Seguir
Tawbi Nadia
Tawbi Nadia
Dirección de correo verificada de ift.ulaval.ca
Título
Citado por
Citado por
Año
Static detection of malicious code in executable programs
J Bergeron, M Debbabi, J Desharnais, MM Erhioui, Y Lavoie, N Tawbi
Int. J. of Req. Eng 2001 (184-189), 79, 2001
3092001
Specification and Verification of the PowerScaleTM Bus Arbitration Protocol: An Industrial Experiment with LOTOS
G Chehaibar, H Garavel, L Mounier, N Tawbi, F Zulian
Formal Description Techniques IX: Theory, application and tools, 435-450, 1996
881996
Execution monitoring enforcement under memory-limitation constraints
C Talhi, N Tawbi, M Debbabi
Information and Computation 206 (2-4), 158-184, 2008
602008
Formal automatic verification of authentication cryptographic protocols
M Debbabi, M Mejri, N Tawbi, I Yahmadi
First IEEE International Conference on Formal Engineering Methods, 50-59, 1997
401997
Estimation of nested loops execution time by integer arithmetic in convex polyhedra
N Tawbi
Proceedings of 8th International Parallel Processing Symposium, 217-221, 1994
381994
R esolution de syst emes d'in equations lin eaires; mode d'emploi du logiciel PIP
P Feautrier, N Tawbi
Technical Report 90-2, Institut Blaise Pascal, Laboratoire MASI (Paris), 1990
351990
From protocol specifications to flaws and attack scenarios: An automatic and formal algorithm
M Debbabi, M Mejre, N Tawbi, I Yahmadi
Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure …, 1997
341997
Extending the enforcement power of truncation monitors using static analysis
H Chabot, R Khoury, N Tawbi
computers & security 30 (4), 194-207, 2011
322011
A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios
M Debbabi, M Mejri, N Tawbi, I Yahmadi
DIMACS Workshop on Design and Formal Verifictaion of Security Protocols, 1997
321997
Processor allocation and loop scheduling on multiprocessor computers
N Tawbi, P Feautrier
Proceedings of the 6th international conference on Supercomputing, 63-71, 1992
291992
Which security policies are enforceable by runtime monitors? A survey
R Khoury, N Tawbi
Computer Science Review 6 (1), 27-45, 2012
282012
Fast and effective clustering of spam emails based on structural similarity
M Sheikhalishahi, A Saracino, M Mejri, N Tawbi, F Martinelli
International Symposium on Foundations and Practice of Security, 195-211, 2015
272015
Detection of malicious code in cots software: A short survey
J Bergeron, M Debbabi, J Desharnais, B Ktari, M Salois, N Tawbi, ...
First International Software Assurance Certification Conference (ISACC’99), 1999
261999
Corrective enforcement: A new paradigm of security policy enforcement by monitors
R Khoury, N Tawbi
ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-27, 2012
252012
Method call acceleration in virtual machines
M Debbabi, N Tawbi, S Zhioua, M Erhioui, L Ketari, H Yahyaoui
US Patent App. 10/395,906, 2004
252004
A dynamic compiler for embedded java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
242004
Parallelisation automatique: estimation des durees d'execution et allocation statique de processeurs
N Tawbi
Paris 6, 1991
241991
Dynamic monitoring of malicious activity in software systems
M Debbabi, M Girard, L Poulin, M Salois, N Tawbi
Proceedings of the Symposium on Requirements Engineering for Information …, 2001
202001
Clustering spam emails into campaigns
MS Alishahi, M Mejri, N Tawbi
2015 International Conference on Information Systems Security and Privacy …, 2015
192015
Execution monitoring enforcement for limited-memory systems
C Talhi, N Tawbi, M Debbabi
Proceedings of the 2006 International Conference on Privacy, Security and …, 2006
182006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20