Polytechnique > Recherche > Répertoire > Un professeur ou chercheur

Répertoire des expertises

Photo de 
          José M.

José M. Fernandez

Professeur agrégé
Département de génie informatique et génie logiciel


Ces données sont extraites du Répertoire des publications de Polytechnique Montréal. La liste ci-dessous recense la majorité des publications du professeur ou du chercheur, à Polytechnique, depuis 1994. Des publications datant d'avant l'embauche à Polytechnique, ou d'avant 1994, peuvent aussi être incluses dans la liste. Vous pouvez consulter le Répertoire des publications scientifiques et techniques pour plus de détails sur les documents qui y sont inclus.

1 A. Lam, J. Fernandez, R. Frank (2017). Cyberterrorists bringing down airplanes: Will it happen soon?. 12th International Conference on Cyber Warfare and Security (ICCWS 2017), p. 210-219.
2 A. Lemay, S. Leblanc, S. Knight, J. Fernandez (2017). Affecting freedom of action in cyber space: Subtle effects and skilled operators. 12th International Conference on Cyber Warfare and Security (ICCWS 2017), p. 220-226.
3 A. Lemay, J.M. Fernandez, S. Knight (2016). A Modbus command and control channelAnnual IEEE Systems Conference (SysCon 2016), 6 pages. DOI : 10.1109/SYSCON.2016.7490631 
4 A. Lemay, S. Knight, J. Fernandez, S. Leblanc (2016). The sound a rattling cyber-sabre makes: Cases studies in cyber power projection. 15th European Conference on Cyber Warfare and Security (ECCWS 2016), p. 191-197.
5 A. Lemay, J.M. Fernandez (2016). Providing SCADA network data sets for intrusion detection research. 9th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2016).
6 M. Faou, A. Lemay, D. Decary-Hetu, J. Calvet, F. Labreche, M. Jean, B. Dupont, J.M. Fernande (2016). Follow the traffic: Stopping click fraud by disrupting the value chain14th Annual Conference on Privacy, Security and Trust (PST 2016), p. 464-476. DOI : 10.1109/pst.2016.7907001 
7 A. Lemay, A. Sadighian, J. Fernandez (2016). Lightweight Journaling For Scada Systems Via Event Correlation10th Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (ICCIP 2016), v. 485, p. 99-115. DOI : 10.1007/978-3-319-48737-3_6 
8 G. Bonfante, J. Fernandez, J.-Y. Marion, B. Rouxel, F. Sabatier, A. Thierry (2015). CoDisasm: Medium scale concatic disassembly of self-modifying binaries with overlapping instructions22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 2015), p. 745-756. DOI : 10.1145/2810103.2813627 
9 F.L. Levesque, A. Somayaji, D. Batchelder, J.M. Fernandez (2015). Measuring the health of antivirus ecosystems10th International Conference on Malicious and Unwanted Software (MALWARE 2015), p. 101-109. DOI : 10.1109/MALWARE.2015.7413690 
10 S. Tlili, J.M. Fernandez, A. Belghith, B. Dridi, S. Hidouri (2014). Scalable Security Verification of Software at Compile Time14th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2014), p. 115-24. DOI : 10.1109/SCAM.2014.20 
11 A. Sadighian, J.M. Fernandez, A. Lemay, S.T. Zargar (2014). ONTIDS: A highly flexible context-aware and ontology-based alert correlation framework6th International Symposium on Foundations and Practice of Security (FPS 2013), v. 8352 LNCS, p. 161-177. DOI : 10.1007/978-3-319-05302-8_10 
12 F.L. Levesque, J.M. Fernandez, A. Somayaji (2014). Risk prediction of malware victimization based on user behavior9th International Conference on Malicious and Unwanted Software: The Americas, MALWARE 2014, p. 128-34. DOI : 10.1109/MALWARE.2014.6999412 
13 A. Lemay, S. Knight, J.M. Fernandez (2014). Intelligence preparation of the cyber environment (IPCE): finding the high ground in cyberspace. 9th International Conference on Cyber Warfare and Security (ICCWS 2014), p. 140-148.
14 A. Lemay, J. Fernandez, S. Knight (2014). Modelling physical impact of cyber attacksWorkshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES 2014), held as part of CPS Week. DOI : 10.1109/MSCPES.2014.6842401 
15 G. Brassard, Y. Elias, J.M. Fernandez, H. Gilboa, J.A. Jones, T. Mor, Y. Weinstein, L. Xiao (2014). Experimental heat-bath cooling of spinsEuropean Physical Journal Plus, 129(12), 266 (20 pages). DOI : 10.1140/epjp/i2014-14266-0 
16 A. Sadighian, S.T. Zargar, J.M. Fernandez, A. Lemay, J. Joshi (2013). Semantic-based Context-aware Alert Fusion for Distributed Intrusion Detection Systems. 8th International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), p. 1-6.
17 A. Lemay, J.M. Fernandez, S. Knight (2013). An isolated virtual cluster for SCADA network security research. 1st International Symposium for ICS & SCADA Cyber Secutiry Research, p. 88.
18 F. Lalonde Levesque, J. Nsiempba, J.M. Fernandez, S. Chiasson, A. Somayaji (2013). A clinical study of risk factors related to malware infectionsACM SIGSAC Conference on Computer and Communications Security (CCS 2013), p. 97-108. DOI : 10.1145/2508859.2516747 
19 G. Cartier, J.-F. Cartier, J.M. Fernandez (2013). Next-generation DoS at the higher layers: A study of SMTP flooding. 7th International Conference on Network and System Security (NSS 2013), v. 7873 LNCS, p. 149-163.
20 D. Boteanu, J.M. Fernandez (2013). A Comprehensive Study of Queue Management as a Dos Counter-Measure. International Journal of Information Security, 12(5), p. 347-382.
21 A. Bkakria, F. Cuppens, N. Cuppens-Boulahia, J.M. Fernandez, D. Gross-Amblard (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 4(2), p. 39-62.
22 A. Bkakria, F. Cuppens, N. Cuppens-Boulahia, J.M. Fernandez (2013). Confidentiality-preserving query execution of fragmented outsourced data. International Conference on Information and Communication Technology (ICT-EurAsia 2013), v. 7804 LNCS, p. 426-440.
23 F. Lalonde Lévesque, C.R. Davis, J.M. Fernandez, A. Somayaji (2012). Evaluating anti-virus products with field studies. 22nd Virus Bulletin International Conference, p. 87-94.
24 F. Lalonde Levesque, C.R. Davis, J.M. Fernandez, S. Chiasson, A. Somayaji (2012). Methodology for a field study of anti-malware software. 16th International Conference on Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, v. 7398 LNCS, p. 80-85.
25 J.M. Fernandez, A.S. Patrick, L.D. Zuck (2012). Ethical and secure data sharing across borders. 16th International Conference on Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, v. 7398 LNCS, p. 136-140.
26 J. Calvet, J.M. Fernandez, J.-Y. Marion (2012). Aligot: Cryptographic function identification in obfuscated binary programsACM Conference on Computer and Communications Security (CCS 2012), p. 169-182. DOI : 10.1145/2382196.2382217 
27 A. Lemay, J.M. Fernandez, S. Knight (2010). Pinprick attacks, a lesser included case. Conference on Cyber Conflict, p. 183-194.
28 J. Calvet, J.M. Fernandez, P.-M. Bureau, J.-Y. Marion (2010). Large-scale malware experiments why, how, and so what. 20th Virus Bulletin International Conference, p. 241-247.
29 J. Calvet, C.R. Davis, J.M. Fernandez, W. Guizani, M. Kaczmarek, J.-Y. Marion, P.-L. St-Onge (2010). Isolated virtualised clusters : testbeds for high-risk security experimentation and training. 3rd International Conference on Cyber Security Experimentation and Test (CSET 2010).
30 J. Calvet, C.R. Davis, J., M. Fernandez, J.-Y. Marion, P.-L. St-Onge, W. Guizani, P.-M. Bureau, A. Somayaji (2010). The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. 26th Annual Computer Security Applications Conference, p. 141-150.
31 A. Somayaji, Y. Li, H. Inoue, J.M. Fernandez, R. Ford (2009). Evaluating Security Products with Clinical Trials. 2nd Workshop on Cyber security Experimentation and Test (CSET 2009).
32 C. Roehrig, J.M. Fernandez (2009). The supervision of research projects entailing computer risks within an academic context: the case of Ecole Polytechnique de Montréal. International Conference on Engineering Education and Research (ICEE-ICEER 2009).
33 C.R. Davis, J.M. Fernandez, S. Neville (2009). Optimising sybil attacks against P2P-based botnets. 4th International Conference on Malicious and Unwanted Software (MALWARE 2009), p. 78-87.
34 C.R. Davis, S. Neville, J.M. Fernandez, J.-M. Robert, J. McHugh (2008). Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?. 13th European Symposium on Research in Computer Security (ESORICS 2008), v. 5283 LNCS, p. 461-480.
35 C.R. Davis, J.M. Fernandez, S. Neville, J. McHugh (2008). Sybil attacks as a mitigation strategy against the Storm botnet. 3rd International Conference on Malicious and Unwanted Software (MALWARE 2008), p. 32-40.
36 E. Aimeur, G. Brassard, J.M. Fernandez, F.S.M. Onana (2008). Alambic: a Privacy-Preserving Recommender System for Electronic Commerce. International Journal of Information Security, 7(5), p. 307-334.
37 E. Aïmeur, G. Brassard, J.M. Fernandez, F.S. Mani Onana, Z. Rakowski (2008). Experimental demonstration of a hybrid privacy-preserving Recommender system. 3rd International Conference on Availability, Security, and Reliability (ARES 2008), p. 161-170.
38 Y. Soudagar, F. Bussieres, G. Berlin, S. Lacroix, J.M. Fernandez, N. Godbout (2007). Cluster-State Quantum Computing in Optical Fibers. Journal of the Optical Society of America B: Optical Physics, 24(2), p. 226-230.
39 Y. Soudagar, F. Buissièeres, J.M. Fernandez, N. Godbout (2007). Creation of a Two-Photon 4-Qubit Square Cluster in Optical Fibres. Laser Science
40 Y. Elias, J.M. Fernandez, T. Mor, Y. Weinstein (2007). Optimal Algorithmic Cooling of Spins. Lecture Notes in Computer Science, 4618, p. 2-26.
41 P.-M. Bureau, J.M. Fernandez (2007). Optimising Networks against Malware. 2nd International Swarm Intelligence and Other Forms of Malware Workshop (MALWARE'07), p. 518-527.
42 D. Boteanu, E. Reich, J.M. Fernandez, J. McHugh (2007). Implementing and testing dynamic timeout adjustment as a DoS counter-measure. ACM Quality of Protection, p. 34-39.
43 D. Boteanu, J.M. Fernandez, J. McHugh, J. Mullins (2007). Queue management as a DoS counter-measure?. 10th Information Security Conference (ISC 2007), v. 4779 LNCS, p. 263-280.
44 J.M. Fernandez, P.-M. Bureau (2006). Optimising malware. 25th IEEE International Performance, Computing, and Communications Conference, p. 577-586.
45 Y. Elias, J.M. Fernandez, T. Mor, Y. Weinstein (2006). Optimal Algorithmic Cooling of Spins. Israel Journal of Chemistry, 46(4), p. 371-391.
46 D. Boteanu, J.M. Fernandez, J. Mullins (2006). On the efficiency of timeout-based DoS attack protections. (Rapport 2006-07). 18 pages.
47 E. Aïmeur, G. Brassard, J.M. Fernandez, F.S. Onana Mani (2006). Privacy-preserving demographic filtering. ACM Symposium on Applied Computing, p. 872-878.
48 T. Mor, V. Roychowdhury, S. Lloyd, J.M. Fernandez, Y. Weinstein (2005). Algorithmic cooling. (No de brevet - US 6873154).
49 J.M. Fernandez, T. Mor, Y. Weinstein (2005). Paramagnetic Materials and Practical Algorithmic Cooling for Nmr Quantum Computing. International Journal of Quantum Information, 3(1), p. 281-285.
50 M. Beaudry, J.M. Fernandez, M. Holzer (2005). A Common Algebraic Description for Probabilistic and Quantum Computations. Theoretical Computer Science, 345(2-3), p. 206-234.
51 J.M. Fernandez, S. Lloyd, T. Mor, V. Roychowdhury (2004). Algorithmic Cooling of Spins: a Practicable Method for Increasing Polarization. International Journal of Quantum Information, 2(4), p. 461-477.
52 M. Beaudry, J.M. Fernandez, M. Holzer (2004). A common algebraic description for probabilistic and quantum computations. Lecture Notes in Computer Science, 3153, p. 851-862.
53 M. Beaudry, J.M. Fernandez (2004). A common algebraic description for probabilistic and quantum computing. 29th International Symposium on Mathematical Foundations of Computer Science (MFCS 2004), v. 3153 LNCS, p. 851-862.


© École Polytechnique de Montréal
Bottin | Plan du site | Recherche | Conditions