Tawbi Nadia
Tawbi Nadia
Verified email at
Cited by
Cited by
Static detection of malicious code in executable programs
J Bergeron, M Debbabi, J Desharnais, MM Erhioui, Y Lavoie, N Tawbi
Int. J. of Req. Eng 2001 (184-189), 79, 2001
Specification and Verification of the PowerScaleTM Bus Arbitration Protocol: An Industrial Experiment with LOTOS
G Chehaibar, H Garavel, L Mounier, N Tawbi, F Zulian
Formal Description Techniques IX: Theory, application and tools, 435-450, 1996
Execution monitoring enforcement under memory-limitation constraints
C Talhi, N Tawbi, M Debbabi
Information and Computation 206 (2-4), 158-184, 2008
Formal automatic verification of authentication cryptographic protocols
M Debbabi, M Mejri, N Tawbi, I Yahmadi
First IEEE International Conference on Formal Engineering Methods, 50-59, 1997
Estimation of nested loops execution time by integer arithmetic in convex polyhedra
N Tawbi
Proceedings of 8th International Parallel Processing Symposium, 217-221, 1994
R esolution de syst emes d'in equations lin eaires; mode d'emploi du logiciel PIP
P Feautrier, N Tawbi
Technical Report 90-2, Institut Blaise Pascal, Laboratoire MASI (Paris), 1990
From protocol specifications to flaws and attack scenarios: An automatic and formal algorithm
M Debbabi, M Mejre, N Tawbi, I Yahmadi
Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure …, 1997
Extending the enforcement power of truncation monitors using static analysis
H Chabot, R Khoury, N Tawbi
computers & security 30 (4), 194-207, 2011
A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios
M Debbabi, M Mejri, N Tawbi, I Yahmadi
DIMACS Workshop on Design and Formal Verifictaion of Security Protocols, 1997
Processor allocation and loop scheduling on multiprocessor computers
N Tawbi, P Feautrier
Proceedings of the 6th international conference on Supercomputing, 63-71, 1992
Which security policies are enforceable by runtime monitors? A survey
R Khoury, N Tawbi
Computer Science Review 6 (1), 27-45, 2012
Fast and effective clustering of spam emails based on structural similarity
M Sheikhalishahi, A Saracino, M Mejri, N Tawbi, F Martinelli
International Symposium on Foundations and Practice of Security, 195-211, 2015
Detection of malicious code in cots software: A short survey
J Bergeron, M Debbabi, J Desharnais, B Ktari, M Salois, N Tawbi, ...
First International Software Assurance Certification Conference (ISACC’99), 1999
Corrective enforcement: A new paradigm of security policy enforcement by monitors
R Khoury, N Tawbi
ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-27, 2012
Method call acceleration in virtual machines
M Debbabi, N Tawbi, S Zhioua, M Erhioui, L Ketari, H Yahyaoui
US Patent App. 10/395,906, 2004
A dynamic compiler for embedded java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
A dynamic compiler for embedded java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
Parallelisation automatique: estimation des durees d'execution et allocation statique de processeurs
N Tawbi
Paris 6, 1991
Dynamic monitoring of malicious activity in software systems
M Debbabi, M Girard, L Poulin, M Salois, N Tawbi
Proceedings of the Symposium on Requirements Engineering for Information …, 2001
Clustering spam emails into campaigns
MS Alishahi, M Mejri, N Tawbi
2015 International Conference on Information Systems Security and Privacy …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20