Polytechnique > Research > Directory > A professor or researcher

Directory of Expertises

Photo of 
          José M.

José M. Fernandez

Associate Professor
Department of Computer Engineering


The bibliographic data is imported from Polytechnique Montréal's Directory of Publications. The bibliography below includes a majority of publications written by a professor/researcher affiliated with Polytechnique, since 1994 (if applicable). Publications before the professor's/researcher's affiliation with Polytechnique or before 1994 may also be included in this list. You may also consult the Directory of Scientific & Technical Publications for more information about the document type coverage.

1 A. Lemay, J.M. Fernandez, S. Knight (2016). A Modbus command and control channelAnnual IEEE Systems Conference (SysCon 2016), 6 pages. DOI : 10.1109/SYSCON.2016.7490631 
2 A. Lemay, S. Knight, J. Fernandez, S. Leblanc (2016). The sound a rattling cyber-sabre makes: Cases studies in cyber power projection. 15th European Conference on Cyber Warfare and Security (ECCWS 2016), p. 191-197.
3 A. Lemay, J.M. Fernandez (2016). Providing SCADA network data sets for intrusion detection research. 9th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2016).
4 G. Bonfante, J. Fernandez, J.-Y. Marion, B. Rouxel, F. Sabatier, A. Thierry (2015). CoDisasm: Medium scale concatic disassembly of self-modifying binaries with overlapping instructions22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 2015), p. 745-756. DOI : 10.1145/2810103.2813627 
5 F.L. Levesque, A. Somayaji, D. Batchelder, J.M. Fernandez (2015). Measuring the health of antivirus ecosystems10th International Conference on Malicious and Unwanted Software (MALWARE 2015), p. 101-109. DOI : 10.1109/MALWARE.2015.7413690 
6 S. Tlili, J.M. Fernandez, A. Belghith, B. Dridi, S. Hidouri (2014). Scalable Security Verification of Software at Compile Time2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, p. 115-24. DOI : 10.1109/SCAM.2014.20 
7 A. Sadighian, J.M. Fernandez, A. Lemay, S.T. Zargar (2014). ONTIDS: A highly flexible context-aware and ontology-based alert correlation framework6th International Symposium on Foundations and Practice of Security, FPS 2013, v. 8352 LNCS, p. 161-177. DOI : 10.1007/978-3-319-05302-8_10 
8 F.L. Levesque, J.M. Fernandez, A. Somayaji (2014). Risk prediction of malware victimization based on user behavior2014 9th International Conference on Malicious and Unwanted Software: The Americas, MALWARE 2014, p. 128-34. DOI : 10.1109/MALWARE.2014.6999412 
9 A. Lemay, S. Knight, J.M. Fernandez (2014). Intelligence preparation of the cyber environment (IPCE): finding the high ground in cyberspace. 9th International Conference on Cyber Warfare and Security (ICCWS 2014), p. 140-148.
10 A. Lemay, J. Fernandez, S. Knight (2014). Modelling physical impact of cyber attacks2014 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, MSCPES 2014 - Held as Part of CPS Week. DOI : 10.1109/MSCPES.2014.6842401 
11 G. Brassard, Y. Elias, J.M. Fernandez, H. Gilboa, J.A. Jones, T. Mor, Y. Weinstein, L. Xiao (2014). Experimental heat-bath cooling of spinsEuropean Physical Journal Plus, 129(12), 266 (20 pages). DOI : 10.1140/epjp/i2014-14266-0 
12 A. Sadighian, S.T. Zargar, J.M. Fernandez, A. Lemay, J. Joshi (2013). Semantic-based Context-aware Alert Fusion for Distributed Intrusion Detection Systems. 8th International Conference on Risks and Security of Internet and Systems (CRiSIS), p. 1-6.
13 A. Lemay, J.M. Fernandez, S. Knight (2013). An isolated virtual cluster for SCADA network security research. 1st International Symposium for ICS & SCADA Cyber Secutiry Research, p. 88.
14 F. Lalonde Levesque, J. Nsiempba, J.M. Fernandez, S. Chiasson, A. Somayaji (2013). A clinical study of risk factors related to malware infections2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, p. 97-108. DOI : 10.1145/2508859.2516747 
15 G. Cartier, J.-F. Cartier, J.M. Fernandez (2013). Next-generation DoS at the higher layers: A study of SMTP flooding. 7th International Conference on Network and System Security, NSS 2013, v. 7873 LNCS, p. 149-163.
16 D. Boteanu, J.M. Fernandez (2013). A Comprehensive Study of Queue Management as a Dos Counter-Measure. International Journal of Information Security, 12(5), p. 347-382.
17 A. Bkakria, F. Cuppens, N. Cuppens-Boulahia, J.M. Fernandez, D. Gross-Amblard (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 4(2), p. 39-62.
18 A. Bkakria, F. Cuppens, N. Cuppens-Boulahia, J.M. Fernandez (2013). Confidentiality-preserving query execution of fragmented outsourced data. International Conference on Information and Communication Technology, ICT-EurAsia 2013, v. 7804 LNCS, p. 426-440.
19 F. Lalonde Lévesque, C.R. Davis, J.M. Fernandez, A. Somayaji (2012). Evaluating anti-virus products with field studies. 22nd Virus Bulletin International Conference, p. 87-94.
20 F. Lalonde Levesque, C.R. Davis, J.M. Fernandez, S. Chiasson, A. Somayaji (2012). Methodology for a field study of anti-malware software. 16th International Conference on Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, v. 7398 LNCS, p. 80-85.
21 J.M. Fernandez, A.S. Patrick, L.D. Zuck (2012). Ethical and secure data sharing across borders. 16th International Conference on Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, v. 7398 LNCS, p. 136-140.
22 J. Calvet, J.M. Fernandez, J.-Y. Marion (2012). Aligot: Cryptographic function identification in obfuscated binary programs2012 ACM Conference on Computer and Communications Security, CCS 2012, p. 169-182. DOI : 10.1145/2382196.2382217 
23 A. Lemay, J.M. Fernandez, S. Knight (2010). Pinprick attacks, a lesser included case. Conference on Cyber Conflict 2010, p. 183-194.
24 J. Calvet, J.M. Fernandez, P.-M. Bureau, J.-Y. Marion (2010). Large-scale malware experiments why, how, and so what. 20th Virus Bulletin International Conference, p. 241-247.
25 J. Calvet, C.R. Davis, J.M. Fernandez, W. Guizani, M. Kaczmarek, J.-Y. Marion, P.-L. St-Onge (2010). Isolated virtualised clusters : testbeds for high-risk security experimentation and training. 3rd International Conference on Cyber Security Experimentation and Test (CSET'10).
26 J. Calvet, C.R. Davis, J., M. Fernandez, J.-Y. Marion, P.-L. St-Onge, W. Guizani, P.-M. Bureau, A. Somayaji (2010). The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. 26th Annual Computer Security Applications Conference, p. 141-150.
27 A. Somayaji, Y. Li, H. Inoue, J.M. Fernandez, R. Ford (2009). Evaluating Security Products with Clinical Trials. 2nd Workshop on Cyber security Experimentation and Test (CSET'09).
28 C. Roehrig, J.M. Fernandez (2009). The supervision of research projects entailing computer risks within an academic context: the case of Ecole Polytechnique de Montréal. International Conference on Engineering Education and Reserarch( ICEE-ICEER 2009).
29 C.R. Davis, J.M. Fernandez, S. Neville (2009). Optimising sybil attacks against P2P-based botnets. 4th International Conference on Malicious and Unwanted Software (MALWARE), p. 78-87.
30 C.R. Davis, S. Neville, J.M. Fernandez, J.-M. Robert, J. McHugh (2008). Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?. 13th European Symposium on Research in Computer Security, ESORICS 2008, v. 5283 LNCS, p. 461-480.
31 C.R. Davis, J.M. Fernandez, S. Neville, J. McHugh (2008). Sybil attacks as a mitigation strategy against the Storm botnet. 3rd International Conference on Malicious and Unwanted Software (MALWARE 2008), p. 32-40.
32 E. Aimeur, G. Brassard, J.M. Fernandez, F.S.M. Onana (2008). Alambic: a Privacy-Preserving Recommender System for Electronic Commerce. International Journal of Information Security, 7(5), p. 307-334.
33 E. Aïmeur, G. Brassard, J.M. Fernandez, F.S. Mani Onana, Z. Rakowski (2008). Experimental demonstration of a hybrid privacy-preserving Recommender system. 3rd International Conference on Availability, Security, and Reliability, ARES 2008, p. 161-170.
34 Y. Soudagar, F. Bussieres, G. Berlin, S. Lacroix, J.M. Fernandez, N. Godbout (2007). Cluster-State Quantum Computing in Optical Fibers. Journal of the Optical Society of America. B, Optical Physics, 24(2), p. 226-230.
35 Y. Soudagar, F. Buissièeres, J.M. Fernandez, N. Godbout (2007). Creation of a Two-Photon 4-Qubit Square Cluster in Optical Fibres. Laser Science
36 Y. Elias, J.M. Fernandez, T. Mor, Y. Weinstein (2007). Optimal Algorithmic Cooling of Spins. Lecture Notes in Computer Science, 4618, p. 2-26.
37 P.-M. Bureau, J.M. Fernandez (2007). Optimising Networks against Malware. 2nd International Swarm Intelligence and Other Forms of Malware Workshop (MALWARE'07), p. 518-527.
38 D. Boteanu, E. Reich, J.M. Fernandez, J. McHugh (2007). Implementing and testing dynamic timeout adjustment as a DoS counter-measure. ACM Quality of Protection, p. 34-39.
39 D. Boteanu, J.M. Fernandez, J. McHugh, J. Mullins (2007). Queue management as a DoS counter-measure?. Information Security : ISC 2007. Proceedings of the 10th Information Security Conference, v. 4779 LNCS, p. 263-280.
40 J.M. Fernandez, P.-M. Bureau (2006). Optimising malware. 25th IEEE International Performance, Computing, and Communications Conference, p. 577-586.
41 Y. Elias, J.M. Fernandez, T. Mor, Y. Weinstein (2006). Optimal Algorithmic Cooling of Spins. Israel Journal of Chemistry, 46(4), p. 371-391.
42 D. Boteanu, J.M. Fernandez, J. Mullins (2006). On the efficiency of timeout-based DoS attack protections. (EPM RT (Ecole polytechnique de Montréal); 2006-07). 18 pages.
43 E. Aïmeur, G. Brassard, J.M. Fernandez, F.S. Onana Mani (2006). Privacy-preserving demographic filtering. Proceedings of ACM Symposium on Applied Computing, p. 872-878.
44 T. Mor, V. Roychowdhury, S. Lloyd, J.M. Fernandez, Y. Weinstein (2005). Algorithmic cooling. (No de brevet - US 6873154).
45 J.M. Fernandez, T. Mor, Y. Weinstein (2005). Paramagnetic Materials and Practical Algorithmic Cooling for Nmr Quantum Computing. International Journal of Quantum Information, 3(1), p. 281-285.
46 M. Beaudry, J.M. Fernandez, M. Holzer (2005). A Common Algebraic Description for Probabilistic and Quantum Computations. Theoretical Computer Science, 345(2-3), p. 206-234.
47 J.M. Fernandez, S. Lloyd, T. Mor, V. Roychowdhury (2004). Algorithmic Cooling of Spins: a Practicable Method for Increasing Polarization. International Journal of Quantum Information, 2(4), p. 461-477.
48 M. Beaudry, J.M. Fernandez, M. Holzer (2004). A common algebraic description for probabilistic and quantum computations. Lecture Notes in Computer Science, 3153, p. 851-862.
49 M. Beaudry, J.M. Fernandez (2004). A common algebraic description for probabilistic and quantum computing. Mathematical Foundations of Computer Science, MFCS 2004. 29th International symposium, v. 3153 LNCS, p. 851-862.


© École Polytechnique de Montréal
Find Peoble or units | Site plan | Key word search | Conditions(*) this link leads to a section in french.