Conference Papers
A. Babar, F. Imam, T.R. Dean, J. Fernandez
"An Approach to Represent and Transform Application-Specific
Constraints for an Intrusion Detection System", CASCON 20:
Proceedings of the 30th Annual International Conference on
Computer Science and Engineering, Toronto, November 2020,
IBM Corp, pp. 53-62.
O.A. Al Harthi, M.H. Alalfi, T.R. Dean.
"Detection of feature interaction in dynamic scripting languages",
CASCON 19: Proceedings of the 29th Annual International
Conference on Computer Science and Engineering, Toronto,
October 2019, IBM Corp, pp. 130-137.
R.S. Al Mahruqi, M.H. Alalfi, T.R. Dean.
"A semi-automated framework for migrating web applications from
SQL to document oriented NoSQL database", CASCON 19:
Proceedings of the 29th Annual International Conference on
Computer Science and Engineering, Toronto, October 2019,
IBM Corp, pp. 44-53.
K. Lavorato, F.T. Imam, T.R. Dean.
"LL(k) optimization of a network protocol parser generator", CASCON
19: Proceedings of the 29th Annual International Conference on
Computer Science and Engineering, Toronto, October 2019,
IBM Corp, pp. 183-192.
M.S. Rakha, F.T. Imam, T.R. Dean.
"Generating a Real-Time Constraint Engine for Network
Protocols", 12th WISTP International Conference on
Information Security Theory and Practice, Lecture Notes in
Computer Science, Brussels, December 2018,
Springer-Verlag, pp. 44-60.
M.J. Michaud, T. Dean, S.P. Leblanc.
"Attacking OMG Data Distribution Service (DDS) Based Real-Time
Mission Critical Distributed Systems", 13th International
Conference on Malicious and Unwanted Software (MALWARE 2018),
Nantucket, MA, October 2018. pp 68-77.
J. Chen, M.H. Alalfi, T.R. Dean, S. Ramesh.
"Modeling AUTOSAR Implementations in Simulink", 14th
European Conference on Modelling Foundations and Applications,
Toulouse, France, June 2018, pp. 279-292
MD Hasan , F. T. Imam, F. Garcia, T. Dean, M.
Zulkernine, S.P. Leblanc.
"A Constraint-based intrusion detection system", Fifth
European Conference on the Engineering of Computer-Based
Systems (ECBS17), Association of Computing Machinery,
Larnaca, Cyprus, Aug-Sept, 2017, pp. 12:1--12:10
A ElShakankiry, T. Dean.
"Context Sensitive and Secure Parser Generation for Deep Packet
Inspection of Binary Protocols", 15th Annual Conference on
Privacy, Security and Trust, Calgary, Aug 2017, pp 77-86.
MD Siam Hassan, Ali ElShakankiry, Thomas Dean,
Mohammed Zulkernine.
“Intrusion detection in a private network by satisfying
constraints”, Fourteenth Annual Conference on Privacy
Security and Trust, Aukland, New Zealand, Dec 2016, pp.
623-628
Imam F, Dean T.
“Modelling Functional Behaviour of Event-Based Systems: A
Practical Knowledge-Based Approach”, Procedings 20th
International Conference on Knowledge-Based and Intelligent
Information and Engineering Systems, York, United
Kingdom, Sept 2016, pp 617–626.
Imam F, Dean T,.
“Affordances in Representing the Behaviour of Event-Based
Systems”, CEUR Workshop Proceedings, Vol-1660. First
International Workshop on Cognition and Ontologies (CAOS 2016)
at the 9th International Conference on Formal Ontology
Information Systems (FOIS 2016), Annecy, France, July
2016, (6 pp, online)
Alalfi M, Rapos E, Stevenson A, Stephan M, Dean T,
Cordy J.
"Semi-automatic Identification and Representation of Subsystem
Variability in Simulink Models", 30th International
Conference on Software Maintenance and Evolution,
Victoria, Canada, October 2014, pp. 486-490
Chapman C, Knight GS, Dean T. (2014),
“USBcat - Towards an Intrusion Surveillance Toolset”, Electronic
Proceedings in Theoretical Computer Science (EPTCS).
International Information Security and Privacy Conference,
Marrakech, Morocco, 2014-06-02 (31-44),
M.H. Alalfi, J. R. Cordy and T. R. Dean,
“Analysis and Clustering of Model Clones: An Automotive
Industrial Experience”, IEEE Software Evolution Week
(CSMR-WCRE 2014), Antwerp, Belgium, February 2014 pp.
375-378.
J. Chen, Thomas R. Dean and M. H. Alalfi
“Clone Detection in Matlab Stateflow Models”, Proceedings
of the Eighth International Workshop on Software Clones (IWSC
2014), Antwerp, Belgium, February 2014, published in Electronic
Communications of the EASST Vol. 63 (2014) , 13 pages.
F. de la Para and T. Dean,
“Survey of Graph Rewriting Applied to Model Transformations”, 2nd
International Conference on Model-Driven Engineering and
Software Development, Lisbon, Portugal, January 2014, pp.
431-441.
A.A.Almonaies, M.H.Alalfi, J.R.Cordy, and T.R.Dean “A Framework for Migrating Web Applications to Web Services”, 13th International Conference on Web Engineering, Aalborg, Denmark, July 2013, Published as Lecture Notes in Computer Science 7977, Springer Verlag, pp. 384-399.
S.Karademir, T. Dean and S. Leblanc “Finding Javascript Malware in Acrobat Files Using Clone Detection”, CASCON '13 Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research, Toronto, Canada, November 2013, pp. 70-80.
M.H.Alalfi, J.R. Cordy, T.R. Dean, M. Stephan and A. Stevenson “Near-miss Model Clone Detection for Simulink Models”, Proc. IWSC 2012, ICSE 6th International Workshop on Software Clones, Zürich, Switzerland, June 2012, pp. 78-79.
M.H. Alalfi and James R. Cordy and T. R. Dean “Recovering Role-Based Access Control Security Models From Dynamic Web Applications”, International Conference on Web Engineering, published in Lecture Notes in Computer Science, Vol 7387, Berlin, July 2012, pp 121–136
M.H.Alalfi, J.R. Cordy, T.R. Dean, M. Stephan and A. Stevenson “Models are Code Too: Near-Miss Clone Detection for Simulink Models”, Proc. ICSM 2012, IEEE 28th International Conference on Software Maintenance, Riva del Garda, Italy, September 2012, pp. 295-304.
M.H.Alalfi, J.R. Cordy and T.R. Dean “Automated Verification of Role-Based Access Control Security Models Recovered from Dynamic Web Applications”, Proc. WSE 2012, 14th IEEE International Symposium on Web Systems Evolution, Riva del Garda, Italy, September 2012, pp. 1-10.
W.Gama, M.H. Alalfi, J.R. Cordy and T.R. Dean “Normalizing Object-Oriented Class Styles in JavaScript”, Proc. WSE 2012, 14th IEEE International Symposium on Web Systems Evolution, Riva del Garda, Italy, September 2012, pp. 79-83.
J.S.Alexander, T.R. Dean and G.S Knight “Spy vs. Spy: Counter-intelligence Methods for Backtracking Malicious Intrusions”, 21st IBM Centres for Advanced Studies Conference, Toronto, November 2011, 1–14.
A.Almonaies, M. Alalfi, J.R. Cordy and T.R.Dean “Towards a Framework for Migrating Web Applications to Web Services”, 21st IBM Centres for Advanced Studies Conference, Toronto, November 2011, 229–241
N.Meng, D. Kelly and T.R. Dean “Towards Automated Accuracy Analysis Through Symbolic Analysis Using Computer Algebra Systems”, 21st IBM Centres for Advanced Studies Conference, Toronto, November 2011, 25–271.
B.K. Kam, and T.R. Dean “Linguistic Security Testing for Text Communication Protocols”, Proc Testing: Academic and Industrial Conference Practice and Research Techniques, Windsor, UK, September 2010 pp. 104-117
M.Alalfi, J.R. Cordy and T.R. Dean, “Automating Coverage Metrics for Dynamic Web Applications”, Proc. CSMR 2010, 15th European Conference on Software Maintenance and Reengineering, Madrid, Spain, March 2010, 10 pp. 61-60.
A.Almonaies, J.R. Cordy, T.R. Dean, "Legacy System Evolution towards Service-Oriented Architecture", Proc. International Workshop on SOA Migration and Evolution (SOAME 2010), Madrid, Spain, pp. 53-62.
B. Kam, T. Dean, “Lessons Learned From a Literal Survey of Web Applications Testing”, Proc. 6th International Conference on Information Technology : New Generations, Las Vegas, USA, April 27-29, pp 125-130.
M.AboElFotoh, T.R. Dean, Ryan Mayor “An Empirical Evaluation of a Language-Based Security Testing Technique”, Proc. 19th IBM Centres for Advanced Studies Conference, Toronto, Canada, November 2009, pp 112-121.
M.Alalfi, J.R. Cordy and T.R.Dean, “WAFA: Fine-grained Dynamic Analysis of Web Applications”, Proc. WSE 2009, 11th International Symposium on Web Systems Evolution, Edmonton, Canada, September 2009, pp. 41-50.
M.H.Alalfi, J.R. Cordy, and T.R. Dean, “A Verification Framework for Access Control in Dynamic Web Applications”, Proc. C3S2E, Canadian Conference on Computer Science and Software Engineering, Montréal, May 2009, pp.109-113.
M.Alalfi, J.R. Cordy and T.R. Dean, “Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications”, Proc. WebTest 2009, 1st International Workshop on Web Testing, Denver, USA, April 2009, pp. 295-302.
M.Ceccato, T.R. Dean, P. Tonella, “Using Program Transformation to Add Structure to a Legacy Data Model”, Proc 8th IEEE International Working Conference on Source Code Analysis and Manipulation, Beijing, China, September 2008, pp 197-206.
J.Chu, T.R. Dean, “Automated Migration of List Based Web Pages to AJAX”, ”, Proc 8th IEEE International Working Conference on Source Code Analysis and Manipulation, Beijing, China, September 2008, pp 217-226
M.Ceccato, T.R. Dean, P. Tonella, D. Marchignoli, “Data Model Reverse Engineering in Migrating a Legacy System to Java”, Proc. WCRE 2008, 15th Working Conference on Reverse Engineering, Antwerp, Belgium, October 2008, pp. 177-186.
M.Alalfi, J.R. Cordy and T.R. Dean, "SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas", Proc. WCRE 2008, 15th Working Conference on Reverse Engineering, Antwerp, Belgium, October 2008, pp. 187-191.
A.Mao,J.R.Cordy, T.R. Dean, “Automated Conversion of Table-based Websites to Structured Stylesheets Using Table Recognition and Clone Detection”, Proc IBM Centers forAdvancedStudies Conference 2007 (CASCON), Toronto, Canada, October 2007, to appear.
S.Zhang, T.R. Dean,G.S. Knight, “Lightweight State Based Mutation Testing for Security”, Proc TAICPART-MUTATION 2007, Windsor, UK, September 2007, pp 223-232.
M.Alalfi,J.R.Cordy, T.R. Dean, “A Survey of Analysis Models and Methods in Website Verification and Testing”, Proc 7th International Conference on Web Engineering(ICWE2007). Como, Italy July 2007, pp. 306-311.
C.K. Roy, M.G. Uddin, B. Roy, T.R. Dean. “Evaluating Aspect Mining Techniques: A Case Study”, 15th IEEE International Conference on Program Comprehension (ICPC’07), Banff, Canada, June 2007, pp. 167-176.
S. Zhang , T.R. Dean and S. Knight,"A Lightweight Approach To State Based Security Testing", Proc. CASCON 06, 16th IBM Centre for Advanced Studies Conference, Toronto, Canada, October 2006, pp. 341-344.
S. Marquis, T.R. Dean and S. Knight,
"Packet Decoding using Context Sensitive Parsing", Proc. CASCON
06, 16th IBM Centre for Advanced Studies Conference, Toronto,
Canada, October 2006, pp. 263-274.
L.Wang,J.R.Cordy and T.R. Dean,
"Enhancing Security Using Legality Assertions",Proc. WCRE
2005 - IEEE 12th International Working Conference on Reverse
Engineering, Pittsburgh, November 2005, pp 35-44.
S. Marquis, T.R. Dean and S. Knight,
"SCL: A Language for Security Testing of Network Applications",
Proc. CASCON 05, 15th IBM Centre for Advanced Studies
Conference, Toronto, Canada, October 2005, pp. 155-164.
S. Xu, and T.R. Dean,
"Modernizing JavaServer Pages by Transformation", 7th
International Symposium on WebSite Evolution, Budapest,
Hungary, September 2005, pp 111-118.
S.Xu, and T.R.Dean,
"Transforming Embedded Java to Custom Tags", 5th
International Workshop on Source Code Analysis and
Manipulation, Budapest, Hungary, September 2005, pp.
173-172.
Sontao Zhang, T.R. Dean and S. Knight,
"Applying Software Transformation Techniques to Security
Testing", Pre-Proceedings of STEP 2005, Software Technology
and Engineering in Practice, Toronto, Canada, October
2005, pp. 180-184.
A.Ashaiwi and T.R. Dean,
"Study the Characteristics of OPNET Design Recovery Tools for
Good Models Understanding and Faster Code Modification", OPNETWORK
2005, Washington, USA, August 2005, on CDROM
T.R.Dean and S. Knight,
"Applying Software Transformation Techniques to Security
Testing", International Workshop on Software Evolution and
Transformation, Delft, Netherlands, November 2004, pp
49-52
O.Tal, S.Knight, and T.R. Dean,
"Syntax-based Vulnerability Testing of Frame-based Network
Protocols", Proc. 2nd Annual Conference on Privacy,
Security and Trust, Fredericton, Canada, October 2004, pp
155-160.
Y.Turcotte, O. Tal,S. Knight, and T.R. Dean,
"Security Vulnerabilities Assessment of the X.509 Protocol by
Syntax-Based Testing", Military Communications Conference
2004, Monterey CA, October 2004, Vol 3 pp. 1572- 1578.
J.R.Cordy, T.R. Dean and N. Synytskyy,
"Practical Language-Independent Detection of Near-Miss Clones",
Proc. CASCON'04, 14th IBM Centre for Advanced Studies
Conference, Toronto, October 2004, pp. 29-40 (Best paper award).
X. Guo, J.R.Cordy, T.R. Dean,
"Unique Renaming in Java", 3rd International Workshop on
Source Code Analysis and Manipulation, Amsterdam,
Netherlands, September 2003, pp 151-160.
M. Synytskyy,J.R. Cordy,T.R. Dean,
"Resolution of Static Clones in Dynamic Web Pages", 5th
International Workshop on Web Site Evolution, Amsterdam,
Netherlands, September 2003 pp. 49-56.
T.R.Dean, Y. Chen,
"Design Recovery of A Two Level System", 11th International
Workshop on Program Comprehension (IWPC 2003), Portland,
Oregon, May 2003 pp. 23-32.
D. Jin,J.R.Cordy, T.R. Dean,
"Transparent Reverse Engineering Tool Integration Using a
Conceptual Transaction Adapter", 7th European Conference on
Software Maintenance and Reengineering, Benevento, Italy,
March 2003, pp. 399-408.
T.R.Dean, J.R. Cordy, K.A. Schneider, A.J. Malton,
"Grammar Programming in TXL", 2nd International Conference
on Source Code Analysis and Manipulation (SCAM 2002),
Montreal, Canada, November 2002, pp 93 - 102.
D. Jin, J.R.Cordy, T.R.Dean,
"Where's the Schema? A Taxonomy of Patterns for Software
Exchange", 10th International Workshop on Program
Comprehension (IWPC 2002), Paris, France, June 2002, pp.
65-74.
J.R.Cordy,T.R.Dean,A.J.Malton,K.A.Schneider,
"Software Engineering by Source Transformation, Experience with
TXL", Proceedings SCAM'01, - IEEE First International
Workshop on Source Code Analysis and Manipulation,
Florence, Italy, November 2001, pp 168-178.
T.R.Dean,J.R.Cordy,K.A.Schneider,A.J.Malton,
"Using Design Recovery Techniques to Transform Legacy Systems",
ICSM 2001 - The International Conference on Software
Maintenance, Florence, Italy, November 2001, pp 622 -
631.
T.R.Dean,A.J.Malton,R.C.Holt,
"Union Schemas as a Basis for a C++ Extractor", WCRE 2001 -
8th Working Conference on Reverse Engineering, Stuttgart,
Germany, October 2001, pp. 59-67.
A.J.Malton,K.A.Schneider,J.R.Cordy,T.R.Dean, D.
Cousineau, J. Reynolds,
"Processing Software Source Text in Automated Design Recovery
and Transformation", IWPC 2001 - The International Workshop
on Program Comprehension, Toronto, Canada, May 2001, pp
145-154.
J.R.Cordy,K.A.Schneider,T.R.Dean,A.J.Malton,
"HSML: Design Directed Source Code Hot Spots", IWPC 2001 -
The International Workshop on Program Comprehension,
Toronto, Canada, May 2001, pp 127-134.
Refereed Journal Publications
J.Chen, T. R. Dean, M. H. Alalfi, "Clone detection in MATLAB Stateflow model", Software Quality Journal, Springer Verlag, Vol 24 No. 4, pp 917–946, DOI 10.1007/s11219-015-9296-0.
Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ying
Zou
"Detecting Android Malware Using Clone Detection", Journal
of Computer Science and Technology, Springer Verlag Vol.
30 No. 5, Aug, 2015, pp 942–956.
B.Kam and T.R. Dean
“Linguistic Security Testing for Text Communication Protocols”,
Software Practice and Experience, 43(9), Sept. 2010
P.Tonella, M. Ceccato, D. Marchignoli, C. Matteotti, T.R. Dean, “Migrazione di sistemi software legaci”, Mondo Digitale, 12 pp. (accepted)
M.Ceccato, T.R. Dean, P. Tonella, D. Marchignoli, “Migrating legacy data structures based on Variable overlay to Java”, Journal of Software Maintenance and Evolution: Research and Practice, pp 211-237.
M.Alalfi, J.R. Cordy and T.R. Dean, "Web Application Verification and Testing Analysis Models and Methods: State of the Art", Software Testing, Verification and Reliability, Vol. 19, No. 4, Dec 2009, pp 265-296.
M.Ceccato, T.R. Dean, P. Tonella, “Recovering Structured Data Types from a Legacy Data Model with Overlays”, Journal of Information and Software Technology, Vol. 51, No. 10,pp 1454-1468.
T.Cassidy,J.R. Cordy, T.R. Dean and J. Dingel,
"Source Transformation for Concurrency Analysis,"Electronic
Notes in Theoretical Computer Science, 141(4), December
2005, pp. 57-75.
T.R.Dean,J.R. Cordy,A.J. Malton and K.A.
Schneider,
"Agile Parsing in TXL", Journal of Automated Software
Engineering 10,4 (October 2003), pp. 311-336.
J.R.Cordy,T.R.Dean,A.J.Malton,K.A.Schneider,
"Source Transformation in Software Engineering using the TXL
Transformation System", Information and Software Technology,
Special Issue: Source Code Analysis and Manipulation, Elsevier,
Amsterdam, 44(13), October 2002, pp. 827-837.
T.R.Dean,J.R.Cordy,
"A Syntactic Theory of Software Architecture", Special Issue on
Software Architecture,IEEE Transactions on Software
Engineering, Vol 21, No. 4, April 1995, pp 302-313.
Invited Papers
T. Dean and Mykyta Synytskyy,
"Agile Parsing and Web Applications",International Summer
School in Generative and Transformational Techniques in
Software Engineering,Pre-proceedings, Part II, Technology
Presentations, Braga, Portugal, July 2005. pp. 29-38.
Chapters in Books
M.H. Alalfi, E.J. Rapos, A.Stevenson, M. Stephan,
T.R. Dean, J.R. Cordy
"Variability Identification and Representation for Automotive
Simulink Models", Automotive Systems and Software
Engineering: State of the Art and Future Trends, Springer
Verlag, in press.
T.R. Dean,J.R. Cordy,
"Software Characterization Using Connectivity", in Studies in
Software Design, D.A. Lamb (ed.), Springer Verlag Lecture
Notes in Computer Science 1078, Berlin, 1996, pp 33-48.