Tracking phishing attacks over time Q Cui, GV Jourdan, GV Bochmann, R Couturier, IV Onut Proceedings of the 26th International Conference on World Wide Web, 667-676, 2017 | 94 | 2017 |
A brief history of web crawlers SM Mirtaheri, ME Dinçktürk, S Hooshmand, GV Bochmann, GV Jourdan, ... arXiv preprint arXiv:1405.0749, 2014 | 74 | 2014 |
A general approach to trace-checking in distributed computing systems C Jard, GV Jourdan, T Jeron, JX Rampon 14th International Conference on Distributed Computing Systems, 396-403, 1994 | 64 | 1994 |
Crawling rich internet applications: the state of the art S Choudhary, ME Dincturk, SM Mirtaheri, A Moosavi, G Von Bochmann, ... Proceedings of the 2012 Conference of the Center for Advanced Studies on …, 2012 | 57 | 2012 |
A model-based approach for crawling rich internet applications ME Dincturk, GV Jourdan, GV Bochmann, IV Onut ACM Transactions on the Web (TWEB) 8 (3), 1-39, 2014 | 46 | 2014 |
A strategy for efficient crawling of rich internet applications K Benjamin, G Von Bochmann, ME Dincturk, GV Jourdan, IV Onut Web Engineering: 11th International Conference, ICWE 2011, Paphos, Cyprus …, 2011 | 45 | 2011 |
Testing input/output partial order automata S Haar, C Jard, GV Jourdan Testing of Software and Communicating Systems: 19th IFIP TC6/WG6. 1 …, 2007 | 44 | 2007 |
Testing systems specified as partial order input/output automata G Bochmann, S Haar, C Jard, GV Jourdan Testing of Software and Communicating Systems: 20th IFIP TC 6/WG 6.1 …, 2008 | 42 | 2008 |
Computing on-line the lattice of maximal antichains of posets GV Jourdan, JX Rampon, C Jard Inria, 1994 | 39 | 1994 |
A statistical approach for efficient crawling of rich internet applications ME Dincturk, S Choudhary, G Von Bochmann, GV Jourdan, IV Onut Web Engineering: 12th International Conference, ICWE 2012, Berlin, Germany …, 2012 | 38 | 2012 |
Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review E Badawi, GV Jourdan IEEE Access 8, 200021-200037, 2020 | 37 | 2020 |
Using url shorteners to compare phishing and malware attacks S Le Page, GV Jourdan, GV Bochmann, J Flood, IV Onut 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-13, 2018 | 35 | 2018 |
On-the-fly analysis of distributed computations E Fromentin, C Jard, GV Jourdan, M Raynal Information Processing Letters 54 (5), 267-274, 1995 | 31 | 1995 |
Reduced checking sequences using unreliable reset GV Jourdan, H Ural, H Yenigün Information Processing Letters 115 (5), 532-535, 2015 | 29 | 2015 |
Dependency tracking and filtering in distributed computations C Jard, GV Jourdan IRISA, 1994 | 28 | 1994 |
Building rich internet applications models: Example of a better strategy S Choudhary, ME Dincturk, SM Mirtaheri, GV Jourdan, G Bochmann, ... Web Engineering: 13th International Conference, ICWE 2013, Aalborg, Denmark …, 2013 | 25 | 2013 |
Solving some modeling challenges when testing rich internet applications for security S Choudhary, ME Dincturk, GV Bochmann, GV Jourdan, IV Onut, ... 2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012 | 24 | 2012 |
Some modeling challenges when testing rich internet applications for security K Benjamin, G Bochmann, GV Jourdan, IV Onut 2010 Third International Conference on Software Testing, Verification, and …, 2010 | 23 | 2010 |
Dist-ria crawler: A distributed crawler for rich internet applications SM Mirtaheri, D Zou, GV Bochmann, GV Jourdan, IV Onut 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013 | 21 | 2013 |
Lightweight protection against brute force login attacks on web applications C Adams, GV Jourdan, JP Levac, F Prevost 2010 Eighth International Conference on Privacy, Security and Trust, 181-188, 2010 | 21 | 2010 |