![]() | Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Arrott, A., Lalonde Levesque, F., Batchelder, D., & Fernandez, J. M. (2016, May). Citizen cybersecurity health metrics for Windows computers [Paper]. Central and Eastern European e|Dem and e|Gov Days (CEEGOV Days 2016), Budapest, Hungary. Unavailable
Aimeur, E., Brassard, G., Fernandez, J. M., & Onana, F. S. M. (2008). Alambic: a Privacy-Preserving Recommender System for Electronic Commerce. International Journal of Information Security, 7(5), 307-334. External link
Aïmeur, E., Brassard, G., Fernandez, J. M., Mani Onana, F. S., & Rakowski, Z. (2008, March). Experimental demonstration of a hybrid privacy-preserving Recommender system [Paper]. 3rd International Conference on Availability, Security, and Reliability (ARES 2008), Barcelona, Spain. External link
Aïmeur, E., Brassard, G., Fernandez, J. M., & Onana Mani, F. S. (2006, April). Privacy-preserving demographic filtering [Paper]. ACM Symposium on Applied Computing, Dijon, France. External link
Bresteau, C., Guigui, S., Berthier, P., & Fernandez, J. M. (2018, April). On the security of aeronautical datalink communications: problems and solutions [Paper]. Integrated Communications, Navigation, Surveillance Conference (ICNS 2018), Herndon, VA (4 pages). External link
Berthier, P., Bresteau, C., & Fernandez, J. M. (2017, October). On the security of aircraft communication networks [Paper]. 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017), Lucca, Italy. External link
Berthier, P., Fernandez, J. M., & Robert, J.-M. (2017, September). SAT : Security in the air using Tesla [Paper]. IEEE/AIAA 36th Digital Avionics Systems Conference (DASC 2017), St. Petersburg, FL (10 pages). External link
Bonfante, G., Fernandez, J. M., Marion, J.-Y., Rouxel, B., Sabatier, F., & Thierry, A. (2015, October). CoDisasm: Medium scale concatic disassembly of self-modifying binaries with overlapping instructions [Paper]. 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 2015), Denver, CO, United states. External link
Brassard, G., Elias, Y., Fernandez, J. M., Gilboa, H., Jones, J. A., Mor, T., Weinstein, Y., & Xiao, L. (2014). Experimental heat-bath cooling of spins. European Physical Journal Plus, 129(12), 20 pages. External link
Boteanu, D., & Fernandez, J. M. (2013). A Comprehensive Study of Queue Management as a Dos Counter-Measure. International Journal of Information Security, 12(5), 347-382. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Fernandez, J. M. (2013, March). Confidentiality-preserving query execution of fragmented outsourced data [Paper]. International Conference on Information and Communication Technology (ICT-EurAsia 2013), Yogyakarta, Indonesia. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., Fernandez, J. M., & Gross-Amblard, D. (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 4(2), 39-62. External link
Boteanu, D., Reich, E., Fernandez, J. M., & McHugh, J. (2007, October). Implementing and testing dynamic timeout adjustment as a DoS counter-measure [Paper]. ACM Quality of Protection, Alexandria, Virginia. External link
Bureau, P.-M., & Fernandez, J. M. (2007, April). Optimising Networks against Malware [Paper]. 2nd International Swarm Intelligence and Other Forms of Malware Workshop (MALWARE'07), New Orleans, Louisiana. External link
Boteanu, D., Fernandez, J. M., McHugh, J., & Mullins, J. (2007, October). Queue management as a DoS counter-measure? [Paper]. 10th Information Security Conference (ISC 2007), Valparaiso, Chile. External link
Boteanu, D., Fernandez, J. M., & Mullins, J. (2006). On the efficiency of timeout-based DoS attack protections. (Technical Report n° EPM-RT-2006-07). Unavailable
Beaudry, M., Fernandez, J. M., & Holzer, M. (2005). A Common Algebraic Description for Probabilistic and Quantum Computations. Theoretical Computer Science, 345(2-3), 206-234. External link
Beaudry, M., Fernandez, J. M., & Holzer, M. (2004, August). A common algebraic description for probabilistic and quantum computations [Paper]. 29th International Symposium on Mathematical Foundations of Computer Science (MFCS 2004), Prague, Czech Republic. External link
Calvet, J., Lalonde Levesque, F., Fernandez, J. M., Traourouder, E., Menet, F., & Marion, J.-Y. (2015, September). WaveAtlas : surfing through the landscape of current malware [Paper]. Virus Bulletin Conference (VB 2015), Prague, Czech Republic. External link
Cartier, G., Cartier, J.-F., & Fernandez, J. M. (2013, June). Next-generation DoS at the higher layers: A study of SMTP flooding [Paper]. 7th International Conference on Network and System Security (NSS 2013), Madrid, Spain. External link
Calvet, J., Fernandez, J. M., & Marion, J.-Y. (2012, October). Aligot: Cryptographic function identification in obfuscated binary programs [Paper]. ACM Conference on Computer and Communications Security (CCS 2012), Raleigh, NC, United states. External link
Calvet, J., Davis, C. R., Fernandez, J. M., Marion, J.-Y., St-Onge, P.-L., Guizani, W., Bureau, P.-M., & Somayaji, A. (2010, December). The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet [Paper]. 26th Annual Computer Security Applications Conference, Austin, TX, USA. External link
Calvet, J., Davis, C. R., Fernandez, J. M., Guizani, W., Kaczmarek, M., Marion, J.-Y., & St-Onge, P.-L. (2010, August). Isolated virtualised clusters : testbeds for high-risk security experimentation and training [Paper]. 3rd International Conference on Cyber Security Experimentation and Test (CSET 2010), Washington, DC, USA. External link
Calvet, J., Fernandez, J. M., Bureau, P.-M., & Marion, J.-Y. (2010, September). Large-scale malware experiments why, how, and so what [Paper]. 20th Virus Bulletin International Conference, Vancouver, BC, Canada. External link
Dominguez, A., Saunier, N., Alcaraz, C., Al Mallah, R., & Fernandez, J. M. (2022, January). Reinforcement-Learning-Based Attack on Adaptive Traffic Control Systems [Paper]. Transportation Research Board Annual Meeting, Washington, D.C. External link
Dupont, B., Côté, A.-M., Boutin, J.-I., & Fernandez, J. M. (2017). Darkode: Recruitment Patterns and Transactional Features of “the Most Dangerous Cybercrime Forum in the World”. American Behavioral Scientist, 61(11), 1219-1243. External link
Davis, C. R., Fernandez, J. M., & Neville, S. (2009, October). Optimising sybil attacks against P2P-based botnets [Paper]. 4th International Conference on Malicious and Unwanted Software (MALWARE 2009), Montréal, Québec. External link
Davis, C. R., Neville, S., Fernandez, J. M., Robert, J.-M., & McHugh, J. (2008, October). Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures? [Paper]. 13th European Symposium on Research in Computer Security (ESORICS 2008), Malaga, Spain. External link
Davis, C. R., Fernandez, J. M., Neville, S., & McHugh, J. (2008, October). Sybil attacks as a mitigation strategy against the Storm botnet [Paper]. 3rd International Conference on Malicious and Unwanted Software (MALWARE 2008), Alexandria, VA, USA. External link
Elias, Y., Fernandez, J. M., Mor, T., & Weinstein, Y. (2007, August). Optimal algorithmic cooling of spins [Paper]. 6th International Conference on Unconventional Computation (UC 2007), Kingston, ON, Canada. External link
Elias, Y., Fernandez, J. M., Mor, T., & Weinstein, Y. (2006). Optimal Algorithmic Cooling of Spins. Israel Journal of Chemistry, 46(4), 371-391. External link
Faou, M., Lemay, A., Décary-Hétu, D., Calvet, J., Labrèche, F., Jean, M., Dupont, B., & Fernandez, J. M. (2016, December). Follow the traffic: Stopping click fraud by disrupting the value chain [Paper]. 14th Annual Conference on Privacy, Security and Trust (PST 2016), Auckland, New Zealand. External link
Faou, M., Calvet, J., Lemay, A., Fernandez, J. M., & Bureau, P.-M. (2016, October). The good, the bad and the ugly : the advertiser, the bot & the traffic broker [Paper]. 26th Virus Bulletin Conference (VB 2016), Denver, CO. External link
Fernandez, J. M., Patrick, A. S., & Zuck, L. D. (2012, March). Ethical and secure data sharing across borders [Paper]. 16th International Conference on Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, Netherlands. External link
Fernandez, J. M., & Bureau, P.-M. (2006, April). Optimising malware [Paper]. 25th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, United States. External link
Fernandez, J. M., Mor, T., & Weinstein, Y. (2005). Paramagnetic Materials and Practical Algorithmic Cooling for Nmr Quantum Computing. International Journal of Quantum Information, 3(1), 281-285. External link
Fernandez, J. M., Lloyd, S., Mor, T., & Roychowdhury, V. (2004). Algorithmic Cooling of Spins: a Practicable Method for Increasing Polarization. International Journal of Quantum Information, 2(4), 461-477. External link
Fernandez, J. M. (2003). De computatione quantica [Ph.D. Thesis, Université de Montréal]. External link
Gassais, R., Ezzati-Jivan, N., Fernandez, J. M., Aloise, D., & Dagenais, M. (2020). Multi-level host-based intrusion detection system for Internet of things. Journal of Cloud Computing-Advances Systems and Applications, 9(1), 62 (16 pages). External link
Lemay, A., Calvet, J., Menet, F., & Fernandez, J. M. (2018). Survey of publicly available reports on advanced persistent threat actors. Computers & Security, 72(Supplement), 26-59. External link
Lévesque, F. L., Chiasson, S., Somayaji, A., & Fernandez, J. M. (2018). Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach. ACM Transactions on Privacy and Security (TOPS), 21(4), 1-30. External link
Lemay, A., Leblanc, S., Knight, S., & Fernandez, J. M. (2017, March). Affecting freedom of action in cyber space: Subtle effects and skilled operators [Paper]. 12th International Conference on Cyber Warfare and Security (ICCWS 2017), Dayton, OH. Unavailable
Lalonde Lévesque, F., Fernandez, J. M., & Batchelder, D. (2017, July). Age and gender as independent risk factors for malware victimisation [Paper]. 31th International British Human Computer Interaction Conference (BHCI 2017), Sunderland, UK (14 pages). External link
Lam, A., Fernandez, J. M., & Frank, R. (2017, March). Cyberterrorists bringing down airplanes: Will it happen soon? [Paper]. 12th International Conference on Cyber Warfare and Security (ICCWS 2017), Dayton, OH. Unavailable
Lalonde Levesque, F., Fernandez, J. M., Young, G., & Batchelder, D. (2016, October). Are they real? Real-life comparative tests of anti-virus products [Paper]. 26th Virus Bulletin Conference (VB 2016), Denver, CO. External link
Lemay, A., Sadighian, A., & Fernandez, J. M. (2016, March). Lightweight Journaling For Scada Systems Via Event Correlation [Paper]. 10th Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (ICCIP 2016), Arlington, VA. External link
Lemay, A., Fernandez, J. M., & Knight, S. (2016, April). A Modbus command and control channel [Paper]. Annual IEEE Systems Conference (SysCon 2016), Orlando, FL, USA (6 pages). External link
Lalonde Levesque, F., Fernandez, J. M., Somayaji, A., & Batchelder, D. (2016, June). National-level risk assessment : a multi-country study of malware infections [Paper]. 15th Annual Workshop on the Economics of Information Security (WEIS 2016), Berkeley, CA (30 pages). External link
Lemay, A., Rochon, J., & Fernandez, J. M. (2016, August). A practical flow white list approach for SCADA systems [Paper]. 4th International Symposium for ICS & SCADA Cyber Security Research (ICR-CSR 2016), Belfast, United Kingdom (4 pages). External link
Lemay, A., & Fernandez, J. M. (2016, August). Providing SCADA network data sets for intrusion detection research [Paper]. 9th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2016), Austin, Tx. External link
Lemay, A., Knight, S., Fernandez, J. M., & Leblanc, S. (2016, July). The sound a rattling cyber-sabre makes: Cases studies in cyber power projection [Paper]. 15th European Conference on Cyber Warfare and Security (ECCWS 2016), Munich, Germany. Unavailable
Lévesque, F. L., Somayaji, A., Batchelder, D., & Fernandez, J. M. (2015, October). Measuring the health of antivirus ecosystems [Paper]. 10th International Conference on Malicious and Unwanted Software (MALWARE 2015), Fajardo, PR, USA. External link
Lemay, A., Krotofil, M., Fernandez, J. M., & Knight, S. (2014, September). Not all SCADA is equal : impact of control models on ICS threat landscape [Paper]. 2nd International Symposium on ICS & SCADA Cyber Security Research (ICS-CSR 2014), St Pölten, Austria. Published in BCS Learning & Development. Available
Lalonde Levesque, F., & Fernandez, J. M. (2014, August). Computer security clinical trials : lessons learned from a 4-month pilot study [Paper]. 7th Workshop on Cyber Security Experimentation and Test (CSET 2014), San Diego, CA (9 pages). External link
Lemay, A., Knight, S., & Fernandez, J. M. (2014, March). Intelligence preparation of the cyber environment (IPCE): finding the high ground in cyberspace [Paper]. 9th International Conference on Cyber Warfare and Security (ICCWS 2014), West Lafayette, IN. External link
Lemay, A., Fernandez, J. M., & Knight, S. (2014, April). Modelling physical impact of cyber attacks [Paper]. Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES 2014), held as part of CPS Week, Berlin, Germany. External link
Lévesque, F. L., Fernandez, J. M., & Somayaji, A. (2014, October). Risk prediction of malware victimization based on user behavior [Paper]. 9th International Conference on Malicious and Unwanted Software: The Americas, MALWARE 2014, Fajardo, Puerto Rico, USA. External link
Lalonde Levesque, F., Nsiempba, J., Fernandez, J. M., Chiasson, S., & Somayaji, A. (2013, November). A clinical study of risk factors related to malware infections [Paper]. ACM SIGSAC Conference on Computer and Communications Security (CCS 2013), Berlin, Germany. External link
Lemay, A., Fernandez, J. M., & Knight, S. (2013, September). An isolated virtual cluster for SCADA network security research [Paper]. 1st International Symposium for ICS & SCADA Cyber Security Research, Leicester, Angleterre. Available
Lalonde Lévesque, F., Davis, C. R., Fernandez, J. M., & Somayaji, A. (2012, September). Evaluating anti-virus products with field studies [Paper]. 22nd Virus Bulletin International Conference, Dallas, TX, USA. External link
Lalonde Levesque, F., Davis, C. R., Fernandez, J. M., Chiasson, S., & Somayaji, A. (2012, March). Methodology for a field study of anti-malware software [Paper]. 16th International Conference on Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, Netherlands. External link
Lemay, A., Fernandez, J. M., & Knight, S. (2010, June). Pinprick attacks, a lesser included case [Paper]. Conference on Cyber Conflict, Tallinn, Estonia. External link
Menet, F., Berthier, P., Gagnon, M., & Fernandez, J. M. (2020). Spartan Networks: Self-feature-squeezing neural networks for increased robustness in adversarial settings. Computers and Security, 88, 101537 (17 pages). External link
Menet, F., Berthier, P., Gagnon, M., & Fernandez, J. M. (2018, October). Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings [Poster]. ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), Toronto, Canada. External link
Mor, T., Roychowdhury, V., Lloyd, S., Fernandez, J. M., & Weinstein, Y. (2005). Algorithmic cooling. (Patent no. US6873154). External link
Ngamboe Mvogo, M. S., Niu, X., Joly, B., Biegler, S. P., Berthier, P., Benito, R., Rice, G., Fernandez, J. M., & Nicolescu, G. (2024). CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B. International Journal of Critical Infrastructure Protection, 48, 100728 (17 pages). External link
Ngamboe Mvogo, M. S., Berthier, P., Ammari, N., Dyrda, K., & Fernandez, J. M. (2021). Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED). International Journal of Information Security, 20(4), 621-645. Available
Ngamboé, M., Fernandez, J. M., & Dyrda, K. (2021). Radio-based cyber-attacks against pacemakers : assessing their chance of success under real conditions. Cardiology and Cardiovascular Medicine, 5(6), 591-598. External link
Neal, C., Dagdougui, H., Lodi, A., & Fernandez, J. M. (2021, January). Reinforcement Learning Based Penetration Testing of a Microgrid Control Algorithm [Paper]. 11th IEEE Annual Computing and Communication Workshop and Conference (CCWC 2021), Nevada, USA. External link
Neal, C., Al Mallah, R., Fernandez, J. M., & Lodi, A. (2020, August). Analyzing the Resiliency of Microgrid Control Algorithms Against Malicious Input [Paper]. 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2020), London, ON, Canada (6 pages). External link
Nicolescu, G., Tria, A., Fernandez, J. M., Marion, J.-Y., & García-Alfaro, J. (2020, December). Foundations and Practice of Security [Paper]. 13th International Symposium on Foundations and Practice of Security (FPS 2020), Montréal, Québec. External link
Nsiempba, J. J., Lévesque, F. L., De Marcellis-Warin, N., & Fernandez, J. M. (2017, September). An empirical analysis of risk aversion in malware infections [Paper]. 12th International Conference on Risks and Security of Internet and Systems (CRiSIS 2017), Dinard, France. External link
Nilizadeh, S., Labreche, F., Sedighian, A., Zand, A., Fernandez, J. M., Kruegel, C., Stringhini, G., & Vigna, G. (2017, October). POISED: Spotting twitter spam off the beaten paths [Paper]. 24th ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), Dallas, TX. External link
Naifer, H., Pierre, S., & Fernandez, J. M. (2007). La sécurité dans les réseaux locaux sans fil. IEEE Canadian Review, 2007(54 (Spring), 20-22. External link
Roehrig, C., & Fernandez, J. M. (2009, August). The supervision of research projects entailing computer risks within an academic context: the case of École Polytechnique de Montréal [Paper]. International Conference on Engineering Education and Research (ICEE-ICEER 2009), Seoul, Korea. External link
Sadighian, A., Fernandez, J. M., Lemay, A., & Zargar, S. T. (2013, October). ONTIDS: A highly flexible context-aware and ontology-based alert correlation framework [Paper]. 6th International Symposium on Foundations and Practice of Security (FPS 2013), La Rochelle, France. External link
Sadighian, A., Zargar, S. T., Fernandez, J. M., Lemay, A., & Joshi, J. (2013, October). Semantic-based Context-aware Alert Fusion for Distributed Intrusion Detection Systems [Paper]. 8th International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), La Rochelle, France. External link
Somayaji, A., Li, Y., Inoue, H., Fernandez, J. M., & Ford, R. (2009, August). Evaluating Security Products with Clinical Trials [Paper]. 2nd Workshop on Cyber security Experimentation and Test (CSET 2009), Montréal, Québec. External link
Soudagar, Y., Bussières, F., Berlín, G., Lacroix, S., Fernandez, J. M., & Godbout, N. (2007). Cluster-State Quantum Computing in Optical Fibers. Journal of the Optical Society of America B: Optical Physics, 24(2), 226-230. External link
Soudagar, Y., Buissièeres, F., Fernandez, J. M., & Godbout, N. (2007). Creation of a Two-Photon 4-Qubit Square Cluster in Optical Fibres. Laser Science. External link
Tlili, S., Fernandez, J. M., Belghith, A., Dridi, B., & Hidouri, S. (2014, September). Scalable Security Verification of Software at Compile Time [Paper]. 14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2014), Victoria, British Columbia. External link
Urdaneta, M., Lemay, A., Saunier, N., & Fernandez, J. M. (2018, March). A cyber-physical test bed for measuring the impacts of cyber attacks on urban road networks [Paper]. 12th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Arlington, Virginia. External link
Xiao, B., Aimeur, E., & Fernandez, J. M. (2003, June). PCFinder : an intelligent product recommendation agent for e-commerce [Paper]. IEEE International Conference on E-Commerce (CEC 2003), New Port Beach, CA (8 pages). External link