default search action
Fehmi Jaafar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Kerson Boisrond, Pierre-Martin Tardif, Fehmi Jaafar:
Ensuring the Integrity, Confidentiality, and Availability of IoT Data in Industry 5.0: A Systematic Mapping Study. IEEE Access 12: 107017-107045 (2024) - [j12]Wissam Salhab, Darine Ameyed, Fehmi Jaafar, Hamid Mcheick:
A Systematic Literature Review on AI Safety: Identifying Trends, Challenges, and Future Directions. IEEE Access 12: 131762-131784 (2024) - [c41]Amine Barrak, Gildas Fofe, Léo Mackowiak, Emmanuel Kouam, Fehmi Jaafar:
Securing AWS Lambda: Advanced Strategies and Best Practices. CSCloud 2024: 113-119 - [c40]Rachel Ladouceur, Abubakr Hassan, Mohamed Mejri, Fehmi Jaafar:
Can Deep Learning Detect Fake News Better when Adding Context Features? CSR 2024: 56-61 - [c39]Chaima Njeh, Haïfa Nakouri, Fehmi Jaafar:
Enhancing RAG-Retrieval to Improve LLMs Robustness and Resilience to Hallucinations. HAIS (2) 2024: 201-213 - [c38]Fehmi Jaafar, Mohamed Aziz Chabchoub, Darine Ameyed:
Detection of Abnormal Activities in a Crowd Video Surveillance using Contextual Information. ICMIP 2024: 31-38 - 2023
- [j11]Darine Ameyed, Fehmi Jaafar, Fábio Petrillo, Mohamed Cheriet:
Quality and Security Frameworks for IoT-Architecture Models Evaluation. SN Comput. Sci. 4(4): 394 (2023) - [c37]Fehmi Jaafar, Darine Amayed, Wissam Salhab, Hajer Bouani, Mohamed Cheriet:
Blockchain-Based Consent Management for Privacy Persevering and Transparency in Intelligent Surveillance Systems. BCCA 2023: 284-293 - [c36]Riadh Ben Chaabene, Darine Ameyed, Fehmi Jaafar, Alexis Roger, Esma Aïmeur, Mohamed Cheriet:
A Privacy-Preserving Federated Learning for IoT Intrusion Detection System. CoDIT 2023: 351-356 - [c35]Abubakr Ibrahim, Mohamed Mejri, Fehmi Jaafar:
An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection. CSR 2023: 160-167 - [c34]Amine Barrak, Ranim Trabelsi, Fehmi Jaafar, Fábio Petrillo:
Exploring the Impact of Serverless Computing on Peer To Peer Training Machine Learning. IC2E 2023: 141-152 - [c33]Fehmi Jaafar, Darine Ameyed, Lavin Titare, Md Nematullah:
IoT Phishing Detection Using Hybrid NLP and Machine Learning Models Enhanced with Contextual Embedding. QRS Companion 2023: 340-349 - [c32]Amine Barrak, Mayssa Jaziri, Ranim Trabelsi, Fehmi Jaafar, Fábio Petrillo:
SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training Architecture. QRS 2023: 650-661 - [i6]Amine Barrak, Fábio Petrillo, Fehmi Jaafar:
Architecting Peer-to-Peer Serverless Distributed Machine Learning Training for Improved Fault Tolerance. CoRR abs/2302.13995 (2023) - [i5]Amine Barrak, Ranim Trabelsi, Fehmi Jaafar, Fábio Petrillo:
Exploring the Impact of Serverless Computing on Peer To Peer Training Machine Learning. CoRR abs/2309.14139 (2023) - [i4]Amine Barrak, Mayssa Jaziri, Ranim Trabelsi, Fehmi Jaafar, Fábio Petrillo:
SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training Architecture. CoRR abs/2309.14148 (2023) - 2022
- [j10]Amine Barrak, Fábio Petrillo, Fehmi Jaafar:
Serverless on Machine Learning: A Systematic Mapping Study. IEEE Access 10: 99337-99352 (2022) - [c31]Pratibha Singh, Hamman Samuel, Fehmi Jaafar, Darine Ameyed:
Enhancing Biometric Security with Combinatorial and Permutational Multi-Fingerprint Authentication Strategies. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-7 - [c30]Hugo Bourreau, Emeric Guichet, Amine Barrak, Benoît Simon, Fehmi Jaafar:
On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography. QRS Companion 2022: 758-759 - 2021
- [j9]Zeinab Azadeh Kermansaravi, Md. Saidur Rahman, Foutse Khomh, Fehmi Jaafar, Yann-Gaël Guéhéneuc:
Investigating design anti-pattern and design pattern mutations and their change- and fault-proneness. Empir. Softw. Eng. 26(1): 9 (2021) - [j8]Manel Grichi, Mouna Abidi, Fehmi Jaafar, Ellis E. Eghan, Bram Adams:
On the Impact of Interlanguage Dependencies in Multilanguage Systems Empirical Case Study on Java Native Interface Applications (JNI). IEEE Trans. Reliab. 70(1): 428-440 (2021) - [c29]Fehmi Jaafar, Darine Ameyed, Amine Barrak, Mohamed Cheriet:
Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis. QRS 2021: 514-523 - [c28]Darine Ameyed, Fehmi Jaafar, Francis Charette Migneault, Mohamed Cheriet:
Blockchain Based Model for Consent Management and Data Transparency Assurance. QRS Companion 2021: 1050-1059 - [i3]Zeinab Azadeh Kermansaravi, Md. Saidur Rahman, Foutse Khomh, Fehmi Jaafar, Yann-Gaël Guéhéneuc:
Investigating Design Anti-pattern and Design Pattern Mutations and Their Change- and Fault-proneness. CoRR abs/2104.00058 (2021) - 2020
- [c27]Fehmi Jaafar, Florent Avellaneda, El Hachemi Alikacem:
Demystifying the Cyber Attribution: An Exploratory Study. DASC/PiCom/CBDCom/CyberSciTech 2020: 35-40 - [c26]Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, Neelam Memon:
Behavioral Study of Malware Affecting Financial Institutions and Clients. DASC/PiCom/CBDCom/CyberSciTech 2020: 79-86 - [c25]Marcela G. dos Santos, Bianca Minetto Napoleão, Fábio Petrillo, Darine Ameyed, Fehmi Jaafar:
A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality Perspective. ICSE (Workshops) 2020: 647-654 - [c24]Manel Grichi, Mouna Abidi, Fehmi Jaafar, Ellis E. Eghan, Bram Adams:
On the Impact of Inter-language Dependencies in Multi-language Systems. QRS 2020: 509 - [e1]Wanyang Dai, Xiangyang Hao, T. Ramayah, Fehmi Jaafar:
ICMIP 2020: 5th International Conference on Multimedia and Image Processing, Nanjing, China, January, 2020. ACM 2020, ISBN 978-1-4503-7664-8 [contents] - [i2]Marcela G. dos Santos, Darine Ameyed, Fábio Petrillo, Fehmi Jaafar, Mohamed Cheriet:
Internet of Things Architectures: A Comparative Study. CoRR abs/2004.12936 (2020)
2010 – 2019
- 2019
- [c23]Naiji Zhang, Fehmi Jaafar, Yasir Malik:
Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning. CSCloud/EdgeCom 2019: 59-62 - [c22]Tunde Akeem Yekini, Fehmi Jaafar, Pavol Zavarsky:
Study of Trust at Device Level of the Internet of Things Architecture. HASE 2019: 150-155 - [c21]Samip Dhakal, Fehmi Jaafar, Pavol Zavarsky:
Private Blockchain Network for IoT Device Firmware Integrity Verification and Update. HASE 2019: 164-170 - [c20]Ranbir Singh Bali, Fehmi Jaafar, Pavol Zavarsky:
Lightweight authentication for MQTT to improve the security of IoT communication. ICCSP 2019: 6-12 - [c19]Yasir Malik, Carlos Renato Salim Campos, Fehmi Jaafar:
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis. QRS Companion 2019: 109-113 - [c18]Anis Kothia, Bobby Swar, Fehmi Jaafar:
Knowledge Extraction and Integration for Information Gathering in Penetration Testing. QRS Companion 2019: 330-335 - 2018
- [j7]Darine Ameyed, Moeiz Miraoui, Atef Zaguia, Fehmi Jaafar, Chakib Tadj:
Using Probabilistic Temporal Logic PCTL and Model Checking for Context Prediction. Comput. Informatics 37(6): 1411-1442 (2018) - [j6]Md. Shahrear Iqbal, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu:
Protecting Internet users from becoming victimized attackers of click-fraud. J. Softw. Evol. Process. 30(3) (2018) - [c17]Gurjot Balraj Singh, Fehmi Jaafar, Sergey Butakov:
Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud. CoDIT 2018: 952-958 - [c16]Caesar Jude Clemente, Fehmi Jaafar, Yasir Malik:
Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms? QRS 2018: 95-102 - [c15]Pooja Rajendraprasad, Sergey Butakov, Fehmi Jaafar:
Information Security Considerations for Wireless Infusion Pumps. QRS Companion 2018: 438-442 - [c14]Fehmi Jaafar, Gagandeep Singh, Pavol Zavarsky:
An Analysis of Android Malware Behavior. QRS Companion 2018: 505-512 - [c13]Gurpreet Kaur, Yasir Malik, Hamman Samuel, Fehmi Jaafar:
Detecting Blind Cross-Site Scripting Attacks Using Machine Learning. SPML 2018: 22-25 - 2017
- [j5]Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, Kim Mens:
Analyzing software evolution and quality by extracting Asynchrony change patterns. J. Syst. Softw. 131: 311-322 (2017) - [c12]Maryam Davari, Mohammad Zulkernine, Fehmi Jaafar:
An Automatic Software Vulnerability Classification Framework. ICSSA 2017: 44-49 - [c11]Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, Kim Mens:
On the Analysis of Co-Occurrence of Anti-Patterns and Clones. QRS 2017: 274-284 - [c10]Fehmi Jaafar:
An Integrated Architecture for IoT Fingerprinting. QRS Companion 2017: 601-602 - [i1]Darine Ameyed, Fehmi Jaafar, Jaouhar Fattahi:
A Slow Read attack Using Cloud. CoRR abs/1712.01939 (2017) - 2016
- [j4]Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, Mohammad Zulkernine:
Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults. Empir. Softw. Eng. 21(3): 896-931 (2016) - [c9]Md. Shahrear Iqbal, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu:
FCFraud: Fighting Click-Fraud from the User Side. HASE 2016: 157-164 - [c8]Fehmi Jaafar, Gabriela Nicolescu, Christian Richard:
A Systematic Approach for Privilege Escalation Prevention. QRS Companion 2016: 101-108 - 2015
- [c7]Darine Ameyed, Fehmi Jaafar, Jaouhar Fattahi:
A slow read attack using cloud. ECAI 2015 - 2014
- [j3]Angela Lozano, Fehmi Jaafar, Kim Mens, Yann-Gaël Guéhéneuc:
Clones and Macro co-changes. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 63 (2014) - [j2]Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Giuliano Antoniol:
Detecting asynchrony and dephase change patterns by mining software repositories. J. Softw. Evol. Process. 26(1): 77-106 (2014) - [c6]Fehmi Jaafar, Foutse Khomh, Yann-Gaël Guéhéneuc, Mohammad Zulkernine:
Anti-pattern Mutations and Fault-proneness. QSIC 2014: 246-255 - 2013
- [j1]Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh:
Analysing Anti-patterns Static Relationships with Design Patterns. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 59 (2013) - [c5]Fehmi Jaafar, Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, Bram Adams:
On the Relationship between Program Evolution and Fault-Proneness: An Empirical Study. CSMR 2013: 15-24 - [c4]Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh:
Mining the relationship between anti-patterns dependencies and fault-proneness. WCRE 2013: 351-360 - [c3]Nasir Ali, Fehmi Jaafar, Ahmed E. Hassan:
Leveraging historical co-change information for requirements traceability. WCRE 2013: 361-370 - 2012
- [c2]Fehmi Jaafar:
On the analysis of evolution of software artefacts and programs. ICSE 2012: 1563-1566 - 2011
- [c1]Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Giuliano Antoniol:
An Exploratory Study of Macro Co-changes. WCRE 2011: 325-334
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint