Остановите войну!
for scientists:
default search action
Azzam Mourad
- > Home > Persons > Azzam Mourad
Publications
- 2013
- [j12]Dima Alhadidi, Azzam Mourad, Hakim Idrissi Kaitouni, Mourad Debbabi:
Common weaving approach in mainstream languages for software security hardening. J. Syst. Softw. 86(10): 2654-2674 (2013) - 2010
- [j7]Robert Charpentier, Mourad Debbabi, Dima Alhadidi, Azzam Mourad, Nadia Belblidia, Amine Boukhtouta, Aiman Hanna, Rachid Hadjidj, Hakim Idrissi Kaitouni, Marc-André Laverdière, Hai Zhou Ling, Syrine Tlili, Xiaochun Yang, Zhenrong Yang:
Security Evaluation and Hardening of Free and Open Source Software (FOSS). Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 33 (2010) - 2009
- [j6]Azzam Mourad, Andrei Soeanu, Marc-André Laverdière, Mourad Debbabi:
New aspect-oriented constructs for security hardening concerns. Comput. Secur. 28(6): 341-358 (2009) - [j5]Azzam Mourad, Marc-André Laverdière, Andrei Soeanu, Mourad Debbabi:
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité. Tech. Sci. Informatiques 28(5): 611-644 (2009) - [c11]Djedjiga Mouheb, Chamseddine Talhi, Azzam Mourad, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222 - 2008
- [j4]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
An aspect-oriented approach for the systematic security hardening of code. Comput. Secur. 27(3-4): 101-114 (2008) - [j3]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A High-level Aspect-oriented-based Framework for Software Security Hardening. Inf. Secur. J. A Glob. Perspect. 17(2): 56-74 (2008) - [c10]Azzam Mourad, Dima Alhadidi, Mourad Debbabi:
Cross-Language Weaving Approach Targeting Software Security Hardening. PST 2008: 87-98 - [c9]Azzam Mourad, Dima Alhadidi, Mourad Debbabi:
Towards Language-Independent Approach for Security Concerns Weaving. SECRYPT 2008: 460-465 - [r1]Mourad Debbabi, Marc-André Laverdière, Azzam Mourad, Syrine Tlili:
Wireless Applications: Middleware Security. Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- [c8]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
Towards an Aspect Oriented Approach for the Security Hardening of Code. AINA Workshops (1) 2007: 595-600 - [c7]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A Security Hardening Language Based on Aspect-Orientation. ICETE (Selected Papers) 2007: 254-266 - [c6]Marc-André Laverdière, Azzam Mourad, Andrei Soeanu, Mourad Debbabi:
Control Flow Based Pointcuts for Security Hardening Concerns. IFIPTM 2007: 301-316 - [c5]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A High-Level Aspect-Oriented based Language for Software Security Hardening. SECRYPT 2007: 363-370 - [c4]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. WOSIS 2007: 123-130 - 2006
- [j2]Mourad Debbabi, Abdelouahed Gherbi, Azzam Mourad, Hamdi Yahyaoui:
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors. Sci. Comput. Program. 59(1-2): 38-63 (2006) - [c3]Marc-André Laverdière, Azzam Mourad, Aiman Hanna, Mourad Debbabi:
Security Design Patterns: Survey and Evaluation. CCECE 2006: 1605-1608 - [c2]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
Security hardening of open source software. PST 2006: 43 - 2005
- [j1]Mourad Debbabi, Azzam Mourad, Chamseddine Talhi, Hamdi Yahyaoui:
Accelerating embedded Java for mobile devices. IEEE Commun. Mag. 43(9): 80-85 (2005) - [c1]Mourad Debbabi, Azzam Mourad, Nadia Tawbi:
Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. SAC 2005: 874-878
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint