au.\*:("DEBBABI, Mourad")
Results 1 to 11 of 11
Selection :
Game semantics model for security protocolsDEBBABI, Mourad; SALEH, Mohamed.Lecture notes in computer science. 2005, pp 125-140, issn 0302-9743, isbn 3-540-29797-9, 1Vol, 16 p.Conference Paper
A systematic approach for detecting and clustering distributed cyber scanningBOU-HARB, Elias; DEBBABI, Mourad; ASSI, Chadi et al.Computer networks (1999). 2013, Vol 57, Num 18, pp 3826-3839, issn 1389-1286, 14 p.Article
A formal verification framework for SysML activity diagramsOUCHANI, Samir; OTMANE AÏT MOHAMED; DEBBABI, Mourad et al.Expert systems with applications. 2014, Vol 41, Num 6, pp 2713-2728, issn 0957-4174, 16 p.Article
Anonymity meets game theory: secure data integration with malicious participantsMOHAMMED, Noman; FUNG, Benjamin C. M; DEBBABI, Mourad et al.The VLDB journal. 2011, Vol 20, Num 4, pp 567-588, issn 1066-8888, 22 p.Article
On fingerprinting probing activitiesBOU-HARB, Elias; DEBBABI, Mourad; ASSI, Chadi et al.Computers & security. 2014, Vol 43, pp 35-48, issn 0167-4048, 14 p.Article
Towards a formal semantics for AspectJ weavingBELBLIDIA, Nadia; DEBBABI, Mourad.Lecture notes in computer science. 2006, pp 155-171, issn 0302-9743, isbn 3-540-40927-0, 1Vol, 17 p.Conference Paper
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité = New pointcuts and primitives for security hardening concernsMOURAD, Azzam; LAVERDIERE, Marc-André; SOEANU, Andrei et al.TSI. Technique et science informatiques. 2009, Vol 28, Num 5, pp 611-644, issn 0752-4072, 34 p.Article
A new logic for electronic commerce protocolsADI, Kamel; DEBBABI, Mourad; MEJRI, Mohamed et al.Theoretical computer science. 2003, Vol 291, Num 3, pp 223-283, issn 0304-3975, 61 p.Article
Game theoretic models for detecting network intrusionsOTROK, Hadi; MEHRANDISH, Mona; ASSI, Chadi et al.Computer communications. 2008, Vol 31, Num 10, pp 1934-1944, issn 0140-3664, 11 p.Article
Execution monitoring enforcement under memory-limitation constraintsTALHI, Chamseddine; TAWBI, Nadia; DEBBABI, Mourad et al.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 158-184, issn 0890-5401, 27 p.Conference Paper
A game-theoretic intrusion detection model for mobile ad hoc networksOTROK, Hadi; MOHAMMED, Noman; LINGYU WANG et al.Computer communications. 2008, Vol 31, Num 4, pp 708-721, issn 0140-3664, 14 p.Article