Wahab Hamou-Lhadj
Wahab Hamou-Lhadj
Professor of Computer/Software Engineering at Concordia University
Verified email at - Homepage
Cited by
Cited by
A survey of trace exploration tools and techniques
A Hamou-Lhadj, TC Lethbridge
Proceedings of the 2004 conference of the Centre for Advanced Studies on …, 2004
Summarizing the content of large traces to facilitate the understanding of the behaviour of a software system
A Hamou-Lhadj, T Lethbridge
14th IEEE International Conference on Program Comprehension (ICPC'06), 181-190, 2006
Recovering behavioral design models from execution traces
A Hamou-Lhadj, E Braun, D Amyot, T Lethbridge
Ninth European Conference on Software Maintenance and Reengineering, 112-121, 2005
An anomaly detection system based on variable N-gram features and one-class SVM
W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi
Information and Software Technology 91, 186-197, 2017
Taxonomy of intrusion risk assessment and response system
A Shameli-Sendi, M Cheriet, A Hamou-Lhadj
Computers & Security 45, 1-16, 2014
Compression techniques to simplify the analysis of large execution traces
A Hamou-Lhadj, TC Lethbridge
Proceedings 10th International Workshop on Program Comprehension, 159-168, 2002
Operational-Log Analysis for Big-Data Systems: Challenges and Solutions
A Miranskyy, A Hamou-Lhadj, E Cialini, A Larsson
IEEE Software 37 (4), 486-508, 2011
A systematic literature review on automated log abstraction techniques
D El-Masri, F Petrillo, YG Guéhéneuc, A Hamou-Lhadj, A Bouziane
Information and Software Technology 122, 106276, 2020
A survey of model-driven testing techniques
M Mussa, S Ouchani, W Al Sammane, A Hamou-Lhadj
2009 Ninth International Conference on Quality Software, 167-172, 2009
Software clustering using dynamic analysis and static dependencies
C Patel, A Hamou-Lhadj, J Rilling
2009 13th European Conference on Software Maintenance and Reengineering, 27-36, 2009
Clever: Combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects
M Nayrolles, A Hamou-Lhadj
Proceedings of the 15th international conference on mining software …, 2018
A host-based anomaly detection approach by representing system calls as states of kernel modules
SS Murtaza, W Khreich, A Hamou-Lhadj, M Couture
In Proc. of the IEEE 24th International Symposium on Software Reliability …, 2013
Mining trends and patterns of software vulnerabilities
SS Murtaza, W Khreich, A Hamou-Lhadj, AB Bener
Journal of Systems and Software 117, 218-228, 2016
Durfex: a feature extraction technique for efficient detection of duplicate bug reports
KK Sabor, A Hamou-Lhadj, A Larsson
2017 IEEE international conference on software quality, reliability and …, 2017
An approach for mapping features to code based on static and dynamic analysis
A Rohatgi, A Hamou-Lhadj, J Rilling
2008 16th IEEE International Conference on Program Comprehension, 236-241, 2008
An HMM-based approach for automatic detection and classification of duplicate bug reports
N Ebrahimi, A Trabelsi, MS Islam, A Hamou-Lhadj, K Khanmohammadi
Information and Software Technology 113, 98-109, 2019
Techniques to simplify the analysis of execution traces for program comprehension
A Hamou-Lhadj
University of Ottawa (Canada), 2006
Automatic prediction of the severity of bugs using stack traces and categorical features
KK Sabor, M Hamdaqa, A Hamou-Lhadj
Information and Software Technology 123, 106205, 2020
A study of run-time behavioral evolution of benign versus malicious apps in android
H Cai, X Fu, A Hamou-Lhadj
Information and Software Technology 122, 106291, 2020
Anomaly detection techniques based on kappa-pruned ensembles
MS Islam, W Khreich, A Hamou-Lhadj
IEEE Transactions on Reliability 67 (1), 212-229, 2018
The system can't perform the operation now. Try again later.
Articles 1–20