Follow
guy-vincent jourdan
Title
Cited by
Cited by
Year
Tracking phishing attacks over time
Q Cui, GV Jourdan, GV Bochmann, R Couturier, IV Onut
Proceedings of the 26th International Conference on World Wide Web, 667-676, 2017
942017
A brief history of web crawlers
SM Mirtaheri, ME Dinçktürk, S Hooshmand, GV Bochmann, GV Jourdan, ...
arXiv preprint arXiv:1405.0749, 2014
742014
A general approach to trace-checking in distributed computing systems
C Jard, GV Jourdan, T Jeron, JX Rampon
14th International Conference on Distributed Computing Systems, 396-403, 1994
641994
Crawling rich internet applications: the state of the art
S Choudhary, ME Dincturk, SM Mirtaheri, A Moosavi, G Von Bochmann, ...
Proceedings of the 2012 Conference of the Center for Advanced Studies on …, 2012
572012
A model-based approach for crawling rich internet applications
ME Dincturk, GV Jourdan, GV Bochmann, IV Onut
ACM Transactions on the Web (TWEB) 8 (3), 1-39, 2014
462014
A strategy for efficient crawling of rich internet applications
K Benjamin, G Von Bochmann, ME Dincturk, GV Jourdan, IV Onut
Web Engineering: 11th International Conference, ICWE 2011, Paphos, Cyprus …, 2011
452011
Testing input/output partial order automata
S Haar, C Jard, GV Jourdan
Testing of Software and Communicating Systems: 19th IFIP TC6/WG6. 1 …, 2007
442007
Testing systems specified as partial order input/output automata
G Bochmann, S Haar, C Jard, GV Jourdan
Testing of Software and Communicating Systems: 20th IFIP TC 6/WG 6.1 …, 2008
422008
Computing on-line the lattice of maximal antichains of posets
GV Jourdan, JX Rampon, C Jard
Inria, 1994
391994
A statistical approach for efficient crawling of rich internet applications
ME Dincturk, S Choudhary, G Von Bochmann, GV Jourdan, IV Onut
Web Engineering: 12th International Conference, ICWE 2012, Berlin, Germany …, 2012
382012
Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review
E Badawi, GV Jourdan
IEEE Access 8, 200021-200037, 2020
372020
Using url shorteners to compare phishing and malware attacks
S Le Page, GV Jourdan, GV Bochmann, J Flood, IV Onut
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-13, 2018
352018
On-the-fly analysis of distributed computations
E Fromentin, C Jard, GV Jourdan, M Raynal
Information Processing Letters 54 (5), 267-274, 1995
311995
Reduced checking sequences using unreliable reset
GV Jourdan, H Ural, H Yenigün
Information Processing Letters 115 (5), 532-535, 2015
292015
Dependency tracking and filtering in distributed computations
C Jard, GV Jourdan
IRISA, 1994
281994
Building rich internet applications models: Example of a better strategy
S Choudhary, ME Dincturk, SM Mirtaheri, GV Jourdan, G Bochmann, ...
Web Engineering: 13th International Conference, ICWE 2013, Aalborg, Denmark …, 2013
252013
Solving some modeling challenges when testing rich internet applications for security
S Choudhary, ME Dincturk, GV Bochmann, GV Jourdan, IV Onut, ...
2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012
242012
Some modeling challenges when testing rich internet applications for security
K Benjamin, G Bochmann, GV Jourdan, IV Onut
2010 Third International Conference on Software Testing, Verification, and …, 2010
232010
Dist-ria crawler: A distributed crawler for rich internet applications
SM Mirtaheri, D Zou, GV Bochmann, GV Jourdan, IV Onut
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013
212013
Lightweight protection against brute force login attacks on web applications
C Adams, GV Jourdan, JP Levac, F Prevost
2010 Eighth International Conference on Privacy, Security and Trust, 181-188, 2010
212010
The system can't perform the operation now. Try again later.
Articles 1–20