A survey of trace exploration tools and techniques A Hamou-Lhadj, TC Lethbridge Proceedings of the 2004 conference of the Centre for Advanced Studies on …, 2004 | 200 | 2004 |
Summarizing the content of large traces to facilitate the understanding of the behaviour of a software system A Hamou-Lhadj, T Lethbridge 14th IEEE International Conference on Program Comprehension (ICPC'06), 181-190, 2006 | 197 | 2006 |
An anomaly detection system based on variable N-gram features and one-class SVM W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi Information and Software Technology 91, 186-197, 2017 | 113 | 2017 |
Recovering behavioral design models from execution traces A Hamou-Lhadj, E Braun, D Amyot, T Lethbridge Ninth European Conference on Software Maintenance and Reengineering, 112-121, 2005 | 113 | 2005 |
Taxonomy of intrusion risk assessment and response system A Shameli-Sendi, M Cheriet, A Hamou-Lhadj Computers & Security 45, 1-16, 2014 | 109 | 2014 |
Compression techniques to simplify the analysis of large execution traces A Hamou-Lhadj, TC Lethbridge Proceedings 10th International Workshop on Program Comprehension, 159-168, 2002 | 89 | 2002 |
Operational-Log Analysis for Big-Data Systems: Challenges and Solutions A Miranskyy, A Hamou-Lhadj, E Cialini, A Larsson IEEE Software 37 (4), 486-508, 2011 | 82* | 2011 |
A systematic literature review on automated log abstraction techniques D El-Masri, F Petrillo, YG Guéhéneuc, A Hamou-Lhadj, A Bouziane Information and Software Technology 122, 106276, 2020 | 80 | 2020 |
Software clustering using dynamic analysis and static dependencies C Patel, A Hamou-Lhadj, J Rilling 2009 13th European Conference on Software Maintenance and Reengineering, 27-36, 2009 | 78 | 2009 |
Clever: Combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects M Nayrolles, A Hamou-Lhadj Proceedings of the 15th international conference on mining software …, 2018 | 76 | 2018 |
A survey of model-driven testing techniques M Mussa, S Ouchani, W Al Sammane, A Hamou-Lhadj 2009 Ninth International Conference on Quality Software, 167-172, 2009 | 76 | 2009 |
A host-based anomaly detection approach by representing system calls as states of kernel modules SS Murtaza, W Khreich, A Hamou-Lhadj, M Couture In Proc. of the IEEE 24th International Symposium on Software Reliability …, 2013 | 69 | 2013 |
Mining trends and patterns of software vulnerabilities SS Murtaza, W Khreich, A Hamou-Lhadj, AB Bener Journal of Systems and Software 117, 218-228, 2016 | 60 | 2016 |
Durfex: a feature extraction technique for efficient detection of duplicate bug reports KK Sabor, A Hamou-Lhadj, A Larsson 2017 IEEE international conference on software quality, reliability and …, 2017 | 59 | 2017 |
An approach for mapping features to code based on static and dynamic analysis A Rohatgi, A Hamou-Lhadj, J Rilling 2008 16th IEEE International Conference on Program Comprehension, 236-241, 2008 | 58 | 2008 |
An HMM-based approach for automatic detection and classification of duplicate bug reports N Ebrahimi, A Trabelsi, MS Islam, A Hamou-Lhadj, K Khanmohammadi Information and Software Technology 113, 98-109, 2019 | 55 | 2019 |
Techniques to simplify the analysis of execution traces for program comprehension A Hamou-Lhadj University of Ottawa (Canada), 2006 | 50 | 2006 |
A study of run-time behavioral evolution of benign versus malicious apps in android H Cai, X Fu, A Hamou-Lhadj Information and Software Technology 122, 106291, 2020 | 48 | 2020 |
Automatic prediction of the severity of bugs using stack traces and categorical features KK Sabor, M Hamdaqa, A Hamou-Lhadj Information and Software Technology 123, 106205, 2020 | 46 | 2020 |
JCHARMING: A bug reproduction approach using crash traces and directed model checking M Nayrolles, A Hamou-Lhadj, S Tahar, A Larsson 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and …, 2015 | 46 | 2015 |