Mourad Debbabi profile picture

Mourad Debbabi

Is this your author profile? Create an account to customize it!

Stand Alone

Verification and validation in systems engineering
Embedded Java security
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
Security and Privacy in Communication Networks 19th Eai International Conference, Securecomm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part III
Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I
Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II
Security and Privacy in Communication Networks
Security and Privacy in Communication Networks
Binary Code Fingerprinting for Cybersecurity
Binary Code Fingerprinting for Cybersecurity Application to Malicious Code Fingerprinting
Binary Code Fingerprinting for Cybersecurity Application to Malicious Code Fingerprinting
Machine Learning for Authorship Attribution and Cyber Forensics
Machine Learning for Authorship Attribution and Cyber Forensics
Machine Learning for Authorship Attribution and Cyber Forensics
Foundations and Practice of Security

See All