Abdelhakim Hannousse

Abdelhakim Hannousse
Université 8 mai 1945 - Guelma · Department of Computer Science

PhD and Habilitation in Computer Science
Associate Professor/Senior Lecturer

About

33
Publications
6,933
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
112
Citations
Citations since 2016
22 Research Items
80 Citations
2016201720182019202020212022010203040
2016201720182019202020212022010203040
2016201720182019202020212022010203040
2016201720182019202020212022010203040
Introduction
Abdelhakim Hannousse is a senior lecturer at Guelma university, Algeria. He has earned his PhD degree from Ecole des Mines de Nantes, France in 2011, and his Magister degree from Annaba university, Algeria in 2006. His research interests include: formal methods, software engineering paradigms and data science. Contact him at hannousse.abdelhakim@univ-guelma.dz.
Additional affiliations
October 2011 - present
Université 8 Mai 1945 - Guelma
Position
  • Professor (Associate)
January 2007 - September 2007
United Nations University (UNU)
Position
  • Fellow
Education
October 2008 - November 2011
IMT Atlantique
Field of study
  • Computer Science
October 2003 - September 2006
Badji Mokhtar - Annaba University
Field of study
  • Computer Science
October 1998 - June 2003
Badji Mokhtar - Annaba University
Field of study
  • Computer Science

Publications

Publications (33)
Article
Full-text available
Searching relevant papers is a fundamental task for the elaboration of secondary studies. This task is known to be tedious and time‐consuming when it is made manually, especially with the presence of several academic repositories. Recently, Semantic Scholar has emerged as a new artificial intelligence‐based search engine enabling a set of valuable...
Article
In recent years, there has been a significant increase in research interest in webshell attacks. Webshells are pieces of code that can be written in different scripting languages. They are uploaded to web servers after creating a breach making use of injection vulnerabilities. Webshells provide hackers a web interface to remotely execute commands,...
Article
The increasing popularity of the Internet led to a substantial growth of e-commerce. However, such activities have main security challenges primary caused by cyberfraud and identity theft. Therefore, checking the legitimacy of visited web pages is a crucial task to secure costumers’ identities and prevent phishing attacks. The use of machine learni...
Article
Microservice architectures (MSA) are becoming trending alternatives to existing software development paradigms notably for developing complex and distributed applications. Microservices emerged as an architectural design pattern aiming to address the scalability and ease the maintenance of online services. However, security breaches have increased...
Preprint
Full-text available
Cross-site scripting (XSS) is one of the major threats menacing the privacy of data and the navigation of trusted web applications. Since its reveal in late 1999 by Microsoft security engineers, several techniques have been developed in the aim to secure web navigation and protect web applications against XSS attacks. The problem became worse with...
Data
This dataset contains a collection of benign and malicious webshells. The source of these webshells are mainly collected from Github and open source projects. It is made available for replication of our ongoing work on the automatic detection of webshells. The list of webshells is filtered using MD5 for all languages and VLD for PHP language.
Article
Full-text available
Webshell attacks are becoming more and more prevalent every year. Webshells are malicious scripts injected into web servers in the aim to confiscate persistent and remote access through simple HTTP requests on web browsers. Through webshells, attackers can remotely access confidential data and execute system commands. Actually, threat actors use we...
Chapter
The elaboration of systematic reviews has become a common practice in computer science after being exclusively related to healthcare and medical sciences. The process incorporates several steps to collect and analyze relevant papers to answer a set of well-formulated research questions. The search process starts by exploring different sources and d...
Conference Paper
The elaboration of systematic reviews has become a common practice in computer science after being exclusively related to healthcare and medical sciences. The process incorporates several steps to collect and analyze relevant papers to answer a set of well-formulated research questions. The search process starts by exploring different sources and d...
Conference Paper
The explosion of web services has been accompanied by a rapid development of dangerous cyberattack methods. Webshells are considered among the easiest and most persistent cyberattack methods targeting web servers in the last few years. Webshells are malicious scripts injected into web servers to gain illegal persistent and remote access through sim...
Data
This dataset is a benchmark proposal for web page phishing detection.
Data
The datatset contains the different studies used to evaluate the coverage rate of Semantic Scholar search engine.
Preprint
Full-text available
The increasing popularity of the Internet led to a substantial growth of e-commerce. However, such activities have main security challenges primary caused by cyberfraud and identity theft. Therefore, checking the legitimacy of visited web pages is a crucial task to secure costumers' identities and prevent phishing attacks. The use of machine learni...
Preprint
Searching relevant papers is a fundamental task for the elaboration of secondary studies. This task is known to be tedious and time-consuming when it is made manually, especially with the presence of several academic repositories. Recently, Semantic Scholar has emerged as a new artificial intelligence-based search engine enabling a set of valuable...
Preprint
Full-text available
Microservice architectures (MSA) are becoming trending alternatives to existing software development paradigms notably for developing complex and distributed applications. Microservices emerged as an architectural design pattern aiming to address the scalability and ease the maintenance of online services. However, security breaches have increased...
Article
Dealing with crosscutting and dynamic features in component software is a longstanding problem primarily due to the nature of used components: components may be available only as black box software units and their implementations may be protected against alteration. Aspect-orientation provides valuable means to deal with crosscutting features in di...
Article
Dealing with crosscutting and dynamic features in component software is a longstanding problem primarily due to the nature of used components: components may be available only as black box software units and their implementations may be protected against alteration. Aspect-orientation provides valuable means to deal with crosscutting features in di...
Conference Paper
Traditional development processes fail to be applied effectively to the development of component software. Some features in the design need to be (un)plugged dynamically to software systems and their implementations may require to crosscut the code of components. This is often not possible in component systems due to the nature of used components (...
Article
Full-text available
Coping with crosscutting and dynamic features of software systems has significant impacts on software modularity, reusability, adaptability and maintainability. However, dealing with such features is a tremendous challenge for different software paradigms, particularly component-based software development (CBSD) where components can be used as blac...
Technical Report
Full-text available
Ce support du cours est destiné aux étudiants de première année structure de la matières
Article
Component based software engineering and aspect orientation are claimed to be two complementary approaches. While the former ensures the modularity and the reusability of software entities, the latter enables the modularity of crosscutting concerns that cannot be modularized as regular components. Nowadays, several approaches and frameworks are ded...
Book
Full-text available
Component based software engineering, or CBSE in short, enables the modularization of concerns in terms of separate software entities called components. Each component provides a set of services and may require services from other components to accomplish its tasks. Components can be assembled in order to construct complex systems. On the other han...
Article
Using AOP to model non-modular concerns in CBSE ensures better modularity and reusability of components. In this thesis, we provide a model independent approach for modeling aspects in component models. In the approach we model aspects as wrappers on views of component systems. A view describes an adequate component system configuration where all t...
Conference Paper
Full-text available
Component based software engineering and aspect orientation are claimed to be two complementary approaches. While the former ensures the modularity and the reusability of software entities, the latter enables the modularity of crosscutting concerns that cannot be modularized as regular components. Nowadays, several approaches and frameworks are ded...
Conference Paper
Full-text available
Fractal component model provides controllers for adding extra-functional capabilities to component behaviors. However, controllers may interfere one with another and their composition is still a challenge. In this article, we extend Fractal with a support for composing controllers with reusable operators. Then, we discuss how to formally model and...
Conference Paper
Full-text available
Component based software development (CBSD) and aspect-oriented software development (AOSD) are two complementary approaches. However, existing proposals for integrating aspects into component models are direct transposition of object-oriented AOSD techniques to components. In this article, we propose a new approach based on views. Our proposal int...
Technical Report
Full-text available
The overarching goal of a formal specification of design patterns is to enhance their understandability, address their composability problem and provide a tool support for their re-usability. Understanding design patterns means uncovering when and how a specific pattern can be used to resolve a specific design problem. The lack of completeness of t...
Article
In fact, effective assessment of Aspect Oriented Software Development (AOSD) models has been a challenge since the arising of the first aspect-oriented programming languages in the past decade. This paper addresses the assessment problem of AOSD models by introducing a framework where more than one AOSD model can be used for the design and the impl...
Conference Paper
Full-text available
This chapter presents a formalization of functional and be- havioural requirements, and a refinement of requirements to a design for CoCoME using the Relational Calculus of Object and Component Sys- tems (rCOS). We give a model of requirements based on an abstraction of the use cases described in Chapter 3.2. Then the refinement calculus of rCOS is...
Conference Paper
Full-text available
The Object Oriented Model has some limitations that recent approaches known as Advanced Separation of Concerns ASOC try to eliminate. Today, there are many ASOC approaches and their comparison is increasingly considered as an important issue. Unfortunately, few works are dedicated to the comparison and the assessment of these approaches. In this pa...

Questions

Question (1)
Question
We are looking for participants to the Historical Arabic Manuscript Dating Competition (HAMD22). The competition is organized in conjunction with the 18th International Conference on Frontiers in Handwriting Recognition (ICFHR 2022). The competition is a valuable opportunity for researchers in the field to compare the performance of their historical manuscript dating systems on a common and well-established dataset and under a strict evaluation process. Here is the link for more details: https://sites.google.com/view/icfhr2022-hamd

Network

Cited By

Projects

Projects (5)
Project
This project aims to study, analyze and protect web sites, web applications and web servers from any cyber threat. Therefore, a series of studies will be conducted to examine the state of the art endeavors and propose new solutions to prevent such threats.
Project
Microservice architecture is becoming a trending alternative to existing software development paradigms notably for developing distributed applications. One of the primordial issues that should be taken in consideration when adopting microservice architectures is security. By this project, we aim to provide an in-depth analysis of securing microservices and microservice architectures and proposing an effective solution to the problem.