{"id":472,"date":"2026-04-17T13:45:07","date_gmt":"2026-04-17T17:45:07","guid":{"rendered":"https:\/\/carleton.ca\/rads\/?page_id=472"},"modified":"2026-04-17T13:45:25","modified_gmt":"2026-04-17T17:45:25","slug":"publications-2024-2025","status":"publish","type":"page","link":"https:\/\/carleton.ca\/rads\/publications-2024-2025\/","title":{"rendered":"Publications 2024-2025"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        Publications 2024-2025\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<h2 id=\"2024-2025\" class=\"wp-block-heading\">2024-2025<\/h2>\n\n\n\n<h2 id=\"journal-publications\" class=\"wp-block-heading\">Journal Publications<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>X. Zhang, P. Zhao, and J. Jaskolka, \u201cNavigating the DevOps landscape,\u201d Journal of Systems and Software, vol. 223, p. 112331, May 2025.<\/li>\n\n\n\n<li>Q. Rouland, B. Hamid, and J. Jaskolka, \u201cA model-driven formal methods approach to software architectural security vulnerabilities specification and verification,\u201d Journal of Systems and Software, vol. 219, p. 112219, January 2025.<\/li>\n<\/ol>\n\n\n\n<h2 id=\"conference-publications\" class=\"wp-block-heading\">Conference Publications<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>G. Yee, \u201cDesigns for Reducing Data Breach Impact\u201d, in 2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 2289-2294, Toronto, Canada, 2025.<\/li>\n\n\n\n<li>J. Breton, J. Jaskolka, and G. Yee, \u201cAn approach to determine a system\u2019s behavioural security posture,\u201d in 17th International Symposium on Foundations &amp; Practice of Security (K. Adi, S. Bourdeau, C. Durand, V. Viet Triem Tong, A. Dulipovici, Y. Kermarrec, and J. Garcia-Alfaro, eds.), vol. 15532 of Lecture Notes in Computer Science, (Cham), pp. 94\u2013110, Springer, 2024.<\/li>\n\n\n\n<li>A. Jawad<em>, Z. Arnott<\/em>, and J. Jaskolka, \u201cRequirements for applying SCIA: a structured cyberattack impact analysis approach for ICS,\u201d in 2024 IEEE 24th International Conference on Software Quality, Reliability and Security, QRS 2024, (Cambridge, UK), pp. 388\u2013399, 2024.<\/li>\n\n\n\n<li>A. Jawad, H. Assal, and J. Jaskolka, \u201c\u201cI\u2019m getting information that I can act on now\u201d: Exploring the level of actionable information in tool-generated threat reports,\u201d in 2024 European Symposium on Usable Security, EuroUSEC 2024, (Karlstad, Sweden), pp. 172\u2013186, 2024. <\/li>\n\n\n\n<li>A. Jawad and J. Jaskolka, \u201cInterplay of attacker behaviors and dependability attributes in industrial control system impact analysis,\u201d in 11th International Conference on Dependable Systems and Their Applications, DSA 2024, (Suzhou, China), pp. 86\u201395, 2024.<\/li>\n\n\n\n<li>D. L\u00e9veill\u00e9 and J. Jaskolka, \u201cA game-theoretic approach for security control selection,\u201d in 15th International Symposium on Games, Automata, Logics and Formal Verification (A. Achilleos and A. Francalanza, eds.), vol. 409 of Electronic Proceedings in Theoretical Computer Science, (Reykjavik, Iceland), pp. 103\u2013119, Open Publishing Association, 2024.<\/li>\n\n\n\n<li>D. L\u00e9veill\u00e9 and J. Jaskolka, \u201cA tool for enabling scalable automation in security control selection,\u201d in 17th International Symposium on Foundations &amp; Practice of Security (K. Adi, S. Bourdeau, C. Durand, V. Viet Triem Tong, A. Dulipovici, Y. Kermarrec, and J. Garcia-Alfaro, eds.), vol. 15532 of Lecture Notes in Computer Science, (Cham), pp. 202\u2013213, Springer, 2024.<\/li>\n\n\n\n<li>N. Mansourzadeh, A. Somayaji, and J. Jaskolka, \u201cA fragility metric for software diversity,\u201d in 19th Annual Symposium on Information Assurance, ASIA 2024, (Albany, NY, USA), pp. 121\u2013129, 2024. <\/li>\n\n\n\n<li>L. Newton, J. Jaskolka, Q. Rouland, and B. Hamid, \u201cData-driven approximation of formal implicit interaction analysis for cyber-physical system designs,\u201d in Resilience Week 2024 Symposium, (Austin, TX, USA), pp. 1\u201310, 2024. <\/li>\n\n\n\n<li>R. Theveniaut, B. Hamid, and J. Jaskolka, \u201cInterplay of human factors and secure architecture design using model-driven engineering,\u201d in 39th IEEE\/ACM International Conference on Automated Software Engineering Workshops, ASEW 2024, (Sacramento, CA, USA), pp. 108\u2013117, 2024.<\/li>\n\n\n\n<li>X. Zhang and J. Jaskolka, \u201cUncovering the DevOps landscape: A scoping review and conceptualization framework,\u201d in 31st Asia-Pacific Software Engineering Conference, APSEC 2024, (Chongqing, China), pp. 497\u2013501, 2024.<\/li>\n\n\n\n<li>X. Zhang, P. Zhao, and J. Jaskolka, \u201cEnhancing security and efficiency in vehicle-to-sensor authentication: A multi-factor approach with cloud assistance,\u201d in 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, pp. 1632\u20131637, 2024<em>. <\/em><\/li>\n\n\n\n<li>A. Farhat, M. A. Issa, A. Eldosouky, M. Ibnkahla, Jason Jaskolka, and A. Matrawy, \u201cIoT-enabled e-health systems: Navigating security challenges and strategic recommendations,\u201d in 22nd International Multi-Conference on Systems, Signals &amp; Devices, SSD 2025, (Monastir, Tunisia), pp. 1\u20136, 2025. <\/li>\n\n\n\n<li>S. Gjorcheski and J. Jaskolka, \u201cFormal model-based traceability for security compliance in satellite control systems,\u201d in AIAA DATC\/IEEE 44th Digital Avionics Systems Conference, DASC 2025, (Montreal, QC, Canada), pp. 1\u201310, 2025.<\/li>\n\n\n\n<li>B. Hamid and J. Jaskolka, \u201cWork in progress: Considering human factors in collaborative decision making for secure architecture design,\u201d in Socio-Technical Aspects in Security, STAST 2022 (M. Mehrnezhad and S. Parkin, eds.), vol. 13855 of Lecture Notes in Computer Science, (Cham), pp. 1\u201313, 2025.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>2024-2025 Journal Publications Conference Publications<\/p>\n","protected":false},"author":496,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cu_dining_location_slug":"","footnotes":"","_links_to":"","_links_to_target":""},"cu_page_type":[28],"class_list":["post-472","page","type-page","status-publish","hentry","cu_page_type-publications"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/pages\/472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/users\/496"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/comments?post=472"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/pages\/472\/revisions"}],"predecessor-version":[{"id":477,"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/pages\/472\/revisions\/477"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/media?parent=472"}],"wp:term":[{"taxonomy":"cu_page_type","embeddable":true,"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/cu_page_type?post=472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}