Follow
guy-vincent jourdan
Title
Cited by
Cited by
Year
Tracking phishing attacks over time
Q Cui, GV Jourdan, GV Bochmann, R Couturier, IV Onut
Proceedings of the 26th International Conference on World Wide Web, 667-676, 2017
1122017
A brief history of web crawlers
SM Mirtaheri, ME Dinçktürk, S Hooshmand, GV Bochmann, GV Jourdan, ...
arXiv preprint arXiv:1405.0749, 2014
822014
A general approach to trace-checking in distributed computing systems
C Jard, GV Jourdan, T Jéron, JX Rampon
14th International Conference on Distributed Computing Systems, 396-403, 1994
621994
Crawling rich internet applications: the state of the art
S Choudhary, ME Dincturk, SM Mirtaheri, A Moosavi, G Von Bochmann, ...
Proceedings of the 2012 Conference of the Center for Advanced Studies on …, 2012
572012
Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review
E Badawi, GV Jourdan
IEEE Access 8, 200021-200037, 2020
532020
A model-based approach for crawling rich internet applications
ME Dincturk, GV Jourdan, GV Bochmann, IV Onut
ACM Transactions on the Web (TWEB) 8 (3), 1-39, 2014
452014
A strategy for efficient crawling of rich internet applications
K Benjamin, G Von Bochmann, ME Dincturk, GV Jourdan, IV Onut
Web Engineering: 11th International Conference, ICWE 2011, Paphos, Cyprus …, 2011
452011
Testing input/output partial order automata
S Haar, C Jard, GV Jourdan
International Workshop on Formal Approaches to Software Testing, 171-185, 2007
442007
Testing systems specified as partial order input/output automata
G Bochmann, S Haar, C Jard, GV Jourdan
International Workshop on Formal Approaches to Software Testing, 169-183, 2008
412008
Computing on-line the lattice of maximal antichains of posets
GV Jourdan, JX Rampon, C Jard
Order 11 (3), 197-210, 1994
401994
A statistical approach for efficient crawling of rich internet applications
ME Dincturk, S Choudhary, G Von Bochmann, GV Jourdan, IV Onut
Web Engineering: 12th International Conference, ICWE 2012, Berlin, Germany …, 2012
382012
Using url shorteners to compare phishing and malware attacks
S Le Page, GV Jourdan, GV Bochmann, J Flood, IV Onut
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-13, 2018
352018
Reduced checking sequences using unreliable reset
GV Jourdan, H Ural, H Yenigün
Information Processing Letters 115 (5), 532-535, 2015
312015
On-the-fly analysis of distributed computations
E Fromentin, C Jard, GV Jourdan, M Raynal
Information Processing Letters 54 (5), 267-274, 1995
311995
Dependency tracking and filtering in distributed computations
C Jard, GV Jourdan
IRISA, 1994
291994
An automatic detection and analysis of the bitcoin generator scam
E Badawi, GV Jourdan, G Bochmann, IV Onut
2020 IEEE european symposium on security and privacy workshops (EuroS&PW …, 2020
272020
Building rich internet applications models: Example of a better strategy
S Choudhary, ME Dincturk, SM Mirtaheri, GV Jourdan, G Bochmann, ...
Web Engineering: 13th International Conference, ICWE 2013, Aalborg, Denmark …, 2013
262013
Lightweight protection against brute force login attacks on web applications
C Adams, GV Jourdan, JP Levac, F Prevost
2010 Eighth International Conference on Privacy, Security and Trust, 181-188, 2010
252010
Solving some modeling challenges when testing rich internet applications for security
S Choudhary, ME Dincturk, GV Bochmann, GV Jourdan, IV Onut, ...
2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012
242012
Some modeling challenges when testing rich internet applications for security
K Benjamin, G Bochmann, GV Jourdan, IV Onut
2010 Third International Conference on Software Testing, Verification, and …, 2010
242010
The system can't perform the operation now. Try again later.
Articles 1–20