Alvi Jawad and Jason Jaskolka.Defense models for data recovery in industrial control systems. In Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence Sèdes, and Joaquin Garcia-Alfaro, editors, Proceedings of the 15th International Symposium on Foundations & Practice of Security, FPS 2022, volume 13877 of Lecture Notes in Computer Science, pages 198-216, Ottawa, ON, Canada, 2023.
Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Reusable formal models for threat specification, detection, and treatment. In Sihem Ben Sassi, Stéphane Ducasse, and Hafedh Mili, editors, Reuse in Emerging Software Engineering Practices, Proceedings of the 19th International Conference on Software and Systems Reuse, ICSR 2020, volume 12541 of Lecture Notes in Computer Science, pages 52–68, Hammamet, Tunisia, December 2020. Springer International Publishing. (Winner of the Best Paper Award)
Thomas Sattolo and Jason Jaskolka. Evaluation of statistical tests for detecting storage-based covert channels. In Marko Hölbl, Kai Rannenberg, and Tatjana Welzer, editors, Proceedings of the 35th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2020, volume 580 of IFIP Advances in Information and Communication Technology, pages 17–31, Maribor, Slovenia, September 2020. Springer, Cham.
Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Formalizing Reusable Communication Models for Distributed Systems Architecture. In El Hassan Abdelwahed, Ladjel Bellatreche, Mattéo Golfarelli, Dominique Méry, and Carlos Ordonez, editors, Proceedings of the 8th International Conference on Model and Data Engineering, MEDI 2018, volume 11163 of Lecture Notes in Computer Science, pages 198-216, Marrakesh, Morocco, October 2018.
Jason Jaskolka, Wendy MacCaull, and Ridha Khedri. Towards an Ontology Design Architecture. In Proceedings of the 2015 International Conference on Computational Science and Computational Intelligence, CSCI 2015, pages 132–135, Las Vegas, NV, U.S.A., December 2015.
Jason Jaskolka and Ridha Khedri. A Formulation of the Potential for Communication Condition using C2KA. In Adriano Peron and Carla Piazza, editors, Proceedings of the 5th International Symposium on Games, Automata, Logics and Formal Verification, volume 161 of Electronic Proceedings in Theoretical Computer Science, pages 161-174. Open Publishing Association, Verona, Italy, September 2014.
Jason Jaskolka, Ridha Khedri, and Qinglei Zhang. Endowing Concurrent Kleene Algebra with Communication Actions. In Peter Höfner, Peter Jipsen, Wolfram Kahl, and Martin E. Müller, editors, Proceedings of the 14th International Conference on Relational and Algebraic Methods in Computer Science, volume 8428 of Lecture Notes in Computer Science, pages 19-36. Springer International Publishing Switzerland, Marienstatt, Germany, April 2014.
Qinglei Zhang, Ridha Khedri, and Jason Jaskolka. Verification of Aspectual Composition in Feature-Modeling. In George Eleftherakis, Mike Hinchey, and Mike Holcombe, editors, Proceedings of the 10th International Conference on Software Engineering and Formal Methods, volume 7504 of Lecture Notes in Computer Science, pages 109–125. Springer Berlin/Heidelberg, Thessaloniki, Greece, October 2012.
Qinglei Zhang, Ridha Khedri, and Jason Jaskolka. An Aspect-Oriented Language for Product Family Specification. In Elhadi Shakshuki and Muhammad Younas, editors, Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies, volume 10 of Procedia Computer Science, ANT 2012 and MobiWIS 2012, pages 482–489, Niagara Falls, ON, Canada, August 2012.
Jason Jaskolka and Ridha Khedri. Exploring Covert Channels. In Proceedings of the 44th Hawaii International Conference on System Sciences, HICSS-44, pages 1–10, Koloa, Kauai, HI, U.S.A., January 2011.
Khair Eddin Sabri, Ridha Khedri, and Jason Jaskolka. Verification of Information Flow in Agent-Based Systems. In Gilbert Babin, Peter Kropf, and Michael Weiss, editors, Proceedings of the 4th International MCETECH Conference on e-Technologies, volume 26 of Lecture Notes in Business Information Processing, pages 252–266, Ottawa, ON, Canada, May 2009. (Nominated for the Best Paper Award)
Monika Bialy, Vera Pantelic, Jason Jaskolka, Alexander Schaap, Lucian Patcas, Mark Lawford, and Alan Wassyng. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems, Chapter 3: Software Engineering for Model-Based Development by Domain Experts, pages 39-64. Elsevier, First Edition, October 2016.
Monika Bialy, Jacques Carette, Lane Gibson, Jason Jaskolka, Mark Lawford, Bennett Mackenzie, Tom Maibaum, Archana Mallya, Gordon Marks, Vera Pantelic, Alexander Schaap, Syed Asim Shah, and Alan Wassyng. Phase 1 Quarterly Report 8 on APC LEAP – Embedded Software Project. Technical Report, McMaster Centre for Software Certification, Hamilton, ON, Canada, December 2015.