Mongi Debbabi

  • Citations Per Year
Learn More
Forensic analysis of physical memory is gaining good attention from experts in the community especially after recent development of valuable tools and techniques. Investigators find it very helpful to seize physical memory contents and perform post-incident analysis of this potential evidence. Most of the research carried out focus on enumerating processes(More)
Diffie-Hellman (DH) is a well-known cryptographic algorithm used for secure key exchange. The first appearance of DH was in 1976. The algorithm allows two users to exchange a symmetric secret key through an insecure wired or wireless channel and without any prior secrets. DH works under the domain of integers Z*/sub n/ where n = p. Here, p and /spl alpha/(More)
Considerable work has been carried out in recent years on vulnerability assessment of Critical Infrastructure Systems (CIS). Recent man-introduced hazard, including the 9/11 terrorist attack on the World Trade Center (WTC) in New York highlighted critical need to assess and evaluate the vulnerably of CIS with a focus on providing well coordinated and(More)
Simple network management protocol (SNMP) is widely used for monitoring and managing computers and network devices on wired and wireless network. SNMPv1 and v2 do not provide security when managing agents. Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM).(More)
The present article details the formation of lanthanum-modified apatites and the binding process of tartrate ions with these obtained apatites. Chemical analyses, FT-IR and (31)P NMR spectroscopies, XRD powder, TGA, and TEM analyses were employed for studying the reaction between Ca(10)(PO(4))(6)(OH)(2) (HAp) or Ca(10)(PO(4))(6)(F)(2) (FAp) and LaCl(3). The(More)
Security plays a predominant role in software engineering. Enforcing security policies should be considered during the early stages of the software development lifecycle to prevent security breaches in the final products. Because of the pervasive nature of security, integrating security solutions at the software design level may result in the scattering and(More)
Natural and synthesis apatites represent a cost effective soil amendment, which can be used for in situ reduction of lead bioavailability and mobility. In our previous work, we selected Tunisian Phosphate Rock (TPR) and Hydroxyapatite (CaHAp) as promising minerals for the removal of lead from aqueous solutions. X-ray powder diffraction patterns (DRX), Infra(More)
This paper presents an implicitly-typed functional, aspect-oriented programming language: lambda_AOP. The main contribution of the paper is a semantics for lambda_AOP advice weaving. The weaving is type-based and implemented statically. We extend the Hindley-Milner type inference system to inject applicable advices into lambda expressions during typing. The(More)
  • 1