Ben Othmane, L., Brucker, A. D., Dashevskyi, S., Tsalovski, P. (2017). An Introduction to Data Analytics for Software Security. Empirical Research for Software Security: Foundations and Experience. CRC Press.
Cruzes, D. S., Ben Othmane, L. (2017). Threats to Validity in Empirical Software Security Research. Empirical Research for Software Security: Foundations and Experience. CRC Press.
Ben Othmane, L., Weffers, H., Mohamad, M. M., Wolf, M. (2015). A Survey of Security and Privacy in Connected Vehicles. Other. 217--247. Springer New York.
Ben Othmane, L., Weffers, H., Ranchal, R., Angin, P., Bhargava, B., Mohamad, M. M. (2013). A Case for Societal Digital Security Culture. Security and Privacy Protection in Information Processing Systems. 391--404. Springer Berlin Heidelberg.
Jedh, M. B., Lee, J. K., Ben Othmane, L. (2023). Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles. IEEE International Conference on Software Quality, Reliability, and Security. NY: IEEE.
Pecka, N., Ben Othmane, L., Valani, A. (2022). Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment. Proceedings of the International Conference on Software and System Processes and International Conference on Global Software Engineering. 45--49.
Ben Othmane, L., Gantenbein, H., Yasar, H., Curzi, S., Valani, A., Prabhakar, A., Cuddy, R. (2022). Tutorial: Threat Modeling of Cloud-based Solutions. 2022 IEEE Secure Development Conference (SecDev). IEEE.
Ben Othmane, L., Jamil, A. (2022). Self-Confidence of Undergraduate Students in Designing Software Architecture. Proc. The Annual Conference The American Society for Engineering Education.
Ben Othmane, L., Ahmed, N. (2022). Using Garbled Circuit for Secure Brokering. The 16th International Conference on Risks and Security of Internet and Systems.
Jamil, A., Othmane, L. b., Valani, A. (2021). Threat Modeling of Cyber-Physical Systems in Practice. The 16th International Conference on Risks and Security of Internet and Systems.
Jamil, A., Khan, S., Lee, J. K., Ben Othmane, L. (2021). Towards Automated Threat Modeling of Cyber-Physical Systems. 7th International Conference on Software Engineering \& Computer Systems (ICSECS). 614--619.
Jamil, A. M., Ben Othmane, L., Altaz Valani, A., Abdelkhalek, M., Tek, A. (2020). The Current Practices of Changing Secure Software: An Empirical Study. The 35th ACM/SIGAPP Symposium on Applied Computing.
Othmane, L. B., Jamil, A., Abdelkhalek, M. (2019). Identification of the Impacts of Code Changes on the Security of Software. 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 2, 569--574.
Othmane, L. B., Lamm, M. (2019). Mindset for software architecture students. 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 2, 306--311.
Ben Othmane, L., Alvarez, V., Berner, K., Fuhrmann, M., Fuhrmann, W., Guss, A., Hartsock, T. (2018). A low-cost fleet monitoring system. 2018 IEEE International Smart Cities Conference (ISC2). 1--2.
Mohan, V., Ben Othmane, L., Kres, A. (2018). BP: Security concerns and best practices for the automation of software deployment processes - an industrial case study. IEEE Cybersecurity Development Conference (SecDev).
Sardesai, S., Ulybyshev, D., Ben Othmane, L., Bhargava, B. (2018). Impacts of Security Attacks on The Effectiveness of Collaborative Adaptive Cruise Control Mechanism. 2018 IEEE International Smart Cities Conference (ISC2). 1--5.
Ulybyshev, D., Alsalem, A. O., Bhargava, B., Savvides, S., Mani, G., Othmane, L. B. (2018). Secure data communication in autonomous v2x systems. 2018 IEEE International Congress on Internet of Things (ICIOT). 156--163.
Pfretzschner, B., Ben Othmane, L. (2017). Identification of dependency-based attacks on node. js. Proceedings of the 12th International Conference on Availability, Reliability and Security. 1--6.
Fernando, R., Ranchal, R., An, B., Ben Othmane, L., Bhargava, B. (2016). Consumer oriented privacy preserving access control for electronic health records in the cloud. IEEE cloud.
Pfretzschner, B., Ben Othmane, L. (2016). Dependency-based Attacks on Node. js. 2016 IEEE Cybersecurity Development (SecDev). 66--66.
Mohan, V., Othmane, L. B. (2016). Secdevops: Is it a marketing buzzword?-mapping research on security in devops. 2016 11th international conference on availability, reliability and security (ARES). 542--547.
Othmane, L. B., Ali, A. (2016). Towards effective security assurance for incremental software development the case of zen cart application. 2016 11th International Conference on Availability, Reliability and Security (ARES). 564--571.
Othmane, L. b., Chehrazi, G., Bodden, E., Tsalovski, P., Brucker, A. D., Miseldine, P. (2015). Factors impacting the effort required to fix security vulnerabilities. International Conference on Information Security. 102--119.
Lilien, L. T., Othmane, L. b., Angin, P., Bhargava, B., Salih, R. M., DeCarlo, A. (2015). Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks. Proc. 33rd IEEE International Symposium on Reliable Distributed Systems Workshops (SRDSW).
Al-Hadhrami, N., Aziz, B., Sardesai, S., Othmane, L. b. (2015). Incremental Development of RBAC-controlled E-marking System Using the B Method. Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015).
Oueslati, H., Rahman, M. M., Ben Othmane, L. (2015). Literature Review of the Challenges of Developing Secure Software Using the Agile Approach. Proc. of the 10th International Conference on Availability, Reliability and Security.
Ben Othmane, L., Cerqueus, T., Thiery, A., Salehie, M., Noel, N., Labaere, A., Domingues, R\'emi,, Cordier, A., Ventresque, A., Pasquale, L., others, (2015). Response to Emergency Situations in a Traffic Management System. Proc. International Conference on Computer Information Systems.
Renaud, K., Flowerday, S., Ben Othmane, L., Volkamer, M. (2015). “I Am Because We Are”: Developing and Nurturing an African Digital Security Culture. African Cyber Citizenship Conference 2015.
Othmane, L. b., Angin, P., Bhargava, B. (2014). Using Assurance Cases to Develop Iteratively Security Features Using Scrum. The First International Workshop on Software Assurance (SAW 2014 )--Proc. the 9th International Conference on Availability, Reliability and Security (ARES).
Ben Othmane, L., Bhuse, V., Lilien, L. T. (2013). Incorporating lab experience into computer security courses. 2013 World Congress on Computer and Information Technology (WCCIT). 1--4.
Bhargava, B., Ranchal, R., Othmane, L. B. (2013). Secure Information Sharing in Digital Supply Chains. Proceedings of IEEE IACC.
Lilien, L., Elbes, M., Othmane, L. b., Salih, R. (2013). Simulation of Emergency Response Operations for a Static Chemical Spill within a Building using an Opportunistic Resource Utilization Network. The 13th annual IEEE Conference on Technologies for Homeland Security (HST ’13).
Ben Othmane, L., Al-Fuqaha, A., ben Hamida, E., van den Brand, M. (2013). Towards Extended Safety in Connected Vehicles. 16th International IEEE Conference on Intelligent Transportation Systems-(ITSC), 2013. 652--657.
Ben Othmane, L., Weffers, H., Klabbers, M. (2013). Using attacker capabilities and motivations in estimating security risk. Workshop on Risk Perception in IT Security and Privacy. Newcastle, UK.
Azarmi, M., Bhargava, B., Angin, P., Ranchal, R., Ahmed, N., Sinclair, A., Linderman, M., Othmane, L. b. (2012). An End-to-End Security Auditing Approach for Service Oriented Architectures. 31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012).
Salih, R. M., Lilien, L., Othmane, L. b. (2012). Protecting Patients’ Electronic Health Records Using Enhanced Active Bundles. 6th International Conference on Pervasive Computing Technologies for Healthcare.
M. Salih, R., Ben Othmane, L., Lilien, L. (2011). Privacy Protection in Pervasive Healthcare Monitoring Systems with Active Bundles. Parallel and Distributed Processing with Applications Workshops (ISPAW), 2011 Ninth IEEE International Symposium on. 311--315.
Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Ben Othmane, L., Lilien, L. (2010). An Entity-centric Approach for Privacy and Identity Management in Cloud Computing. Reliable Distributed Systems, 2010 29th IEEE Symposium on. 177--183.
Ranchal, R., Bhargava, B., Othmane, L. B., Lilien, L., Kim, A., Kang, M., Linderman, M. (2010). Protection of Identity Information in Cloud Computing without Trusted Third Party. Reliable Distributed Systems, 2010 29th IEEE Symposium on. 368--372.
Lilien, L., Al-Alawneh, A., Ben Othmane, L. (2010). The pervasive trust foundation for security in next generation networks. Proceedings of the 2010 New Security Paradigms Workshop. 129--142.
Ben Othmane, L., Lilien, L. (2009). Protecting Privacy of Sensitive Data Dissemination Using Active Bundles. Privacy, Security, Trust and the Management of e-Business, 2009. CONGRESS'09. World Congress on. 202--213.
Ben-Othmane, L., Lilien, L. (2008). Protecting Sensitive Data throughout Its Life Cycle. Proc. Graduate Student Symposium, the 6th Annual Conference on Privacy, Security and Trust (PST2008). 12--13.
Jedh, M., Othmane, L. b., Ahmed, N., Bhargava, B. (2021). Detection of Message Injection Attacks onto the CAN Bus using Similarities of Successive Messages-Sequence Graphs. Other. 16, 4133--4146.
Ben Othmane, L., Dhulipala, L., Multari, N., Govindarasu, M. (2020). On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus. IEEE Transactions on Dependable and Secure Computing. 19(1), 468 - 481. IEEE.
Ranchal, R., Bhargava, B., Angin, P., Ben Othmane, L. (2018). Epics: A framework for enforcing security policies in composite web services. IEEE Transactions on Services Computing. IEEE.
Othmane, L. B., Chehrazi, G., Bodden, E., Tsalovski, P., Brucker, A. D. (2017). Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. Other. 2(2), 107--124. Springer.
Al-Hadhrami, N., Aziz, B., Ben Othmane, L. (2016). An Incremental B-Model for RBAC-Controlled Electronic Marking System. Other. 7(2), 37--64. IGI Global.
Oueslati, H., Rahman, M. M., Ben Othmane, L., Ghani, I., Arbain, A. F. (2016). Evaluation of the challenges of developing secure software using the agile approach. Other. 7(1), 17--37. IGI Global.
Ben Othmane, L., Ranchal, R., Fernando, R., Bhargava, B., Bodden, E. (2015). Incorporating attacker capabilities in risk estimation and mitigation. Other. 51, 41--61. Elsevier.
Son, J., Bhuse, V., Othmane, L. B., Lilien, L. (2015). Incorporating lab experience into computer security courses: three case studies. Other. 7(2), 69--80.
Lilien, L. T., Ben Othmane, L., Angin, P., DeCarlo, A., Salih, R. M., Bhargava, B. (2014). A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks. Journal of Network and Computer Applications. Academic Press.
Ben Othmane, L., Angin, P., Weffers, H., Bhargava, B. (2014). Extending the Agile Development Process to Develop Acceptably Secure Software. IEEE Transactions on Dependable and Secure Computing. 11(6), 497--509. IEEE.
Othmane, L. b., Fernando, R., Ranchal, R., Bhargava, B., Bodden, E. (2014). Likelihood of Threats to Connected Vehicles. International Journal of Next-Generation Computing. 5(3), 290--303.
Ben Othmane, L., Weffers, H., Angin, P., Bhargava, B. (2013). A Time-Evolution Model for the Privacy Degree of Information Disseminated in Online Social Networks. Other. Inderscience Publishers.
Kallel, S., Cuppens, Frederic,, Boulahia Cuppens, N., Hadj Kacem, A., Ben Othmane, L. (2021). Special issue on risk and security of smart systems. 61, . Elsevier. https://dl.acm.org/doi/abs/10.1016/j.jisa.2021.102925
Ben Othmane, L., Dhulipala, L. (2020). Injection of RPM and speed reading messages onto the CAN bus of a moving vehicle. Other. (https://dx.doi.org/10.21227/s1jy-h433), .
Ben Othmane, L., Jaatun, M. G., Weippl, E. (2017). Empirical research for software security: foundations and experience. CRC Press.
Baluda, M., Fuchs, A., Holzinger, P., Nguyen, L., Ben Othmane, L., Poller, A., Repp, J\"urgen,, Sp\"ath, Johannes,, Steffan, J., Triller, S., others, (2015). Security Analysis of TrueCrypt. Other.
Ben Othmane, L. (2010). Active Bundles for Protecting Confidentiality of Sensitive Data Throughout Their Lifecycle. Western Michigan University.
ben Othman, L. (2000). D\'eveloppement d'un syst\`eme de gestion de workflows distribu\'e. Universit\'e de Sherbrooke.