SAMOVAR - SAMOVAR
Telecom SudParis
9 rue Charles Fourier
91011 EVRY CEDEX

Fax : +33 (0) 1 60 76 20 80

Pr. Ana Rosa CAVALLI

Professeur Émérite
ACMES

ana.cavalli[@-Code to remove to avoid SPAM-]telecom-sudparis.eu

Article dans une revue

2023

ref_biblio
Zujany Salazar, Fatiha Zaïdi, Huu-Nghia Nguyen, Wissam Mallouli, Ana R Cavalli, et al.. A network traffic mutation based ontology, and Its application to 5G networks. IEEE Access, 2023, 11, pp.43925-43944. ⟨10.1109/ACCESS.2023.3268759⟩. ⟨hal-04476884⟩
Accès au bibtex
BibTex

2022

ref_biblio
George Amponis, Panagiotis Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana R Cavalli, et al.. Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. EURASIP Journal on Wireless Communications and Networking, 2022, 1, pp.124. ⟨10.1186/s13638-022-02204-5⟩. ⟨hal-04476890⟩
Accès au bibtex
BibTex
ref_biblio
George Amponis, Panagiotis Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana Cavalli, et al.. Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. EURASIP Journal on Wireless Communications and Networking, 2022, 2022 (1), pp.124. ⟨10.1186/s13638-022-02204-5⟩. ⟨hal-04008882⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04008882/file/s13638-022-02204-5.pdf BibTex
ref_biblio
George Amponis, Panagiotis Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana Cavalli, et al.. Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. EURASIP Journal on Wireless Communications and Networking, 2022, 2022, ⟨10.1186/s13638-022-02204-5⟩. ⟨hal-04007779⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04007779/file/Eurasip_journal%20%282%29.pdf BibTex

2020

ref_biblio
Juan Nolazco Flores, Vinh Hoa La, Ana Rosa Cavalli, Raul Ramirez Velarde, Raul Fuentes Samaniego. Switched-based resilient control of cyber-physical systems. IEEE Access, 2020, 8 (3), pp.212194 - 212208. ⟨10.1109/ACCESS.2020.3039879⟩. ⟨hal-03113904⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03113904/file/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf BibTex
ref_biblio
Georges Ouffoué, Fatiha Zaïdi, Ana R Cavalli, Huu Nghia Nguyen. A Framework for the Attack Tolerance of Cloud Applications Based on Web Services. Electronics, 2020, 10 (1), pp.6. ⟨10.3390/electronics10010006⟩. ⟨hal-03113828⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03113828/file/Version_final_paper_Electronics_journal.pdf BibTex

2019

ref_biblio
Raul Armando Fuentes Samaniego, Vinh Hoa La, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Raúl Valente Ramirez Velarde. A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication. International journal of autonomous and adaptive communications systems, 2019, 12 (3), pp.218-243. ⟨10.1504/IJAACS.2019.10022471⟩. ⟨hal-02184618⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02184618/file/A-monitoring_AuthorFinalVersion.pdf BibTex
ref_biblio
Husnu Yenigun, Nina Yevtushenko, Ana Rosa Cavalli. Guest editorial: special issue on testing software and systems. Software Quality Journal, 2019, 27 (2), pp.497-499. ⟨10.1007/s11219-019-09447-4⟩. ⟨hal-02481420⟩
Accès au bibtex
BibTex

2018

ref_biblio
Khalifa Toumi, Mohamed Aouadi, Ana Rosa Cavalli, Wissam Mallouli, Jordi Puiggali Allepuz, et al.. A framework for testing and monitoring security policies: application to an electronic voting system. The Computer Journal, 2018, 61 (8), pp.1109 - 1122. ⟨10.1093/comjnl/bxy018⟩. ⟨hal-02017364⟩
Accès au bibtex
BibTex

2017

ref_biblio
Alessandra Bagnato, Andrey Sadovykh, Sarah Dahab, Stephane Maag, Ana Rosa Cavalli, et al.. Modeling OMG SMM metrics using the Modelio modeling tool in the MEASURE project. Génie logiciel : le magazine de l'ingénierie du logiciel et des systèmes, 2017, 120, pp.46 - 52. ⟨hal-01534818⟩
Accès au bibtex
BibTex

2016

ref_biblio
Natalia Kushik, Khaled El-Fakhi, Nina Yevtushenko, Ana Rosa Cavalli. On adaptive experiments for nondeterministic finite state machines. International Journal on Software Tools for Technology Transfer, 2016, 18 (3), pp.251 - 264. ⟨10.1007/s10009-014-0357-7⟩. ⟨hal-01354241⟩
Accès au bibtex
BibTex
ref_biblio
Diego Arturo Rivera Villagra, Ana Rosa Cavalli. Analysis and influence of economical decisions on the quality of experience of OTT services. IEEE Latin America Transactions, 2016, 14 (6), pp.2773 - 2776. ⟨10.1109/TLA.2016.7555253⟩. ⟨hal-01433979⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, César Andrés, Ana Rosa Cavalli. Formal framework for defining trust in multi-organisation environment. International journal of autonomous and adaptive communications systems, 2016, 9 (1-2), pp.164 - 178. ⟨10.1504/IJAACS.2016.075389⟩. ⟨hal-01335534⟩
Accès au bibtex
BibTex

2015

ref_biblio
Felipe Barbosa Abreu, Anderson Morais, Ana Rosa Cavalli, Bachar Wehbi, Edgardo Montes de Oca, et al.. An effective attack detection approach in wireless mesh networks. International Journal of Space-Based and Situated Computing, 2015, 5 (2), pp.89 - 99. ⟨10.1504/IJSSC.2015.069204⟩. ⟨hal-01262770⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Teruo Higashino, Manuel Nunez. A survey on formal active and passive testing with applications to the cloud. Annals of Telecommunications - annales des télécommunications, 2015, 70 (3), pp.85 - 93. ⟨10.1007/s12243-015-0457-8⟩. ⟨hal-01262762⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Teruo Higashino, Manuel Nunez. Special issue on formal active and passive testing of distributed and networked systems. Annals of Telecommunications - annales des télécommunications, 2015, 70 (3), pp.83 - 84. ⟨10.1007/s12243-015-0459-6⟩. ⟨hal-01262755⟩
Accès au bibtex
BibTex

2014

ref_biblio
Mohamed Aouadi, Khalifa Toumi, Ana Rosa Cavalli. Testing security policies for distributed systems: vehicular networks as a case study. International Journal of Computer Science Issues, 2014, 11 (5), pp.68 - 77. ⟨hal-01331562⟩
Accès au bibtex
BibTex
ref_biblio
Olga Kondratyeva, Nina Yevtushenko, Ana Rosa Cavalli. ПАРАЛЛЕЛЬНАЯ КОМПОЗИЦИЯ КОНЕЧНЫХ АВТОМАТОВ С ТАЙМАУТАМИ. Journal of Control and Computer Science (Tomsk State University), 2014, 2 (27), pp.73 - 81. ⟨hal-01948353⟩
Accès au bibtex
BibTex
ref_biblio
Vinh Hoa La, Ana Rosa Cavalli. Security attacks and solutions in Vehicular Ad Hoc Networks : a survey. International journal on AdHoc networking systems (IJANS), 2014, 4 (2), pp.1 - 20. ⟨10.5121/ijans.2014.4201⟩. ⟨hal-01262473⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, Ana Rosa Cavalli, Cesar Andres Sanchez. Validation of a trust approach in multi-organization environments. International journal of secure software engineering, 2014, 5 (1), pp.1 - 18. ⟨10.4018/ijsse.2014010101⟩. ⟨hal-01262565⟩
Accès au bibtex
BibTex

2013

ref_biblio
Olga Kondratyeva, Natalia Kushik, Ana Rosa Cavalli, Nina Yevtushenko. Using finite state models for quality evaluation at web service develoment steps. International Journal of Services Computing, 2013, 1 (1), pp.1 - 12. ⟨hal-01262472⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Iksoon Hwang, Ana Rosa Cavalli, Eliane Martins. Generating attack scenarios for the system security validation. Networking science, 2013, 2 (3 & 4), pp.69-80. ⟨10.1007/s13119-012-0012-0⟩. ⟨hal-00848049⟩
Accès au bibtex
BibTex
ref_biblio
Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. Using passive testing based on symbolic execution and slicing techniques : application to the validation of communication protocols. Computer Networks, 2013, 57 (15), pp.2992 - 3008. ⟨10.1016/j.comnet.2013.06.019⟩. ⟨hal-01273640⟩
Accès au bibtex
BibTex

2012

ref_biblio
Ik Soon Hwang, Nina Yevtushenko, Ana Rosa Cavalli. Tight bound on the length of distinguishing sequences for non-observable nondeterministic finite-state machines with a polynomial number of inputs and outputs. Information Processing Letters, 2012, 112 (7), pp.298-301. ⟨10.1016/j.ipl.2011.12.012⟩. ⟨hal-00711769⟩
Accès au bibtex
BibTex
ref_biblio
Hwang Iksoon, Mounir Lallali, Ana Rosa Cavalli, Dominique Verchere. Applying formal methods to PCEP: an industrial case study from modeling to test generation.. Journal of Software Testing, Verification and Reliability, 2012, 22 (5), pp.343--361. ⟨10.1002/stvr.445⟩. ⟨hal-00706162⟩
Accès au bibtex
BibTex
ref_biblio
Natalia Kushik, Amel Mammar, Ana Rosa Cavalli, Nina Yevtushenko, Willy Ronald Jimenez Freitez, et al.. A SPIN-based approach for detecting vulnerabilities in C programs. Automatic control and computer sciences, 2012, 46 (7), pp.379-386. ⟨10.3103/S0146411612070115⟩. ⟨hal-00772243⟩
Accès au bibtex
BibTex
ref_biblio
Amel Mammar, Wissam Mallouli, Ana Rosa Cavalli. A systematic approach to integrate common timed security rules within a TEFSM-based system specification. Information and Software Technology, 2012, 54 (1), pp.87-98. ⟨10.1016/j.infsof.2011.07.004⟩. ⟨hal-00711778⟩
Accès au bibtex
BibTex
ref_biblio
Fatima Mattiello-Francisco, Eliane Martins, Ana Rosa Cavalli, Edgard Toshiro Yano. InRob : an approach for testing interoperability and robustness of real-time embedded software. Journal of Systems and Software, 2012, 85 (1), pp.3-15. ⟨10.1016/j.jss.2011.02.034⟩. ⟨hal-00711774⟩
Accès au bibtex
BibTex
ref_biblio
Nahid Shahmehri, Amel Mammar, Edgardo Montes de Oca, David Byers, Ana Rosa Cavalli, et al.. An advanced approach for modeling and detecting software vulnerabilities. Information and Software Technology, 2012, 54 (9), pp.997-1013. ⟨10.1016/j.infsof.2012.03.004⟩. ⟨hal-00739075⟩
Accès au bibtex
BibTex

2010

ref_biblio
Rita Dorofeeva, Khaled El-Fakhi, Stephane Maag, Ana Rosa Cavalli, Nina Yevtushenko. FSM-based conformance testing methods : a survey annotated with experimental evaluation. Information and Software Technology, 2010, 52 (12), pp.1286-1297. ⟨10.1016/j.infsof.2010.07.001⟩. ⟨hal-00593960⟩
Accès au bibtex
BibTex
ref_biblio
Iksoon Hwang, Ana Rosa Cavalli. Testing a probabilistic FSM using interval estimation. Computer Networks, 2010, 54 (7), pp.1108 - 1125 ⟨10.1016/j.comnet.2009.10.014⟩. ⟨hal-00472884⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli, Eliane Martins. Génération de scripts d'attaque pour la validation de la sécurité. Génie logiciel : le magazine de l'ingénierie du logiciel et des systèmes, 2010, 94, pp.39 - 44. ⟨hal-01465755⟩
Accès au bibtex
BibTex

2008

ref_biblio
Stephane Maag, Cyril Grepet, Ana Rosa Cavalli. A formal validation methodology for MANET routing protocols based on nodes' self similarity. Computer Communications, 2008, 31 (4), pp.827 - 841. ⟨10.1016/j.comcom.2007.10.031⟩. ⟨hal-01354849⟩
Accès au bibtex
BibTex

Communication dans un congrès

2023

ref_biblio
Anis Bouaziz, Manh-Dung Nguyen, Valeria Valdés, Ana R Cavalli, Wissam Mallouli. Study on adversarial attacks techniques, learning methods and countermeasures: application to anomaly detection. 18th International Conference on Software Technologies (ICSOFT), Jul 2023, Rome, France. pp.510-517, ⟨10.5220/0012125100003538⟩. ⟨hal-04476913⟩
Accès au bibtex
BibTex
ref_biblio
Francesco Caccavale, Huu-Nghia Nguyen, Ana R Cavalli, Edgardo Montes de Oca, Wissam Mallouli. HTTP/2 attacks generation using 5Greplay. The 18th International Conference on Availability, Reliability and Security (ARES ), Aug 2023, Benevento Italy, France. pp.1-7, ⟨10.1145/3600160.3605062⟩. ⟨hal-04476907⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Edgardo Montes de Oca. Cybersecurity, monitoring, explainability and resilience. 2023 Fourteenth International Conference on Mobile Computing and Ubiquitous Network (ICMU), Nov 2023, Kyoto, France. pp.1-7, ⟨10.23919/ICMU58504.2023.10412157⟩. ⟨hal-04476909⟩
Accès au bibtex
BibTex
ref_biblio
Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry, Jean-Yves Tigli, et al.. The DYNABIC approach to resilience of critical infrastructures. The 18th International Conference on Availability, Reliability and Security (ARES ), Aug 2023, Benevento Italy, France. pp.1-8, ⟨10.1145/3600160.3605055⟩. ⟨hal-04476904⟩
Accès au bibtex
BibTex

2022

ref_biblio
Vinh Hoa La, Edgardo Montes De Oca, Wissam Mallouli, Ana R Cavalli. A framework for security monitoring of real IoT testbeds. 16th International Conference on Software Technologies (ICSOFT), Lisbonne University, Jul 2022, Lisbonne, Portugal. pp.645-652, ⟨10.5220/0010578506450652⟩. ⟨hal-04478481⟩
Accès au bibtex
BibTex
ref_biblio
Manh-Dung Nguyen, Vinh Hoa La, Ana R Cavalli, Edgardo Montes de Oca. Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper). 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Apr 2022, Valencia, Spain. pp.7-10, ⟨10.1109/ICSTW55395.2022.00016⟩. ⟨hal-04016695⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04016695/file/ITEQS_2022.pdf BibTex
ref_biblio
Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R Cavalli. Digital twin for IoT environments : a testing and simulation tool. 15th International Conference on the Quality of Information and Communications Technology(QUATIC) ·, University of Castilla-La Mancha, Sep 2022, Talavera de la Reina, Spain. pp.205-219, ⟨10.1007/978-3-031-14179-9_14⟩. ⟨hal-04039592⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04039592/file/QUATIC_2022%20%283%29.pdf BibTex
ref_biblio
Manh-Dung Nguyen, Vinh Hoa La, Ana R Cavalli, Edgardo Montes De Oca. Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks. 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Mälardalen University, Apr 2022, Valencia (Espagne), Spain. ⟨10.1109/ICSTW55395.2022.00016⟩. ⟨hal-04477901⟩
Accès au bibtex
BibTex
ref_biblio
Zujany Salazar, Ana R Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, et al.. Monitoring approaches for security and safety analysis: application to a load position system. International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Universitat Politècnica de València and Open Universiteit, Apr 2022, Valencia (Espagne), mars 2007, Spain. ⟨10.1109/ICSTW55395.2022.00021⟩. ⟨hal-04477933⟩
Accès au bibtex
BibTex
ref_biblio
Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, et al.. Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System. 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Apr 2022, Valencia, Spain. pp.40-48, ⟨10.1109/ICSTW55395.2022.00021⟩. ⟨hal-03974746⟩
Accès au bibtex
BibTex
ref_biblio
Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana R Cavalli, Huu Nghia Nguyen, et al.. A formal approach for complex attacks generation based on mutation of 5G network traffic. 17th International Conference on Software Technologies (ICSOFT), Institute of Business Informatics Wroclaw; Department of Computing Sydney, Macquarie Univ., Sydney, Australia, Jul 2022, Lisbon (Portugal), Portugal. ⟨hal-04477834⟩
Accès au bibtex
BibTex
ref_biblio
Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Cavalli, Huu Nguyen, et al.. A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. 17th International Conference on Software Technologies, Jul 2022, Lisbon, Portugal. pp.234-241, ⟨10.5220/0011319000003266⟩. ⟨hal-03974768⟩
Accès au bibtex
BibTex
ref_biblio
Mariana Segovia, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia‐alfaro. Switched-based control testbed to assure cyber-physical resilience by design. SECRYPT 2022 : 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.681-686, ⟨10.5220/0011327300003283⟩. ⟨hal-03843016⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03843016/file/secrypt2022a-preprint.pdf BibTex
ref_biblio
Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, et al.. SANCUS: multi-layers vulnerability management framework for cloud-native 5G networks. The 16th International Conference on Availability, Reliability and Security (ARES), Aug 2022, Vienna, Austria. pp.1-10. ⟨hal-04478439⟩
Accès au bibtex
BibTex

2021

ref_biblio
Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R Cavalli, Edgardo Montes de Oca. 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. ARES 2021: The 16th International Conference on Availability, Reliability and Security, Aug 2021, Vienna, Austria. pp.1-8, ⟨10.1145/3465481.3470079⟩. ⟨hal-04064212⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04064212/file/ens_workshop_2021_mmt_5greplay.pdf BibTex
ref_biblio
Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R Cavalli, Edgardo Montes de Oca. 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. ARES 2021: The 16th International Conference on Availability, Reliability and Security, Aug 2021, Vienna Austria, France. pp.1-8, ⟨10.1145/3465481.3470079⟩. ⟨hal-04050929⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04050929/file/5greplay_a_5G_Network_Traffic_Fuzzer.pdf BibTex

2020

ref_biblio
Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes De Oca. Metrics-driven DevSecOps. ICSOFT, Jul 2020, On line streaming, Australia. ⟨hal-03113928⟩
Accès au bibtex
BibTex
ref_biblio
Mariana Segovia, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia-Alfaro. Cyber-resilience evaluation of Cyber-Physical Systems. International Symposium on Network Computing and Applications, Nov 2020, Cambridge, MA (online), United States. pp.1-8, ⟨10.1109/NCA51143.2020.9306741⟩. ⟨hal-03115317⟩
Accès au bibtex
BibTex

2019

ref_biblio
Thierno Sambe, Stephane Maag, Ana Cavalli. A methodology for enterprise resource planning automation testing application to the Open Source ERP-ODOO. ICSOFT 2019: 14th International Conference on Software Technologies, Jul 2019, Prague, Czech Republic. pp.407-415, ⟨10.5220/0007923004070415⟩. ⟨hal-02268593⟩
Accès au bibtex
BibTex
ref_biblio
Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Reflective attenuation of cyber-physical attacks. CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, Sep 2019, Luxembourg, Luxembourg. pp.19-34, ⟨10.1007/978-3-030-42048-2_2⟩. ⟨hal-02434486⟩
Accès au bibtex
BibTex

2018

ref_biblio
Ana Rosa Cavalli, Antonio M. Ortiz, Georges Ouffoué, Cesar Andres Sanchez, Fatiha Zaidi. Design of a secure shield for internet and web-based services using software reflection. IEEE International Conference on Web Services (ICWS), Jun 2018, Seattle, United States. pp.472 - 486, ⟨10.1007/978-3-319-94289-6_30⟩. ⟨hal-02017535⟩
Accès au bibtex
BibTex
ref_biblio
Sarah Dahab, Erika Fernanda Silva Balocchi, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli. Enhancing software development process quality based on metrics correlation and suggestion. The 13th International Conference on Software Technologies (ICSOFT), Jul 2018, Porto, Portugal. pp.120 - 131, ⟨10.5220/0006856501540165⟩. ⟨hal-01977133⟩
Accès au bibtex
BibTex
ref_biblio
Sarah Dahab, Stephane Maag, Wissam Mallouli, Ana Cavalli. Smart measurements and analysis for software quality enhancement. ICSOFT 2018: International Conference on Software Technologies, Jul 2018, Porto, Portugal. pp.194-219, ⟨10.1007/978-3-030-29157-0_9⟩. ⟨hal-02268574⟩
Accès au bibtex
BibTex
ref_biblio
Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro. A study on mitigation techniques for SCADA-driven cyber-physical systems. FPS 2018: 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. pp.257 - 264, ⟨10.1007/978-3-030-18419-3_17⟩. ⟨hal-02014254⟩
Accès au bibtex
BibTex

2017

ref_biblio
Pamela Carvallo, Ana Rosa Cavalli, Natalia Kushik. Automatic derivation and validation of a cloud dataset for insider threat detection. ICSOFT 2017 : 12th International Conference on Software Technologies, Jul 2017, Madrid, Spain. pp.480 - 487, ⟨10.5220/0006480904800487⟩. ⟨hal-01583232⟩
Accès au bibtex
BibTex
ref_biblio
Pamela Carvallo, Ana Rosa Cavalli, Wissam Mallouli. A platform for security monitoring of multi-cloud applications. PSI 2017 : 11th International Adrei Ershov Informatics Conference, Jun 2017, Moscou, Russia. pp.59 - 71, ⟨10.1007/978-3-319-74313-4_5⟩. ⟨hal-01695148⟩
Accès au bibtex
BibTex
ref_biblio
Pamela Carvallo, Ana Rosa Cavalli, Natalia Kushik. A study of threat detection systems and techniques in the cloud. CRISIS 2017 : 12th International Conference on Risks and Security of Internet and Systems, Sep 2017, Dinard, France. pp.140 - 155, ⟨10.1007/978-3-319-76687-4_10⟩. ⟨hal-01745762⟩
Accès au bibtex
BibTex
ref_biblio
Pamela Carvallo, Ana Rosa Cavalli, Wissam Mallouli, Erkuden Rios. Multi-cloud applications security monitoring. GPC 2017 : 12th International Conference on Green, Pervasive, and Cloud Computing, May 2017, Cetara, Italy. pp.748 - 758, ⟨10.1007/978-3-319-57186-7_54⟩. ⟨hal-01583350⟩
Accès au bibtex
BibTex
ref_biblio
Georges Ouffoué, Fatiha Zaidi, Ana Rosa Cavalli, Mounir Lallali. How web services can be tolerant to intruders through diversification. ICWS 2017 : 24th IEEE International Conference on Web Services, Jun 2017, Honolulu, United States. pp.436 - 443, ⟨10.1109/ICWS.2017.50⟩. ⟨hal-01592719⟩
Accès au bibtex
BibTex
ref_biblio
Georges Ouffoué, Fatiha Zaidi, Ana Rosa Cavalli, Mounir Lallali. Model-based attack tolerance. FINA 2017 : 13th International Symposium on Frontiers of Information Systems and Network Applications, Mar 2017, Taipei, Taiwan. pp.68 - 73, ⟨10.1109/WAINA.2017.88⟩. ⟨hal-01583439⟩
Accès au bibtex
BibTex
ref_biblio
Georges Ouffoué, Fatiha Zaidi, Ana Rosa Cavalli, Mounir Lallali. An attack-tolerant framework for web services. SCC 2017 : 14th International Conference on Services Computing, Jun 2017, Honolulu, United States. pp.503 - 506, ⟨10.1109/SCC.2017.75⟩. ⟨hal-01695155⟩
Accès au bibtex
BibTex
ref_biblio
Husnu Yenigun, Natalia Kushik, Jorge Lopez, Nina Yevtushenko, Ana Rosa Cavalli. Decreasing the complexity of deriving test suites against nondeterministic Finite State Machines. EWDTS 2017 : 15th IEEE East-West Design & Test Symposium, Sep 2017, Novi Sad, Serbia. pp.1 - 4, ⟨10.1109/EWDTS.2017.8110091⟩. ⟨hal-01669274⟩
Accès au bibtex
BibTex

2016

ref_biblio
Rui Abreu, César Andrés, Ana Rosa Cavalli. A framework to reduce the cost of monitoring and diagnosis using game theory. CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. pp.169 - 182, ⟨10.1007/978-3-319-54876-0_14⟩. ⟨hal-01487740⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Wissam Mallouli. Monitoring techniques in practice: experiences and lessons learned. SAM 2016: 9th System Analysis and Modelling Conference , Oct 2016, Saint Malo, France. ⟨hal-01586259⟩
Accès au bibtex
BibTex
ref_biblio
Raul Armando Fuentes Samaniego, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores. An analysis of secure M2M communication in WSNs using DTLS. STAM 2016 : 2nd IEEE International Workshop on Security Testing and Monitoring, Jun 2016, Nara, Japan. pp.78 - 83, ⟨10.1109/ICDCSW.2016.13⟩. ⟨hal-01416148⟩
Accès au bibtex
BibTex
ref_biblio
Natalia Kushik, Jorge Eleazar Lopez Coronado, Ana Rosa Cavalli, Nina Yevtushenko. Optimizing protocol passive testing through 'Gedanken' experiments with Finite State Machines. QRS 2016 : International Conference on Software Quality, Reliability and Security, Aug 2016, Vienna, Austria. pp.315 - 322, ⟨10.1109/QRS.2016.43⟩. ⟨hal-01432412⟩
Accès au bibtex
BibTex
ref_biblio
Vinh Hoa La, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli. Network monitoring using MMT: an application based on the user-agent field in HTTP headers. AINA 2016 : 30th International Conference on Advanced Information Networking and Applications, Mar 2016, Crans-Montana, Switzerland. pp.147 - 154, ⟨10.1109/AINA.2016.41⟩. ⟨hal-01335530⟩
Accès au bibtex
BibTex
ref_biblio
Vinh Hoa La, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli. A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks. APCC 2016 : 22nd Asia-Pacific Conference on Communications, Aug 2016, Yogyakarta, Indonesia. pp.230 - 237, ⟨10.1109/APCC.2016.7581493⟩. ⟨hal-01391251⟩
Accès au bibtex
BibTex
ref_biblio
Vinh Hoa La, Ana Rosa Cavalli. A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks. STAM 2016: 2nd IEEE International Workshop on Security Testing And Monitoring, Jun 2016, Nara, Japan. pp.49 - 54, ⟨10.1109/ICDCSW.2016.11⟩. ⟨hal-01415351⟩
Accès au bibtex
BibTex
ref_biblio
Jorge Eleazar Lopez Coronado, Natalia Kushik, Ana Rosa Cavalli, Nina Yevtushenko. Optimizing network utilization through source code state model representation. EWDTS 2016 : 14th East-West Design & Test Symposium, Oct 2016, Yerevan, Armenia. pp.1 - 4, ⟨10.1109/EWDTS.2016.7807732⟩. ⟨hal-01433929⟩
Accès au bibtex
BibTex
ref_biblio
Huu Nghia Nguyen, Fatiha Zaidi, Ana Rosa Cavalli. Effectively testing of timed composite systems using test case prioritization. SEKE 2016 : 28th International Conference on Software Engineering and Knowledge Engineering, Jul 2016, San Francisco, United States. pp.1 - 6, ⟨10.18293/SEKE2016-153⟩. ⟨hal-01358350⟩
Accès au bibtex
BibTex
ref_biblio
Georges Ouffoué, Antonio Ortiz, Ana Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, et al.. Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), Jun 2016, Nara, France. ⟨10.1109/ICDCSW.2016.27⟩. ⟨hal-01767065⟩
Accès au bibtex
BibTex
ref_biblio
Diego Arturo Rivera Villagra, Ana Rosa Cavalli, Natalia Kushik, Wissam Mallouli. An implementation of a QoE evaluation technique including business model parameters. ICSOFT-PT 2016 : 11th International Conference on Software Paradigm Trends, Aug 2016, Lisbon, Portugal. pp.138 - 145, ⟨10.5220/0006005001380145⟩. ⟨hal-01369532⟩
Accès au bibtex
BibTex
ref_biblio
Diego Arturo Rivera Villagra, Ana Rosa Cavalli. QoE-driven service optimization aware of the business model. WAINA 2016 : 30th International Conference on Advanced Information Networking and Applications Workshops , Mar 2016, Crans-Montana, Switzerland. pp.725 - 730, ⟨10.1109/WAINA.2016.105⟩. ⟨hal-01335539⟩
Accès au bibtex
BibTex
ref_biblio
Jorge Visca, Javier Ernesto Baliosian, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli. Path sampling : a robust alternative to gossiping for opportunistic network routing. WIMOB 2016 : 12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2016, New York, United States. pp.1 - 8, ⟨10.1109/WiMOB.2016.7763244⟩. ⟨hal-01433849⟩
Accès au bibtex
BibTex
ref_biblio
Jorge Visca, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli, Javier Ernesto Baliosian. Opportunistic media sharing for mobile networks. NOMS 2016 : IEEE/IFIP Network Operations and Management Symposium, Apr 2016, Istanbul, Turkey. pp.799 - 803, ⟨10.1109/NOMS.2016.7502902⟩. ⟨hal-01348024⟩
Accès au bibtex
BibTex

2015

ref_biblio
Mohamed Aouadi, Khalifa Toumi, Ana Rosa Cavalli. An active testing tool for security testing of distributed systems. ARES 2015 : 10th International Conference on Availability, Reliability and Security, Aug 2015, Toulouse, France. pp.735 - 740, ⟨10.1109/ARES.2015.97⟩. ⟨hal-01263726⟩
Accès au bibtex
BibTex
ref_biblio
Javier Ernesto Baliosian, Ana Rosa Cavalli. An abstraction for the interoperability analysis of security policies. NSS 2015 : 9th International Conference on Network and System Security , Nov 2015, New York, United States. pp.418 - 427, ⟨10.1007/978-3-319-25645-0_30⟩. ⟨hal-01263746⟩
Accès au bibtex
BibTex
ref_biblio
Raul Armando Fuentes Samaniego, Ana Rosa Cavalli, Wissam Mallouli, Javier Ernesto Baliosian. Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol. LANOMS 2015 : 8th Latin American Network Operations and Management Symposium, Oct 2015, Joao Pessoa, Brazil. pp.69 - 72, ⟨10.1109/LANOMS.2015.7332672⟩. ⟨hal-01263742⟩
Accès au bibtex
BibTex
ref_biblio
Vinh Hoa La, Ana Rosa Cavalli. A comparative evaluation of two intrusion-tolerant routing protocols for Wireless Sensor Networks. BWCCA 2015: 10th International Conference on Broadband and Wireless Computing, Communication and Applications, Nov 2015, Krakow, Poland. pp.6 - 12, ⟨10.1109/BWCCA.2015.104⟩. ⟨hal-01341539⟩
Accès au bibtex
BibTex
ref_biblio
Jorge Eleazar Lopez Coronado, Stephane Maag, Cecilia Saint-Pierre, Javier Alejandro Bustos Jimenez, Ana Rosa Cavalli. Process mining for trust monitoring. WAINA 2015 : 29th International Conference on Advanced Information Networking and Applications Workshops , Mar 2015, Gwangiu, South Korea. pp.605 - 610, ⟨10.1109/WAINA.2015.71⟩. ⟨hal-01255094⟩
Accès au bibtex
BibTex
ref_biblio
Diego Arturo Rivera Villagra, Natalia Kushik, Camila Fuenzalida Nunez, Ana Rosa Cavalli, Nina Yevtushenko. QoE evaluation based on QoS and QoBiz parameters applied to an OTT service. ICWS 2015 : 22nd IEEE International Conference on Web Services, Jun 2015, New York, United States. pp.607 - 614, ⟨10.1109/ICWS.2015.86⟩. ⟨hal-01269646⟩
Accès au bibtex
BibTex

2014

ref_biblio
Mohamed Aouadi, Khalifa Toumi, Ana Rosa Cavalli. On modeling and testing security properties of vehicular networks. ICSTW 2014 : 7th International Conference on Software Testing, Verification and Validation Workshops, Mar 2014, Cleveland, United States. pp.42 - 50, ⟨10.1109/ICSTW.2014.56⟩. ⟨hal-01285747⟩
Accès au bibtex
BibTex
ref_biblio
Xiaoping Che, Stephane Maag, Jorge Eleazar Lopez Coronado, Ana Rosa Cavalli. Testing network protocols : formally, at runtime and online. SEKE 2014 : 26th International Conference on Software Engineering and Knowledge Engineering, Jul 2014, Vancouver, Canada. pp.90 - 93. ⟨hal-01263332⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Graa, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Ana Cavalli. Protection against Code Obfuscation Attacks based on control dependencies in Android Systems. TC 2014 : 8th International Workshop on Trustworthy Computing, Jun 2014, San Francisco, United States. ⟨hal-01010902⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01010902/file/bare_conf.pdf BibTex
ref_biblio
Mariem Graa, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Ana Cavalli. Détection de flux de contrôle illégaux dans les Smartphones. INFORSID 2014 : 32ème congrès de l'INFormatique des ORganisations et Systèmes d'Information et de Décision, May 2014, Lyon, France. ⟨hal-01009849⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01009849/file/Article_Mariem_Graa_INFORSID2014.pdf BibTex
ref_biblio
Mariem Graa, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Ana Cavalli. Detection of illegal control flow in Android System: Protecting private data used by Smartphone Apps. FPS 2014 : the 7th International Symposium on Foundations & Practice of Security, Nov 2014, Montréal, Canada. pp.337 - 346, ⟨10.1007/978-3-319-17040-4_22⟩. ⟨hal-01214033⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01214033/file/Article.pdf BibTex
ref_biblio
Natalia Kushik, Nina Yevtushenko, Ana Rosa Cavalli, Wissam Mallouli, Jeevan Pokhrel. Evaluating web service QoE by learning logic networks. WEBIST 2014 : 10th International Conference on Web Information Systems and Technologies, Apr 2014, Barcelone, Spain. pp.168 - 176, ⟨10.5220/0004855801680176⟩. ⟨hal-01262476⟩
Accès au bibtex
BibTex
ref_biblio
Natalia Kushik, Anton Kolomeez, Ana Rosa Cavalli, Nina Yevtushenko. Extended Finite State Machine based test derivation strategies for telecommunication protocols. SYRCoSE 2014 : 8th Spring/Summer Young Researchers’ Colloquium on Software Engineering , May 2014, Saint-Pétersbourg, Russia. pp.108 - 113, ⟨10.15514/SYRCOSE-2014-8-15⟩. ⟨hal-01262562⟩
Accès au bibtex
BibTex
ref_biblio
Natalia Kushik, Nina Yevtushenko, Ana Rosa Cavalli. On testing against partial non-observable specifications. QUATIC 2014 : 9th International Conference on the Quality of Information and Communications Technology, Sep 2014, Guimaraes, Portugal. pp.230 - 233, ⟨10.1109/QUATIC.2014.38⟩. ⟨hal-01262783⟩
Accès au bibtex
BibTex
ref_biblio
Huu Nghia Nguyen, Fatiha Zaïdi, Ana Cavalli. A Framework for Distributed Testing of Timed Composite Systems. 2014 21st Asia-Pacific Software Engineering Conference (APSEC), Dec 2014, Jeju, France. ⟨10.1109/APSEC.2014.16⟩. ⟨hal-01760336⟩
Accès au bibtex
BibTex
ref_biblio
Huu Nghia Nguyen, Ana Rosa Cavalli. Formal verification of coordination systems' requirements : a case study on the European Train Control System. SEKE 2014 : 26th International Conference on Software Engineering and Knowledge Engineering, Jul 2014, Vancouver, Canada. pp.393 - 396. ⟨hal-01262566⟩
Accès au bibtex
BibTex
ref_biblio
Indira Paudel, Jeevan Pokhrel, Bachar Wehbi, Ana Rosa Cavalli, Badii Jouaber. Estimation of video QoE from MAC parameters in wireless network : a Random Neural Network approach. ISCIT 2014 : 14th International Symposium on Communications and Information Technologies, Sep 2014, Incheon, South Korea. pp.51 - 55, ⟨10.1109/ISCIT.2014.7011868⟩. ⟨hal-01262789⟩
Accès au bibtex
BibTex
ref_biblio
Jeevan Pokhrel, Indira Paudel, Bachar Wehbi, Ana Rosa Cavalli, Badii Jouaber. Performance evaluation of video transmission over 802.11n wireless network : a MAC layer perspective. SaCoNeT 2014 : 5th International Conference on Smart Communications in Network Technologies, Jun 2014, Vilanova I La Geltrú, Spain. pp.1 - 6, ⟨10.1109/SaCoNeT.2014.6867761⟩. ⟨hal-01262788⟩
Accès au bibtex
BibTex
ref_biblio
Jeevan Pokhrel, Felipe Lalanne Rojas, Ana Rosa Cavalli, Wissam Mallouli. QoE estimation for web service selection using a Fuzzy-Rough hybrid expert system. AINA 2014 : 28th IEEE International Conference on Advanced Information Networking and Applications, May 2014, Victoria, Bc, Canada. pp.629 - 634, ⟨10.1109/AINA.2014.77⟩. ⟨hal-01262475⟩
Accès au bibtex
BibTex
ref_biblio
Cesar Andres Sanchez, Ana Rosa Cavalli, Nina Yevtushenko, João Santos, Rui Abreu. On modeling and testing components of the European Train Control System. IPCT 2014 : International Conference on Advances in Information Processing And Communication Technology, Jun 2014, Rome, Italy. pp.31 - 35, ⟨10.15224/978-1-63248-021-7-72⟩. ⟨hal-01262564⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana Rosa Cavalli. How to evaluate trust using MMT. NSS 2014 : 8th International Conference on Network and System Security, Oct 2014, Xi'An, China. pp.484 - 492, ⟨10.1007/978-3-319-11698-3_37⟩. ⟨hal-01262784⟩
Accès au bibtex
BibTex

2013

ref_biblio
Felipe Barbosa Abreu, Anderson Morais, Ana Rosa Cavalli, Bachar Wehbi, Edgardo Montes de Oca. An effective attack detection approach in wireless mesh networks. NetMM '13 : International Workshop on Network Management and Monitoring, Mar 2013, Barcelona, Spain. pp.1450 -1455, ⟨10.1109/WAINA.2013.1⟩. ⟨hal-00842731⟩
Accès au bibtex
BibTex
ref_biblio
Antonio Cuadra-Sánchez, Maria del Mar Cutanda-Rodriguez, Andreas Aurelius, Kjell Brunnström, Jorge E. López de Vergara, et al.. Ecosystem for customer experience assurance. SACONET 2013 : International Conference on Smart Communications in Network Technologies, Jun 2013, Paris, France. pp.1 - 5, ⟨10.1109/SaCoNeT.2013.6654553⟩. ⟨hal-01262114⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Graa, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Ana Cavalli. Formal Characterization of Illegal Control Flow in Android System. SITIS 2013 : 9th International Conference on Signal Image Technology & Internet Systems, Dec 2013, Kyoto, Japan. ⟨hal-00924480⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00924480/file/bare_conf.pdf BibTex
ref_biblio
Olga Kondratyeva, Ana Rosa Cavalli, Natalia Kushik, Nina Yevtushenko. Evaluating quality of web services: a short survey. ICWS 2013 : 20th International Conference on Web Services, Jun 2013, Santa Clara, United States. pp.587 - 594, ⟨10.1109/ICWS.2013.83⟩. ⟨hal-01274984⟩
Accès au bibtex
BibTex
ref_biblio
Olga Kondratyeva, Natalia Kushik, Ana Rosa Cavalli, Nina Yevtushenko. Evaluating Web service quality using finite state models. QSIC 2013 : 13th International Conference on Quality Software, Jul 2013, Nanjing, China. pp.95 - 102, ⟨10.1109/QSIC.2013.52⟩. ⟨hal-01262103⟩
Accès au bibtex
BibTex
ref_biblio
Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. Monitoring based on IOSTS for testing functional and security properties: application to an automotive case study. COMPSAC 2013 : 37th Annual International Computer Software & Applications Conference, Jul 2013, Kyoto, Japan. pp.1 - 10, ⟨10.1109/COMPSAC.2013.5⟩. ⟨hal-01275006⟩
Accès au bibtex
BibTex
ref_biblio
Jeevan Pokhrel, Bachar Wehbi, Morais Anderson, Ana Rosa Cavalli, Eric Allilaire. Estimation of QoE of video traffic using a fuzzy expert system. CCNC '13 : The 10th Annual IEEE Consumer Communications and Networking Conference, Jan 2013, Las Vegas, United States. pp.224-229, ⟨10.1109/CCNC.2013.6488450⟩. ⟨hal-00816061⟩
Accès au bibtex
BibTex

2012

ref_biblio
César Andrés, Ana Rosa Cavalli. How to reduce the cost of passive testing. HASE '12 : 14th IEEE International High-Assurance Systems Engineering symposium, Oct 2012, Omaha, United States. pp.209-216, ⟨10.1109/HASE.2012.36⟩. ⟨hal-00771884⟩
Accès au bibtex
BibTex
ref_biblio
Mazen El Maarabani, Cesar Andres, Ana Rosa Cavalli. Testing interoperability security policies. SEKE '12 : The 24th International Conference on Software Engineering and Knowledge Engineering, Jul 2012, San Francisco, United States. pp.464-469. ⟨hal-00744694⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Graa, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Ana Cavalli. Detecting control flow in Smarphones: Combining static and dynamic analyses. CSS 2012: The 4th International Symposium on Cyberspace Safety and Security, Dec 2012, Melbourne, Australia. pp.33 - 47, ⟨10.1007/978-3-642-35362-8_4⟩. ⟨hal-00785180⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00785180/file/Article.pdf BibTex
ref_biblio
Felipe Lalanne Rojas, Ana Rosa Cavalli, Stephane Maag. Quality of experience as a selection criterion for web services. SITIS '12 : The 8th International Conference on Signal-Image Technology & Internet Systems, Nov 2012, Sorrento, Italy. pp.519-526, ⟨10.1109/SITIS.2012.81⟩. ⟨hal-00772763⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Mounir Lallali, Gerardo Morales, Ana Rosa Cavalli. Modeling and testing secure web-based systems : application to an industrial case study. SITIS '08 : The Fourth International Conference on Signal-Image Technology & Internet-Based Systems, Nov 2012, Bali, Indonesia. pp.128-136, ⟨10.1109/SITIS.2008.58⟩. ⟨hal-00796034⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli. A distributed intrusion detection scheme for wireless ad hoc networks. SAC '12 : The 27th Annual ACM Symposium on Applied Computing, Mar 2012, Trento, Italy. pp.556-562, ⟨10.1145/2245276.2245382⟩. ⟨hal-00738916⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli. A event-based packet dropping detection scheme for wireless mesh networks. CSS '12 : The 4th International Symposium on Cyberspace Safety and Security, Dec 2012, Melbourne, Australia. pp.309-323, ⟨10.1007/978-3-642-35362-8_24⟩. ⟨hal-00816664⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli, Hai Anh Tran, Abdelhamid Mellouk, Brice Augustin, et al.. Managing customer experience through service quality monitoring. Conference Future Network & Mobile Summit 2012, Jul 2012, Berlín, Germany. pp.1-9. ⟨hal-00771815⟩
Accès au bibtex
BibTex
ref_biblio
Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. Improving protocol validation by an IOSTS-based passive testing approach. STV '12 : System Testing and Validation Workshop, Oct 2012, Paris, France. pp.87-95. ⟨hal-00738521⟩
Accès au bibtex
BibTex
ref_biblio
Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. An IOSTS based passive testing approach for the validation of data-centric protocols. QSIC '12 : 12th International Conference of Quality Software, Aug 2012, Xi'An, China. pp.49-58, ⟨10.1109/QSIC.2012.33⟩. ⟨hal-00747198⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, César Andrés, Ana Rosa Cavalli, Mazen El Maarabani. A vector based model approach for defining trust in multi-organization environments. CRiSIS '12 : 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8, ⟨10.1109/CRISIS.2012.6378939⟩. ⟨hal-00768221⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, César Andrés, Ana Rosa Cavalli. Setting trust evaluations with fuzzy logic in MOE. STV '12: System Testing and Validation Workshop, Oct 2012, Paris, France. pp.49-58. ⟨hal-00767987⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, César Andrés, Ana Rosa Cavalli. Trust-OrBAC : a trust access control model in multi-organization environments. ICISS '12 : 8th International Conference on Information Systems Security, Dec 2012, Guwahati, India. pp.89-103, ⟨10.1007/978-3-642-35130-3_7⟩. ⟨hal-00767797⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, Ana Rosa Cavalli, Mazen El Maarabani. Role based interoperability security policies in collaborative systems. SECOTS '12 : International Symposium on Security in Collaboration Technologies and Systems, May 2012, Denver, United States. pp.471-477, ⟨10.1109/CTS.2012.6261092⟩. ⟨hal-00738970⟩
Accès au bibtex
BibTex

2011

ref_biblio
Mazen El Maarabani, Ana Rosa Cavalli, Iksoon Hwang, Fatiha Zaïdi. Verification of interoperability security policies by model checking. HASE '11 : The 13th IEEE International High Assurance Systems Engineering Symposium, Nov 2011, Boca Raton, United States. pp.376 -381, ⟨10.1109/HASE.2011.17⟩. ⟨hal-00738626⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, et al.. Using requirements engineering in an automatic security policy derivation process. DPM - SETOP 2011 : 6th International Workshop on Data Privacy Management and 4th International Workshop on Autonomous and Spontaneous Security, Sep 2011, Leuven, Belgium. pp.155-172, ⟨10.1007/978-3-642-28879-1_11⟩. ⟨hal-00738844⟩
Accès au bibtex
BibTex
ref_biblio
Natalia Kushik, Amel Mammar, Ana Rosa Cavalli, Nina Yevtushenko, Edgardo Montes de Oca. A SPIN-based approach for detecting vulnerabilities in C programs. PSSV 2011 : 2nd Workshop on Program Semantics, Specification and Verification : Theory and Applications, Jun 2011, St Petersburg, Russia. pp.131 - 143. ⟨hal-01465027⟩
Accès au bibtex
BibTex
ref_biblio
Amel Mammar, Ana Rosa Cavalli, Willy Ronald Jimenez Freitez, Wissam Mallouli, Edgardo Montes de Oca. Using testing techniques for vulnerability detection in C programs. 23th International Conference on Testing Software and Systems (ICTSS), Nov 2011, Paris, France. pp.80-96, ⟨10.1007/978-3-642-24580-0_7⟩. ⟨hal-01303013⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01303013/file/978-3-642-24580-0_7_Chapter.pdf BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli. Route manipulation attack in wireless mesh networks. AINA 2011 : 25th International Conference on Advanced Information Networking and Applications, Mar 2011, Biopolis, Singapore. pp.501 - 508, ⟨10.1109/AINA.2011.11⟩. ⟨hal-01465746⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli. Detection of attacks in wireless mesh networks. LADC 2011 : 5th Latin-American Symposium on Dependable Computing, Apr 2011, Sao Jose Dos Campos, Brazil. pp.45 - 54, ⟨10.1109/LADC.2011.13⟩. ⟨hal-01301634⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli. A quality of experience based approach for wireless mesh networks. 9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova I La Geltrú, Spain. pp.162-173, ⟨10.1007/978-3-642-21560-5_14⟩. ⟨hal-01301638⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01301638/file/978-3-642-21560-5_14_Chapter.pdf BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli, Eliane Martins. A model-based attack injection approach for security validation. SIN '11 : 4th international conference on Security of information and networks, Nov 2011, Sydney, Australia. pp.103-110, ⟨10.1145/2070425.2070443⟩. ⟨hal-00711762⟩
Accès au bibtex
BibTex
ref_biblio
Marcelo Odin, Jose Pablo Escobedo, Ana Rosa Cavalli, Stephane Maag, Ariel Sabiguero. Cost effective cross-layer protocol testing : a case study. CASE 2011 : Congreso Argentino de Sistemas Embebidos, Mar 2011, Buenos Aires, Argentina. pp.103 - 108. ⟨hal-01303607⟩
Accès au bibtex
BibTex
ref_biblio
Maxim Zhigulin, Stephane Maag, Ana Rosa Cavalli, Nina Yevtushenko. FSM-based test derivation strategies for systems with time-outs. QSIC 2011 : 11th International Conference On Quality Software, Jul 2011, Madrid, Spain. pp.141 - 149, ⟨10.1109/QSIC.2011.30⟩. ⟨hal-01303601⟩
Accès au bibtex
BibTex

2010

ref_biblio
Fayçal Bessayah, Ana Rosa Cavalli, William Maja, Eliane Martins, Andre Willik Valenti. A fault injection tool for testing web services composition. TAIC PART 2010 : Testing: Academic & Industrial Conference Practice and Research Techniques, Sep 2010, Windsor, United Kingdom. pp.137 - 146, ⟨10.1007/978-3-642-15585-7_13⟩. ⟨hal-01306763⟩
Accès au bibtex
BibTex
ref_biblio
Fayçal Bessayah, Ana Rosa Cavalli. A formal passive testing approach for checking real time constraints. QUATIC 2010 : 7th International Conference on the Quality of Information and Communications Technology, Sep 2010, Porto, Portugal. pp.274 - 279, ⟨10.1109/QUATIC.2010.55⟩. ⟨hal-01306297⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Tien-Dung Cao, Wissam Mallouli, Eliane Martins, Andrey Sadovykh, et al.. Webmov : a dedicated framework for the modelling and testing of web services composition. ICWS 2010 : 8th International Conference on Web Services, Jul 2010, Miami, United States. pp.377 - 384, ⟨10.1109/ICWS.2010.24⟩. ⟨hal-01306746⟩
Accès au bibtex
BibTex
ref_biblio
Mazen El Maarabani, Iksoon Hwang, Ana Rosa Cavalli. A formal approach for interoperability testing of security rules. SITIS 2010 : 6th International Conference on Signal-Image Technology & Internet-Based Systems, Dec 2010, Kuala Lumpur, Malaysia. pp.277 - 284, ⟨10.1109/SITIS.2010.53⟩. ⟨hal-01305099⟩
Accès au bibtex
BibTex
ref_biblio
Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana Rosa Cavalli. Testing web service orchestrators in context : a symbolic approach. SEFM 2010 : 8th IEEE International Conference on Software Engineering and Formal Methods, Sep 2010, Pisa, Italy. pp.257 - 267, ⟨10.1109/SEFM.2010.30⟩. ⟨hal-01306744⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli, Eliane Martins. Attack scripts generation for security validation. SEC-SY '10 : Sécurité des Systèmes d'Information et les Environnements Collaboratifs, May 2010, Marseille, France. ⟨hal-00727714⟩
Accès au bibtex
BibTex
ref_biblio
Gerardo Morales, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca, et al.. Timed extended invariants for the passive testing of Web services. ICWS 2010 : 8th International Conference on Web Services, Jul 2010, Miami, United States. pp.592 - 599, ⟨10.1109/ICWS.2010.17⟩. ⟨hal-01309503⟩
Accès au bibtex
BibTex
ref_biblio
Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. Transmit and reserve (tar) : a coordinated channel access for IEEE 802.11 networks. WCNC 2010 : IEEE Wireless Communications and Networking Conference, Apr 2010, Sidney, Australia. pp.1 - 6, ⟨10.1109/WCNC.2010.5506240⟩. ⟨hal-01306741⟩
Accès au bibtex
BibTex

2009

ref_biblio
Morais Anderson, Ana Rosa Cavalli, Eliane Martins, Willy Ronald Jimenez Freitez. Security protocol testing using attack trees. CSE '09 : 12th IEEE International Conference on Computational Science and Engineering, Aug 2009, Vancouver, Canada. pp.690-697, ⟨10.1109/CSE.2009.206⟩. ⟨hal-00446770⟩
Accès au bibtex
BibTex
ref_biblio
César Andrés, Stephane Maag, Ana Rosa Cavalli, Mercedes Merayo, Manuel Nunez. Analysis of the OLSR protocol by using formal passive testing. APSEC 2009 : 16th Asia-Pacific Software Engineering Conference, Dec 2009, Penang, Malaysia. pp.152 - 159, ⟨10.1109/APSEC.2009.37⟩. ⟨hal-01366249⟩
Accès au bibtex
BibTex
ref_biblio
Fayçal Bessayah, Ana Rosa Cavalli, Eliane Martins. A formal approach for specification and verification of fault injection process. ICIS '09 : International Conference on Interaction Sciences, Dec 2009, Phoenix, United States. pp.883-890, ⟨10.1145/1655925.1656086⟩. ⟨hal-00771611⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Azzedine Benameur, Wissam Mallouli, Keqin Li. A passive testing approach for security checking and its practical usage for web services monitoring. NOTERE 2009 : 9e Conférence Internationale sur Les NOuvelles TEchnologies de la REpartition, Jun 2009, Montréal, Canada. ⟨hal-01360187⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01360187/file/notere09.pdf BibTex
ref_biblio
Ana Rosa Cavalli, Stephane Maag, Edgardo Montes de Oca, Fatiha Zaidi. A formal passive testing approach to test a MANET routing protocol. PWN 2009 : 5th IEEE PerCom Workshop on Pervasive Wireless Networking , Mar 2009, Galveston, United States. pp.1 - 6, ⟨10.1109/PERCOM.2009.4912874⟩. ⟨hal-01369686⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Stephane Maag, Edgardo Montes de Oca. A passive conformance testing approach for a MANET routing protocol. SAC '09 : 24th Annual ACM Symposium on Applied Computing, Mar 2009, Hawai, United States. pp.207-211, ⟨10.1145/1529282.1529326⟩. ⟨hal-00771619⟩
Accès au bibtex
BibTex
ref_biblio
Mazen El Maarabani, Asma Adala, Iksoon Hwang, Ana Rosa Cavalli. Interoperability testing of presence service on IMS platform. TridentCom 2009 : 5th International Conference onTestbeds and Research Infrastructures for the Development of Networks & Communities and Workshops, Apr 2009, Washington, United States. ⟨10.1109/TRIDENTCOM.2009.4976260⟩. ⟨hal-00442192⟩
Accès au bibtex
BibTex
ref_biblio
Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana Rosa Cavalli. Observability and controllability issues in conformance testing of Web service compositions. TESTCOM/FATES 2009 : 21st IFIP International Conference on Testing of Communicating Systems and 9th International Workshop on Formal Approaches to Testing of Software, Nov 2009, Eindhoven, Netherlands. pp.217 - 222, ⟨10.1007/978-3-642-05031-2_15⟩. ⟨hal-01360755⟩
Accès au bibtex
BibTex
ref_biblio
Iksoon Hwang, Mounir Lallali, Ana Rosa Cavalli, Dominique Verchère. Modeling, validation, and verification of PCEP using the IF language. FMOODS/FORTE 2009 : 11th Formal Methods for Open Object-Based Distributed Systems and 29th Formal Techniques for Networked and Distributed Systems, Jun 2009, Lisboa, Portugal. pp.122 - 136, ⟨10.1007/978-3-642-02138-1_8⟩. ⟨hal-00446605⟩
Accès au bibtex
BibTex
ref_biblio
Willy Ronald Jimenez Freitez, Amel Mammar, Ana Rosa Cavalli. Software vulnerabilities, prevention and detection methods : a review. SEC-MDA 2009 : Security in Model Driven Architecture , Jun 2009, Enschede, Netherlands. pp.1 - 11. ⟨hal-01367445⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01367445/file/GET_sec-mda09.pdf BibTex
ref_biblio
Felipe Lalanne Rojas, Stephane Maag, Edgardo Montes de Oca, Ana Rosa Cavalli, Wissam Mallouli, et al.. An automated passive testing approach for the IMS PoC service. ASE 2009 : 24th IEEE/ACM International Conference on Automated Software Engineering, Nov 2009, Auckland, New Zealand. pp.535 - 539, ⟨10.1109/ASE.2009.33⟩. ⟨hal-01316417⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Amel Mammar, Ana Rosa Cavalli. A formal framework to integrate timed security rules within a TEFSM-based system specification. APSEC 2009 : 16th AsiaPacific Software Engineering Conference, Dec 2009, Batu Ferringhi, Malaysia. pp.489 - 496, ⟨10.1109/APSEC.2009.52⟩. ⟨hal-00444089⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00444089/file/mallouli2009.pdf BibTex
ref_biblio
Wissam Mallouli, Amel Mammar, Ana Cavalli. Prise en Compte de Règles de Sécurité Temporelles dans une Spécification TEFSM d'un Système. CFIP'2009, Oct 2009, Strasbourg, France. ⟨inria-00419463⟩
Accès au texte intégral et bibtex
https://inria.hal.science/inria-00419463/file/34.pdf BibTex
ref_biblio
Amel Mammar, Ana Rosa Cavalli, Edgardo Montes de Oca, Shanai Ardi, David Byers, et al.. Modélisation et détection formelles de vulnérabilités logicielles par le test passif. SAR-SSI 2009 : 4eme Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information , Jun 2009, Luchon, France. ⟨hal-00444066⟩
Accès au bibtex
BibTex
ref_biblio
Eliane Martins, Ana Rosa Cavalli, Jean Arlat, Regina Moraes, Taisy Weber. RobustWeb : development and validation of SOA applications based on Web services. Colloquium of Computation : Brazil / INRIA, Cooperations, Advances and Challenges, Jul 2009, Rio Grande Do Sul, Brazil. ⟨hal-00448589⟩
Accès au bibtex
BibTex
ref_biblio
Fatima Mattiello-Francisco, Eliane Martins, André Corsetti, Ana Rosa Cavalli, Edgard Yano. Extended interoperability models for timed system robustness testing. LATINCOM '09 : IEEE Latin-American Conference on Communications, Sep 2009, Medelin, Colombia. pp.1-6, ⟨10.1109/LATINCOM.2009.5304903⟩. ⟨hal-00448581⟩
Accès au bibtex
BibTex
ref_biblio
Mercedes Merayo, Iksoon Hwang, Manuel Nunez, Ana Rosa Cavalli. A statistical approach to test stochastic and probabilistic systems. ICFEM 2009 : 11th International Conference on Formal Engineering Methods, Dec 2009, Rio De Janeiro, Brazil. pp.186 - 205, ⟨10.1007/978-3-642-10373-5_10⟩. ⟨hal-01360751⟩
Accès au bibtex
BibTex
ref_biblio
Fatiha Zaidi, Emmanuel Bayse, Ana Rosa Cavalli. Network protocol interoperability testing based on contextual signatures and passive testing. SAC 2009 : 24th Annual ACM Symposium on Applied Computing, Mar 2009, Honolulu (Hawaii), United States. pp.2 - 7, ⟨10.1145/1529282.1529284⟩. ⟨hal-01316444⟩
Accès au bibtex
BibTex

2008

ref_biblio
Ana Rosa Cavalli, Eliane Martins, Anderson Morais. Use of invariant properties to evaluate the results of fault-injection-based robustness testing of protocol implementations. ICSTW 2008 : 1st International Conference on Software Testing Verification and Validation Workshop, Apr 2008, Lillehammer, Norway. pp.21 - 30, ⟨10.1109/ICSTW.2008.51⟩. ⟨hal-01326406⟩
Accès au bibtex
BibTex
ref_biblio
Ana Cavalli, Eliane Martins, Anderson Morais, Bruno Moreira. Une approche de test de robustesse basée sur l'injection de fautes et le monitorage. Colloque Francophone sur l'Ingénierie des Protocoles (CFIP), Mar 2008, Les Arcs, France. ⟨hal-00250162⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00250162/file/submission_55.pdf BibTex
ref_biblio
Céline Coma, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Ana Rosa Cavalli. Context ontology for secure interoperability. FARES 2008 : International Workshop on Frontiers in Availability, Reliability and Security, Mar 2008, Barcelona, Spain. pp.821-827, ⟨10.1109/ARES.2008.133⟩. ⟨hal-00796516⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Amel Mammar, Ana Rosa Cavalli. Modeling system security rules with time constraints using timed extended finite state machines. DS-RT 2008 : 12th IEEE/ACM International Symposium on Distributed Simulation an Real Time Applications, Oct 2008, Vancouver, Canada. pp.173 - 180, ⟨10.1109/DS-RT.2008.22⟩. ⟨hal-01380237⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Fayçal Bessayah, Ana Rosa Cavalli, Azzedine Benameur. Security rules specification and analysis based on passive testing. GLOBECOM 2008 : IEEE Global Telecommunications Conference, Nov 2008, New Orleans, United States. pp.1 - 6, ⟨10.1109/GLOCOM.2008.ECP.400⟩. ⟨hal-01378696⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Bachar Wehbi, Ana Rosa Cavalli. Distributed monitoring in Ad Hoc networks : conformance and security checking. AdHoc-NOW 2008 : 7th International Conference on Ad Hoc Networks and Wireless, Sep 2008, Sophia-Antipolis, France. pp.345 - 356, ⟨10.1007/978-3-540-85209-4_27⟩. ⟨hal-01327393⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Gerardo Morales, Ana Rosa Cavalli. Testing security policies for web applications. ICSTW '08 : IEEE International Conference on Software Testing Verification and Validation Workshop, Apr 2008, Lillehammer, Norway. pp.269-270, ⟨10.1109/ICSTW.2008.45⟩. ⟨hal-00796098⟩
Accès au bibtex
BibTex
ref_biblio
Eliane Martins, Anderson Morais, Ana Rosa Cavalli. Generating attack scenarios for the validation of security protocol implementations. SAST '08 : 2nd Brazilian Workshop on Systematic and Automated Software Testing, Oct 2008, Campinas, Brazil. pp.21-33. ⟨hal-00796077⟩
Accès au bibtex
BibTex
ref_biblio
Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. Efficient time synchronization mechanism for wireless multi hop networks. PIMRC 2008 : IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2008, Cannes, France. pp.1 - 6, ⟨10.1109/PIMRC.2008.4699638⟩. ⟨hal-01379599⟩
Accès au bibtex
BibTex
ref_biblio
Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. ReDEx : Receiver Diversity Exploitation mechanism for 802.11 wireless networks. ICLAN 2008 : International Conference on the Latest Advances in Networks, Dec 2008, Toulouse, France. pp.1 - 6. ⟨hal-01394732⟩
Accès au bibtex
BibTex
ref_biblio
Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. A reactive wireless mesh network architecture. Med-Hoc-Net 2008 : Seventh Annual Mediterranean Ad Hoc Networking Workshop : Advances in Ad Hoc Networking, Jun 2008, Palma De Mallorca, Spain. pp.203 - 214, ⟨10.1007/978-0-387-09490-8_18⟩. ⟨hal-01373149⟩
Accès au bibtex
BibTex

2007

ref_biblio
Ana Rosa Cavalli, Stephane Maag, Gerardo Morales. Regression and performance testing of an e-learning Web application : dotLRN. SITIS 2007 : 3rd International Conference on Signal Image Technology and Internet-Based Systems, Dec 2007, Shangai, China. pp.369 - 376, ⟨10.1109/SITIS.2007.129⟩. ⟨hal-01328016⟩
Accès au bibtex
BibTex

2006

ref_biblio
Ana Cavalli, Timothy Griffin, Dario Vieira. MSP: A Novel Session Maintenance Protocol. 2006 14th IEEE International Conference on Networks, Sep 2006, Singapore, France. pp.1-6, ⟨10.1109/ICON.2006.302611⟩. ⟨hal-04085693⟩
Accès au bibtex
BibTex
ref_biblio
Dario Vieira, Ana Cavalli. Vérification et analyse de performance d'un protocole de gestion de session. CFIP 2006: Colloque Francophone sur l'Ingénierie des Protocoles, Eric Fleury and Farouk Kamoun, Oct 2006, Tozeur, Tunisie. 12 p. ⟨inria-00111718⟩
Accès au texte intégral et bibtex
https://inria.hal.science/inria-00111718/file/CFIP-ID-30.pdf BibTex

2003

ref_biblio
Cédric Besse, Ana Cavalli, Fatiha Zaïdi. Génération de tests d'intéropérabilité pour le protocole TCP. 4ème Colloque Francophone sur la Modélisation des Systèmes Réactifs (MSR '03), Oct 2003, Metz, France. pp.447-461. ⟨hal-01530440⟩
Accès au bibtex
BibTex

Chapitre d'ouvrage

2021

ref_biblio
Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R Cavalli, Edgardo Montes De Oca. 5Greplay: a 5G network traffic fuzzer - application to attack injection. ARES '21 : Actes de la 16e Conférence internationale sur la disponibilité, la fiabilité et la sécurité, ACM, pp.1-8, 2021, 9781450390514. ⟨10.1145/3465481.3470079⟩. ⟨hal-04478392⟩
Accès au bibtex
BibTex

2015

ref_biblio
Jeevan Pokhrel, Natalia Kushik, Bachar Wehbi, Nina Yevtushenko, Ana Rosa Cavalli. Multimedia Quality of Experience. Emerging research on networked multimedia communication systems, Information Science Reference, pp.250 - 284, 2015, Advances in multimedia and interactive technologies book series, 978-1-466-68850-6. ⟨10.4018/978-1-4666-8850-6.ch008⟩. ⟨hal-01263826⟩
Accès au bibtex
BibTex

2014

ref_biblio
Antonio Cuadra Sanchez, Maria del Mar Cutanda Rodriguez, Andreas Aurelius, Kjell Brunnström, Jorge E. López de Vergara, et al.. An ecosystem for customer experience management. Quality of experience engineering for customer added value services: from evaluation to monitoring, Wiley, pp.1 - 256, 2014, ISTE, 978-1-84821-672-3. ⟨10.1002/9781118984352.ch2⟩. ⟨hal-01255095⟩
Accès au bibtex
BibTex
ref_biblio
Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. Symbolic-based monitoring for embedded applications. Handbook of research on embedded systems design, IGI Global, pp.52 - 74, 2014, Advances in Systems Analysis, Software Engineering, and High Performance Computing book series, 978-1-466-66194-3. ⟨10.4018/978-1-4666-6194-3.ch003⟩. ⟨hal-01263345⟩
Accès au bibtex
BibTex

2011

ref_biblio
Wissam Mallouli, Bachar Wehbi, Ana Rosa Cavalli, Stephane Maag. Formal supervision of mobile ad hoc networks for security flaws detection. Security engineering techniques and solutions for information systems : management and implementation, IGI Global, 2011, 978-1-615-20803-6. ⟨10.4018/978-1-61520-803-6⟩. ⟨hal-00690721⟩
Accès au bibtex
BibTex

2010

ref_biblio
Wissam Mallouli, Mounir Lallali, Amel Mammar, Gerardo Morales, Ana Rosa Cavalli. Modeling and testing secure web applications. Web-based information technologies and distributed systems, Atlantis Press, pp.207-255, 2010, Atlantis Ambient and Pervasive Intelligence, ⟨10.1007/978-94-91216-32-9_10⟩. ⟨hal-00673835⟩
Accès au bibtex
BibTex

2009

ref_biblio
Jean-Marie Orset, Ana Rosa Cavalli. Security in ad hoc networks. Wireless and mobile network security : security basics, security in on-the-shelf and emerging technologies, iSTE-WILEY, pp.475-524, 2009, 978-1-84821-117-9. ⟨hal-00801279⟩
Accès au bibtex
BibTex

N°spécial de revue/special issue

2022

ref_biblio
Ricardo Perez-Castillo, Ana Paiva, Ana Rosa Cavalli. Special issue on information systems quality for digital transformation. Software Quality Journal, 30 (4), pp.953-954, 2022, ⟨10.1007/s11219-022-09608-y⟩. ⟨hal-04476915⟩
Accès au bibtex
BibTex

Ouvrages

2017

ref_biblio
Nina Yevtushenko, Ana Rosa Cavalli, Husnu Yenigun. Testing Software and Systems: 29th IFIP WG 6.1 International Conference, ICTSS 2017, St. Petersburg, Russia, October 9-11, 2017, Proceedings. Springer International Publishing, LNCS-10533, 2017, Lecture Notes in Computer Science, 978-3-319-67548-0. ⟨10.1007/978-3-319-67549-7⟩. ⟨hal-01678967⟩
Accès au bibtex
BibTex

Proceedings/Recueil des communications

2022

ref_biblio
David Clark, Héctor D. Menéndez, Ana R Cavalli. Testing Software and Systems: 33rd IFIP WG 6.1 International Conference, ICTSS 2021, London, UK, November 10–12, 2021, Proceedings. IFIP International Conference on Testing Software and Systems (ICTSS), 13045, 2022, Lecture Notes in Computer Science, 978-3-031-04673-5. ⟨10.1007/978-3-031-04673-5⟩. ⟨hal-04478239⟩
Accès au bibtex
BibTex

Rapport

2023

ref_biblio
Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia‐alfaro. Cyber-resilience approaches for cyber-physical systems. Télécom SudParis (Institut Mines-Télécom). 2023. ⟨hal-04495662⟩
Accès au bibtex
https://arxiv.org/pdf/2302.05402 BibTex