SAMOVAR - SAMOVAR
Telecom SudParis
9 rue Charles Fourier
91011 EVRY CEDEX

Fax : +33 (0) 1 60 76 20 80

Pr. Ana Rosa CAVALLI

Professeur Émérite
METHODES

ana.cavalli[@-Code to remove to avoid SPAM-]telecom-sudparis.eu

Article dans une revue

2020

ref_biblio
Georges Ouffoué, Fatiha Zaïdi, Ana R Cavalli, Huu Nghia Nguyen. A Framework for the Attack Tolerance of Cloud Applications Based on Web Services. Electronics, 2020, 10 (1), pp.6. ⟨10.3390/electronics10010006⟩. ⟨hal-03113828⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03113828/file/Version_final_paper_Electronics_journal.pdf BibTex

2019

ref_biblio
Raul Armando Fuentes Samaniego, Vinh Hoa La, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Raúl Valente Ramirez Velarde. A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication. International journal of autonomous and adaptive communications systems, 2019, 12 (3), pp.218-243. ⟨10.1504/IJAACS.2019.10022471⟩. ⟨hal-02184618⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02184618/file/A-monitoring_AuthorFinalVersion.pdf BibTex
ref_biblio
Husnu Yenigun, Nina Yevtushenko, Ana Rosa Cavalli. Guest editorial: special issue on testing software and systems. Software Quality Journal, 2019, 27 (2), pp.497-499. ⟨10.1007/s11219-019-09447-4⟩. ⟨hal-02481420⟩
Accès au bibtex
BibTex

2018

ref_biblio
Khalifa Toumi, Mohamed Aouadi, Ana Rosa Cavalli, Wissam Mallouli, Jordi Puiggali Allepuz, et al.. A framework for testing and monitoring security policies: application to an electronic voting system. The Computer Journal, 2018, 61 (8), pp.1109 - 1122. ⟨10.1093/comjnl/bxy018⟩. ⟨hal-02017364⟩
Accès au bibtex
BibTex

2017

ref_biblio
Alessandra Bagnato, Andrey Sadovykh, Sarah Dahab, Stephane Maag, Ana Rosa Cavalli, et al.. Modeling OMG SMM metrics using the Modelio modeling tool in the MEASURE project. Génie logiciel : le magazine de l'ingénierie du logiciel et des systèmes, 2017, 120, pp.46 - 52. ⟨hal-01534818⟩
Accès au bibtex
BibTex

2016

ref_biblio
Natalia Kushik, Khaled El-Fakhi, Nina Yevtushenko, Ana Rosa Cavalli. On adaptive experiments for nondeterministic finite state machines. International Journal on Software Tools for Technology Transfer, 2016, 18 (3), pp.251 - 264. ⟨10.1007/s10009-014-0357-7⟩. ⟨hal-01354241⟩
Accès au bibtex
BibTex
ref_biblio
Diego Arturo Rivera Villagra, Ana Rosa Cavalli. Analysis and influence of economical decisions on the quality of experience of OTT services. IEEE Latin America Transactions, 2016, 14 (6), pp.2773 - 2776. ⟨10.1109/TLA.2016.7555253⟩. ⟨hal-01433979⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, César Andrés, Ana Rosa Cavalli. Formal framework for defining trust in multi-organisation environment. International journal of autonomous and adaptive communications systems, 2016, 9 (1-2), pp.164 - 178. ⟨10.1504/IJAACS.2016.075389⟩. ⟨hal-01335534⟩
Accès au bibtex
BibTex

2014

ref_biblio
Mohamed Aouadi, Khalifa Toumi, Ana Rosa Cavalli. Testing security policies for distributed systems: vehicular networks as a case study. International Journal of Computer Science Issues, 2014, 11 (5), pp.68 - 77. ⟨hal-01331562⟩
Accès au bibtex
BibTex
ref_biblio
Olga Kondratyeva, Nina Yevtushenko, Ana Rosa Cavalli. ПАРАЛЛЕЛЬНАЯ КОМПОЗИЦИЯ КОНЕЧНЫХ АВТОМАТОВ С ТАЙМАУТАМИ. Journal of Control and Computer Science (Tomsk State University), 2014, 2 (27), pp.73 - 81. ⟨hal-01948353⟩
Accès au bibtex
BibTex
ref_biblio
Vinh Hoa La, Ana Rosa Cavalli. Security attacks and solutions in Vehicular Ad Hoc Networks : a survey. International journal on AdHoc networking systems (IJANS), 2014, 4 (2), pp.1 - 20. ⟨10.5121/ijans.2014.4201⟩. ⟨hal-01262473⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, Ana Rosa Cavalli, Cesar Andres Sanchez. Validation of a trust approach in multi-organization environments. International journal of secure software engineering, 2014, 5 (1), pp.1 - 18. ⟨10.4018/ijsse.2014010101⟩. ⟨hal-01262565⟩
Accès au bibtex
BibTex

2013

ref_biblio
Anderson Morais, Iksoon Hwang, Ana Rosa Cavalli, Eliane Martins. Generating attack scenarios for the system security validation. Networking science, 2013, 2 (3 & 4), pp.69-80. ⟨10.1007/s13119-012-0012-0⟩. ⟨hal-00848049⟩
Accès au bibtex
BibTex

2012

ref_biblio
Ik Soon Hwang, Nina Yevtushenko, Ana Rosa Cavalli. Tight bound on the length of distinguishing sequences for non-observable nondeterministic finite-state machines with a polynomial number of inputs and outputs. Information Processing Letters, 2012, 112 (7), pp.298-301. ⟨10.1016/j.ipl.2011.12.012⟩. ⟨hal-00711769⟩
Accès au bibtex
BibTex
ref_biblio
Hwang Iksoon, Mounir Lallali, Ana Rosa Cavalli, Dominique Verchere. Applying formal methods to PCEP: an industrial case study from modeling to test generation.. Journal of : Software Testing, Verification and Reliability, 2012, 22 (5), pp.343--361. ⟨10.1002/stvr.445⟩. ⟨hal-00706162⟩
Accès au bibtex
BibTex
ref_biblio
Natalia Kushik, Amel Mammar, Ana Rosa Cavalli, Nina Yevtushenko, Willy Ronald Jimenez Freitez, et al.. A SPIN-based approach for detecting vulnerabilities in C programs. Automatic control and computer sciences, 2012, 46 (7), pp.379-386. ⟨10.3103/S0146411612070115⟩. ⟨hal-00772243⟩
Accès au bibtex
BibTex
ref_biblio
Amel Mammar, Wissam Mallouli, Ana Rosa Cavalli. A systematic approach to integrate common timed security rules within a TEFSM-based system specification. Information and Software Technology, 2012, 54 (1), pp.87-98. ⟨10.1016/j.infsof.2011.07.004⟩. ⟨hal-00711778⟩
Accès au bibtex
BibTex
ref_biblio
Fatima Mattiello-Francisco, Eliane Martins, Ana Rosa Cavalli, Edgard Toshiro Yano. InRob : an approach for testing interoperability and robustness of real-time embedded software. Journal of Systems and Software, 2012, 85 (1), pp.3-15. ⟨10.1016/j.jss.2011.02.034⟩. ⟨hal-00711774⟩
Accès au bibtex
BibTex
ref_biblio
Nahid Shahmehri, Amel Mammar, Edgardo Montes de Oca, David Byers, Ana Rosa Cavalli, et al.. An advanced approach for modeling and detecting software vulnerabilities. Information and Software Technology, 2012, 54 (9), pp.997-1013. ⟨10.1016/j.infsof.2012.03.004⟩. ⟨hal-00739075⟩
Accès au bibtex
BibTex

2010

ref_biblio
Rita Dorofeeva, Khaled El-Fakhi, Stephane Maag, Ana Rosa Cavalli, Nina Yevtushenko. FSM-based conformance testing methods : a survey annotated with experimental evaluation. Information and Software Technology, 2010, 52 (12), pp.1286-1297. ⟨10.1016/j.infsof.2010.07.001⟩. ⟨hal-00593960⟩
Accès au bibtex
BibTex
ref_biblio
Iksoon Hwang, Ana Rosa Cavalli. Testing a probabilistic FSM using interval estimation. Computer Networks, 2010, 54 (7), pp.1108 - 1125 ⟨10.1016/j.comnet.2009.10.014⟩. ⟨hal-00472884⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli, Eliane Martins. Génération de scripts d'attaque pour la validation de la sécurité. Génie logiciel : le magazine de l'ingénierie du logiciel et des systèmes, 2010, 94, pp.39 - 44. ⟨hal-01465755⟩
Accès au bibtex
BibTex

2008

ref_biblio
Stephane Maag, Cyril Grepet, Ana Rosa Cavalli. A formal validation methodology for MANET routing protocols based on nodes' self similarity. Computer Communications, 2008, 31 (4), pp.827 - 841. ⟨10.1016/j.comcom.2007.10.031⟩. ⟨hal-01354849⟩
Accès au bibtex
BibTex

Communication dans un congrès

2022

ref_biblio
Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes De Oca, Ana R Cavalli. Digital twin for IoT environments: a testing and simulation tool. 15th International Conference Quality of Information and Communications Technology (QUATIC 2022), Sep 2022, Talavera de la Reina, Spain. pp.205-219, ⟨10.1007/978-3-031-14179-9_14⟩. ⟨hal-04008905⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04008905/file/QUATIC_2022.pdf BibTex

2020

ref_biblio
Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes De Oca. Metrics-driven DevSecOps. ICSOFT, Jul 2020, On line streaming, Australia. ⟨hal-03113928⟩
Accès au bibtex
BibTex

2019

ref_biblio
Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli, Brecht Vermeulen, et al.. Industrial IoT security monitoring and test on Fed4Fire+ platforms. ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.270-278, ⟨10.1007/978-3-030-31280-0_17⟩. ⟨hal-02526342⟩
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-02526342/file/482770_1_En_17_Chapter.pdf BibTex
ref_biblio
Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Reflective attenuation of cyber-physical attacks. CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, Sep 2019, Luxembourg, Luxembourg. pp.19-34, ⟨10.1007/978-3-030-42048-2_2⟩. ⟨hal-02434486⟩
Accès au bibtex
BibTex

2018

ref_biblio
Ana Rosa Cavalli, Antonio M. Ortiz, Georges Ouffoué, Cesar Andres Sanchez, Fatiha Zaidi. Design of a secure shield for internet and web-based services using software reflection. ICWS 2018: IEEE International Conference on Web Services, Jun 2018, Seattle, United States. pp.472 - 486, ⟨10.1007/978-3-319-94289-6_30⟩. ⟨hal-02017535⟩
Accès au bibtex
BibTex
ref_biblio
Sarah Dahab, Erika Fernanda Silva Balocchi, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli. Enhancing software development process quality based on metrics correlation and suggestion. ICSOFT 2018: 13th International Conference on Software Technologies, Jul 2018, Porto, Portugal. pp.120 - 131, ⟨10.5220/0006856501540165⟩. ⟨hal-01977133⟩
Accès au bibtex
BibTex
ref_biblio
Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro. A study on mitigation techniques for SCADA-driven cyber-physical systems. FPS 2018: 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. pp.257 - 264, ⟨10.1007/978-3-030-18419-3_17⟩. ⟨hal-02014254⟩
Accès au bibtex
BibTex

2017

ref_biblio
Pamela Carvallo, Ana Rosa Cavalli, Wissam Mallouli. A platform for security monitoring of multi-cloud applications. PSI 2017 : 11th International Adrei Ershov Informatics Conference, Jun 2017, Moscou, Russia. pp.59 - 71, ⟨10.1007/978-3-319-74313-4_5⟩. ⟨hal-01695148⟩
Accès au bibtex
BibTex
ref_biblio
Pamela Carvallo, Ana Rosa Cavalli, Natalia Kushik. A study of threat detection systems and techniques in the cloud. CRISIS 2017 : 12th International Conference on Risks and Security of Internet and Systems, Sep 2017, Dinard, France. pp.140 - 155, ⟨10.1007/978-3-319-76687-4_10⟩. ⟨hal-01745762⟩
Accès au bibtex
BibTex
ref_biblio
Pamela Carvallo, Ana Rosa Cavalli, Wissam Mallouli, Erkuden Rios. Multi-cloud applications security monitoring. GPC 2017 : 12th International Conference on Green, Pervasive, and Cloud Computing, May 2017, Cetara, Italy. pp.748 - 758, ⟨10.1007/978-3-319-57186-7_54⟩. ⟨hal-01583350⟩
Accès au bibtex
BibTex
ref_biblio
Pamela Carvallo, Ana Rosa Cavalli, Natalia Kushik. Automatic derivation and validation of a cloud dataset for insider threat detection. ICSOFT 2017 : 12th International Conference on Software Technologies, Jul 2017, Madrid, Spain. pp.480 - 487, ⟨10.5220/0006480904800487⟩. ⟨hal-01583232⟩
Accès au bibtex
BibTex
ref_biblio
Georges Ouffoué, Fatiha Zaidi, Ana Rosa Cavalli, Mounir Lallali. How web services can be tolerant to intruders through diversification. ICWS 2017 : 24th IEEE International Conference on Web Services, Jun 2017, Honolulu, United States. pp.436 - 443, ⟨10.1109/ICWS.2017.50⟩. ⟨hal-01592719⟩
Accès au bibtex
BibTex
ref_biblio
Georges Ouffoué, Fatiha Zaidi, Ana Rosa Cavalli, Mounir Lallali. Model-based attack tolerance. FINA 2017 : 13th International Symposium on Frontiers of Information Systems and Network Applications, Mar 2017, Taipei, Taiwan. pp.68 - 73, ⟨10.1109/WAINA.2017.88⟩. ⟨hal-01583439⟩
Accès au bibtex
BibTex
ref_biblio
Georges Ouffoué, Fatiha Zaidi, Ana Rosa Cavalli, Mounir Lallali. An attack-tolerant framework for web services. SCC 2017 : 14th International Conference on Services Computing, Jun 2017, Honolulu, United States. pp.503 - 506, ⟨10.1109/SCC.2017.75⟩. ⟨hal-01695155⟩
Accès au bibtex
BibTex
ref_biblio
Husnu Yenigun, Natalia Kushik, Jorge Lopez, Nina Yevtushenko, Ana Rosa Cavalli. Decreasing the complexity of deriving test suites against nondeterministic Finite State Machines. EWDTS 2017 : 15th IEEE East-West Design & Test Symposium, Sep 2017, Novi Sad, Serbia. pp.1 - 4, ⟨10.1109/EWDTS.2017.8110091⟩. ⟨hal-01669274⟩
Accès au bibtex
BibTex

2016

ref_biblio
Rui Abreu, César Andrés, Ana Rosa Cavalli. A framework to reduce the cost of monitoring and diagnosis using game theory. CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. pp.169 - 182, ⟨10.1007/978-3-319-54876-0_14⟩. ⟨hal-01487740⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Wissam Mallouli. Monitoring techniques in practice: experiences and lessons learned. SAM 2016: 9th System Analysis and Modelling Conference , Oct 2016, Saint Malo, France. ⟨hal-01586259⟩
Accès au bibtex
BibTex
ref_biblio
Raul Armando Fuentes Samaniego, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores. An analysis of secure M2M communication in WSNs using DTLS. STAM 2016 : 2nd IEEE International Workshop on Security Testing and Monitoring, Jun 2016, Nara, Japan. pp.78 - 83, ⟨10.1109/ICDCSW.2016.13⟩. ⟨hal-01416148⟩
Accès au bibtex
BibTex
ref_biblio
Natalia Kushik, Jorge Eleazar Lopez Coronado, Ana Rosa Cavalli, Nina Yevtushenko. Optimizing protocol passive testing through 'Gedanken' experiments with Finite State Machines. QRS 2016 : International Conference on Software Quality, Reliability and Security, Aug 2016, Vienna, Austria. pp.315 - 322, ⟨10.1109/QRS.2016.43⟩. ⟨hal-01432412⟩
Accès au bibtex
BibTex
ref_biblio
Vinh Hoa La, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli. A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks. APCC 2016 : 22nd Asia-Pacific Conference on Communications, Aug 2016, Yogyakarta, Indonesia. pp.230 - 237, ⟨10.1109/APCC.2016.7581493⟩. ⟨hal-01391251⟩
Accès au bibtex
BibTex
ref_biblio
Vinh Hoa La, Ana Rosa Cavalli. A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks. STAM 2016: 2nd IEEE International Workshop on Security Testing And Monitoring, Jun 2016, Nara, Japan. pp.49 - 54, ⟨10.1109/ICDCSW.2016.11⟩. ⟨hal-01415351⟩
Accès au bibtex
BibTex
ref_biblio
Vinh Hoa La, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli. Network monitoring using MMT: an application based on the user-agent field in HTTP headers. AINA 2016 : 30th International Conference on Advanced Information Networking and Applications, Mar 2016, Crans-Montana, Switzerland. pp.147 - 154, ⟨10.1109/AINA.2016.41⟩. ⟨hal-01335530⟩
Accès au bibtex
BibTex
ref_biblio
Jorge Eleazar Lopez Coronado, Natalia Kushik, Ana Rosa Cavalli, Nina Yevtushenko. Optimizing network utilization through source code state model representation. EWDTS 2016 : 14th East-West Design & Test Symposium, Oct 2016, Yerevan, Armenia. pp.1 - 4, ⟨10.1109/EWDTS.2016.7807732⟩. ⟨hal-01433929⟩
Accès au bibtex
BibTex
ref_biblio
Huu Nghia Nguyen, Fatiha Zaidi, Ana Rosa Cavalli. Effectively testing of timed composite systems using test case prioritization. SEKE 2016 : 28th International Conference on Software Engineering and Knowledge Engineering, Jul 2016, San Francisco, United States. pp.1 - 6, ⟨10.18293/SEKE2016-153⟩. ⟨hal-01358350⟩
Accès au bibtex
BibTex
ref_biblio
Diego Arturo Rivera Villagra, Ana Rosa Cavalli, Natalia Kushik, Wissam Mallouli. An implementation of a QoE evaluation technique including business model parameters. ICSOFT-PT 2016 : 11th International Conference on Software Paradigm Trends, Aug 2016, Lisbon, Portugal. pp.138 - 145, ⟨10.5220/0006005001380145⟩. ⟨hal-01369532⟩
Accès au bibtex
BibTex
ref_biblio
Diego Arturo Rivera Villagra, Ana Rosa Cavalli. QoE-driven service optimization aware of the business model. WAINA 2016 : 30th International Conference on Advanced Information Networking and Applications Workshops , Mar 2016, Crans-Montana, Switzerland. pp.725 - 730, ⟨10.1109/WAINA.2016.105⟩. ⟨hal-01335539⟩
Accès au bibtex
BibTex
ref_biblio
Jorge Visca, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli, Javier Ernesto Baliosian. Opportunistic media sharing for mobile networks. NOMS 2016 : IEEE/IFIP Network Operations and Management Symposium, Apr 2016, Istanbul, Turkey. pp.799 - 803, ⟨10.1109/NOMS.2016.7502902⟩. ⟨hal-01348024⟩
Accès au bibtex
BibTex
ref_biblio
Jorge Visca, Javier Ernesto Baliosian, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli. Path sampling : a robust alternative to gossiping for opportunistic network routing. WIMOB 2016 : 12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2016, New York, United States. pp.1 - 8, ⟨10.1109/WiMOB.2016.7763244⟩. ⟨hal-01433849⟩
Accès au bibtex
BibTex

2015

ref_biblio
Raul A. Fuentes-Samaniego, Ana Rosa Cavalli, Juan A. Nolazco-Flores, Javier Baliosian. A Survey on Wireless Sensors Networks Security Based on a Layered Approach. 13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.77-93, ⟨10.1007/978-3-319-22572-2_6⟩. ⟨hal-01728805⟩
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-01728805/file/346846_1_En_6_Chapter.pdf BibTex
ref_biblio
Vinh Hoa La, Ana Rosa Cavalli. A comparative evaluation of two intrusion-tolerant routing protocols for Wireless Sensor Networks. BWCCA 2015: 10th International Conference on Broadband and Wireless Computing, Communication and Applications, Nov 2015, Krakow, Poland. pp.6 - 12, ⟨10.1109/BWCCA.2015.104⟩. ⟨hal-01341539⟩
Accès au bibtex
BibTex

2014

ref_biblio
Mohamed Aouadi, Khalifa Toumi, Ana Rosa Cavalli. On modeling and testing security properties of vehicular networks. ICSTW 2014 : 7th International Conference on Software Testing, Verification and Validation Workshops, Mar 2014, Cleveland, United States. pp.42 - 50, ⟨10.1109/ICSTW.2014.56⟩. ⟨hal-01285747⟩
Accès au bibtex
BibTex
ref_biblio
Cesar Andres Sanchez, Ana Rosa Cavalli, Nina Yevtushenko, João Santos, Rui Abreu. On modeling and testing components of the European Train Control System. IPCT 2014 : International Conference on Advances in Information Processing And Communication Technology, Jun 2014, Rome, Italy. pp.31 - 35, ⟨10.15224/978-1-63248-021-7-72⟩. ⟨hal-01262564⟩
Accès au bibtex
BibTex

2013

ref_biblio
Felipe Barbosa Abreu, Anderson Morais, Ana Rosa Cavalli, Bachar Wehbi, Edgardo Montes de Oca. An effective attack detection approach in wireless mesh networks. NetMM '13 : International Workshop on Network Management and Monitoring, Mar 2013, Barcelona, Spain. pp.1450 -1455, ⟨10.1109/WAINA.2013.1⟩. ⟨hal-00842731⟩
Accès au bibtex
BibTex
ref_biblio
Olga Kondratyeva, Ana Rosa Cavalli, Natalia Kushik, Nina Yevtushenko. Evaluating quality of web services: a short survey. ICWS 2013 : 20th International Conference on Web Services, Jun 2013, Santa Clara, United States. pp.587 - 594, ⟨10.1109/ICWS.2013.83⟩. ⟨hal-01274984⟩
Accès au bibtex
BibTex
ref_biblio
Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. Monitoring based on IOSTS for testing functional and security properties: application to an automotive case study. COMPSAC 2013 : 37th Annual International Computer Software & Applications Conference, Jul 2013, Kyoto, Japan. pp.1 - 10, ⟨10.1109/COMPSAC.2013.5⟩. ⟨hal-01275006⟩
Accès au bibtex
BibTex
ref_biblio
Jeevan Pokhrel, Bachar Wehbi, Morais Anderson, Ana Rosa Cavalli, Eric Allilaire. Estimation of QoE of video traffic using a fuzzy expert system. CCNC '13 : The 10th Annual IEEE Consumer Communications and Networking Conference, Jan 2013, Las Vegas, United States. pp.224-229, ⟨10.1109/CCNC.2013.6488450⟩. ⟨hal-00816061⟩
Accès au bibtex
BibTex

2012

ref_biblio
César Andrés, Ana Rosa Cavalli. How to reduce the cost of passive testing. HASE '12 : 14th IEEE International High-Assurance Systems Engineering symposium, Oct 2012, Omaha, United States. pp.209-216, ⟨10.1109/HASE.2012.36⟩. ⟨hal-00771884⟩
Accès au bibtex
BibTex
ref_biblio
Mazen El Maarabani, Cesar Andres, Ana Rosa Cavalli. Testing interoperability security policies. SEKE '12 : The 24th International Conference on Software Engineering and Knowledge Engineering, Jul 2012, San Francisco, United States. pp.464-469. ⟨hal-00744694⟩
Accès au bibtex
BibTex
ref_biblio
Felipe Lalanne Rojas, Ana Rosa Cavalli, Stephane Maag. Quality of experience as a selection criterion for web services. SITIS '12 : The 8th International Conference on Signal-Image Technology & Internet Systems, Nov 2012, Sorrento, Italy. pp.519-526, ⟨10.1109/SITIS.2012.81⟩. ⟨hal-00772763⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Mounir Lallali, Gerardo Morales, Ana Rosa Cavalli. Modeling and testing secure web-based systems : application to an industrial case study. SITIS '08 : The Fourth International Conference on Signal-Image Technology & Internet-Based Systems, Nov 2012, Bali, Indonesia. pp.128-136, ⟨10.1109/SITIS.2008.58⟩. ⟨hal-00796034⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli. A distributed intrusion detection scheme for wireless ad hoc networks. SAC '12 : The 27th Annual ACM Symposium on Applied Computing, Mar 2012, Trento, Italy. pp.556-562, ⟨10.1145/2245276.2245382⟩. ⟨hal-00738916⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli. A event-based packet dropping detection scheme for wireless mesh networks. CSS '12 : The 4th International Symposium on Cyberspace Safety and Security, Dec 2012, Melbourne, Australia. pp.309-323, ⟨10.1007/978-3-642-35362-8_24⟩. ⟨hal-00816664⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli, Hai Anh Tran, Abdelhamid Mellouk, Brice Augustin, et al.. Managing customer experience through service quality monitoring. Conference Future Network & Mobile Summit 2012, Jul 2012, Berlín, Germany. pp.1-9. ⟨hal-00771815⟩
Accès au bibtex
BibTex
ref_biblio
Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. Improving protocol validation by an IOSTS-based passive testing approach. STV '12 : System Testing and Validation Workshop, Oct 2012, Paris, France. pp.87-95. ⟨hal-00738521⟩
Accès au bibtex
BibTex
ref_biblio
Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. An IOSTS based passive testing approach for the validation of data-centric protocols. QSIC '12 : 12th International Conference of Quality Software, Aug 2012, Xi'An, China. pp.49-58, ⟨10.1109/QSIC.2012.33⟩. ⟨hal-00747198⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, César Andrés, Ana Rosa Cavalli. Trust-OrBAC : a trust access control model in multi-organization environments. ICISS '12 : 8th International Conference on Information Systems Security, Dec 2012, Guwahati, India. pp.89-103, ⟨10.1007/978-3-642-35130-3_7⟩. ⟨hal-00767797⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, Ana Rosa Cavalli, Mazen El Maarabani. Role based interoperability security policies in collaborative systems. SECOTS '12 : International Symposium on Security in Collaboration Technologies and Systems, May 2012, Denver, United States. pp.471-477, ⟨10.1109/CTS.2012.6261092⟩. ⟨hal-00738970⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, César Andrés, Ana Rosa Cavalli. Setting trust evaluations with fuzzy logic in MOE. STV '12: System Testing and Validation Workshop, Oct 2012, Paris, France. pp.49-58. ⟨hal-00767987⟩
Accès au bibtex
BibTex
ref_biblio
Khalifa Toumi, César Andrés, Ana Rosa Cavalli, Mazen El Maarabani. A vector based model approach for defining trust in multi-organization environments. CRiSIS '12 : 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8, ⟨10.1109/CRISIS.2012.6378939⟩. ⟨hal-00768221⟩
Accès au bibtex
BibTex

2011

ref_biblio
Mazen El Maarabani, Ana Rosa Cavalli, Iksoon Hwang, Fatiha Zaïdi. Verification of interoperability security policies by model checking. HASE '11 : The 13th IEEE International High Assurance Systems Engineering Symposium, Nov 2011, Boca Raton, United States. pp.376 -381, ⟨10.1109/HASE.2011.17⟩. ⟨hal-00738626⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, et al.. Using requirements engineering in an automatic security policy derivation process. DPM - SETOP 2011 : 6th International Workshop on Data Privacy Management and 4th International Workshop on Autonomous and Spontaneous Security, Sep 2011, Leuven, Belgium. pp.155-172, ⟨10.1007/978-3-642-28879-1_11⟩. ⟨hal-00738844⟩
Accès au bibtex
BibTex
ref_biblio
Natalia Kushik, Amel Mammar, Ana Rosa Cavalli, Nina Yevtushenko, Edgardo Montes de Oca. A SPIN-based approach for detecting vulnerabilities in C programs. PSSV 2011 : 2nd Workshop on Program Semantics, Specification and Verification : Theory and Applications, Jun 2011, St Petersburg, Russia. pp.131 - 143. ⟨hal-01465027⟩
Accès au bibtex
BibTex
ref_biblio
Amel Mammar, Ana Rosa Cavalli, Willy Ronald Jimenez Freitez, Wissam Mallouli, Edgardo Montes de Oca. Using testing techniques for vulnerability detection in C programs. 23th International Conference on Testing Software and Systems (ICTSS), Nov 2011, Paris, France. pp.80-96, ⟨10.1007/978-3-642-24580-0_7⟩. ⟨hal-01303013⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01303013/file/978-3-642-24580-0_7_Chapter.pdf BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli. Route manipulation attack in wireless mesh networks. AINA 2011 : 25th International Conference on Advanced Information Networking and Applications, Mar 2011, Biopolis, Singapore. pp.501 - 508, ⟨10.1109/AINA.2011.11⟩. ⟨hal-01465746⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli. A quality of experience based approach for wireless mesh networks. 9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova I La Geltrú, Spain. pp.162-173, ⟨10.1007/978-3-642-21560-5_14⟩. ⟨hal-01301638⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01301638/file/978-3-642-21560-5_14_Chapter.pdf BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli. Detection of attacks in wireless mesh networks. LADC 2011 : 5th Latin-American Symposium on Dependable Computing, Apr 2011, Sao Jose Dos Campos, Brazil. pp.45 - 54, ⟨10.1109/LADC.2011.13⟩. ⟨hal-01301634⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli, Eliane Martins. A model-based attack injection approach for security validation. SIN '11 : 4th international conference on Security of information and networks, Nov 2011, Sydney, Australia. pp.103-110, ⟨10.1145/2070425.2070443⟩. ⟨hal-00711762⟩
Accès au bibtex
BibTex
ref_biblio
Marcelo Odin, Jose Pablo Escobedo, Ana Rosa Cavalli, Stephane Maag, Ariel Sabiguero. Cost effective cross-layer protocol testing : a case study. CASE 2011 : Congreso Argentino de Sistemas Embebidos, Mar 2011, Buenos Aires, Argentina. pp.103 - 108. ⟨hal-01303607⟩
Accès au bibtex
BibTex
ref_biblio
Maxim Zhigulin, Stephane Maag, Ana Rosa Cavalli, Nina Yevtushenko. FSM-based test derivation strategies for systems with time-outs. QSIC 2011 : 11th International Conference On Quality Software, Jul 2011, Madrid, Spain. pp.141 - 149, ⟨10.1109/QSIC.2011.30⟩. ⟨hal-01303601⟩
Accès au bibtex
BibTex

2010

ref_biblio
Fayçal Bessayah, Ana Rosa Cavalli. A formal passive testing approach for checking real time constraints. QUATIC 2010 : 7th International Conference on the Quality of Information and Communications Technology, Sep 2010, Porto, Portugal. pp.274 - 279, ⟨10.1109/QUATIC.2010.55⟩. ⟨hal-01306297⟩
Accès au bibtex
BibTex
ref_biblio
Fayçal Bessayah, Ana Rosa Cavalli, William Maja, Eliane Martins, Andre Willik Valenti. A fault injection tool for testing web services composition. TAIC PART 2010 : Testing: Academic & Industrial Conference Practice and Research Techniques, Sep 2010, Windsor, United Kingdom. pp.137 - 146, ⟨10.1007/978-3-642-15585-7_13⟩. ⟨hal-01306763⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Tien-Dung Cao, Wissam Mallouli, Eliane Martins, Andrey Sadovykh, et al.. Webmov : a dedicated framework for the modelling and testing of web services composition. ICWS 2010 : 8th International Conference on Web Services, Jul 2010, Miami, United States. pp.377 - 384, ⟨10.1109/ICWS.2010.24⟩. ⟨hal-01306746⟩
Accès au bibtex
BibTex
ref_biblio
Mazen El Maarabani, Iksoon Hwang, Ana Rosa Cavalli. A formal approach for interoperability testing of security rules. SITIS 2010 : 6th International Conference on Signal-Image Technology & Internet-Based Systems, Dec 2010, Kuala Lumpur, Malaysia. pp.277 - 284, ⟨10.1109/SITIS.2010.53⟩. ⟨hal-01305099⟩
Accès au bibtex
BibTex
ref_biblio
Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana Rosa Cavalli. Testing web service orchestrators in context : a symbolic approach. SEFM 2010 : 8th IEEE International Conference on Software Engineering and Formal Methods, Sep 2010, Pisa, Italy. pp.257 - 267, ⟨10.1109/SEFM.2010.30⟩. ⟨hal-01306744⟩
Accès au bibtex
BibTex
ref_biblio
Anderson Morais, Ana Rosa Cavalli, Eliane Martins. Attack scripts generation for security validation. SEC-SY '10 : Sécurité des Systèmes d'Information et les Environnements Collaboratifs, May 2010, Marseille, France. ⟨hal-00727714⟩
Accès au bibtex
BibTex
ref_biblio
Gerardo Morales, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca, et al.. Timed extended invariants for the passive testing of Web services. ICWS 2010 : 8th International Conference on Web Services, Jul 2010, Miami, United States. pp.592 - 599, ⟨10.1109/ICWS.2010.17⟩. ⟨hal-01309503⟩
Accès au bibtex
BibTex
ref_biblio
Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. Transmit and reserve (tar) : a coordinated channel access for IEEE 802.11 networks. WCNC 2010 : IEEE Wireless Communications and Networking Conference, Apr 2010, Sidney, Australia. pp.1 - 6, ⟨10.1109/WCNC.2010.5506240⟩. ⟨hal-01306741⟩
Accès au bibtex
BibTex

2009

ref_biblio
Morais Anderson, Ana Rosa Cavalli, Eliane Martins, Willy Ronald Jimenez Freitez. Security protocol testing using attack trees. CSE '09 : 12th IEEE International Conference on Computational Science and Engineering, Aug 2009, Vancouver, Canada. pp.690-697, ⟨10.1109/CSE.2009.206⟩. ⟨hal-00446770⟩
Accès au bibtex
BibTex
ref_biblio
César Andrés, Stephane Maag, Ana Rosa Cavalli, Mercedes Merayo, Manuel Nunez. Analysis of the OLSR protocol by using formal passive testing. APSEC 2009 : 16th Asia-Pacific Software Engineering Conference, Dec 2009, Penang, Malaysia. pp.152 - 159, ⟨10.1109/APSEC.2009.37⟩. ⟨hal-01366249⟩
Accès au bibtex
BibTex
ref_biblio
Fayçal Bessayah, Ana Rosa Cavalli, Eliane Martins. A formal approach for specification and verification of fault injection process. ICIS '09 : International Conference on Interaction Sciences, Dec 2009, Phoenix, United States. pp.883-890, ⟨10.1145/1655925.1656086⟩. ⟨hal-00771611⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Azzedine Benameur, Wissam Mallouli, Keqin Li. A passive testing approach for security checking and its practical usage for web services monitoring. NOTERE 2009 : 9e Conférence Internationale sur Les NOuvelles TEchnologies de la REpartition, Jun 2009, Montréal, Canada. ⟨hal-01360187⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01360187/file/notere09.pdf BibTex
ref_biblio
Ana Rosa Cavalli, Stephane Maag, Edgardo Montes de Oca, Fatiha Zaidi. A formal passive testing approach to test a MANET routing protocol. PWN 2009 : 5th IEEE PerCom Workshop on Pervasive Wireless Networking , Mar 2009, Galveston, United States. pp.1 - 6, ⟨10.1109/PERCOM.2009.4912874⟩. ⟨hal-01369686⟩
Accès au bibtex
BibTex
ref_biblio
Ana Rosa Cavalli, Stephane Maag, Edgardo Montes de Oca. A passive conformance testing approach for a MANET routing protocol. SAC '09 : 24th Annual ACM Symposium on Applied Computing, Mar 2009, Hawai, United States. pp.207-211, ⟨10.1145/1529282.1529326⟩. ⟨hal-00771619⟩
Accès au bibtex
BibTex
ref_biblio
Mazen El Maarabani, Asma Adala, Iksoon Hwang, Ana Rosa Cavalli. Interoperability testing of presence service on IMS platform. TridentCom 2009 : 5th International Conference onTestbeds and Research Infrastructures for the Development of Networks & Communities and Workshops, Apr 2009, Washington, United States. ⟨10.1109/TRIDENTCOM.2009.4976260⟩. ⟨hal-00442192⟩
Accès au bibtex
BibTex
ref_biblio
Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana Rosa Cavalli. Observability and controllability issues in conformance testing of Web service compositions. TESTCOM/FATES 2009 : 21st IFIP International Conference on Testing of Communicating Systems and 9th International Workshop on Formal Approaches to Testing of Software, Nov 2009, Eindhoven, Netherlands. pp.217 - 222, ⟨10.1007/978-3-642-05031-2_15⟩. ⟨hal-01360755⟩
Accès au bibtex
BibTex
ref_biblio
Iksoon Hwang, Mounir Lallali, Ana Rosa Cavalli, Dominique Verchère. Modeling, validation, and verification of PCEP using the IF language. FMOODS/FORTE 2009 : 11th Formal Methods for Open Object-Based Distributed Systems and 29th Formal Techniques for Networked and Distributed Systems, Jun 2009, Lisboa, Portugal. pp.122 - 136, ⟨10.1007/978-3-642-02138-1_8⟩. ⟨hal-00446605⟩
Accès au bibtex
BibTex
ref_biblio
Willy Ronald Jimenez Freitez, Amel Mammar, Ana Rosa Cavalli. Software vulnerabilities, prevention and detection methods : a review. SEC-MDA 2009 : Security in Model Driven Architecture , Jun 2009, Enschede, Netherlands. pp.1 - 11. ⟨hal-01367445⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01367445/file/GET_sec-mda09.pdf BibTex
ref_biblio
Felipe Lalanne Rojas, Stephane Maag, Edgardo Montes de Oca, Ana Rosa Cavalli, Wissam Mallouli, et al.. An automated passive testing approach for the IMS PoC service. ASE 2009 : 24th IEEE/ACM International Conference on Automated Software Engineering, Nov 2009, Auckland, New Zealand. pp.535 - 539, ⟨10.1109/ASE.2009.33⟩. ⟨hal-01316417⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Amel Mammar, Ana Rosa Cavalli. A formal framework to integrate timed security rules within a TEFSM-based system specification. APSEC 2009 : 16th AsiaPacific Software Engineering Conference, Dec 2009, Batu Ferringhi, Malaysia. pp.489 - 496, ⟨10.1109/APSEC.2009.52⟩. ⟨hal-00444089⟩
Accès au texte intégral et bibtex
https://hal.science/hal-00444089/file/mallouli2009.pdf BibTex
ref_biblio
Amel Mammar, Ana Rosa Cavalli, Edgardo Montes de Oca, Shanai Ardi, David Byers, et al.. Modélisation et détection formelles de vulnérabilités logicielles par le test passif. SAR-SSI 2009 : 4eme Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information , Jun 2009, Luchon, France. ⟨hal-00444066⟩
Accès au bibtex
BibTex
ref_biblio
Eliane Martins, Ana Rosa Cavalli, Jean Arlat, Regina Moraes, Taisy Weber. RobustWeb : development and validation of SOA applications based on Web services. Colloquium of Computation : Brazil / INRIA, Cooperations, Advances and Challenges, Jul 2009, Rio Grande Do Sul, Brazil. ⟨hal-00448589⟩
Accès au bibtex
BibTex
ref_biblio
Fatima Mattiello-Francisco, Eliane Martins, André Corsetti, Ana Rosa Cavalli, Edgard Yano. Extended interoperability models for timed system robustness testing. LATINCOM '09 : IEEE Latin-American Conference on Communications, Sep 2009, Medelin, Colombia. pp.1-6, ⟨10.1109/LATINCOM.2009.5304903⟩. ⟨hal-00448581⟩
Accès au bibtex
BibTex
ref_biblio
Mercedes Merayo, Iksoon Hwang, Manuel Nunez, Ana Rosa Cavalli. A statistical approach to test stochastic and probabilistic systems. ICFEM 2009 : 11th International Conference on Formal Engineering Methods, Dec 2009, Rio De Janeiro, Brazil. pp.186 - 205, ⟨10.1007/978-3-642-10373-5_10⟩. ⟨hal-01360751⟩
Accès au bibtex
BibTex
ref_biblio
Fatiha Zaidi, Emmanuel Bayse, Ana Rosa Cavalli. Network protocol interoperability testing based on contextual signatures and passive testing. SAC 2009 : 24th Annual ACM Symposium on Applied Computing, Mar 2009, Honolulu (Hawaii), United States. pp.2 - 7, ⟨10.1145/1529282.1529284⟩. ⟨hal-01316444⟩
Accès au bibtex
BibTex

2008

ref_biblio
Ana Rosa Cavalli, Eliane Martins, Anderson Morais. Use of invariant properties to evaluate the results of fault-injection-based robustness testing of protocol implementations. ICSTW 2008 : 1st International Conference on Software Testing Verification and Validation Workshop, Apr 2008, Lillehammer, Norway. pp.21 - 30, ⟨10.1109/ICSTW.2008.51⟩. ⟨hal-01326406⟩
Accès au bibtex
BibTex
ref_biblio
Céline Coma, Nora Cuppens-Bouhlahia, Frédéric Cuppens, Ana Rosa Cavalli. Context ontology for secure interoperability. FARES 2008 : International Workshop on Frontiers in Availability, Reliability and Security, Mar 2008, Barcelona, Spain. pp.821-827, ⟨10.1109/ARES.2008.133⟩. ⟨hal-00796516⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Fayçal Bessayah, Ana Rosa Cavalli, Azzedine Benameur. Security rules specification and analysis based on passive testing. GLOBECOM 2008 : IEEE Global Telecommunications Conference, Nov 2008, New Orleans, United States. pp.1 - 6, ⟨10.1109/GLOCOM.2008.ECP.400⟩. ⟨hal-01378696⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Bachar Wehbi, Ana Rosa Cavalli. Distributed monitoring in Ad Hoc networks : conformance and security checking. AdHoc-NOW 2008 : 7th International Conference on Ad Hoc Networks and Wireless, Sep 2008, Sophia-Antipolis, France. pp.345 - 356, ⟨10.1007/978-3-540-85209-4_27⟩. ⟨hal-01327393⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Gerardo Morales, Ana Rosa Cavalli. Testing security policies for web applications. ICSTW '08 : IEEE International Conference on Software Testing Verification and Validation Workshop, Apr 2008, Lillehammer, Norway. pp.269-270, ⟨10.1109/ICSTW.2008.45⟩. ⟨hal-00796098⟩
Accès au bibtex
BibTex
ref_biblio
Wissam Mallouli, Amel Mammar, Ana Rosa Cavalli. Modeling system security rules with time constraints using timed extended finite state machines. DS-RT 2008 : 12th IEEE/ACM International Symposium on Distributed Simulation an Real Time Applications, Oct 2008, Vancouver, Canada. pp.173 - 180, ⟨10.1109/DS-RT.2008.22⟩. ⟨hal-01380237⟩
Accès au bibtex
BibTex
ref_biblio
Eliane Martins, Anderson Morais, Ana Rosa Cavalli. Generating attack scenarios for the validation of security protocol implementations. SAST '08 : 2nd Brazilian Workshop on Systematic and Automated Software Testing, Oct 2008, Campinas, Brazil. pp.21-33. ⟨hal-00796077⟩
Accès au bibtex
BibTex
ref_biblio
Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. A reactive wireless mesh network architecture. Med-Hoc-Net 2008 : Seventh Annual Mediterranean Ad Hoc Networking Workshop : Advances in Ad Hoc Networking, Jun 2008, Palma De Mallorca, Spain. pp.203 - 214, ⟨10.1007/978-0-387-09490-8_18⟩. ⟨hal-01373149⟩
Accès au bibtex
BibTex
ref_biblio
Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. ReDEx : Receiver Diversity Exploitation mechanism for 802.11 wireless networks. ICLAN 2008 : International Conference on the Latest Advances in Networks, Dec 2008, Toulouse, France. pp.1 - 6. ⟨hal-01394732⟩
Accès au bibtex
BibTex
ref_biblio
Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. Efficient time synchronization mechanism for wireless multi hop networks. PIMRC 2008 : IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2008, Cannes, France. pp.1 - 6, ⟨10.1109/PIMRC.2008.4699638⟩. ⟨hal-01379599⟩
Accès au bibtex
BibTex

2007

ref_biblio
Ana Rosa Cavalli, Stephane Maag, Gerardo Morales. Regression and performance testing of an e-learning Web application : dotLRN. SITIS 2007 : 3rd International Conference on Signal Image Technology and Internet-Based Systems, Dec 2007, Shangai, China. pp.369 - 376, ⟨10.1109/SITIS.2007.129⟩. ⟨hal-01328016⟩
Accès au bibtex
BibTex

Chapitre d'ouvrage

2011

ref_biblio
Wissam Mallouli, Bachar Wehbi, Ana Rosa Cavalli, Stephane Maag. Formal supervision of mobile ad hoc networks for security flaws detection. Security engineering techniques and solutions for information systems : management and implementation, IGI Global, 2011, 978-1-615-20803-6. ⟨10.4018/978-1-61520-803-6⟩. ⟨hal-00690721⟩
Accès au bibtex
BibTex

2010

ref_biblio
Wissam Mallouli, Mounir Lallali, Amel Mammar, Gerardo Morales, Ana Rosa Cavalli. Modeling and testing secure web applications. Web-based information technologies and distributed systems, Atlantis Press, pp.207-255, 2010, Atlantis Ambient and Pervasive Intelligence, ⟨10.1007/978-94-91216-32-9_10⟩. ⟨hal-00673835⟩
Accès au bibtex
BibTex

2009

ref_biblio
Jean-Marie Orset, Ana Rosa Cavalli. Security in ad hoc networks. Wireless and mobile network security : security basics, security in on-the-shelf and emerging technologies, iSTE-WILEY, pp.475-524, 2009, 978-1-84821-117-9. ⟨hal-00801279⟩
Accès au bibtex
BibTex

Ouvrages

2017

ref_biblio
Nina Yevtushenko, Ana Rosa Cavalli, Husnu Yenigun. Testing Software and Systems: 29th IFIP WG 6.1 International Conference, ICTSS 2017, St. Petersburg, Russia, October 9-11, 2017, Proceedings. Springer International Publishing, LNCS-10533, 2017, Lecture Notes in Computer Science, 978-3-319-67548-0. ⟨10.1007/978-3-319-67549-7⟩. ⟨hal-01678967⟩
Accès au bibtex
BibTex