Schallum PierreSocial Network and Cyber SecurityPublished, Laval University Press, Quebec, CanadaLink

Book Chapter

YearAuthorsTitleCo-EditorURL Link
2024Manel Grichi, Fehmi JaafarDemystifying the Digital Identity Challenges and the Blockchain RoleCRC Press
2023Darine Amayed, Fehmi Jaafar, Riadh Ben Chaabene, Mohamed CherietSecurity and corporate violation to privacy in the internet of things ageCRC Press
2023Darine Ameyed, Fehmi Jaafar, Riadh ben Chaabene and Mohamed CherietSecurity and
Corporate Violation to Privacy in The Internet Of Things Age. Blockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and IoTs
CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America
2023Manel Grichi and Fehmi JaafarBlockchain and Artificial Intelligence
Based Solution to Enhance the Privacy in Digital Identity and IoTs
CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America
2023Darine Amayed, Fehmi Jaafar, Riadh Ben Chaabene, and Mohamed CherietDemystifying the Digital Identity Challenges and the Blockchain
Role. Blockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and
IoTs
CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America
2021 Fehmi Jaafar and Jean DecianCyber Attacks Against Social Network: Lessons Learned. Social
Network and Cyber Security
2020Kolade Folayemi Awe, Yasir Malik, Pavol Zavarsky, and Fehmi JaafarValidating BGP Update
Using Blockchain-Based Infrastructure
Springer Publishing, New York, United States of America