Tawbi Nadia
Tawbi Nadia
Email verificata su ift.ulaval.ca
Titolo
Citata da
Citata da
Anno
Static detection of malicious code in executable programs
J Bergeron, M Debbabi, J Desharnais, MM Erhioui, Y Lavoie, N Tawbi
Int. J. of Req. Eng 2001 (184-189), 79, 2001
2412001
Specification and Verification of the PowerScaleTM Bus Arbitration Protocol: An Industrial Experiment with LOTOS
G Chehaibar, H Garavel, L Mounier, N Tawbi, F Zulian
Formal Description Techniques IX, 435-450, 1996
811996
Execution monitoring enforcement under memory-limitation constraints
C Talhi, N Tawbi, M Debbabi
Information and Computation 206 (2-4), 158-184, 2008
522008
Formal automatic verification of authentication cryptographic protocols
M Debbabi, M Mejri, N Tawbi, I Yahmadi
First IEEE International Conference on Formal Engineering Methods, 50-59, 1997
401997
Estimation of nested loops execution time by integer arithmetic in convex polyhedra
N Tawbi
Proceedings of 8th International Parallel Processing Symposium, 217-221, 1994
371994
R esolution de syst emes d'in equations lin eaires; mode d'emploi du logiciel PIP
P Feautrier, N Tawbi
Technical Report 90-2, Institut Blaise Pascal, Laboratoire MASI (Paris), 1990
361990
From protocol specifications to flaws and attack scenarios: An automatic and formal algorithm
M Debbabi, M Mejre, N Tawbi, I Yahmadi
Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure …, 1997
321997
Processor allocation and loop scheduling on multiprocessor computers
N Tawbi, P Feautrier
Proceedings of the 6th international conference on Supercomputing, 63-71, 1992
291992
A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios
M Debbabi, M Mejri, N Tawbi, I Yahmadi
DIMACS Workshop on Design and Formal Verifictaion of Security Protocols, 1997
271997
Extending the enforcement power of truncation monitors using static analysis
H Chabot, R Khoury, N Tawbi
computers & security 30 (4), 194-207, 2011
252011
A dynamic compiler for embedded Java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Tawbi, H Yahyaoui, S Zhioua
Proceedings of the 3rd international symposium on Principles and practice of …, 2004
242004
A dynamic compiler for embedded Java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Tawbi, H Yahyaoui, S Zhioua
Proceedings of the 3rd international symposium on Principles and practice of …, 2004
242004
Method call acceleration in virtual machines
M Debbabi, N Tawbi, S Zhioua, M Erhioui, L Ketari, H Yahyaoui
US Patent App. 10/395,906, 2004
242004
Parallelisation automatique: estimation des durees d'execution et allocation statique de processeurs
N Tawbi
Paris 6, 1991
221991
Detection of malicious code in cots software: A short survey
J Bergeron, M Debbabi, J Desharnais, B Ktari, M Salois, N Tawbi, ...
First International Software Assurance Certification Conference (ISACC’99), 1999
211999
Corrective enforcement: A new paradigm of security policy enforcement by monitors
R Khoury, N Tawbi
ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-27, 2012
202012
Which security policies are enforceable by runtime monitors? a survey
R Khoury, N Tawbi
Computer Science Review 6 (1), 27-45, 2012
182012
Fast and effective clustering of spam emails based on structural similarity
M Sheikhalishahi, A Saracino, M Mejri, N Tawbi, F Martinelli
International Symposium on Foundations and Practice of Security, 195-211, 2015
172015
Execution monitoring enforcement for limited-memory systems
C Talhi, N Tawbi, M Debbabi
Proceedings of the 2006 International Conference on Privacy, Security and …, 2006
162006
Dynamic monitoring of malicious activity in software systems
M Debbabi, M Girard, L Poulin, M Salois, N Tawbi
Proceedings of the Symposium on Requirements Engineering for Information …, 2001
162001
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20