Directory of Experts

You are here

Publications by type

Journal article (14) Conference paper (42) Book Book chapter Patent (1) Report (1) Thesis

José Fernandez (58)

  • Journal articles (14)
    • 2018
      • Journal article
        Lemay, A., Calvet, J., Menet, F. & Fernandez, J.M. (2018). Survey of publicly available reports on advanced persistent threat actors. Computers & Security, 72(Supplement C), 26-59. Retrieved from https://doi.org/10.1016/j.cose.2017.08.005
    • 2017
      • Journal article
        Dupont, B., Côté, A.-M., Boutin, J.-I. & Fernandez, J. (2017). Darkode: Recruitment Patterns and Transactional Features of “the Most Dangerous Cybercrime Forum in the World”. American Behavioral Scientist, 61(11), 1219-1243. Retrieved from https://doi.org/10.1177/0002764217734263
    • 2014
      • Journal article
        Brassard, G., Elias, Y., Fernandez, J.M., Gilboa, H., Jones, J.A., Mor, T., Weinstein, Y. & Xiao, L. (2014). Experimental heat-bath cooling of spins. European Physical Journal Plus, 129(12), 266 (20 pages). Retrieved from https://doi.org/10.1140/epjp/i2014-14266-0
    • 2013
      • Journal article
        Boteanu, D. & Fernandez, J.M. (2013). A Comprehensive Study of Queue Management as a Dos Counter-Measure. International Journal of Information Security, 12(5), 347-382.
      • Journal article
        Bkakria, A., Cuppens, F., Cuppens-Boulahia, N., Fernandez, J.M. & Gross-Amblard, D. (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 4(2), 39-62.
    • 2008
      • Journal article
        Aimeur, E., Brassard, G., Fernandez, J.M. & Onana, F.S.M. (2008). Alambic: a Privacy-Preserving Recommender System for Electronic Commerce. International Journal of Information Security, 7(5), 307-334.
    • 2007
      • Journal article
        Soudagar, Y., Bussieres, F., Berlin, G., Lacroix, S., Fernandez, J.M. & Godbout, N. (2007). Cluster-State Quantum Computing in Optical Fibers. Journal of the Optical Society of America B: Optical Physics, 24(2), 226-230.
      • Journal article
        Soudagar, Y., Buissièeres, F., Fernandez, J.M. & Godbout, N. (2007). Creation of a Two-Photon 4-Qubit Square Cluster in Optical Fibres. Laser Science.
      • Journal article
        Elias, Y., Fernandez, J.M., Mor, T. & Weinstein, Y. (2007). Optimal Algorithmic Cooling of Spins. Lecture Notes in Computer Science, 4618, 2-26.
    • 2006
      • Journal article
        Elias, Y., Fernandez, J.M., Mor, T. & Weinstein, Y. (2006). Optimal Algorithmic Cooling of Spins. Israel Journal of Chemistry, 46(4), 371-391.
    • 2005
      • Journal article
        Beaudry, M., Fernandez, J.M. & Holzer, M. (2005). A Common Algebraic Description for Probabilistic and Quantum Computations. Theoretical Computer Science, 345(2-3), 206-234.
      • Journal article
        Fernandez, J.M., Mor, T. & Weinstein, Y. (2005). Paramagnetic Materials and Practical Algorithmic Cooling for Nmr Quantum Computing. International Journal of Quantum Information, 3(1), 281-285.
    • 2004
      • Journal article
        Beaudry, M., Fernandez, J.M. & Holzer, M. (2004). A common algebraic description for probabilistic and quantum computations. Lecture Notes in Computer Science, 3153, 851-862.
      • Journal article
        Fernandez, J.M., Lloyd, S., Mor, T. & Roychowdhury, V. (2004). Algorithmic Cooling of Spins: a Practicable Method for Increasing Polarization. International Journal of Quantum Information, 2(4), 461-477.
  • Conference papers (42)
    • 2017
      • Conference paper
        Lemay, A., Leblanc, S., Knight, S. & Fernandez, J. (2017). Affecting freedom of action in cyber space: Subtle effects and skilled operators. Paper presented at the 12th International Conference on Cyber Warfare and Security (ICCWS 2017), Dayton, OH (pp. 220-226).
      • Conference paper
        Lalonde Lévesque, F., Fernandez, J.M. & Batchelder, D. (2017). Age and gender as independent risk factors for malware victimisation. Paper presented at the 31th International British Human Computer Interaction Conference (BHCI 2017), Sunderland, UK (14 pages). Retrieved from http://hci2017.bcs.org/wp-content/uploads/BHCI_2017_paper_60.pdf
      • Conference paper
        Lam, A., Fernandez, J. & Frank, R. (2017). Cyberterrorists bringing down airplanes: Will it happen soon? Paper presented at the 12th International Conference on Cyber Warfare and Security (ICCWS 2017), Dayton, OH (pp. 210-219).
      • Conference paper
        Nilizadeh, S., Labreche, F., Sedighian, A., Zand, A., Fernandez, J., Kruegel, C., Stringhini, G. & Vigna, G. (2017). POISED: Spotting twitter spam off the beaten paths. Paper presented at the 24th ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), Dallas, TX (pp. 1159-1174). Retrieved from https://doi.org/10.1145/3133956.3134055
      • Conference paper
        Berthier, P., Fernandez, J.M. & Robert, J.M. (2017). SAT : Security in the air using Tesla. Paper presented at the IEEE/AIAA 36th Digital Avionics Systems Conference (DASC 2017), St. Petersburg, FL (10 pages). Retrieved from https://doi.org/10.1109/DASC.2017.8102003
    • 2016
      • Conference paper
        Lemay, A., Fernandez, J.M. & Knight, S. (2016). A Modbus command and control channel. Paper presented at the Annual IEEE Systems Conference (SysCon 2016), Orlando, Florida (6 pages). Retrieved from https://doi.org/10.1109/SYSCON.2016.7490631
      • Conference paper
        Faou, M., Lemay, A., Decary-Hetu, D., Calvet, J., Labreche, F., Jean, M., Dupont, B. & Fernande, J.M. (2016). Follow the traffic: Stopping click fraud by disrupting the value chain. Paper presented at the 14th Annual Conference on Privacy, Security and Trust (PST 2016), Auckland, New Zealand (pp. 464-476). Retrieved from https://doi.org/10.1109/PST.2016.7907001
      • Conference paper
        Lemay, A., Sadighian, A. & Fernandez, J. (2016). Lightweight Journaling For Scada Systems Via Event Correlation. Paper presented at the 10th Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (ICCIP 2016), Arlington, VA (pp. 99-115). Retrieved from https://doi.org/10.1007/978-3-319-48737-3_6
      • Conference paper
        Lemay, A. & Fernandez, J.M. (2016). Providing SCADA network data sets for intrusion detection research. Paper presented at the 9th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2016), Austin, Tx.
      • Conference paper
        Lemay, A., Knight, S., Fernandez, J. & Leblanc, S. (2016). The sound a rattling cyber-sabre makes: Cases studies in cyber power projection. Paper presented at the 15th European Conference on Cyber Warfare and Security (ECCWS 2016), Munich, Germany (pp. 191-197).
    • 2015
      • Conference paper
        Bonfante, G., Fernandez, J., Marion, J.-Y., Rouxel, B., Sabatier, F. & Thierry, A. (2015). CoDisasm: Medium scale concatic disassembly of self-modifying binaries with overlapping instructions. Paper presented at the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 2015), Denver, CO, United states (pp. 745-756). Retrieved from https://doi.org/10.1145/2810103.2813627
      • Conference paper
        Levesque, F.L., Somayaji, A., Batchelder, D. & Fernandez, J.M. (2015). Measuring the health of antivirus ecosystems. Paper presented at the 10th International Conference on Malicious and Unwanted Software (MALWARE 2015), Fajardo, PR, USA (pp. 101-109). Retrieved from https://doi.org/10.1109/MALWARE.2015.7413690
    • 2014
      • Conference paper
        Lemay, A., Knight, S. & Fernandez, J.M. (2014). Intelligence preparation of the cyber environment (IPCE): finding the high ground in cyberspace. Paper presented at the 9th International Conference on Cyber Warfare and Security (ICCWS 2014), West Lafayette, IN (pp. 140-148).
      • Conference paper
        Lemay, A., Fernandez, J. & Knight, S. (2014). Modelling physical impact of cyber attacks. Paper presented at the Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES 2014), held as part of CPS Week, Berlin, Germany. Retrieved from https://doi.org/10.1109/MSCPES.2014.6842401
      • Conference paper
        Sadighian, A., Fernandez, J.M., Lemay, A. & Zargar, S.T. (2014). ONTIDS: A highly flexible context-aware and ontology-based alert correlation framework. Paper presented at the 6th International Symposium on Foundations and Practice of Security (FPS 2013), La Rochelle, France (pp. 161-177). Retrieved from https://doi.org/10.1007/978-3-319-05302-8_10
      • Conference paper
        Levesque, F.L., Fernandez, J.M. & Somayaji, A. (2014). Risk prediction of malware victimization based on user behavior. Paper presented at the 9th International Conference on Malicious and Unwanted Software: The Americas, MALWARE 2014, Fajardo, Puerto Rico, USA (pp. 128-34). Retrieved from https://doi.org/10.1109/MALWARE.2014.6999412
      • Conference paper
        Tlili, S., Fernandez, J.M., Belghith, A., Dridi, B. & Hidouri, S. (2014). Scalable Security Verification of Software at Compile Time. Paper presented at the 14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2014), Victoria, British Columbia (pp. 115-24). Retrieved from https://doi.org/10.1109/SCAM.2014.20
    • 2013
      • Conference paper
        Lalonde Levesque, F., Nsiempba, J., Fernandez, J.M., Chiasson, S. & Somayaji, A. (2013). A clinical study of risk factors related to malware infections. Paper presented at the ACM SIGSAC Conference on Computer and Communications Security (CCS 2013), Berlin, Germany (pp. 97-108). Retrieved from https://doi.org/10.1145/2508859.2516747
      • Conference paper
        Lemay, A., Fernandez, J.M. & Knight, S. (2013). An isolated virtual cluster for SCADA network security research. Paper presented at the 1st International Symposium for ICS & SCADA Cyber Secutiry Research, Leicester, Angleterre (pp. 88).
      • Conference paper
        Bkakria, A., Cuppens, F., Cuppens-Boulahia, N. & Fernandez, J.M. (2013). Confidentiality-preserving query execution of fragmented outsourced data. Paper presented at the International Conference on Information and Communication Technology (ICT-EurAsia 2013), Yogyakarta, Indonesia (pp. 426-440).
      • Conference paper
        Cartier, G., Cartier, J.-F. & Fernandez, J.M. (2013). Next-generation DoS at the higher layers: A study of SMTP flooding. Paper presented at the 7th International Conference on Network and System Security (NSS 2013), Madrid, Spain (pp. 149-163).
      • Conference paper
        Sadighian, A., Zargar, S.T., Fernandez, J.M., Lemay, A. & Joshi, J. (2013). Semantic-based Context-aware Alert Fusion for Distributed Intrusion Detection Systems. Paper presented at the 8th International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), La Rochelle, France (pp. 1-6).
    • 2012
      • Conference paper
        Calvet, J., Fernandez, J.M. & Marion, J.-Y. (2012). Aligot: Cryptographic function identification in obfuscated binary programs. Paper presented at the ACM Conference on Computer and Communications Security (CCS 2012), Raleigh, NC, United states (pp. 169-182). Retrieved from https://doi.org/10.1145/2382196.2382217
      • Conference paper
        Fernandez, J.M., Patrick, A.S. & Zuck, L.D. (2012). Ethical and secure data sharing across borders. Paper presented at the 16th International Conference on Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, Netherlands (pp. 136-140).
      • Conference paper
        Lalonde Lévesque, F., Davis, C.R., Fernandez, J.M. & Somayaji, A. (2012). Evaluating anti-virus products with field studies. Paper presented at the 22nd Virus Bulletin International Conference, Dallax, TX, USA (pp. 87-94).
      • Conference paper
        Lalonde Levesque, F., Davis, C.R., Fernandez, J.M., Chiasson, S. & Somayaji, A. (2012). Methodology for a field study of anti-malware software. Paper presented at the 16th International Conference on Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, Netherlands (pp. 80-85).
    • 2010
      • Conference paper
        Calvet, J., Davis, C.R., Fernandez, J.M., Guizani, W., Kaczmarek, M., Marion, J.-Y. & St-Onge, P.-L. (2010). Isolated virtualised clusters : testbeds for high-risk security experimentation and training. Paper presented at the 3rd International Conference on Cyber Security Experimentation and Test (CSET 2010), Washington, DC, USA.
      • Conference paper
        Calvet, J., Fernandez, J.M., Bureau, P.-M. & Marion, J.-Y. (2010). Large-scale malware experiments why, how, and so what. Paper presented at the 20th Virus Bulletin International Conference, Vancouver, BC, Canada (pp. 241-247).
      • Conference paper
        Lemay, A., Fernandez, J.M. & Knight, S. (2010). Pinprick attacks, a lesser included case. Paper presented at the Conference on Cyber Conflict, Tallinn, Estonia (pp. 183-194).
      • Conference paper
        Calvet, J., Davis, C.R., Fernandez, J., M., Marion, J.-Y., St-Onge, P.-L., Guizani, W., Bureau, P.-M. & Somayaji, A. (2010). The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. Paper presented at the 26th Annual Computer Security Applications Conference, Austin, TX, USA (pp. 141-150).
    • 2009
      • Conference paper
        Somayaji, A., Li, Y., Inoue, H., Fernandez, J.M. & Ford, R. (2009). Evaluating Security Products with Clinical Trials. Paper presented at the 2nd Workshop on Cyber security Experimentation and Test (CSET 2009), Montreal, QC, Canada.
      • Conference paper
        Davis, C.R., Fernandez, J.M. & Neville, S. (2009). Optimising sybil attacks against P2P-based botnets. Paper presented at the 4th International Conference on Malicious and Unwanted Software (MALWARE 2009), Montreal, QC, Canada (pp. 78-87).
      • Conference paper
        Roehrig, C. & Fernandez, J.M. (2009). The supervision of research projects entailing computer risks within an academic context: the case of Ecole Polytechnique de Montréal. Paper presented at the International Conference on Engineering Education and Research (ICEE-ICEER 2009), Seoul, Korea.
    • 2008
      • Conference paper
        Aïmeur, E., Brassard, G., Fernandez, J.M., Mani Onana, F.S. & Rakowski, Z. (2008). Experimental demonstration of a hybrid privacy-preserving Recommender system. Paper presented at the 3rd International Conference on Availability, Security, and Reliability (ARES 2008), Barcelona, Spain (pp. 161-170).
      • Conference paper
        Davis, C.R., Neville, S., Fernandez, J.M., Robert, J.-M. & McHugh, J. (2008). Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures? Paper presented at the 13th European Symposium on Research in Computer Security (ESORICS 2008), Malaga, Spain (pp. 461-480).
      • Conference paper
        Davis, C.R., Fernandez, J.M., Neville, S. & McHugh, J. (2008). Sybil attacks as a mitigation strategy against the Storm botnet. Paper presented at the 3rd International Conference on Malicious and Unwanted Software (MALWARE 2008) (pp. 32-40).
    • 2007
      • Conference paper
        Boteanu, D., Reich, E., Fernandez, J.M. & McHugh, J. (2007). Implementing and testing dynamic timeout adjustment as a DoS counter-measure. Paper presented at the ACM Quality of Protection, Alexandria, Virginia (pp. 34-39).
      • Conference paper
        Bureau, P.-M. & Fernandez, J.M. (2007). Optimising Networks against Malware. Paper presented at the 2nd International Swarm Intelligence and Other Forms of Malware Workshop (MALWARE'07), New Orleans, Louisiana (pp. 518-527).
      • Conference paper
        Boteanu, D., Fernandez, J.M., McHugh, J. & Mullins, J. (2007). Queue management as a DoS counter-measure? Paper presented at the 10th Information Security Conference (ISC 2007), Valparaiso, Chile (pp. 263-280).
    • 2006
      • Conference paper
        Fernandez, J.M. & Bureau, P.-M. (2006). Optimising malware. Paper presented at the 25th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, United States (pp. 577-586).
      • Conference paper
        Aïmeur, E., Brassard, G., Fernandez, J.M. & Onana Mani, F.S. (2006). Privacy-preserving demographic filtering. Paper presented at the ACM Symposium on Applied Computing, Dijon, France (pp. 872-878).
    • 2004
      • Conference paper
        Beaudry, M. & Fernandez, J.M. (2004). A common algebraic description for probabilistic and quantum computing. Paper presented at the 29th International Symposium on Mathematical Foundations of Computer Science (MFCS 2004), Prague, Czech Republic (pp. 851-862).
  • Patents (1)
  • Reports (1)
    • 2006
      • Report
        Boteanu, D., Fernandez, J.M. & Mullins, J. (2006). On the efficiency of timeout-based DoS attack protections (Report No 2006-07). École Polytechnique de Montréal.