.

Browsing SoAS - Scholarly Publications by Author "Mourad, Azzam"

LAUR Repository

Browsing SoAS - Scholarly Publications by Author "Mourad, Azzam"

Sort by: Order: Results:

  • Debbabi, Mourad; Mourad, Azzam; Talhi, Chamseddine; Yahyaoui, Hamdi (2015-09-15)
    With the proliferation of wireless devices, networks, and systems, the deployment of efficient embedded Java virtual machines is becoming a challenging and important research area. Accordingly, a plethora of acceleration ...
  • Maamar, Zakaria; Yahyaoui, Hamdi; Mourad, Azzam; Sellami, Mohamed (IEEE, 2017-03-10)
    This paper looks into ways of supporting social Web services react to the behaviors that their peers expose at run time. Examples of behaviors include selfishness and unfairness. These reactions are associated with actions ...
  • Abualola, Huda; Alhawai, Hessa; Kadadha, Maha; Otrok, Hadi; Mourad, Azzam (2017-03-14)
    Security attacks continue to emerge on daily basis due to the fast growth in the number of smart devices and mobile applications. Attacks take different malware forms such as Spyware and Trojan exploiting different operating ...
  • Debbabi, Mourad; Mourad, Azzam; Tawbi, Nadia (ACM, 2017-03-08)
    This paper presents a new selective dynamic compilation technique targeting ARM 16/32-bit embedded system processors. This compiler is built inside the J2ME/CLDC (Java 2 Micro Edition for Connected Limited Device Configuration) ...
  • Mouheb, Djedjiga; Talhi, Chamseddine; Mourad, Azzam; Lima, Victor; Debbabi, Mourad; Wang, Lingyu; Pourzandi, Makan (2018-08-17)
    Security is a very challenging task in software engineering. Enforcing security policies should be taken care of during the early phases of the software development life cycle to prevent security breaches in the final ...
  • Mourad, Azzam; Laverdiere, Marc-André; Debbabi, Mourad (2016-05-19)
    In this paper, we present an aspect-oriented approach for the systematic security hardening of source code. It aims at allowing developers to perform software security hardening by providing an abstraction over the actions ...
  • Haraty, Ramzi A.; Naous, Mirna F.; Mourad, Azzam (2015-11-24)
    Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. Ordinary users ...
  • Al Ebri, Noura; Otrok, Hadi; Mourad, Azzam; Al-Hammadi, Yousof (IEEE, 2017-03-10)
    In this paper, we address the problem of botnet detection by correlating information from trusted hosts and network. Botnets are groups of compromised computers controlled by a botmaster through a command and control (C&C) ...
  • CEAP 
    Abdel Wahab, Omar; Mourad, Azzam; Otrok, Hadi; Bentahar, Jamal (2017-02-06)
    The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. Detecting such attacks has attracted several contributions in the past ...
  • Otrok, Hadi; Mourad, Azzam; Robert, Jean-Marc; Moati, Nadia; Sanadiki, Hiba (IEEE, 2017-03-09)
    The QOLSR is a multimedia protocol that was designed on top of the Optimized Link State Routing (OLSR) protocol. It considers the Quality of Service (QoS) of the nodes during the selection of the Multi-Point Relay (MPRs) ...
  • Alhadidi, Dima; Mourad, Azzam; Kaitouni, Hakim Idrissi; Debbabi, Mourad (2015-11-24)
    In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security ...
  • El Khatib, Amjad; Mourad, Azzam; Otrok, Hadi; Abdel Wahab, Omar; Bentahar, Jamal (IEEE, 2017-03-09)
    In this paper, we address the problem of detecting misbehaving vehicles in Vehicular Ad-Hoc Network using VANET QoS-OLSR, Quality of Service-Optimized Link State Routing protocol. VANET QoS-OLSR is a clustering protocol ...
  • Abdel Wahab, Omar; Otrok, Hadi; Mourad, Azzam (2015-11-24)
    In this paper, we address the problem of detecting misbehaving vehicles in Vehicular Ad Hoc Network (VANET) using Quality of Service Optimized Link State Routing (QoS-OLSR) protocol. According to this protocol, vehicles ...
  • Mourad, Azzam; Alhadidi, Dima; Debbabi, Mourad (IEEE, 2017-03-08)
    In this paper, we propose an approach for systematic security hardening of software based on aspect-oriented programming and Gimple language. We also present the first steps towards a formal specification for Gimple weaving ...
  • Abdel Wahab, Omar; Otrok, Hadi; Mourad, Azzam (2015-11-24)
    In this paper, we address the problem of cooperation among vehicles in VANET using QoS-OLSR protocol in the presence of selfish nodes. QoS-OLSR is a proactive protocol that considers the Quality of Service (QoS) of the ...
  • Sanadiki, Hiba; Otrok, Hadi; Mourad, Azzam; Robert, Jean-Marc (IEEE, 2017-03-10)
    In this paper, we detect two attacks targeting the QoS-OLSR protocol MANET. The Cluster-based model QoS-OLSR is a multimedia protocol designed on top of Optimized Link State Routing (OLSR) protocol. The quality of service ...
  • Munla, Nermine; Khalil, Mohamad; Shahin, Ahmad; Mourad, Azzam (IEEE, 2017-03-09)
    This paper intends to investigate stress level detection of a driver during real world driving experiment. This detection is based on heart rate variability (HRV) analysis which is derived from ECG signal and reflects ...
  • Halawi, Bahia; Mourad, Azzam; Otrok, Hadi; Damiani, Ernesto (2021-04-15)
    Due to the high popularity of Twitter, spammers tend to favor its use in spreading their commercial messages. In the context of detecting twitter spams, different statistical and behavioral analysis approaches were proposed. ...
  • Mourad, Azzam; Tout, Hanine; Talhi, Chamseddine; Otrok, Hadi; Yahyaoui, Hamdi (2017-02-06)
    With lot of hype surrounding policy-based computing, XACML (eXtensible Access Control Markup Language) has become the widely used de facto standard for managing access to open and distributed service-based environments ...
  • Mourad, Azzam; Laverdiere, Marc-André; Debbabi, Mourad (2018-08-17)
    In this paper, we propose an aspect-oriented language, called SHL (Security Hardening Language), for specifying systematically the security hardening solutions. This language constitutes our new achievement towards developing ...

Search LAUR


Advanced Search

Browse

My Account