{"id":218,"date":"2019-04-22T16:47:41","date_gmt":"2019-04-22T20:47:41","guid":{"rendered":"https:\/\/carleton.ca\/jaskolka\/?page_id=218"},"modified":"2026-02-12T11:44:53","modified_gmt":"2026-02-12T16:44:53","slug":"publications-by-year","status":"publish","type":"page","link":"https:\/\/carleton.ca\/jaskolka\/publications-by-year\/","title":{"rendered":"Publications By Year"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        Publications By Year\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<h2 id=\"2026\" class=\"wp-block-heading\">2026<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Xinrui Zhang, Pincan Zhao, <strong class=\"myprefix-text-bold\">Jason Jaskolka<\/strong>, Heng Li, and Rongxing Lu. <a href=\"https:\/\/doi.org\/10.1007\/s10664-025-10795-y\" type=\"link\" id=\"https:\/\/doi.org\/10.1007\/s10664-025-10795-y\">SecMLOps: A comprehensive framework for integrating security throughout the machine learning operations lifecycle<\/a>. <em class=\"myprefix-text-italic\">Empirical Software Engineering<\/em>, 31:74, February 2026.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2025\" class=\"wp-block-heading\">2025<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Stojanche Gjorcheski and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/DASC66011.2025.11257324\">Formal model-based traceability for security compliance in satellite control systems<\/a>. In&nbsp;<em>Proceedings of the AIAA DATC\/IEEE 44th Digital Avionics Systems Conference<\/em>,&nbsp;<em>DASC 2025<\/em>, pages 1\u201310, Montreal, QC, Canada, 2025<\/li>\n\n\n\n<li>Ali Farhat, Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla,&nbsp;<strong>Jason Jaskolka<\/strong>, and Ashraf Matrawy.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/SSD64182.2025.10990002\">IoT-enabled e-health systems: Navigating security challenges and strategic recommendations<\/a>. In&nbsp;<em>Proceedings of the 22nd International Multi-Conference on Systems, Signals &amp; Devices<\/em>,&nbsp;<em>IEEE SSD 2025<\/em>, pages 1\u20136, Monastir, Tunisia, 2025<\/li>\n\n\n\n<li>Xinrui Zhang, Pincan Zhao, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.jss.2024.112331\">Navigating the DevOps landscape<\/a>.&nbsp;<em>Journal of Systems and Software<\/em>, 223:112331, May 2025.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.jss.2024.112219\">A model-driven formal methods approach to software architectural security vulnerabilities specification and verification<\/a>.&nbsp;<em>Journal of Systems and Software<\/em>, 219:112219, January 2025.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2024\" class=\"wp-block-heading\">2024<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>John Breton,&nbsp;<strong>Jason Jaskolka<\/strong>, and George O.M. Yee.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-87499-4_7\">An approach to determine a system\u2019s behavioural security posture<\/a>. In Kamel Adi, Simon Bourdeau, Christel Durand, Val\u00e9rie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, and Joaquin Garcia-Alfaro, editors,&nbsp;<em>Proceedings of the 17th International Symposium on Foundations &amp; Practice of Security<\/em>,&nbsp;<em>FPS 2024<\/em>, volume 15532 of Lecture Notes in Computer Science, pages 94\u2013110, Montreal, QC, Canada, 2024<\/li>\n\n\n\n<li>Dylan L\u00e9veill\u00e9 and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-87499-4_13\">A tool for enabling scalable automation in security control selection<\/a>. In Kamel Adi, Simon Bourdeau, Christel Durand, Val\u00e9rie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, and Joaquin Garcia-Alfaro, editors,&nbsp;<em>Proceedings of the 17th International Symposium on Foundations &amp; Practice of Security<\/em>,&nbsp;<em>FPS 2024<\/em>, volume 15532 of Lecture Notes in Computer Science, pages 202\u2013213, Montreal, QC, Canada, 2024<\/li>\n\n\n\n<li>Xinrui Zhang and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/APSEC65559.2024.00067\">Uncovering the DevOps landscape: A scoping review and conceptualization framework<\/a>. In&nbsp;<em>Proceedings of the 31st Asia-Pacific Software Engineering Conference<\/em>,&nbsp;<em>APSEC 2024<\/em>, pages 497\u2013501, Chongqing, China, 2024.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-87719-3_7\">A tool-supported methodology for creating security cases using argument patterns<\/a>. In Carlos Ordonez and Giancarlo Sperl\u00ec, Elio Masciari, and Ladjel Bellatreche, editors,&nbsp;<em>Proceedings of the 13th International Conference on Model and Data Engineering<\/em>,&nbsp;<em>MEDI 2024<\/em>, volume 15590 of Lecture Notes in Computer Science, pages 82-90, Naples, Italy, 2024.<\/li>\n\n\n\n<li>Lo\u00efc Thierry,&nbsp;<strong>Jason Jaskolka<\/strong>, and Brahim Hamid.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-87719-3_4\">Reusable formal model libraries for specifying and analyzing security objectives in Event-B<\/a>. In Carlos Ordonez and Giancarlo Sperl\u00ec, Elio Masciari, and Ladjel Bellatreche, editors,&nbsp;<em>Proceedings of the 13th International Conference on Model and Data Engineering<\/em>,&nbsp;<em>MEDI 2024<\/em>, volume 15590 of Lecture Notes in Computer Science, pages 55-63, Naples, Italy, 2024.<\/li>\n\n\n\n<li>Xinrui Zhang, Pincan Zhao, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/TrustCom63139.2024.00224\">Enhancing security and efficiency in vehicle-to-sensor authentication: A multi-factor approach with cloud assistance<\/a>. In&nbsp;<em>23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/em>,&nbsp;<em>TrustCom 2024<\/em>, pages 1632\u20131637, 2024.<\/li>\n\n\n\n<li>Lo\u00efc Thierry,&nbsp;<strong>Jason Jaskolka<\/strong>, and Brahim Hamid.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-85356-2_10\">A formal approach for verifying and validating security objectives in software architecture<\/a>. In Belgacem Ben Hedia, Mohamed Ghazel and Bruno Monsuez, editors,&nbsp;<em>Proceedings of the 17th International Conference on Verification and Evaluation of Computer and Communication Systems<\/em>,&nbsp;<em>VECoS 2024<\/em>, volume 15466 of Lecture Notes in Computer Science, pages 143-158, Djerba, Tunisia, 2024.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-85356-2_7\">Formal security analysis of deep neural network architecture<\/a>. In Carlos Ordonez and Giancarlo Sperl\u00ec, Elio Masciari, and Ladjel Bellatreche, editors,&nbsp;<em>Proceedings of the 17th International Conference on Verification and Evaluation of Computer and Communication Systems<\/em>,&nbsp;<em>VECoS 2024<\/em>, volume 15466 of Lecture Notes in Computer Science, pages 97-112, Djerba, Tunisia, 2024.<\/li>\n\n\n\n<li>Alvi Jawad and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/DSA63982.2024.00022\">Interplay of attacker behaviors and dependability attributes in industrial control system impact analysis<\/a>. In&nbsp;<em>Proceedings of the 11th International Conference on Dependable Systems and Their Applications<\/em>,&nbsp;<em>DSA 2024<\/em>, pages 86-95, Suzhou, China, 2024.<\/li>\n\n\n\n<li>Luke Newton,&nbsp;<strong>Jason Jaskolka<\/strong>, Quentin Rouland, and Brahim Hamid.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/RWS62797.2024.10799344\">Data-driven approximation of formal implicit interaction analysis for cyber-physical system designs<\/a>. In&nbsp;<em>Proceedings of the 2024 Resilience Week Symposium<\/em>, pages 1-10, Austin, TX, USA, 2024.<\/li>\n\n\n\n<li>Alvi Jawad, Hala Assal, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3688459.3688467\">\u201cI\u2019m getting information that I can act on now\u201d: Exploring the level of actionable information in tool-generated threat reports<\/a>. In&nbsp;<em>Proceedings of the 2024 European Symposium on Usable Security<\/em>,&nbsp;<em>EuroUSEC 2024<\/em>, pages 172-186, Karlstad, Sweden, 2024.<\/li>\n\n\n\n<li>Dylan L\u00e9veill\u00e9 and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.4204\/EPTCS.409.11\">A game-theoretic approach for security control selection<\/a>. In Antonios Achilleos and Andrian Francalanza, editors,&nbsp;<em>Proceedings of the 15th International Symposium on Games, Automata, Logics and Formal Verification<\/em>, volume 409 of Electronic Proceedings in Theoretical Computer Science, pages 103\u2013119. Open Publishing Association, Reykjavi, Iceland, 2024.<\/li>\n\n\n\n<li>Robin Theveniaut, Brahim Hamid, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3691621.3694962\">Interplay of human factors and secure architecture design using model-driven engineering<\/a>. In&nbsp;<em>Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering Workshops<\/em>,&nbsp;<em>ASEW 2024<\/em>, pages 108-117, Sacramento, CA, USA, 2024.<\/li>\n\n\n\n<li>Alvi Jawad, Zoe Arnott, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/QRS62785.2024.00045\">Requirements for applying SCIA: a structured cyberattack impact analysis approach for ICS<\/a>. In&nbsp;<em>Proceedings of the 2024 IEEE 24th International Conference on Software Quality, Reliability and Security<\/em>,&nbsp;<em>QRS 2024<\/em>, pages 388-399, Cambridge, UK, 2024.&nbsp;<strong><em>(Winner of the Best Paper Award)<\/em><\/strong><\/li>\n\n\n\n<li>Nilofar Mansourzadeh, Anil Somayaji, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/people.scs.carleton.ca\/~soma\/pubs\/mansourzadeh-asia2024.pdf\">A fragility metric for software diversity<\/a>. In&nbsp;<em>Proceedings of the 19th Annual Symposium on Information Assurance<\/em>,&nbsp;<em>ASIA 2024&nbsp;<\/em>, pages 121\u2013129, Albany, NY, USA, 2024.<\/li>\n\n\n\n<li>John Breton,&nbsp;<strong>Jason Jaskolka<\/strong>, and George O.M. Yee.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-57537-2_24\">Hardening systems against data corruption attacks at design time<\/a>. In Mohamed Mosbah, Florence S\u00e8des, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens and Joaquin Garcia-Alfaro, editors,&nbsp;<em>Proceedings of the 16th International Symposium on Foundations &amp; Practice of Security<\/em>,&nbsp;<em>FPS 2023<\/em>, volume 14551 of Lecture Notes in Computer Science, pages 391-407, Bordeaux, France, 2024.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2023\" class=\"wp-block-heading\">2023<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Quentin Rouland, Stojanche Gjorcheski, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/QRS-C60940.2023.00054\">A security compliance-by-design framework utilizing reusable formal models.<\/a>&nbsp;In&nbsp;<em>Proceedings of the 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion<\/em>,&nbsp;<em>QRS-C<\/em>, pages 186\u2013195, Chiang Mai, Thailand, 2023.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.5555\/3721041.3721068\">Security argument patterns for deep neural network development<\/a>. In&nbsp;<em>Proceedings of the 30th Conference on Pattern Languages of Programs<\/em>, PLoP 2023, pages 1-18, 2023.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3628034.3628044\">Formal model-based argument patterns for security cases<\/a>. In&nbsp;<em>Proceedings of the 28th European Conference on Pattern Languages of Programs<\/em>, EuroPLoP 2023, pages 1-12, 2023.<\/li>\n\n\n\n<li>James Baak, Quentin Rouland, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-49333-1_2\">A formal metamodel with composite components<\/a>. In Mohamed Mosbah, Tahar Kechadi, Ladjel Bellatreche, and Faiez Gargouri, editors,&nbsp;<em>Proceedings of the 12th International Conference on Model and Data Engineering<\/em>,&nbsp;<em>MEDI 2023<\/em>, volume 14396 of Lecture Notes in Computer Science, pages 15-29, Sousse, Tunisia, 2023.<\/li>\n\n\n\n<li>Lo\u00efc Thierry,&nbsp;<strong>Jason Jaskolka<\/strong>, Brahim Hamid, and Jean-Paul Bodeveix.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/ICECCS59891.2023.00028\">Specification and verification of communication paradigms for CBSE in Event B<\/a>. In&nbsp;<em>Proceedings of the 27th International Conference on Engineering of Complex Computer Systems<\/em>,&nbsp;<em>ICECSS 2023<\/em>, pages 157\u2013166, Toulouse, France, 2023.<\/li>\n\n\n\n<li>Alvi Jawad and&nbsp;<strong>Jason Jaskolka.<\/strong>&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/DSA59317.2023.00040\">Single and combined cyberattack impact on industrial wastewater systems<\/a>. In&nbsp;<em>Proceedings of the 10th International Conference on Dependable Systems and Their Applications<\/em>,&nbsp;<em>DSA 2023<\/em>, pages 272\u2013281, Tokyo, Japan, 2023.<\/li>\n\n\n\n<li>Quentin Rouland, Stojanche Gjorcheski, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/REW57809.2023.00045\">Eliciting a security architecture requirements baseline from standards and regulations.<\/a>&nbsp;In&nbsp;<em>Proceedings of the 2023 IEEE 31st International Requirements Engineering Conference Workshops<\/em>,&nbsp;<em>REW<\/em>, pages 224\u2013229, Hannover, Germany, 2023.<\/li>\n\n\n\n<li>Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla,&nbsp;<strong>Jason Jaskolka<\/strong>, and Ashraf Matrawy.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/SAS58821.2023.10254186\">Integrating medical and wearable devices with e-health systems using horizontal IoT platforms.<\/a>&nbsp;In&nbsp;<em>Proceedings of the 2023 IEEE Sensors Applications Symposium<\/em>,&nbsp;<em>SAS<\/em>, pages 1\u20136, Ottawa, ON, Canada, 2023.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-40953-0_2\">Constructing security cases based on formal verification of security requirements in Alloy<\/a>. In&nbsp;<em>J\u00e9r\u00e9mie Guiochet, Stefano Tonetta, Erwin Schoitsch, Matthieu Roy, and Friedemann Bitsch, editors, Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops<\/em>, volume 14182 of Lecture Notes in Computer Science, pages 15\u201325, Toulouse, France, 2023.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, Jean-Paul Bodeveix, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/ICSA-C57050.2023.00042\">Formalizing the relationship between security policies and objectives in software architectures<\/a>. In&nbsp;<em>Proceedings of the 2023 IEEE 20th International Conference on Software Architecture Companion<\/em>,&nbsp;<em>ICSA-C 2023<\/em>, pages 151\u2013158, L\u2019Aquila, Italy, 2023.<\/li>\n\n\n\n<li>Sanaa Alwidian and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-29786-1_5\">Understanding the role of human-related factors in security requirements elicitation<\/a>. In Alessio Ferrari and Birgit Penzenstadler, editors,&nbsp;<em>Proceedings of the 29th International Working Conference on Requirements Engineering: Foundation for Software Quality<\/em>,&nbsp;<em>REFSQ 2023<\/em>, volume 13975 of Lecture Notes in Computer Science, pages 65-74, Barcelona, Spain, 2023.<\/li>\n\n\n\n<li>Alvi Jawad and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-30122-3_17\">Defense models for data recovery in industrial control systems<\/a>. In Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence S\u00e8des, and Joaquin Garcia-Alfaro, editors,&nbsp;<em>Proceedings of the 15th International Symposium on Foundations &amp; Practice of Security<\/em>,&nbsp;<em>FPS 2022<\/em>, volume 13877 of Lecture Notes in Computer Science, pages 198-216, Ottawa, ON, Canada, 2023.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2022\" class=\"wp-block-heading\">2022<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Xinrui Zhang and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/QRS57517.2022.00023\">Conceptualizing the secure machine learning operations (SecMLOps) paradigm<\/a>. In&nbsp;<em>Proceedings of the 22nd IEEE International Conference on Software Quality, Reliability, and Security<\/em>, QRS 2022, pages 127-138, 2022.<\/li>\n\n\n\n<li>Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/TrustCom56396.2022.00226\">Towards logical specification of adversarial examples in machine learning<\/a>. In&nbsp;<em>Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/em>, TrustCom 2022, pages 1575-1580, 2022.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>&nbsp;and Brahim Hamid.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3551349.3561149\">Towards the integration of human factors in collaborative decision making for secure architecture design<\/a>. In&nbsp;<em>Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering<\/em>, ASE 2022, pages 1-8, Rochester, MI, USA, 2022.<\/li>\n\n\n\n<li>Brahim Hamid and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-83072-3_1\">Work in progress: Considering human factors in collaborative decision making for secure architecture design<\/a>. In Maryam Mehrnezhad and Simon Parkin, editors, Socio-Technical Aspects in Security, STAST 2022, volume 13855 of Lecture Notes in Computer Science, pages 1\u201313, Copenhagen, Denmark, 2022.<\/li>\n\n\n\n<li>Jediael Mendoza, Jason Mycroft, Lyam Milbury, Nafiseh Kahani, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3558489.3559073\">On the effectiveness of data balancing techniques in the context of ML-based test case prioritization<\/a>. In&nbsp;<em>Proceedings of the 18th International Conference on Predictive Models and Data Analytics in Software Engineering<\/em>, PROMISE 2022, pages 72-81, Singapore, 2022.<\/li>\n\n\n\n<li>Xinrui Zhang and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3551902.3565070\">Security patterns for machine learning: The data-oriented stages<\/a>. In&nbsp;<em>Proceedings of the 27th European Conference on Pattern Languages of Programs<\/em>, EuroPLoP 2022, pages 1-12, 2022.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Brahim Hamid, and Sahar Kokaly.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/MS.2022.3164872\">Software design trends supporting multi-concern assurance<\/a>.&nbsp;<em>IEEE Software<\/em>, 39(4):22\u201326, July\/August 2022.<\/li>\n\n\n\n<li>Andrew Le Clair,&nbsp;<strong>Jason Jaskolka<\/strong>, Wendy MacCaull, and Ridha Khedri.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.datak.2022.102044\">Architecture for ontology-supported multi-context reasoning systems<\/a>.&nbsp;<em>Data &amp; Knowledge Engineering<\/em>, 140:102044, July 2022.<\/li>\n\n\n\n<li>Sajib Kumar Kuri, Tarim Islam,&nbsp;<strong>Jason Jaskolka<\/strong>, and Mohamed Ibnkahla.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/VTC2022-Spring54318.2022.9860359\">A threat model and security recommendations for IoT sensors in connected vehicle networks<\/a>. In&nbsp;<em>Proceedings of the 2022 IEEE 95th Vehicular Technology Conference<\/em>, VTC-Spring 2022, pages 1-5, Helsinki, Finland, 2022.<\/li>\n\n\n\n<li>Alvi Jawad, Luke Newton, Ashraf Matrawy, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/ICC45855.2022.9838865\">A formal analysis of the efficacy of rebooting as a countermeasure against IoT botnets<\/a>. In&nbsp;<em>Proceedings of the 2022 IEEE International Conference on Communications<\/em>, IEEE ICC 2022, pages 2206-2211, Seoul, South Korea, 2022.<\/li>\n\n\n\n<li>Bohdana Sereda and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.procs.2022.03.038\">An evaluation of IoT security guidance documents: A shared responsibility perspective<\/a>. In Elhadi Shakshuki and Muhammad Younas, editors,&nbsp;<em>Proceedings of the 13th International Conference on Ambient Systems, Networks and Technologies<\/em>, volume 201C of&nbsp;<em>Procedia Computer Science, ANT 2022<\/em>, pages 281-288, Porto, Portugal, 2022.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2021\" class=\"wp-block-heading\">2021<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Alvi Jawad and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/QRS54544.2021.00106\">Analyzing the impact of cyberattacks on industrial control systems using timed automata<\/a>. In&nbsp;<em>Proceedings of the 21st IEEE International Conference on Software Quality, Reliability, and Security<\/em>, QRS 2021, pages 966-977, Hainan Island, China, 2021.<\/li>\n\n\n\n<li>Joe Samuel,&nbsp;<strong>Jason Jaskolka<\/strong>, and George O.M. Yee.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/QRS54544.2021.00012\">Analyzing structural security posture to evaluate system design decisions<\/a>. In&nbsp;<em>Proceedings of the 21st IEEE International Conference on Software Quality, Reliability, and Security<\/em>, QRS 2021, page 8-17, Hainan Island, China, 2021.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Brahim Hamid, Alvi Jawad, and Joe Samuel.&nbsp;<a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/3712039.3712051\">Secure Development Decomposition \u2013 An Argument Pattern for Structured Assurance Case Models<\/a>. In&nbsp;<em>Proceedings of the 28th Conference on Pattern Languages of Programs<\/em>, PLoP 2021, pages 1-12, 2021.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Brahim Hamid, Alvi Jawad, and Joe Samuel.&nbsp;<a href=\"https:\/\/doi.org\/10.1145\/3489449.3490001\">A security property decomposition argument pattern for structured assurance case models<\/a>. In&nbsp;<em>Proceedings of the 26th European Conference on Pattern Languages of Programs<\/em>, EuroPLoP 2021, pages 1-10, Graz, Austria, 2021.<\/li>\n\n\n\n<li>Luke Newton and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1109\/RWS52686.2021.9611810\">Analyzing implicit interactions to identify weak points in cyber-physical system designs<\/a>. In Proceedings of the 2021 Resilience Week Symposium, pages 1-8, Salt Lake City, UT, USA, 2021.<\/li>\n\n\n\n<li>Alvi Jawad and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.23919\/ANNSIM52504.2021.9552043\">Modeling and simulation approaches for cybersecurity impact analysis: State-of-the-art<\/a>. In&nbsp;<em>Proceedings of the 2021 Annual Modeling and Simulation Conference<\/em>, ANNSIM 2021, pages 1\u201312, Fairfax, VA, USA, 2021.<\/li>\n\n\n\n<li>Joe Samuel,&nbsp;<strong>Jason Jaskolka<\/strong>, and George O.M. Yee.&nbsp;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9452029\">Leveraging external data sources to enhance secure system design<\/a>. In&nbsp;<em>Proceedings of the 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge<\/em>, RDAAPS 2021, pages 1\u20138, Hamilton, ON, Canada, 2021.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.sysarc.2021.102073\">Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support<\/a>.&nbsp;<em>Journal of Systems Architecture<\/em>, 117:102073, August 2021.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2020\" class=\"wp-block-heading\">2020<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Joe Samuel, Khalil Aalab, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9343145\">Evaluating the soundness of security metrics from vulnerability scoring frameworks<\/a>. In&nbsp;<em>Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/em>, IEEE TrustCom 2020, pages 442\u2013449, Guangzhou, China, 2020.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-64330-0_3\">Identifying and analyzing implicit interactions in a wastewater dechlorination system<\/a>. In Sokratis Katsikas et al., editors,&nbsp;<em>Computer Security. CyberICPS 2020, SECPRE 2020, ADIoT 2020<\/em>, volume 12501 of Lecture Notes in Computer Science, pages 34\u201351, Guildford, UK, 2020. Springer, Cham.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-64694-3_4\">Reusable formal models for threat specification, detection, and treatment<\/a>. In Sihem Ben Sassi, St\u00e9phane Ducasse, and Hafedh Mili, editors,&nbsp;<em>Reuse in Emerging Software Engineering Practices, Proceedings of the 19th International Conference on Software and Systems Reuse, ICSR 2020<\/em>, volume 12541 of Lecture Notes in Computer Science, pages 52\u201368, Hammamet, Tunisia, December 2020. Springer International Publishing.&nbsp;<strong><em>(Winner of the Best Paper Award)<\/em><\/strong><\/li>\n\n\n\n<li>Thomas Sattolo and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-58201-2_2\">Evaluation of statistical tests for detecting storage-based covert channels<\/a>. In Marko H\u00f6lbl, Kai Rannenberg, and Tatjana Welzer, editors,&nbsp;<em>Proceedings of the 35th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2020<\/em>, volume 580 of IFIP Advances in Information and Communication Technology, pages 17\u201331, Maribor, Slovenia, September 2020. Springer, Cham.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-52243-8_37\">Recommendations for effective security assurance of software-dependent systems<\/a>. In Kohei Arai, Supriya Kapoor, and Rahul Bhatia, editors,&nbsp;<em>Intelligent Computing, SAI 2020<\/em>, volume 1230 of Advances in Intelligent Systems and Computing, pages 511\u2013531. London, UK, 2020. Springer, Cham.<\/li>\n\n\n\n<li>Quentin Rouland, Brahim Hamid, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.future.2020.02.033\">Formal specification and verification of reusable communication models for distributed systems architecture.<\/a>&nbsp;<em>Future Generation Computer Systems<\/em>, 108:178-197, July 2020.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2019\" class=\"wp-block-heading\">2019<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Brahim Hamid, Quentin Rouland, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8952145\">Distributed maintenance of a spanning tree of k-connected graphs<\/a>. In&nbsp;<em>Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing<\/em>, pages 217-226, Kyoto, Japan, December 2019.<\/li>\n\n\n\n<li>Maxime Buyse* and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/www.isa-afp.org\/entries\/C2KA_DistributedSystems.html\">Communicating concurrent Kleene algebra for distributed systems specification.<\/a>&nbsp;<em>Archive of Formal Proofs,&nbsp;<\/em>p. 22, August 2019.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2018\" class=\"wp-block-heading\">2018<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Quentin Rouland, Brahim Hamid, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-00856-7_13\" target=\"_blank\" rel=\"noreferrer noopener\">Formalizing Reusable Communication Models for Distributed Systems Architecture<\/a>. In El Hassan Abdelwahed, Ladjel Bellatreche, Matt\u00e9o Golfarelli, Dominique M\u00e9ry, and Carlos Ordonez, editors,<em>Proceedings of the 8th International Conference on Model and Data Engineering<\/em>,&nbsp;<em>MEDI 2018<\/em>, volume 11163 of Lecture Notes in Computer Science, pages 198-216, Marrakesh, Morocco, October 2018.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8598444\">Challenges in Assuring Security and Resilience of Advanced Metering Infrastructure<\/a>.&nbsp;In&nbsp;<em>Proceedings of the 18th annual IEEE Canada Electrical Power and Energy Conference<\/em>,&nbsp;<em>EPEC 2018<\/em>, Toronto, ON, Canada, 2018.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>. Assurance cases for security and resilience of advanced metering infrastructure.&nbsp;<em>Technical Report Prepared for Natural Resources Canada<\/em>, March, 2018.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2017\" class=\"wp-block-heading\">2017<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li><strong>Jason Jaskolka<\/strong>&nbsp;and John Villasenor.&nbsp;<a href=\"http:\/\/nmio.ise.gov\/Portals\/16\/Tech%20Bulletins\/Docs\/Technical%20Bulletin%20Vol%2012.pdf?ver=2017-07-20-104648-587\" target=\"_blank\" rel=\"noreferrer noopener\">Securing Cyber-Dependent Maritime Systems and Operations<\/a>.&nbsp;<em>NMIO Technical Bulletin<\/em>&nbsp;12:4-6, June 2017.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>&nbsp;and John Villasenor.&nbsp;<a href=\"http:\/\/ieeexplore.ieee.org\/document\/7875503\/\" target=\"_blank\" rel=\"noreferrer noopener\">An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems.<\/a>&nbsp;<em>IEEE Transactions on Reliability<\/em>, 66(2):529-546, June 2017.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>&nbsp;and John Villasenor.&nbsp;<a href=\"http:\/\/hdl.handle.net\/10125\/41886\" target=\"_blank\" rel=\"noreferrer noopener\">Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems<\/a>. In&nbsp;<em>Proceedings of the 50th Hawaii International Conference on System Sciences<\/em>,&nbsp;<em>HICSS-50<\/em>, pages 5988\u20135997, Hilton Waikoloa Village, HI, U.S.A., January 2017.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2016\" class=\"wp-block-heading\">2016<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Monika Bialy, Vera Pantelic,&nbsp;<strong>Jason Jaskolka<\/strong>, Alexander Schaap, Lucian Patcas, Mark Lawford, and Alan Wassyng.&nbsp;<em>Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems<\/em>, Chapter 3:&nbsp;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780128037737000036\" target=\"_blank\" rel=\"noreferrer noopener\">Software Engineering for Model-Based Development by Domain Experts<\/a>, pages 39-64. Elsevier, First Edition, October 2016.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>&nbsp;and Ridha Khedri.&nbsp;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0304397516302675\" target=\"_blank\" rel=\"noreferrer noopener\">Mitigating Covert Channels Based on Analysis of the Potential for Communication<\/a>.&nbsp;<em>Theoretical Computer Science<\/em>, 643:1\u201337, August 2016.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2015\" class=\"wp-block-heading\">2015<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li><strong>Jason Jaskolka<\/strong>, Wendy MacCaull, and Ridha Khedri.&nbsp;<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=7424077\" target=\"_blank\" rel=\"noreferrer noopener\">Towards an Ontology Design Architecture<\/a>. In&nbsp;<em>Proceedings of the 2015 International Conference on Computational Science and Computational Intelligence, CSCI 2015<\/em>, pages 132\u2013135, Las Vegas, NV, U.S.A., December 2015.<\/li>\n\n\n\n<li>Monika Bialy, Jacques Carette, Lane Gibson,&nbsp;<strong>Jason Jaskolka<\/strong>, Mark Lawford, Bennett Mackenzie, Tom Maibaum, Archana Mallya, Gordon Marks, Vera Pantelic, Alexander Schaap, Syed Asim Shah, and Alan Wassyng. Phase 1 Quarterly Report 8 on APC LEAP \u2013 Embedded Software Project. Technical Report, McMaster Centre for Software Certification, Hamilton, ON, Canada, December 2015.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Wendy MacCaull, and Ridha Khedri.&nbsp;<a href=\"https:\/\/carleton.ca\/jaskolka\/wp-content\/uploads\/CAS-15-09-RK.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Towards an Architectural Framework for Systematically Designing Ontologies<\/a>. Technical Report CAS-15-09-RK, McMaster University, Hamilton, ON, Canada, November 2015.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Ridha Khedri, and Khair Eddin Sabri.&nbsp;<a href=\"http:\/\/link.springer.com\/article\/10.1007%2Fs12652-015-0289-4\" target=\"_blank\" rel=\"noreferrer noopener\">Investigative Support for Information Confidentiality<\/a>.&nbsp;<em>Journal of Ambient Intelligence and Humanized Computing<\/em>, 6(4):425-451, August 2015.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>&nbsp;and Ridha Khedri.&nbsp;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S187705091500900X\" target=\"_blank\" rel=\"noreferrer noopener\">Towards the Certification of Covert Channel Freeness in Cloud-Based Systems<\/a>. In Elhadi Shakshuki, editor,&nbsp;<em>Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies<\/em>, volume 52 of&nbsp;<em>Procedia Computer Science, ANT 2015 and SEIT 2015<\/em>, pages 318\u2013225, London, UK, June 2015.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"http:\/\/hdl.handle.net\/11375\/16872\" target=\"_blank\" rel=\"noreferrer noopener\">On the Modeling, Analysis, and Mitigation of Distributed Covert Channels<\/a>. Ph.D. thesis, McMaster University, Hamilton, ON, Canada. March 2015.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2014\" class=\"wp-block-heading\">2014<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li><strong>Jason Jaskolka<\/strong>&nbsp;and Ridha Khedri.&nbsp;<a href=\"http:\/\/arxiv.org\/abs\/1408.5964\" target=\"_blank\" rel=\"noreferrer noopener\">A Formulation of the Potential for Communication Condition using C<sup>2<\/sup>KA<\/a>. In Adriano Peron and Carla Piazza, editors,&nbsp;<em>Proceedings of the 5th International Symposium on Games, Automata, Logics and Formal Verification<\/em>, volume 161 of&nbsp;<em>Electronic Proceedings in Theoretical Computer Science<\/em>, pages 161-174. Open Publishing Association, Verona, Italy, September 2014.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Ridha Khedri, and Khair Eddin Sabri.&nbsp;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050914008783\" target=\"_blank\" rel=\"noreferrer noopener\">Investigative Support for Confidentiality Part I: Detecting Information Leakage via Protocol-Based Covert Channels<\/a>. In&nbsp;<em>Proceedings of the 9th International Conference on Future Networks and Communications<\/em>, volume 34 of&nbsp;<em>Procedia Computer Science, FNC 2014 and MobiSPC 2014<\/em>, pages 276\u2013285, Niagara Falls, ON, Canada, August 2014.&nbsp;<em>(Invited Paper)<\/em>.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Ridha Khedri, and Khair Eddin Sabri.&nbsp;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050914008771\" target=\"_blank\" rel=\"noreferrer noopener\">Investigative Support for Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics<\/a>. In&nbsp;<em>Proceedings of the 9th International Conference on Future Networks and Communications<\/em>, volume 34 of&nbsp;<em>Procedia Computer Science, FNC 2014 and MobiSPC 2014<\/em>, pages 266\u2013275, Niagara Falls, ON, Canada, August 2014.&nbsp;<em>(Invited Paper)<\/em>.<\/li>\n\n\n\n<li>Qinglei Zhang, Ridha Khedri, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"http:\/\/link.springer.com\/article\/10.1007%2Fs12652-013-0201-z\" target=\"_blank\" rel=\"noreferrer noopener\">An Aspect-Oriented Language for Feature-Modeling<\/a>.&nbsp;<em>Journal of Ambient Intelligence and Humanized Computing<\/em>, 5(3):343-356, June 2014.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Ridha Khedri, and Qinglei Zhang.&nbsp;<a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-06251-8_2\" target=\"_blank\" rel=\"noreferrer noopener\">Endowing Concurrent Kleene Algebra with Communication Actions<\/a>. In Peter H\u00f6fner, Peter Jipsen, Wolfram Kahl, and Martin E. M\u00fcller, editors,&nbsp;<em>Proceedings of the 14th International Conference on Relational and Algebraic Methods in Computer Science<\/em>, volume 8428 of Lecture Notes in Computer Science, pages 19-36. Springer International Publishing Switzerland, Marienstatt, Germany, April 2014.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2013\" class=\"wp-block-heading\">2013<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li><strong>Jason Jaskolka<\/strong>, Ridha Khedri, and Qinglei Zhang.&nbsp;<a href=\"https:\/\/carleton.ca\/jaskolka\/wp-content\/uploads\/CAS-13-07-RK.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Foundations of Communicating Concurrent Kleene Algebra<\/a>. Technical Report CAS-13-07-RK, McMaster University, Hamilton, ON, Canada, November 2013.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2012\" class=\"wp-block-heading\">2012<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Qinglei Zhang, Ridha Khedri, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-642-33826-7_8\" target=\"_blank\" rel=\"noreferrer noopener\">Verification of Aspectual Composition in Feature-Modeling<\/a>. In George Eleftherakis, Mike Hinchey, and Mike Holcombe, editors,&nbsp;<em>Proceedings of the 10th International Conference on Software Engineering and Formal Methods<\/em>, volume 7504 of Lecture Notes in Computer Science, pages 109\u2013125. Springer Berlin\/Heidelberg, Thessaloniki, Greece, October 2012.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Ridha Khedri, and Qinglei Zhang.&nbsp;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050912004164\" target=\"_blank\" rel=\"noreferrer noopener\">On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey<\/a>. In Elhadi Shakshuki and Muhammad Younas, editors,&nbsp;<em>Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies<\/em>, volume 10 of&nbsp;<em>Procedia Computer Science, ANT 2012 and MobiWIS 2012<\/em>, pages 458\u2013465, Niagara Falls, ON, Canada, August 2012.<\/li>\n\n\n\n<li>Qinglei Zhang, Ridha Khedri, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S187705091200419X\" target=\"_blank\" rel=\"noreferrer noopener\">An Aspect-Oriented Language for Product Family Specification<\/a>. In Elhadi Shakshuki and Muhammad Younas, editors,&nbsp;<em>Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies<\/em>, volume 10 of&nbsp;<em>Procedia Computer Science, ANT 2012 and MobiWIS 2012<\/em>, pages 482\u2013489, Niagara Falls, ON, Canada, August 2012.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2011\" class=\"wp-block-heading\">2011<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Qinglei Zhang, Ridha Khedri, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/carleton.ca\/jaskolka\/wp-content\/uploads\/CAS-11-08-RK.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">An Aspect-Oriented Language Based on Product Family Algebra: Aspects Specification and Verification<\/a>. Technical Report CAS-11-08-RK, McMaster University, Hamilton, ON, Canada, November 2011.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Ridha Khedri, and Khair Eddin Sabri.&nbsp;<a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2179343\" target=\"_blank\" rel=\"noreferrer noopener\">A Formal Test for Detecting Information Leakage via Covert Channels<\/a>. In&nbsp;<em>Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop<\/em>, CSIIRW7, pages 1\u20134, Oak Ridge, TN, U.S.A., October 2011.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>, Ridha Khedri, and Khair Eddin Sabri.&nbsp;<a href=\"https:\/\/carleton.ca\/jaskolka\/wp-content\/uploads\/CAS-11-05-RK.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Information Leakage via Protocol-Based Covert Channels: Detection, Automation, and Applications<\/a>. Technical Report CAS-11-05-RK, McMaster University, Hamilton, ON, Canada, August 2011.<\/li>\n\n\n\n<li><strong>Jason Jaskolka<\/strong>&nbsp;and Ridha Khedri.&nbsp;<a href=\"http:\/\/ieeexplore.ieee.org\/document\/5718510\/\" target=\"_blank\" rel=\"noreferrer noopener\">Exploring Covert Channels<\/a>. In&nbsp;<em>Proceedings of the 44th Hawaii International Conference on System Sciences<\/em>, HICSS-44, pages 1\u201310, Koloa, Kauai, HI, U.S.A., January 2011.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2010\" class=\"wp-block-heading\">2010<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li><strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"http:\/\/hdl.handle.net\/11375\/9018\" target=\"_blank\" rel=\"noreferrer noopener\">Modeling, Analysis, and Detection of Information Leakage via Protocol-Based Covert Channels<\/a>. Master\u2019s thesis, McMaster University, Hamilton, ON, Canada. September 2010.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2009\" class=\"wp-block-heading\">2009<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Khair Eddin Sabri, Ridha Khedri, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<em>Advanced Technologies<\/em>, Chapter 13:&nbsp;<a href=\"http:\/\/www.intechopen.com\/books\/advanced-technologies\/algebraic-model-for-agent-explicit-knowledge-in-multi-agent-systems\" target=\"_blank\" rel=\"noreferrer noopener\">Algebraic Model for Agent Explicit Knowledge in Multi-Agent Systems<\/a>, pages 224-250. IN-TECH, October 2009.<\/li>\n\n\n\n<li>Khair Eddin Sabri, Ridha Khedri, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-01187-0_22\" target=\"_blank\" rel=\"noreferrer noopener\">Verification of Information Flow in Agent-Based Systems<\/a>. In Gilbert Babin, Peter Kropf, and Michael Weiss, editors,&nbsp;<em>Proceedings of the 4th International MCETECH Conference on e-Technologies<\/em>, volume 26 of Lecture Notes in Business Information Processing, pages 252\u2013266, Ottawa, ON, Canada, May 2009.&nbsp;<em><strong>(Nominated for Best Paper Award)<\/strong><\/em><\/li>\n\n\n\n<li>Khair Eddin Sabri, Ridha Khedri, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"https:\/\/carleton.ca\/jaskolka\/wp-content\/uploads\/CAS-09-01-RK.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Automated Verification of Information Flow in Agent-Based Systems<\/a>. Technical Report CAS-09-01-RK, McMaster University, Hamilton, ON, Canada, January 2009.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"2008\" class=\"wp-block-heading\">2008<\/h2>\n\n\n\n<ol reversed class=\"wp-block-list\">\n<li>Khair Eddin Sabri, Ridha Khedri, and&nbsp;<strong>Jason Jaskolka<\/strong>.&nbsp;<a href=\"http:\/\/waset.org\/Publication\/specification-of-agent-explicit-knowledge-in-cryptographic-protocols\/820\" target=\"_blank\" rel=\"noreferrer noopener\">Specification of Agent Explicit Knowledge in Cryptographic Protocols<\/a>. In&nbsp;<em>Proceedings of the International Conference on Computer, Electrical, and Systems Science, and Engineering<\/em>, volume 35 of&nbsp;<em>CESSE 2008<\/em>, pages 447\u2013454, Venice, Italy, October 2008.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>2026 2025 2024 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cu_dining_location_slug":"","footnotes":"","_links_to":"","_links_to_target":""},"cu_page_type":[25],"class_list":["post-218","page","type-page","status-publish","hentry","cu_page_type-research"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/jaskolka\/wp-json\/wp\/v2\/pages\/218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/jaskolka\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/jaskolka\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/jaskolka\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/jaskolka\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/carleton.ca\/jaskolka\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":494,"href":"https:\/\/carleton.ca\/jaskolka\/wp-json\/wp\/v2\/pages\/218\/revisions\/494"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/jaskolka\/wp-json\/wp\/v2\/media?parent=218"}],"wp:term":[{"taxonomy":"cu_page_type","embeddable":true,"href":"https:\/\/carleton.ca\/jaskolka\/wp-json\/wp\/v2\/cu_page_type?post=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}