Tracking phishing attacks over time Q Cui, GV Jourdan, GV Bochmann, R Couturier, IV Onut Proceedings of the 26th International Conference on World Wide Web, 667-676, 2017 | 126 | 2017 |
A brief history of web crawlers SM Mirtaheri, ME Dinçktürk, S Hooshmand, GV Bochmann, GV Jourdan, ... arXiv preprint arXiv:1405.0749, 2014 | 87 | 2014 |
Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review E Badawi, GV Jourdan IEEE Access 8, 200021-200037, 2020 | 71 | 2020 |
A general approach to trace-checking in distributed computing systems C Jard, GV Jourdan, T Jéron, JX Rampon 14th International Conference on Distributed Computing Systems, 396-403, 1994 | 62 | 1994 |
Crawling rich internet applications: the state of the art S Choudhary, ME Dincturk, SM Mirtaheri, A Moosavi, G Von Bochmann, ... Proceedings of the 2012 Conference of the Center for Advanced Studies on …, 2012 | 56 | 2012 |
A strategy for efficient crawling of rich internet applications K Benjamin, G Von Bochmann, ME Dincturk, GV Jourdan, IV Onut Web Engineering: 11th International Conference, ICWE 2011, Paphos, Cyprus …, 2011 | 46 | 2011 |
A model-based approach for crawling rich internet applications ME Dincturk, GV Jourdan, GV Bochmann, IV Onut ACM Transactions on the Web (TWEB) 8 (3), 1-39, 2014 | 45 | 2014 |
Testing input/output partial order automata S Haar, C Jard, GV Jourdan International Workshop on Formal Approaches to Software Testing, 171-185, 2007 | 43 | 2007 |
Testing systems specified as partial order input/output automata G Bochmann, S Haar, C Jard, GV Jourdan International Workshop on Formal Approaches to Software Testing, 169-183, 2008 | 41 | 2008 |
Computing on-line the lattice of maximal antichains of posets GV Jourdan, JX Rampon, C Jard Order 11 (3), 197-210, 1994 | 40 | 1994 |
Using url shorteners to compare phishing and malware attacks S Le Page, GV Jourdan, GV Bochmann, J Flood, IV Onut 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-13, 2018 | 39 | 2018 |
A statistical approach for efficient crawling of rich internet applications ME Dincturk, S Choudhary, G Von Bochmann, GV Jourdan, IV Onut Web Engineering: 12th International Conference, ICWE 2012, Berlin, Germany …, 2012 | 39 | 2012 |
Reduced checking sequences using unreliable reset GV Jourdan, H Ural, H Yenigün Information Processing Letters 115 (5), 532-535, 2015 | 33 | 2015 |
An automatic detection and analysis of the bitcoin generator scam E Badawi, GV Jourdan, G Bochmann, IV Onut 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 30 | 2020 |
On-the-fly analysis of distributed computations E Fromentin, C Jard, GV Jourdan, M Raynal Information Processing Letters 54 (5), 267-274, 1995 | 30 | 1995 |
Dependency tracking and filtering in distributed computations C Jard, GV Jourdan IRISA, 1994 | 28 | 1994 |
Building rich internet applications models: Example of a better strategy S Choudhary, ME Dincturk, SM Mirtaheri, GV Jourdan, G Bochmann, ... International Conference on Web Engineering, 291-305, 2013 | 26 | 2013 |
Solving some modeling challenges when testing rich internet applications for security S Choudhary, ME Dincturk, GV Bochmann, GV Jourdan, IV Onut, ... 2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012 | 25 | 2012 |
Lightweight protection against brute force login attacks on web applications C Adams, GV Jourdan, JP Levac, F Prevost 2010 Eighth International Conference on Privacy, Security and Trust, 181-188, 2010 | 25 | 2010 |
Domain classifier: Compromised machines versus malicious registrations S Le Page, GV Jourdan, GV Bochmann, IV Onut, J Flood Web Engineering: 19th International Conference, ICWE 2019, Daejeon, South …, 2019 | 24 | 2019 |