Main Content

A set of my publications are available in ISU digital repository

Books
L. ben Othmane, M. G. Jaatun, and E. Weippl, Eds., Empirical research for software security: foundations and experience. Taylor and Francis Group, LLC, 2017.

Journals

  1. M. Jedh, L. Ben Othmane, N. Ahmed, and B. Bhargava, Detection of message injection attacks onto the CAN bus using similarities of successive messages-sequence graphs, IEEE Transactions on Information Forensics and Security , 16, 4133–4146, Jul. 2021 Online
  2. L Ben Othmane, L Dhulipala, N Multari, M Govindarasu, On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus, Transactions on Dependable and Secure Computing, 2020 Online
  3. R. Ranchal, B. Bhargava, P. Angin, L. ben Othmane, EPICS: A Framework for Enforcing Security Policies in Composite Web Services, IEEE Transactions on Services Computing, Special Issue on Recent Advances in Web Services Research, vol. 12, issue 3, pp. 415-428, May-June 2019 . Online
  4. L. ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, and A. D. Brucker, Time for addressing software security issues: prediction models and impacting factors, Data Science and Engineering, vol 2, issue 2, pp. 107–124, June 2017 Online
  5. N. Al-hadhrami, B. Aziz, and L. ben Othmane, An incremental B-model for RBAC-controlled electronic marking system, International Journal of Secure Software Engineering (IJSSE), vol. 7, no. (2), pp. 37–64, May 2016.
  6. H. Oueslati, M. M. Rahman, L. ben Othmane, and I. G. A. Arbain, Evaluation of the challenges of developing secure software using the agile approach, International Journal of Secure Software Engineering (IJSSE), vol. 7, no. (1), Jan. 2016.
  7. L. ben Othmane, R. Ranchal, R. Fernando, B. Bhargava, and E. Bodden, Incorporating attacker capabilities in risk estimation and mitigation, Computers and Security, vol. 51, 41–61, Jun. 2015, Elsevier. Online
  8. J. Son, V. Bhuse, L. ben Othmane, and L. Lilien, Incorporating lab experience into computer security courses: Three case studies, Global Journal of Enterprise Information System (GJEIS), vol. 7, no. (2), 2015.
  9. L. ben Othmane, P. Angin, H. Weffers, and B. Bhargava, Extending the agile development approach to develop acceptably secure software, IEEE Transactions on Dependable and Secure Computing, vol. 11, no. (6), 497–509, Nov. 2014.
  10. L. ben Othmane, R. Fernando, R. Ranchal, B. Bhargava, and E. Bodden, Likelihood of threats to connected vehicles, International Journal of Next-generation Computing (IJNGC), vol. 5, no. (3), 290–303, Nov. 2014.
  11. L. Lilien, L. ben Othmane, P. Angin, A. DeCarlo, R. Salih, and B. Bhargava, A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks, Journal of Network and Computer Applications, special Issue Advanced Technologies for Homeland Defense and Security, vol. 38, 3–15. Feb. 2014, Elsevier.
  12. L. ben Othmane, H. Weffers, P. Angin, and B. Bhargava, A time-evolution model for the privacy degree of information disseminated in online social networks, International Journal of Communication Networks and Distributed Systems, vol. 11, no. (4), 412–430, 2013, Inderscience Publishers.

Conference/workshop papers

  1. L. ben Othmane and N. Ahmed, Using garbled circuit for secure brokering, in Proc. the 16th International Conference on Risks and Security of Internet and Systems (CRISIS 2021), Ames, USA, Nov. 2021 Online
  2. A.-M. Jamil, S. Khan, J. K. Lee, and L. ben Othmane, Towards automated threat modeling of cyber-physical systems, in The 7th International Conference on Software Engineering and Computer Systems (ICSECS), Pekan, Malaysia, Aug. 2021, pp.614–619 Online
  3. A.-M. Jamil, L. ben Othmane, and A. Valani, Threat modeling of cyber-physical systems in practice, in Proc. the 16th International Conference on Risks and Security of Internet and Systems (CRISIS 2021), Ames, USA, Nov. 2021 Online
  4. A. M. Jamil, L. ben Othmane, A. Valani, M. Abdelkhalek, and A. Tek, The Current Practices of Changing Secure Software, The 35th ACM/SIGAPP Symposium on Applied Computing, Brno, Czech Republic, Apr., 2020
  5. M. Abdelkhalek, A.-M. Jamil, and L. ben Othmane, Identification of the effects of code changes on the security of software, IEEE 43rd Annual Computer Software and Applications Conference, ser. COMPSAC 2019, Milwaukee, WI, USA, Jul. 2019, pp.569-574 Online
  6. L Ben Othmane, M Lamm, Mindset for Software Architecture Students, Proc. COMPSAC 2019: Data Driven Intelligence for a Smarter World, July, 2019 Online
  7. L. ben Othmane, V. Alvarez, K. Berner, M. Fuhrmann, W. Fuhrmann, A. Guss, and T. Hartsock, Demo: A low-cost fleet monitoring system, Proc. Fourth IEEE Annual International Smart Cities Conference, Kansas City, MO, Sep. 2018.Online
  8. S. Sardesai, D. Ulybyshev, L. B. Othmane, and B. Bhargava, Impacts of security attacks on the effectiveness of collaborative adaptive cruise control mechanism, in The Fourth IEEE Annual In- ternational Smart Cities Conference, Kansas City, MO, Sep. 2018.Online
  9. V. Mohan, L. ben Othmane, and A. Kres, BP: Security concerns and best practices for the automation of software deployment processes - an industrial case study, in Proc. IEEE Cybersecurity Development Conference, Cambridge, USA, 2018.Online
  10. D. Ulybyshev, A. Oqab-Alsalem, B. Bhargava, S. Savvides, G. Mani, and L. ben Othmane, Secure data communication in autonomous V2X systems, in IEEE 2018 International Congress on Internet of Things, San Francisco, CA, Jul. 2018.
  11. B. Pfretzschner and L. ben Othmane, Identification of dependency-based attacks on Node.js, in Proc. of the 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, Sep. 2017.Online.Slides
  12. A. Ali and L. ben Othmane, Towards effective security assurance for incremental software development - the case of zen cart application, in Proc. of the 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, Sep. 2016, pp.564–571.
  13. R. Fernando, R. Ranchal, B. An, L. ben Othmane, and B. Bhargava, Consumer oriented privacy preserving access control for electronic health records in the cloud, in IEEE cloud, (acceptance rate 16,7%), San Francisco, USA, Jun. 2016.
  14. V. Mohan and L. ben Othmane, SecDevOps: Is it a marketing buzzword? mapping research on security in devops, in Proc. of the 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, Sep. 2016, pp.542–547.
  15. B. Pfretzschner and L. ben Othmane, Dependency-based attacks on node.js, in Proc. 2016 IEEE Cyber- security Development (SecDev), Boston, MA, USA, Nov. 2016, pp.66.
  16. L. ben Othmane, T. Cerqueus, A. Thiery, M. Salehie, N. Noel, A. Labaere, R. Domingues, A. Cordier, A. Ventresque, L. Pasquale, P. Perry, and B. Nuseibeh, Response to emergency situations in a traffic management system, in Proc. of The 2nd World Congress on Computer Applications and Information Systems (WCCAIS’2015), Hammamet, Tunisia, Jan. 2015.
  17. L. ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, A. Brucker, and P. Miseldine, Factors impacting the effort required to fix security vulnerabilities, in Proc. Information Security Conference (ISC 2015), Trondheim, Norway, Sep. 2015, pp.102–119.
  18. N. Al-Hadhrami, B. Aziz, S. Sardesai, and L. ben Othmane, Incremental development of RBAC-controlled e-marking system using the B method, in Proc. of the 10th International Conference on Availability, Reliability and Security (ARES), Toulouse, France, Aug. 2015, pp.532–539.
  19. H. Oueslati, M. M. Rahman, and L. ben Othmane, Literature review of the challenges of developing secure software using the agile approach, in Proc. of the 10th International Conference on Availability, Reliability and Security (ARES), Toulouse, France, Aug. 2015, pp.540–547.
  20. K. Renaud, M. Volkamer, S. Flowerday, and L. ben Othmane, ‘I Am Because We Are’ developing and nurturing african digital security culture, in Proc. African Cyber Citizenship Conference 2015 (ACCC 2015), Port Elizabeth, South Africa, Nov. 2015.
  21. L. T. Lilien, L. ben Othmane, P. Angin, B. Bhargava, R. M. Salih, and A. DeCarlo, Impact of initial target position on performance of uav surveillance using opportunistic resource utilization networks, in Proc. 33rd IEEE International Symposium on Reliable Distributed Systems Workshops (SRDSW), Montreal, Canada, Sep. 2015.
  22. L. ben Othmane, P. Angin, and B. Bhargava, Using assurance cases to develop iteratively security features using scrum, in Proc. of the 9th International Conference on Availability, Reliability and Security (ARES), Fribourg, Switzerland, Sep. 2014, pp.490–497.
  23. L. ben Othmane, V. Bhuse, and L. Lilien, Incorporating labs into computer security courses, in Proc. 2013 World Congress on Computer and Information Technology (WCCIT), Sousse, Tunisia, Jun. 2013, pp.1–4.
  24. L. ben Othmane, H. Weffers, and M. Klabbers, Using attacker capabilities and motivations in estimating security risk, in Workshop on Risk Perception in IT Security and Privacy, URL: http://cups.cs.cmu.edu/soups/2013/risk/Cap.-Based-risk.pdf, Newcastle, UK., Jul. 2013.
  25. L. ben Othmane, H. Weffers, R. Ranchal, P. Angin, B. Bhargava, and M. M. Mohamad, A case for societal digital security culture, in Proc. 28th IFIP International Information Security and Privacy Conference (SEC 2013), Auckland, New Zealand, Jul. 2013, pp.391–404.
  26. L. ben-Othmane, A. Al-Fuqaha, E. ben Hamida, and M. van den Brand, Towards extended safety in connected vehicles, in Proc. 16th International IEEE Conference on Intelligent Transportation Systems (ITSC), The Hague, The Netherlands., Oct. 2013, pp.652–657.
  27. B. Bhargava, R. Ranchal, and L. ben Othmane, Secure information sharing in supply chain collaboration, in Proc. 3rd IEEE International Advance Computing Conference (IACC-2013), Ghaziabad, India, Feb. 2013, pp.1636–1640.
  28. L. Lilien, M. Elbes, L. ben Othmane, and R. Salih, Simulation of emergency response operations for a static chemical spill within a building using an opportunistic resource utilization network, in Proc. Of The 13th annual IEEE Conference on Technologies for Homeland Security (HST 13), Waltham, USA, Nov. 2013, pp.408–413.
  29. M. Azarmi, B. Bhargava, P. Angin, R. Ranchal, N. Ahmed, A. Sinclair, M. Linderman, and L. ben Othmane, An end-to-end security auditing approach for service oriented architectures, in Proc. 31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, CA, Oct. 2012, pp.279–284.
  30. R. M. Salih, L. Lilien, and L. ben Othmane, Protecting patients electronic health records using enhanced active bundles, in Proc. 6th International Conference on Pervasive Computing Technologies for Healthcare, Doctoral Consortium, San Diego, CA, May 2012, pp.1–4.
  31. R. Salih, L. ben Othmane, and L. Lilien, Privacy protection in pervasive healthcare monitoring systems with active bundles, in Proc. Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW 2011), Busan, Korea, May 2011, pp.311– 315.
  32. P. Angin, B. Bhargava, R. Ranchal, N. Singh, M. Linderman, L. ben Othmane, and L. Lilien, An entity-centric approach for privacy and identity management in cloud computing, in Proc. 29th International Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, India, Nov. 2010, pp.177–183.
  33. L. Lilien, A. Al-Alawneh, and L. ben Othmane, The pervasive trust foundation for security in next generation networks (a position paper), in Proc. The New Security Paradigms Workshop (NSPW 2010), Concord, Massachusetts, Sep. 2010, pp.129–142.
  34. R. Ranchal, B. Bhargava, L. ben Othmane, L. Lilien, A. Kim, M. Kang, and M. Linderman, Protection of identity information in cloud computing without trusted third party, in Proc. 29th International Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, India, Nov. 2010, pp.368–372.
  35. L. ben Othmane and L. Lilien, Protecting privacy of sensitive data dissemination using active bundles, in World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS ’09), Aug. 2009, pp.202–213. 24.
  36. L. ben Othmane and L. Lilien, Protecting sensitive data throughout its life cycle, in Graduate Students Symposium, Annual Conference on Privacy Security and Trust, Fredericton, Canada, Oct. 2008.

Book chapters

  1. D. S. Cruzes and L. ben Othmane, Empirical research for software security: foundations and experience, in, L. ben Othmane, M. G. Jaatun, and E. Weippl, Eds. Taylor and Francis Group, LLC, 2017, ch. Threats to validity in software security empirical research.
  2. L. ben Othmane, A. D. Brucker, S. Dashevskyi, and P. Tsalovski, Empirical research for software security: foundations and experience, in, L. ben Othmane, M. G. Jaatun, and E. Weippl, Eds. Taylor and Francis Group, LLC, 2017, ch. An introduction to data analytics for software security. Online
  3. L. ben Othmane, H. Weffers, M. M. Mohamad, and M. Wolf, Wireless sensor networks (wsn) for vehicular and space applications: Architecture and implementation, in, D. BenHaddou and A. Al-Fuqaha, Eds. Norwell, MA: Springer, 2015, ch. A survey of security and privacy in connected vehicles, pp. 217–247.