Wahab Hamou-Lhadj
Wahab Hamou-Lhadj
Professor of Computer/Software Engineering at Concordia University
Verified email at - Homepage
Cited by
Cited by
A survey of trace exploration tools and techniques
A Hamou-Lhadj, TC Lethbridge
Proceedings of the 2004 conference of the Centre for Advanced Studies on …, 2004
Summarizing the content of large traces to facilitate the understanding of the behaviour of a software system
A Hamou-Lhadj, T Lethbridge
14th IEEE International Conference on Program Comprehension (ICPC'06), 181-190, 2006
Recovering behavioral design models from execution traces
A Hamou-Lhadj, E Braun, D Amyot, T Lethbridge
Ninth European Conference on Software Maintenance and Reengineering, 112-121, 2005
An anomaly detection system based on variable N-gram features and one-class SVM
W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi
Information and Software Technology 91, 186-197, 2017
Taxonomy of intrusion risk assessment and response system
A Shameli-Sendi, M Cheriet, A Hamou-Lhadj
Computers & Security 45, 1-16, 2014
Compression techniques to simplify the analysis of large execution traces
A Hamou-Lhadj, TC Lethbridge
Proceedings 10th International Workshop on Program Comprehension, 159-168, 2002
A survey of model-driven testing techniques
M Mussa, S Ouchani, W Al Sammane, A Hamou-Lhadj
2009 Ninth International Conference on Quality Software, 167-172, 2009
Operational-Log Analysis for Big-Data Systems: Challenges and Solutions
A Miranskyy, A Hamou-Lhadj, E Cialini, A Larsson
IEEE Software 37 (4), 486-508, 2011
Software clustering using dynamic analysis and static dependencies
C Patel, A Hamou-Lhadj, J Rilling
2009 13th European Conference on Software Maintenance and Reengineering, 27-36, 2009
A host-based anomaly detection approach by representing system calls as states of kernel modules
SS Murtaza, W Khreich, A Hamou-Lhadj, M Couture
In Proc. of the IEEE 24th International Symposium on Software Reliability …, 2013
Clever: Combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects
M Nayrolles, A Hamou-Lhadj
Proceedings of the 15th international conference on mining software …, 2018
A systematic literature review on automated log abstraction techniques
D El-Masri, F Petrillo, YG Guéhéneuc, A Hamou-Lhadj, A Bouziane
Information and Software Technology 122, 106276, 2020
An approach for mapping features to code based on static and dynamic analysis
A Rohatgi, A Hamou-Lhadj, J Rilling
2008 16th IEEE International Conference on Program Comprehension, 236-241, 2008
Mining trends and patterns of software vulnerabilities
SS Murtaza, W Khreich, A Hamou-Lhadj, AB Bener
Journal of Systems and Software 117, 218-228, 2016
An HMM-based approach for automatic detection and classification of duplicate bug reports
N Ebrahimi, A Trabelsi, MS Islam, A Hamou-Lhadj, K Khanmohammadi
Information and Software Technology 113, 98-109, 2019
Durfex: a feature extraction technique for efficient detection of duplicate bug reports
KK Sabor, A Hamou-Lhadj, A Larsson
2017 IEEE international conference on software quality, reliability and …, 2017
Techniques to simplify the analysis of execution traces for program comprehension
A Hamou-Lhadj
University of Ottawa (Canada), 2006
Stratified sampling of execution traces: Execution phases serving as strata
H Pirzadeh, S Shanian, A Hamou-Lhadj, L Alawneh, A Shafiee
Science of Computer Programming 78 (8), 1099-1118, 2013
Pattern recognition techniques applied to the abstraction of traces of inter-process communication
L Alawneh, A Hamou-Lhadj
2011 15th European Conference on Software Maintenance and Reengineering, 211-220, 2011
Automatic prediction of the severity of bugs using stack traces and categorical features
KK Sabor, M Hamdaqa, A Hamou-Lhadj
Information and Software Technology 123, 106205, 2020
The system can't perform the operation now. Try again later.
Articles 1–20