


default search action
Dima Alhadidi
- > Home > Persons > Dima Alhadidi
Publications
- 2016
- [j8]Djedjiga Mouheb
, Dima Alhadidi, Mariam Nouh
, Mourad Debbabi
, Lingyu Wang, Makan Pourzandi:
Aspect-oriented modeling framework for security hardening. Innov. Syst. Softw. Eng. 12(1): 41-67 (2016) - 2015
- [b1]Djedjiga Mouheb
, Mourad Debbabi
, Makan Pourzandi, Lingyu Wang, Mariam Nouh
, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima:
Aspect-Oriented Security Hardening of UML Design Models. Springer 2015, ISBN 978-3-319-16105-1, pp. 1-219 - [j7]Andrei Soeanu, Mourad Debbabi
, Dima Alhadidi, Makram Makkawi, Mohamad Khaled Allouche, Micheline Bélanger, Nicolas Léchevin:
Transportation risk analysis using probabilistic model checking. Expert Syst. Appl. 42(9): 4410-4421 (2015) - 2014
- [j6]Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung
, Mourad Debbabi
:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data. IEEE Trans. Dependable Secur. Comput. 11(1): 59-71 (2014) - [c11]Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi
:
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud. DBSec 2014: 82-97 - 2013
- [j5]Dima Alhadidi, Azzam Mourad
, Hakim Idrissi Kaitouni, Mourad Debbabi
:
Common weaving approach in mainstream languages for software security hardening. J. Syst. Softw. 86(10): 2654-2674 (2013) - [c10]Samira Barouti, Dima Alhadidi, Mourad Debbabi
:
Symmetrically-Private Database Search in Cloud Computing. CloudCom (1) 2013: 671-678 - 2012
- [c9]Dima Alhadidi, Noman Mohammed, Benjamin C. M. Fung
, Mourad Debbabi
:
Secure Distributed Framework for Achieving ε-Differential Privacy. Privacy Enhancing Technologies 2012: 120-139 - 2010
- [j4]Robert Charpentier, Mourad Debbabi, Dima Alhadidi, Azzam Mourad, Nadia Belblidia, Amine Boukhtouta, Aiman Hanna, Rachid Hadjidj, Hakim Idrissi Kaitouni, Marc-André Laverdière, Hai Zhou Ling, Syrine Tlili, Xiaochun Yang, Zhenrong Yang:
Security Evaluation and Hardening of Free and Open Source Software (FOSS). Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 33 (2010) - [c8]Mariam Nouh
, Raha Ziarati, Djedjiga Mouheb
, Dima Alhadidi, Mourad Debbabi
, Lingyu Wang, Makan Pourzandi:
Aspect weaver: a model transformation approach for UML models. CASCON 2010: 139-153 - [c7]Djedjiga Mouheb
, Dima Alhadidi, Mariam Nouh
, Mourad Debbabi
, Lingyu Wang, Makan Pourzandi:
Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework. FACS 2010: 182-199 - 2009
- [j3]Dima Alhadidi, Nadia Belblidia, Mourad Debbabi
, Prabir Bhattacharya:
lambda_SAOP: A Security AOP Calculus. Comput. J. 52(7): 824-849 (2009) - [j2]Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi
:
Capturing Returned Computable Values in AspectJ for Security Hardening. Inf. Secur. J. A Glob. Perspect. 18(2): 87-98 (2009) - [c6]Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi
:
A Practical Framework for the Dataflow Pointcut in AspectJ. ARES 2009: 835-840 - [c5]Dima Alhadidi, Amine Boukhtouta, Nadia Belblidia, Mourad Debbabi
, Prabir Bhattacharya:
The dataflow pointcut: a formal and practical framework. AOSD 2009: 15-26 - 2008
- [j1]Dima Alhadidi, Mourad Debbabi
, Prabir Bhattacharya:
New AspectJ Pointcuts for Integer Overflow and Underflow Detection. Inf. Secur. J. A Glob. Perspect. 17(5&6): 278-287 (2008) - [c4]Azzam Mourad
, Dima Alhadidi, Mourad Debbabi
:
Cross-Language Weaving Approach Targeting Software Security Hardening. PST 2008: 87-98 - [c3]Azzam Mourad, Dima Alhadidi, Mourad Debbabi:
Towards Language-Independent Approach for Security Concerns Weaving. SECRYPT 2008: 460-465 - 2007
- [c2]Dima Alhadidi, Nadia Belblidia, Mourad Debbabi
, Prabir Bhattacharya:
An AOP Extended Lambda-Calculus. SEFM 2007: 183-194 - 2006
- [c1]Dima Alhadidi, Nadia Belblidia, Mourad Debbabi:
Security crosscutting concerns and AspectJ. PST 2006: 45

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-22 23:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint