Static detection of malicious code in executable programs J Bergeron, M Debbabi, J Desharnais, MM Erhioui, Y Lavoie, N Tawbi Int. J. of Req. Eng 2001 (184-189), 79, 2001 | 314 | 2001 |
Specification and Verification of the PowerScaleTM Bus Arbitration Protocol: An Industrial Experiment with LOTOS G Chehaibar, H Garavel, L Mounier, N Tawbi, F Zulian Formal Description Techniques IX: Theory, application and tools, 435-450, 1996 | 86 | 1996 |
Execution monitoring enforcement under memory-limitation constraints C Talhi, N Tawbi, M Debbabi Information and Computation 206 (2-4), 158-184, 2008 | 61 | 2008 |
Formal automatic verification of authentication cryptographic protocols M Debbabi, M Mejri, N Tawbi, I Yahmadi First IEEE International Conference on Formal Engineering Methods, 50-59, 1997 | 40 | 1997 |
Estimation of nested loops execution time by integer arithmetic in convex polyhedra N Tawbi Proceedings of 8th International Parallel Processing Symposium, 217-221, 1994 | 38 | 1994 |
R esolution de syst emes d'in equations lin eaires; mode d'emploi du logiciel PIP P Feautrier, N Tawbi Technical Report 90-2, Institut Blaise Pascal, Laboratoire MASI (Paris), 1990 | 35 | 1990 |
From protocol specifications to flaws and attack scenarios: An automatic and formal algorithm M Debbabi, M Mejre, N Tawbi, I Yahmadi Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure …, 1997 | 34 | 1997 |
Extending the enforcement power of truncation monitors using static analysis H Chabot, R Khoury, N Tawbi computers & security 30 (4), 194-207, 2011 | 33 | 2011 |
Which security policies are enforceable by runtime monitors? A survey R Khoury, N Tawbi Computer Science Review 6 (1), 27-45, 2012 | 30 | 2012 |
A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios M Debbabi, M Mejri, N Tawbi, I Yahmadi DIMACS Workshop on Design and Formal Verifictaion of Security Protocols, 1997 | 30 | 1997 |
Processor allocation and loop scheduling on multiprocessor computers N Tawbi, P Feautrier Proceedings of the 6th international conference on Supercomputing, 63-71, 1992 | 29 | 1992 |
Fast and effective clustering of spam emails based on structural similarity M Sheikhalishahi, A Saracino, M Mejri, N Tawbi, F Martinelli International Symposium on Foundations and Practice of Security, 195-211, 2015 | 27 | 2015 |
Corrective enforcement: A new paradigm of security policy enforcement by monitors R Khoury, N Tawbi ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-27, 2012 | 27 | 2012 |
Detection of malicious code in cots software: A short survey J Bergeron, M Debbabi, J Desharnais, B Ktari, M Salois, N Tawbi, ... First International Software Assurance Certification Conference (ISACC’99), 1999 | 26 | 1999 |
Method call acceleration in virtual machines M Debbabi, N Tawbi, S Zhioua, M Erhioui, L Ketari, H Yahyaoui US Patent App. 10/395,906, 2004 | 25 | 2004 |
A dynamic compiler for embedded java virtual machines M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua Trinity College Dublin, 2004 | 24 | 2004 |
Parallelisation automatique: estimation des durees d'execution et allocation statique de processeurs N Tawbi Paris 6, 1991 | 24 | 1991 |
Dynamic monitoring of malicious activity in software systems M Debbabi, M Girard, L Poulin, M Salois, N Tawbi Proceedings of the Symposium on Requirements Engineering for Information …, 2001 | 20 | 2001 |
Execution monitoring enforcement for limited-memory systems C Talhi, N Tawbi, M Debbabi Proceedings of the 2006 International Conference on Privacy, Security and …, 2006 | 19 | 2006 |
Clustering spam emails into campaigns MS Alishahi, M Mejri, N Tawbi 2015 International Conference on Information Systems Security and Privacy …, 2015 | 18 | 2015 |