Stop the war!
Остановите войну!
for scientists:
default search action
Ana R. Cavalli
Ana Rosa Cavalli
Person information
- affiliation: Montimage, Paris, France
- affiliation: Telecom SudParis, SAMOVAR, Évry, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j41]Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems. ACM Comput. Surv. 56(8): 202:1-202:37 (2024) - [c186]Valeria Valdés Ríos, Fatiha Zaïdi, Ana Rosa Cavalli, Angel Rego:
Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment. ARES 2024: 166:1-166:9 - [c185]Manh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
AI4SOAR: A Security Intelligence Tool for Automated Incident Response. ARES 2024: 170:1-170:8 - [c184]Ivan Orefice, Wissam Mallouli, Ana R. Cavalli, Filip Sebek, Alberto Lizarduy:
Diagnosis Automation Using Similarity Analysis: Application to Industrial Systems. ICSOFT 2024: 331-338 - 2023
- [j40]Zujany Salazar, Fatiha Zaïdi, Huu Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access 11: 43925-43944 (2023) - [c183]Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca:
A deep learning anomaly detection framework with explainability and robustness. ARES 2023: 134:1-134:7 - [c182]Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa Cavalli:
The DYNABIC approach to resilience of critical infrastructures. ARES 2023: 136:1-136:8 - [c181]Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli:
HTTP/2 Attacks Generation using 5Greplay. ARES 2023: 138:1-138:7 - [c180]Valeria Valdés, Ana Rosa Cavalli, Fatiha Zaïdi, Wissam Mallouli:
Testing techniques to assess impact and cascading effects. CloudCom 2023: 269-272 - [c179]Lorens Barraud, Francesco G. Caccavale, Jean-Baptiste Peyrat, Wissam Mallouli, Véronique Capdevielle, Hicham Khalife, Ana Rosa Cavalli:
5G SUCI Catcher: Attack and Detection. CloudCom 2023: 285-290 - [c178]Phu Hong Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe, Erkuden Rios, Diego Sagasti, Gonzalo Nicolas, Valeria Valdés, Wissam Mallouli, Ana R. Cavalli, Nicolas Ferry:
Towards Smarter Security Orchestration and Automatic Response for CPS and IoT. CloudCom 2023: 298-302 - [c177]Valeria Valdés, Fatiha Zaïdi, Ana Rosa Cavalli, Wissam Mallouli:
A Resilience Component for a Digital Twin. FPS (2) 2023: 93-104 - [c176]Ana Rosa Cavalli, Edgardo Montes de Oca:
Cybersecurity, Monitoring, Explainability and Resilience. ICMU 2023: 1-7 - [c175]Anis Bouaziz, Manh-Dung Nguyen, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli:
Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection. ICSOFT 2023: 510-517 - [i4]Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
Cyber-Resilience Approaches for Cyber-Physical Systems. CoRR abs/2302.05402 (2023) - [i3]Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. CoRR abs/2304.05719 (2023) - 2022
- [j39]George Amponis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana R. Cavalli, Dimitrios Klonidis, Evangelos K. Markakis, Panagiotis G. Sarigiannidis:
Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. EURASIP J. Wirel. Commun. Netw. 2022(1): 124 (2022) - [j38]Ricardo Pérez-Castillo, Ana C. R. Paiva, Ana Rosa Cavalli:
Special issue on information systems quality for digital transformation. Softw. Qual. J. 30(4): 953-954 (2022) - [c174]Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Rosa Cavalli, Huu Nghia Nguyen, Edgardo Montes de Oca:
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. ICSOFT 2022: 234-241 - [c173]Manh-Dung Nguyen, Vinh Hoa La, Ana R. Cavalli, Edgardo Montes de Oca:
Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper). ICST Workshops 2022: 7-10 - [c172]Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, Monika Ewa Rakoczy:
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System. ICST Workshops 2022: 40-48 - [c171]Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R. Cavalli:
Digital Twin for IoT Environments: A Testing and Simulation Tool. QUATIC 2022: 205-219 - [c170]Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
Switched-based Control Testbed to Assure Cyber-physical Resilience by Design. SECRYPT 2022: 681-686 - [e6]David Clark, Héctor D. Menéndez, Ana Rosa Cavalli:
Testing Software and Systems - 33rd IFIP WG 6.1 International Conference, ICTSS 2021, London, UK, November 10-12, 2021, Proceedings. Lecture Notes in Computer Science 13045, Springer 2022, ISBN 978-3-031-04672-8 [contents] - 2021
- [c169]Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. ARES 2021: 106:1-106:8 - [c168]Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis, George Guirgis, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis, Wissam Mallouli:
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks. ARES 2021: 108:1-108:10 - [c167]Vinh Hoa La, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli:
A Framework for Security Monitoring of Real IoT Testbeds. ICSOFT 2021: 645-652 - [c166]Ana Rosa Cavalli:
Security testing and resilience. ICST Workshops 2021: 1 - [e5]Ana C. R. Paiva, Ana Rosa Cavalli, Paula Ventura Martins, Ricardo Pérez-Castillo:
Quality of Information and Communications Technology - 14th International Conference, QUATIC 2021, Algarve, Portugal, September 8-11, 2021, Proceedings. Communications in Computer and Information Science 1439, Springer 2021, ISBN 978-3-030-85346-4 [contents] - 2020
- [j37]Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García:
Switched-Based Resilient Control of Cyber-Physical Systems. IEEE Access 8: 212194-212208 (2020) - [c165]Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes de Oca:
Metrics-driven DevSecOps. ICSOFT 2020: 228-233 - [c164]Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
Cyber-Resilience Evaluation of Cyber-Physical Systems. NCA 2020: 1-8 - [i2]Mariana Segovia, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquín García-Alfaro:
Cyber-Resilience Evaluation of Cyber-Physical Systems. CoRR abs/2009.06927 (2020)
2010 – 2019
- 2019
- [j36]Raul A. Fuentes-Samaniego, Vinh Hoa La, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Raúl V. Ramírez-Velarde:
A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication. Int. J. Auton. Adapt. Commun. Syst. 12(3): 218-243 (2019) - [j35]Hüsnü Yenigün, Nina Yevtushenko, Ana Rosa Cavalli:
Guest Editorial: Special issue on Testing Software and Systems. Softw. Qual. J. 27(2): 497-499 (2019) - [c163]Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquín García-Alfaro:
Reflective Attenuation of Cyber-Physical Attacks. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 19-34 - [c162]Rabéa Ameur-Boulifa, Ana R. Cavalli, Stephane Maag:
From Formal Test Objectives to TTCN-3 for Verifying ETCS Complex Software Control Systems. ICSOFT (Selected Papers) 2019: 156-178 - [c161]Rabéa Ameur-Boulifa, Ana R. Cavalli, Stephane Maag:
Verifying Complex Software Control Systems from Test Objectives: Application to the ETCS System. ICSOFT 2019: 397-406 - [c160]Thierno Birahime Sambe, Stephane Maag, Ana R. Cavalli:
A Methodology for Enterprise Resource Planning Automation Testing Application to the Open Source ERP-ODOO. ICSOFT 2019: 407-415 - [c159]Georges Ouffoué, Fatiha Zaïdi, Ana R. Cavalli:
Attack Tolerance for Services-Based Applications in the Cloud. ICTSS 2019: 242-258 - [c158]Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli, Brecht Vermeulen, Matevz Vucnik:
Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms. ICTSS 2019: 270-278 - 2018
- [j34]Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort:
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. Comput. J. 61(8): 1109-1122 (2018) - [c157]Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Joaquín García-Alfaro:
A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper). FPS 2018: 257-264 - [c156]Sarah A. Dahab, Erika Silva, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli:
Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion. ICSOFT 2018: 154-165 - [c155]Sarah A. Dahab, Stephane Maag, Wissam Mallouli, Ana R. Cavalli:
Smart Measurements and Analysis for Software Quality Enhancement. ICSOFT (Selected Papers) 2018: 194-219 - [c154]Ana R. Cavalli, Antonio M. Ortiz, Georges Ouffoué, Cesar A. Sanchez, Fatiha Zaïdi:
Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection. ICWS 2018: 472-486 - 2017
- [c153]Georges L. A. Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali:
An Attack-Tolerant Framework for Web Services. SCC 2017: 503-506 - [c152]Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali:
Model-Based Attack Tolerance. AINA Workshops 2017: 68-73 - [c151]Pamela Carvallo, Ana R. Cavalli, Natalia Kushik:
A Study of Threat Detection Systems and Techniques in the Cloud. CRiSIS 2017: 140-155 - [c150]Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli:
A Platform for Security Monitoring of Multi-cloud Applications. Ershov Informatics Conference 2017: 59-71 - [c149]Hüsnü Yenigün, Natalia Kushik, Jorge López, Nina Yevtushenko, Ana R. Cavalli:
Decreasing the complexity of deriving test suites against nondeterministic finite state machines. EWDTS 2017: 1-4 - [c148]Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli, Erkuden Rios:
Multi-cloud Applications Security Monitoring. GPC 2017: 748-758 - [c147]Pamela Carvallo, Ana R. Cavalli, Natalia Kushik:
Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection. ICSOFT 2017: 480-487 - [c146]Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali:
How Web Services Can Be Tolerant to Intruders through Diversification. ICWS 2017: 436-443 - [e4]Nina Yevtushenko, Ana Rosa Cavalli, Hüsnü Yenigün:
Testing Software and Systems - 29th IFIP WG 6.1 International Conference, ICTSS 2017, St. Petersburg, Russia, October 9-11, 2017, Proceedings. Lecture Notes in Computer Science 10533, Springer 2017, ISBN 978-3-319-67548-0 [contents] - 2016
- [j33]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Formal framework for defining trust in multi-organisation environment. Int. J. Auton. Adapt. Commun. Syst. 9(1/2): 164-178 (2016) - [j32]Natalia Kushik, Khaled El-Fakih, Nina Yevtushenko, Ana R. Cavalli:
On adaptive experiments for nondeterministic finite state machines. Int. J. Softw. Tools Technol. Transf. 18(3): 251-264 (2016) - [c145]Vinh Hoa La, Raul A. Fuentes-Samaniego, Ana R. Cavalli:
Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers. AINA 2016: 147-154 - [c144]Diego Rivera, Ana R. Cavalli:
QoE-Driven Service Optimization Aware of the Business Model. AINA Workshops 2016: 725-730 - [c143]Vinh Hoa La, Raul Fuentes, Ana R. Cavalli:
A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks. APCC 2016: 230-237 - [c142]Rui Abreu, César Andrés, Ana R. Cavalli:
A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory. CRiSIS 2016: 169-182 - [c141]Jorge López, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko:
Optimizing network utilization through source code state model representation. EWDTS 2016: 1-4 - [c140]Vinh Hoa La, Ana R. Cavalli:
A Misbehavior Node Detection Algorithm for 6LoWPAN Wireless Sensor Networks. ICDCS Workshops 2016: 49-54 - [c139]Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sánchez, Fatiha Zaïdi:
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. ICDCS Workshops 2016: 61-66 - [c138]Raul A. Fuentes-Samaniego, Ana R. Cavalli, Juan Arturo Nolazco-Flores:
An Analysis of Secure M2M Communication in WSNs Using DTLS. ICDCS Workshops 2016: 78-83 - [c137]Diego Rivera, Ana R. Cavalli, Natalia Kushik, Wissam Mallouli:
An Implementation of a QoE Evaluation Technique Including Business Model Parameters. ICSOFT-PT 2016: 138-145 - [c136]Jorge Visca, Raul Fuentes, Ana R. Cavalli, Javier Baliosian:
Opportunistic media sharing for mobile networks. NOMS 2016: 799-803 - [c135]Natalia Kushik, Jorge López, Ana R. Cavalli, Nina Yevtushenko:
Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State Machines. QRS 2016: 315-322 - [c134]Huu Nghia Nguyen, Fatiha Zaïdi, Ana R. Cavalli:
Effectively Testing of Timed Composite Systems using Test Case Prioritization. SEKE 2016: 408-413 - [c133]Jorge Visca, Javier Baliosian, Raul A. Fuentes-Samaniego, Ana R. Cavalli:
Path sampling, a robust alternative to gossiping for opportunistic network routing. WiMob 2016: 1-8 - 2015
- [j31]Ana R. Cavalli, Teruo Higashino, Manuel Núñez:
Special issue on formal active and passive testing of distributed and networked systems. Ann. des Télécommunications 70(3-4): 83-84 (2015) - [j30]Ana R. Cavalli, Teruo Higashino, Manuel Núñez:
A survey on formal active and passive testing with applications to the cloud. Ann. des Télécommunications 70(3-4): 85-93 (2015) - [j29]Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca, Wissam Mallouli:
An effective attack detection approach in wireless mesh networks. Int. J. Space Based Situated Comput. 5(2): 89-99 (2015) - [c132]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
An Active Testing Tool for Security Testing of Distributed Systems. ARES 2015: 735-740 - [c131]Jorge López, Stephane Maag, Cecilia Saint-Pierre, Javier Bustos-Jiménez, Ana R. Cavalli:
Process Mining for Trust Monitoring. AINA Workshops 2015: 605-610 - [c130]Vinh Hoa La, Ana Rosa Cavalli:
A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks. BWCCA 2015: 6-12 - [c129]Diego Rivera, Natalia Kushik, Camila Fuenzalida, Ana R. Cavalli, Nina Yevtushenko:
QoE Evaluation Based on QoS and QoBiz Parameters Applied to an OTT Service. ICWS 2015: 607-614 - [c128]Raul A. Fuentes-Samaniego, Ana R. Cavalli, Wissam Mallouli, Javier Baliosian:
Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol. LANOMS 2015: 69-72 - [c127]Javier Baliosian, Ana R. Cavalli:
An Abstraction for the Interoperability Analysis of Security Policies. NSS 2015: 418-427 - [c126]Raul A. Fuentes-Samaniego, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Javier Baliosian:
A Survey on Wireless Sensors Networks Security Based on a Layered Approach. WWIC 2015: 77-93 - 2014
- [j28]Natalia Kushik, Jeevan Pokhrel, Nina Yevtushenko, Ana R. Cavalli, Wissam Mallouli:
QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches. Int. J. Organ. Collect. Intell. 4(3): 44-64 (2014) - [j27]Khalifa Toumi, Ana R. Cavalli, César Andrés:
Validation of a Trust Approach in Multi-Organization Environments. Int. J. Secur. Softw. Eng. 5(1): 1-18 (2014) - [j26]Anderson Morais Paiva Morais, Ana R. Cavalli:
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks. Mob. Networks Appl. 19(1): 101-120 (2014) - [c125]Jeevan Pokhrel, Felipe Lalanne, Ana R. Cavalli, Wissam Mallouli:
QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System. AINA 2014: 629-634 - [c124]Huu Nghia Nguyen, Fatiha Zaïdi, Ana R. Cavalli:
A Framework for Distributed Testing of Timed Composite Systems. APSEC (1) 2014: 47-54 - [c123]Khalifa Toumi, Fabien Autrel, Ana R. Cavalli, Sammy Haddad:
ISER: A Platform for Security Interoperability of Multi-source Systems. CRiSIS 2014: 230-238 - [c122]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps. FPS 2014: 337-346 - [c121]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
A Formal Approach to Automatic Testing of Security Policies Specified in XACML. FPS 2014: 367-374 - [c120]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
On Modeling and Testing Security Properties of Vehicular Networks. ICST Workshops 2014: 42-50 - [c119]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Détection de flux de contrôle illégaux dans les Smartphones. INFORSID 2014: 27-43 - [c118]Indira Paudel, Jeevan Pokhrel, Bachar Wehbi, Ana R. Cavalli, Badii Jouaber:
Estimation of video QoE from MAC parameters in wireless network: A Random Neural Network approach. ISCIT 2014: 51-55 - [c117]Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli:
How to Evaluate Trust Using MMT. NSS 2014: 484-492 - [c116]Natalia Kushik, Nina Yevtushenko, Ana R. Cavalli:
On Testing against Partial Non-observable Specifications. QUATIC 2014: 230-233 - [c115]Xiaoping Che, Stéphane Maag, Jorge López, Ana R. Cavalli:
Testing Network Protocols: formally, at runtime and online. SEKE 2014: 90-93 - [c114]Huu Nghia Nguyen, Ana R. Cavalli:
Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System. SEKE 2014: 393-396 - [c113]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems. SERE (Companion) 2014: 149-157 - [c112]Natalia Kushik, Nina Yevtushenko, Ana R. Cavalli, Wissam Mallouli, Jeevan Pokhrel:
Evaluating Web Service QoE by Learning Logic Networks. WEBIST (1) 2014: 168-176 - [i1]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study. CoRR abs/1410.5789 (2014) - 2013
- [j25]Pramila Mouttappa, Stephane Maag, Ana R. Cavalli:
Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols. Comput. Networks 57(15): 2992-3008 (2013) - [j24]Ana R. Cavalli, Sudipto Ghosh:
ICST 2010 Special Issue. Softw. Test. Verification Reliab. 23(5): 351 (2013) - [c111]Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca:
An Effective Attack Detection Approach in Wireless Mesh Networks. AINA Workshops 2013: 1450-1455 - [c110]Jeevan Pokhrel, Bachar Wehbi, Anderson Nunes Paiva Morais, Ana R. Cavalli, Eric Allilaire:
Estimation of QoE of video traffic using a fuzzy expert system. CCNC 2013: 224-229 - [c109]Pramila Mouttappa, Stephane Maag, Ana R. Cavalli:
Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case Study. COMPSAC 2013: 1-10 - [c108]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Security Properties in Virtual Organizations. HPCC/EUC 2013: 238-245 - [c107]Olga Kondratyeva, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko:
Evaluating Quality of Web Services: A Short Survey. ICWS 2013: 587-594 - [c106]Olga Kondratyeva, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko:
Evaluating Web Service Quality Using Finite State Models. QSIC 2013: 95-102 - [c105]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Trust Ontology Based on Access Control Parameters in Multi-organization Environments. SITIS 2013: 285-292 - [c104]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Formal Characterization of Illegal Control Flow in Android System. SITIS 2013: 293-300 - 2012
- [j23]Natalia Kushik, Amel Mammar, Ana R. Cavalli, Nina Yevtushenko, Willy Jimenez, Edgardo Montes de Oca:
A SPIN-based approach for detecting vulnerabilities in C programs. Autom. Control. Comput. Sci. 46(7): 379-386 (2012) - [j22]Amel Mammar, Wissam Mallouli, Ana R. Cavalli:
A systematic approach to integrate common timed security rules within a TEFSM-based system specification. Inf. Softw. Technol. 54(1): 87-98 (2012) - [j21]Nahid Shahmehri, Amel Mammar, Edgardo Montes de Oca, David Byers, Ana R. Cavalli, Shanai Ardi, Willy Jimenez:
An advanced approach for modeling and detecting software vulnerabilities. Inf. Softw. Technol. 54(9): 997-1013 (2012) - [j20]Iksoon Hwang, Nina Yevtushenko, Ana R. Cavalli:
Tight bound on the length of distinguishing sequences for non-observable nondeterministic Finite-State Machines with a polynomial number of inputs and outputs. Inf. Process. Lett. 112(7): 298-301 (2012) - [j19]Maria de Fátima Mattiello-Francisco, Eliane Martins, Ana R. Cavalli, Edgar Toshiro Yano:
InRob: An approach for testing interoperability and robustness of real-time embedded software. J. Syst. Softw. 85(1): 3-15 (2012) - [j18]Iksoon Hwang, Ana R. Cavalli, Mounir Lallali, Dominique Verchère:
Applying formal methods to PCEP: an industrial case study from modeling to test generation. Softw. Test. Verification Reliab. 22(5): 343-361 (2012) - [c103]Khalifa Toumi, César Andrés, Ana R. Cavalli, Mazen El Maarabani:
A vector based model approach for defining trust in Multi-Organization Environments. CRiSIS 2012: 1-8 - [c102]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses. CSS 2012: 33-47 - [c101]