{"id":155,"date":"2019-03-15T08:39:26","date_gmt":"2019-03-15T12:39:26","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?page_id=155"},"modified":"2026-04-19T12:53:26","modified_gmt":"2026-04-19T16:53:26","slug":"publications","status":"publish","type":"page","link":"https:\/\/carleton.ca\/cybersea\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        Publications\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<h2 id=\"journal-articles\" class=\"wp-block-heading\">Journal Articles<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Dylan L\u00e9veill\u00e9 and Jason Jaskolka. <a href=\"https:\/\/doi.org\/10.46298\/lmcs-22(2:7)2026\">A scalable game-theoretic approach for selecting security controls from standardized catalogues<\/a>. <em class=\"myprefix-text-italic\">Logical Methods in Computer Science<\/em>, 22(2):1\u201327, April 2026.<\/li>\n\n\n\n<li>David Kohout, Tomas Lieskovan, Petr Mlynek, Radek Fujdiak, and Jason Jaskolka. <a href=\"https:\/\/doi.org\/10.1049\/gtd2.70292\">Secure deployment of smart meters<\/a>. <em class=\"myprefix-text-italic\">IET Generation, Transmission &amp; Distribution<\/em>, 20(1):e70292, April 2026.<\/li>\n\n\n\n<li>Xinrui Zhang, Pincan Zhao, Rongxing Lu, Jason Jaskolka, and Suprio Ray. <a href=\"https:\/\/doi.org\/10.1109\/JIOT.2025.3650147\">Enabling private cooperative sensing sharing in vehicular networks via encrypted spatial matching<\/a>. <em class=\"myprefix-text-italic\">IEEE Internet of Things Journal<\/em>, 13(7):14390\u201314403, April 2026.<\/li>\n\n\n\n<li>Anastassia Gharib, Jason Jaskolka, Mohamed Ibnkahla, and Ashraf Matrawy. <a href=\"https:\/\/doi.org\/10.1145\/3766888\">Security management of horizontal IoT platforms: A survey and comparison<\/a>. <em class=\"myprefix-text-italic\">ACM Computing Surveys<\/em>, 58(3):1\u201339, February 2026.<\/li>\n\n\n\n<li>Xinrui Zhang, Pincan Zhao, Jason Jaskolka, Heng Li, and Rongxing Lu. <a href=\"SecMLOps: A comprehensive framework for integrating security throughout the machine learning operations lifecycle\">SecMLOps: A comprehensive framework for integrating security throughout the machine learning operations lifecycle<\/a>. <em class=\"myprefix-text-italic\">Empirical Software Engineering<\/em>, 31:74, February 2026.<\/li>\n\n\n\n<li>Xinrui Zhang, Pincan Zhao, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.jss.2024.112331\">Navigating the DevOps landscape<\/a>.&nbsp;<em>Journal of Systems and Software<\/em>, 223:112331, May 2025.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.jss.2024.112219\">A model-driven formal methods approach to software architectural security vulnerabilities specification and verification<\/a>.&nbsp;<em>Journal of Systems and Software<\/em>, 219:112219, January 2025.<\/li>\n\n\n\n<li>Jason Jaskolka, Brahim Hamid, and Sahar Kokaly.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/MS.2022.3164872\">Software design trends supporting multi-concern assurance<\/a>.&nbsp;<em>IEEE Software<\/em>, 39(4):22\u201326, July\/August 2022.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.sysarc.2021.102073\">Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support<\/a>.&nbsp;<em>Journal of Systems Architecture<\/em>, 117:102073, August 2021.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.future.2020.02.033\">Formal specification and verification of reusable communication models for distributed systems architecture.<\/a>&nbsp;<em>Future Generation Computer Systems<\/em>, 108:178-197, July 2020.<\/li>\n\n\n\n<li>Maxime Buyse and Jason Jaskolka.&nbsp;<a href=\"https:\/\/www.isa-afp.org\/entries\/C2KA_DistributedSystems.html\">Communicating concurrent Kleene algebra for distributed systems specification.<\/a>&nbsp;<em>Archive of Formal Proofs<\/em>, p. 22, August 2019.<\/li>\n\n\n\n<li>Jason Jaskolka&nbsp;and John Villasenor.&nbsp;<a href=\"http:\/\/ieeexplore.ieee.org\/document\/7875503\/\" target=\"_blank\" rel=\"noreferrer noopener\">An approach for identifying and analyzing implicit interactions in distributed systems.<\/a>&nbsp;<em>IEEE Transactions on Reliability<\/em>, 66(2):529-546, June 2017.<\/li>\n\n\n\n<li>Jason Jaskolka&nbsp;and Ridha Khedri.&nbsp;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0304397516302675\" target=\"_blank\" rel=\"noreferrer noopener\">Mitigating covert channels based on analysis of the potential for communication<\/a>.&nbsp;<em>Theoretical Computer Science<\/em>, 643:1\u201337, August 2016.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"conference-papers\" class=\"wp-block-heading\">Conference Papers<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Alvi Jawad and Jason Jaskolka. <a href=\"https:\/\/doi.org\/10.1109\/DSA66321.2025.00030\">Enhancing risk assessment through contextualized application of systematic impact analysis<\/a>. In <em class=\"myprefix-text-italic\">Proceedings of the 12th International Conference on Dependable Systems and Their Applications<\/em>, <em class=\"myprefix-text-italic\">DSA 2025<\/em>, pages 175\u2013186, Sharjah, UAE, 2025.<\/li>\n\n\n\n<li>Stojanche Gjorcheski and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/DASC66011.2025.11257324\">Formal model-based traceability for security compliance in satellite control systems<\/a>. In&nbsp;<em>Proceedings of the AIAA DATC\/IEEE 44th Digital Avionics Systems Conference<\/em>,&nbsp;<em>DASC 2025<\/em>, pages 1\u201310, Montreal, QC, Canada, 2025<\/li>\n\n\n\n<li>Ali Farhat, Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/SSD64182.2025.10990002\">IoT-enabled e-health systems: Navigating security challenges and strategic recommendations<\/a>. In&nbsp;<em>Proceedings of the 22nd International Multi-Conference on Systems, Signals &amp; Devices<\/em>,&nbsp;<em>IEEE SSD 2025<\/em>, pages 1\u20136, Monastir, Tunisia, 2025<\/li>\n\n\n\n<li>John Breton, Jason Jaskolka, and George O.M. Yee.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-87499-4_7\">An approach to determine a system\u2019s behavioural security posture<\/a>. In Kamel Adi, Simon Bourdeau, Christel Durand, Val\u00e9rie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, and Joaquin Garcia-Alfaro, editors,&nbsp;<em>Proceedings of the 17th International Symposium on Foundations &amp; Practice of Security<\/em>,&nbsp;<em>FPS 2024<\/em>, volume 15532 of Lecture Notes in Computer Science, pages 94\u2013110, Montreal, QC, Canada, 2024<\/li>\n\n\n\n<li>Dylan L\u00e9veill\u00e9 and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-87499-4_13\">A tool for enabling scalable automation in security control selection<\/a>. In Kamel Adi, Simon Bourdeau, Christel Durand, Val\u00e9rie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, and Joaquin Garcia-Alfaro, editors,&nbsp;<em>Proceedings of the 17th International Symposium on Foundations &amp; Practice of Security<\/em>,&nbsp;<em>FPS 2024<\/em>, volume 15532 of Lecture Notes in Computer Science, pages 202\u2013213, Montreal, QC, Canada, 2024<\/li>\n\n\n\n<li>Xinrui Zhang and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/APSEC65559.2024.00067\">Uncovering the DevOps landscape: A scoping review and conceptualization framework<\/a>. In&nbsp;<em>Proceedings of the 31st Asia-Pacific Software Engineering Conference<\/em>,&nbsp;<em>APSEC 2024<\/em>, pages 497\u2013501, Chongqing, China, 2024.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-87719-3_7\">A tool-supported methodology for creating security cases using argument patterns<\/a>. In Carlos Ordonez and Giancarlo Sperl\u00ec, Elio Masciari, and Ladjel Bellatreche, editors,&nbsp;<em>Proceedings of the 13th International Conference on Model and Data Engineering<\/em>,&nbsp;<em>MEDI 2024<\/em>, volume 15590 of Lecture Notes in Computer Science, pages 82-90, Naples, Italy, 2024.<\/li>\n\n\n\n<li>Lo\u00efc Thierry, Jason Jaskolka, and Brahim Hamid.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-87719-3_4\">Reusable formal model libraries for specifying and analyzing security objectives in Event-B<\/a>. In Carlos Ordonez and Giancarlo Sperl\u00ec, Elio Masciari, and Ladjel Bellatreche, editors,&nbsp;<em>Proceedings of the 13th International Conference on Model and Data Engineering<\/em>,&nbsp;<em>MEDI 2024<\/em>, volume 15590 of Lecture Notes in Computer Science, pages 55-63, Naples, Italy, 2024.<\/li>\n\n\n\n<li>Xinrui Zhang, Pincan Zhao, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/TrustCom63139.2024.00224\">Enhancing security and efficiency in vehicle-to-sensor authentication: A multi-factor approach with cloud assistance<\/a>. In&nbsp;<em>23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/em>,&nbsp;<em>TrustCom 2024<\/em>, pages 1632\u20131637, 2024.<\/li>\n\n\n\n<li>Lo\u00efc Thierry, Jason Jaskolka, and Brahim Hamid.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-85356-2_10\">A formal approach for verifying and validating security objectives in software architecture<\/a>. In Belgacem Ben Hedia, Mohamed Ghazel and Bruno Monsuez, editors,&nbsp;<em>Proceedings of the 17th International Conference on Verification and Evaluation of Computer and Communication Systems<\/em>,&nbsp;<em>VECoS 2024<\/em>, volume 15466 of Lecture Notes in Computer Science, pages 143-158, Djerba, Tunisia, 2024.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-85356-2_7\">Formal security analysis of deep neural network architecture<\/a>. In Carlos Ordonez and Giancarlo Sperl\u00ec, Elio Masciari, and Ladjel Bellatreche, editors,&nbsp;<em>Proceedings of the 17th International Conference on Verification and Evaluation of Computer and Communication Systems<\/em>,&nbsp;<em>VECoS 2024<\/em>, volume 15466 of Lecture Notes in Computer Science, pages 97-112, Djerba, Tunisia, 2024.<\/li>\n\n\n\n<li>Alvi Jawad and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/DSA63982.2024.00022\">Interplay of attacker behaviors and dependability attributes in industrial control system impact analysis<\/a>. In&nbsp;<em>Proceedings of the 11th International Conference on Dependable Systems and Their Applications<\/em>,&nbsp;<em>DSA 2024<\/em>, pages 86-95, Suzhou, China, 2024.<\/li>\n\n\n\n<li>Luke Newton, Jason Jaskolka, Quentin Rouland, and Brahim Hamid.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/RWS62797.2024.10799344\">Data-driven approximation of formal implicit interaction analysis for cyber-physical system designs<\/a>. In&nbsp;<em>Proceedings of the 2024 Resilience Week Symposium<\/em>, pages 1-10, Austin, TX, USA, 2024.<\/li>\n\n\n\n<li>Alvi Jawad, Hala Assal, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3688459.3688467\">\u201cI\u2019m getting information that I can act on now\u201d: Exploring the level of actionable information in tool-generated threat reports<\/a>. In&nbsp;<em>Proceedings of the 2024 European Symposium on Usable Security<\/em>,&nbsp;<em>EuroUSEC 2024<\/em>, pages 172-186, Karlstad, Sweden, 2024.<\/li>\n\n\n\n<li>Dylan L\u00e9veill\u00e9 and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.4204\/EPTCS.409.11\">A game-theoretic approach for security control selection<\/a>. In Antonios Achilleos and Andrian Francalanza, editors,&nbsp;<em>Proceedings of the 15th International Symposium on Games, Automata, Logics and Formal Verification<\/em>, volume 409 of Electronic Proceedings in Theoretical Computer Science, pages 103\u2013119. Open Publishing Association, Reykjavi, Iceland, 2024.<\/li>\n\n\n\n<li>Robin Theveniaut, Brahim Hamid, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3691621.3694962\">Interplay of human factors and secure architecture design using model-driven engineering<\/a>. In&nbsp;<em>Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering Workshops<\/em>,&nbsp;<em>ASEW 2024<\/em>, pages 108-117, Sacramento, CA, USA, 2024.<\/li>\n\n\n\n<li>Alvi Jawad, Zoe Arnott, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/QRS62785.2024.00045\">Requirements for applying SCIA: a structured cyberattack impact analysis approach for ICS<\/a>. In&nbsp;<em>Proceedings of the 2024 IEEE 24th International Conference on Software Quality, Reliability and Security<\/em>,&nbsp;<em>QRS 2024<\/em>, pages 388-399, Cambridge, UK, 2024.&nbsp;<strong><em>(Winner of the Best Paper Award)<\/em><\/strong><\/li>\n\n\n\n<li>Nilofar Mansourzadeh, Anil Somayaji, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/people.scs.carleton.ca\/~soma\/pubs\/mansourzadeh-asia2024.pdf\">A fragility metric for software diversity<\/a>. In&nbsp;<em>Proceedings of the 19th Annual Symposium on Information Assurance<\/em>,&nbsp;<em>ASIA 2024&nbsp;<\/em>, pages 121\u2013129, Albany, NY, USA, 2024.<\/li>\n\n\n\n<li>John Breton, Jason Jaskolka, and George O.M. Yee.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-57537-2_24\">Hardening systems against data corruption attacks at design time<\/a>. In Mohamed Mosbah, Florence S\u00e8des, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens and Joaquin Garcia-Alfaro, editors,&nbsp;<em>Proceedings of the 16th International Symposium on Foundations &amp; Practice of Security<\/em>,&nbsp;<em>FPS 2023<\/em>, volume 14551 of Lecture Notes in Computer Science, pages 391-407, Bordeaux, France, 2024.<\/li>\n\n\n\n<li>Quentin Rouland, Stojanche Gjorcheski, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/QRS-C60940.2023.00054\">A security compliance-by-design framework utilizing reusable formal models.<\/a>&nbsp;In&nbsp;<em>Proceedings of the 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion<\/em>,&nbsp;<em>QRS-C<\/em>, pages 186\u2013195, Chiang Mai, Thailand, 2023.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.5555\/3721041.3721068\">Security argument patterns for deep neural network development<\/a>. In&nbsp;<em>Proceedings of the 30th Conference on Pattern Languages of Programs<\/em>, PLoP 2023, pages 1-18, 2023.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3628034.3628044\">Formal model-based argument patterns for security cases<\/a>. In&nbsp;<em>Proceedings of the 28th European Conference on Pattern Languages of Programs<\/em>, EuroPLoP 2023, pages 1-12, 2023.<\/li>\n\n\n\n<li>James Baak, Quentin Rouland, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-49333-1_2\">A formal metamodel with composite components<\/a>. In Mohamed Mosbah, Tahar Kechadi, Ladjel Bellatreche, and Faiez Gargouri, editors,&nbsp;<em>Proceedings of the 12th International Conference on Model and Data Engineering<\/em>,&nbsp;<em>MEDI 2023<\/em>, volume 14396 of Lecture Notes in Computer Science, pages 15-29, Sousse, Tunisia, 2023.<\/li>\n\n\n\n<li>Lo\u00efc Thierry, Jason Jaskolka, Brahim Hamid, and Jean-Paul Bodeveix.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/ICECCS59891.2023.00028\">Specification and verification of communication paradigms for CBSE in Event B<\/a>. In&nbsp;<em>Proceedings of the 27th International Conference on Engineering of Complex Computer Systems<\/em>,&nbsp;<em>ICECSS 2023<\/em>, pages 157\u2013166, Toulouse, France, 2023.<\/li>\n\n\n\n<li>Alvi Jawad and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/DSA59317.2023.00040\">Single and combined cyberattack impact on industrial wastewater systems<\/a>. In&nbsp;<em>Proceedings of the 10th International Conference on Dependable Systems and Their Applications<\/em>,&nbsp;<em>DSA 2023<\/em>, pages 272\u2013281, Tokyo, Japan, 2023.<\/li>\n\n\n\n<li>Quentin Rouland, Stojanche Gjorcheski, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/REW57809.2023.00045\">Eliciting a security architecture requirements baseline from standards and regulations.<\/a>&nbsp;In&nbsp;<em>Proceedings of the 2023 IEEE 31st International Requirements Engineering Conference Workshops<\/em>,&nbsp;<em>REW<\/em>, pages 224\u2013229, Hannover, Germany, 2023.<\/li>\n\n\n\n<li>Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/SAS58821.2023.10254186\">Integrating medical and wearable devices with e-health systems using horizontal IoT platforms.<\/a>&nbsp;In&nbsp;<em>Proceedings of the 2023 IEEE Sensors Applications Symposium<\/em>,&nbsp;<em>SAS<\/em>, pages 1\u20136, Ottawa, ON, Canada, 2023.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-40953-0_2\">Constructing security cases based on formal verification of security requirements in Alloy<\/a>. In&nbsp;<em>J\u00e9r\u00e9mie Guiochet, Stefano Tonetta, Erwin Schoitsch, Matthieu Roy, and Friedemann Bitsch, editors, Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops<\/em>, volume 14182 of Lecture Notes in Computer Science, pages 15\u201325, Toulouse, France, 2023.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, Jean-Paul Bodeveix, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/ICSA-C57050.2023.00042\">Formalizing the relationship between security policies and objectives in software architectures<\/a>. In&nbsp;<em>Proceedings of the 2023 IEEE 20th International Conference on Software Architecture Companion<\/em>,&nbsp;<em>ICSA-C 2023<\/em>, pages 151\u2013158, L\u2019Aquila, Italy, 2023.<\/li>\n\n\n\n<li>Sanaa Alwidian and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-29786-1_5\">Understanding the role of human-related factors in security requirements elicitation<\/a>. In Alessio Ferrari and Birgit Penzenstadler, editors,&nbsp;<em>Proceedings of the 29th International Working Conference on Requirements Engineering: Foundation for Software Quality<\/em>,&nbsp;<em>REFSQ 2023<\/em>, volume 13975 of Lecture Notes in Computer Science, pages 65-74, Barcelona, Spain, 2023.<\/li>\n\n\n\n<li>Alvi Jawad and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-30122-3_17\">Defense models for data recovery in industrial control systems<\/a>. In Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence S\u00e8des, and Joaquin Garcia-Alfaro, editors,&nbsp;<em>Proceedings of the 15th International Symposium on Foundations &amp; Practice of Security<\/em>,&nbsp;<em>FPS 2022<\/em>, volume 13877 of Lecture Notes in Computer Science, pages 198-216, Ottawa, ON, Canada, 2023.<\/li>\n\n\n\n<li>Xinrui Zhang and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/QRS57517.2022.00023\">Conceptualizing the secure machine learning operations (SecMLOps) paradigm<\/a>. In&nbsp;<em>Proceedings of the 22nd IEEE International Conference on Software Quality, Reliability, and Security<\/em>, QRS 2022, pages 127-138, 2022.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/TrustCom56396.2022.00226\">Towards logical specification of adversarial examples in machine learning<\/a>. In&nbsp;<em>Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/em>, TrustCom 2022, pages 1575-1580, 2022.<\/li>\n\n\n\n<li>Jason Jaskolka and Brahim Hamid.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3551349.3561149\">Towards the integration of human factors in collaborative decision making for secure architecture design<\/a>. In&nbsp;<em>Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering<\/em>, ASE 2022, pages 1-8, Rochester, MI, USA, 2022.<\/li>\n\n\n\n<li>Brahim Hamid and Jason Jaskolka&lt;\/strong.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-83072-3_1\">Work in progress: Considering human factors in collaborative decision making for secure architecture design<\/a>. In Maryam Mehrnezhad and Simon Parkin, editors, Socio-Technical Aspects in Security, STAST 2022, volume 13855 of Lecture Notes in Computer Science, pages 1\u201313, Copenhagen, Denmark, 2022.<\/li>\n\n\n\n<li>Xinrui Zhang and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3551902.3565070\">Security patterns for machine learning: The data-oriented stages<\/a>. In&nbsp;<em>Proceedings of the 27th European Conference on Pattern Languages of Programs<\/em>, EuroPLoP 2022, pages 1-12, 2022.<\/li>\n\n\n\n<li>Sajib Kumar Kuri, Tarim Islam, Jason Jaskolka, and Mohamed Ibnkahla.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/VTC2022-Spring54318.2022.9860359\">A threat model and security recommendations for IoT sensors in connected vehicle networks<\/a>. In&nbsp;<em>Proceedings of the 2022 IEEE 95th Vehicular Technology Conference<\/em>, VTC-Spring 2022, pages 1-5, Helsinki, Finland, 2022.<\/li>\n\n\n\n<li>Alvi Jawad, Luke Newton, Ashraf Matrawy, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/ICC45855.2022.9838865\">A formal analysis of the efficacy of rebooting as a countermeasure against IoT botnets<\/a>. In&nbsp;<em>Proceedings of the 2022 IEEE International Conference on Communications<\/em>, IEEE ICC 2022, pages 2206-2211, Seoul, South Korea, 2022.<\/li>\n\n\n\n<li>Bohdana Sereda and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.procs.2022.03.038\">An evaluation of IoT security guidance documents: A shared responsibility perspective<\/a>. In Elhadi Shakshuki and Muhammad Younas, editors,&nbsp;<em>Proceedings of the 13th International Conference on Ambient Systems, Networks and Technologies<\/em>, volume 201C of&nbsp;<em>Procedia Computer Science, ANT 2022<\/em>, pages 281-288, Porto, Portugal, 2022.<\/li>\n\n\n\n<li>Alvi Jawad and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/QRS54544.2021.00106\">Analyzing the impact of cyberattacks on industrial control systems using timed automata<\/a>. In&nbsp;<em>Proceedings of the 21st IEEE International Conference on Software Quality, Reliability, and Security<\/em>, QRS 2021, pages 966-977, Hainan Island, China, 2021.<\/li>\n\n\n\n<li>Joe Samuel, Jason Jaskolka, and George O.M. Yee.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/QRS54544.2021.00012\">Analyzing structural security posture to evaluate system design decisions<\/a>. In&nbsp;<em>Proceedings of the 21st IEEE International Conference on Software Quality, Reliability, and Security<\/em>, QRS 2021, page 8-17, Hainan Island, China, 2021.<\/li>\n\n\n\n<li>Jason Jaskolka, Brahim Hamid, Alvi Jawad, and Joe Samuel.&nbsp;<a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/3712039.3712051\">Secure Development Decomposition \u2013 An Argument Pattern for Structured Assurance Case Models<\/a>. In&nbsp;<em>Proceedings of the 28th Conference on Pattern Languages of Programs<\/em>, PLoP 2021, pages 1-12, 2021.<\/li>\n\n\n\n<li>Jason Jaskolka, Brahim Hamid, Alvi Jawad, and Joe Samuel.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3489449.3490001\">A security property decomposition argument pattern for structured assurance case models<\/a>. In&nbsp;<em>Proceedings of the 26th European Conference on Pattern Languages of Programs<\/em>, EuroPLoP 2021, pages 1-10, Graz, Austria, 2021.<\/li>\n\n\n\n<li>Luke Newton and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/RWS52686.2021.9611810\">Analyzing implicit interactions to identify weak points in cyber-physical system designs<\/a>. In Proceedings of the 2021 Resilience Week Symposium, pages 1-8, Salt Lake City, UT, USA, 2021.<\/li>\n\n\n\n<li>Alvi Jawad and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.23919\/ANNSIM52504.2021.9552043\">Modeling and simulation approaches for cybersecurity impact analysis: State-of-the-art<\/a>. In&nbsp;<em>Proceedings of the 2021 Annual Modeling and Simulation Conference<\/em>, ANNSIM 2021, pages 1\u201312, Fairfax, VA, USA, 2021.<\/li>\n\n\n\n<li>Joe Samuel, Jason Jaskolka, and George O.M. Yee.&nbsp;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9452029\">Leveraging external data sources to enhance secure system design<\/a>. In&nbsp;<em>Proceedings of the 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge<\/em>, RDAAPS 2021, pages 1\u20138, Hamilton, ON, Canada, 2021.<\/li>\n\n\n\n<li>Joe Samuel, Khalil Aalab, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9343145\">Evaluating the soundness of security metrics from vulnerability scoring frameworks<\/a>. In&nbsp;<em>Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/em>, IEEE TrustCom 2020, pages 442\u2013449, Guangzhou, China, 2020.<\/li>\n\n\n\n<li>Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-64330-0_3\">Identifying and analyzing implicit interactions in a wastewater dechlorination system<\/a>. In Sokratis Katsikas et al., editors,&nbsp;<em>Computer Security. CyberICPS 2020, SECPRE 2020, ADIoT 2020<\/em>, volume 12501 of Lecture Notes in Computer Science, pages 34\u201351, Guildford, UK, 2020. Springer, Cham.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-64694-3_4\">Reusable formal models for threat specification, detection, and treatment<\/a>. In Sihem Ben Sassi, St\u00e9phane Ducasse, and Hafedh Mili, editors,&nbsp;<em>Reuse in Emerging Software Engineering Practices, Proceedings of the 19th International Conference on Software and Systems Reuse, ICSR 2020<\/em>, volume 12541 of Lecture Notes in Computer Science, pages 52\u201368, Hammamet, Tunisia, December 2020. Springer International Publishing.&nbsp;<strong><em>(Winner of the Best Paper Award)<\/em><\/strong><\/li>\n\n\n\n<li>Thomas Sattolo and Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-58201-2_2\">Evaluation of statistical tests for detecting storage-based covert channels<\/a>. In Marko H\u00f6lbl, Kai Rannenberg, and Tatjana Welzer, editors,&nbsp;<em>Proceedings of the 35th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2020<\/em>, volume 580 of IFIP Advances in Information and Communication Technology, pages 17\u201331, Maribor, Slovenia, September 2020. Springer, Cham.<\/li>\n\n\n\n<li>Jason Jaskolka.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-52243-8_37\">Recommendations for effective security assurance of software-dependent systems<\/a>. In Kohei Arai, Supriya Kapoor, and Rahul Bhatia, editors,&nbsp;<em>Intelligent Computing, SAI 2020<\/em>, volume 1230 of Advances in Intelligent Systems and Computing, pages 511\u2013531. London, UK, 2020. Springer, Cham.<\/li>\n\n\n\n<li>Brahim Hamid, Quentin Rouland, and Jason Jaskolka.&nbsp;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8952145\">Distributed maintenance of a spanning tree of k-connected graphs<\/a>. In&nbsp;<em>Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing<\/em>, pages 217-226, Kyoto, Japan, December 2019.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, and&nbsp;Jason Jaskolka.&nbsp;<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-00856-7_13\" target=\"_blank\" rel=\"noreferrer noopener\">Formalizing reusable communication models for distributed systems architecture<\/a>. In El Hassan Abdelwahed, Ladjel Bellatreche, Matt\u00e9o Golfarelli, Dominique M\u00e9ry, and Carlos Ordonez, editors,&nbsp;<em>Proceedings of the 8th International Conference on Model and Data Engineering<\/em>,&nbsp;<em>MEDI 2018<\/em>, volume 11163 of Lecture Notes in Computer Science, pages 198-216, Marrakesh, Morocco, October 2018.<\/li>\n\n\n\n<li>Jason Jaskolka.&nbsp;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8598444\" target=\"_blank\" rel=\"noreferrer noopener\">Challenges in assuring security and resilience of advanced metering infrastructure<\/a>. In&nbsp;<em>Proceedings of the 18th annual IEEE Canada Electrical Power and Energy Conference<\/em>,&nbsp;<em>EPEC 2018<\/em>, Toronto, ON, Canada, 2018.<\/li>\n\n\n\n<li>Jason Jaskolka&nbsp;and Ridha Khedri.&nbsp;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S187705091500900X\" target=\"_blank\" rel=\"noreferrer noopener\">Towards the certification of covert channel freeness in cloud-based systems<\/a>. In Elhadi Shakshuki, editor,&nbsp;<em>Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies<\/em>, volume 52 of&nbsp;<em>Procedia Computer Science, ANT 2015 and SEIT 2015<\/em>, pages 318\u2013225, London, UK, June 2015.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Articles Conference Papers<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cu_dining_location_slug":"","footnotes":"","_links_to":"","_links_to_target":""},"cu_page_type":[],"class_list":["post-155","page","type-page","status-publish","hentry"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=155"}],"version-history":[{"count":5,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/155\/revisions"}],"predecessor-version":[{"id":2221,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/155\/revisions\/2221"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=155"}],"wp:term":[{"taxonomy":"cu_page_type","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_page_type?post=155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}