{"id":3509,"date":"2022-04-13T16:49:30","date_gmt":"2022-04-13T14:49:30","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/acmes-2\/ana-rosa-cavalli-2\/"},"modified":"2022-04-13T16:49:56","modified_gmt":"2022-04-13T14:49:56","slug":"ana-rosa-cavalli-2","status":"publish","type":"page","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/acmes-2\/ana-rosa-cavalli-2\/","title":{"rendered":"Ana Rosa CAVALLI"},"content":{"rendered":"<p><div class=\"bandeau-personnel MonLaboUser\"><img decoding=\"async\" src=\"https:\/\/samovar.telecom-sudparis.eu\/wp-content\/uploads\/2022\/07\/Ana-CAVALLI.jpg\" class=\"wp-image-6 alignleft img-arrondi wp-post-image\" height=\"150\" width=\"150\" alt=\" \" \/><div class=\"adresse\"><p>SAMOVAR - SAMOVAR<br \/>Telecom SudParis<br \/>\r\n9 rue Charles Fourier<br \/>\r\n91011 EVRY CEDEX<\/p><p>Fax : +33 (0) 1 60 76 20 80<\/p><\/div><div class=\"monlaboBlocTexte\"><h1>Pr. Ana Rosa <span class=\"MonLabo-lastname\">CAVALLI<\/span><\/h1><div class=\"coordonnees\"><em>Professeur \u00c9m\u00e9rite<\/em><br \/><span class=\"team-description\"><a href=\"https:\/\/samovar.telecom-sudparis.eu\/?page_id=2438\" class=\"MonLaboLink\"><span class=\"MonLabo_team_name\">ACMES<\/span><\/a><\/span><\/div><div class=\"coordonnees\"><span class=\"MonLabo-email\">ana.cavalli[&#64;<span>-Code to remove to avoid SPAM-<\/span>]telecom-sudparis.eu<\/span><\/div><div class=\"external_url\"><h1 style=\"text-align: center;\"><a href=\"http:\/\/www-lor.int-evry.fr\/~anna\/research.html\"><button class=\"btn btn-oldstyle\" type=\"button\">Site personnel<\/button><\/a><\/h1><\/div><\/div><\/div>\n<div id=\"res_script\">\n<p class='Rubrique'>Article dans une revue<\/p>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia\u2010alfaro. A survey on cyber-resilience approaches for cyber-physical systems. <i>ACM Computing Surveys<\/i>, 2024, 56 (8), pp.1-37. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3652953\">&#x27E8;10.1145\/3652953&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04562096v1\">&#x27E8;hal-04562096&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04562096\/file\/COSUR.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04562096\/file\/COSUR.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04562096\/file\/COSUR.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04562096v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Zujany Salazar, Fatiha Za\u00efdi, Huu-Nghia Nguyen, Wissam Mallouli, Ana R Cavalli, et al.. A network traffic mutation based ontology, and Its application to 5G networks. <i>IEEE Access<\/i>, 2023, 11, pp.43925-43944. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2023.3268759\">&#x27E8;10.1109\/ACCESS.2023.3268759&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04476884v1\">&#x27E8;hal-04476884&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04476884v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">George Amponis, Panagiotis Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana Cavalli, et al.. Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. <i>EURASIP Journal on Wireless Communications and Networking<\/i>, 2022, 2022 (1), pp.124. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1186\/s13638-022-02204-5\">&#x27E8;10.1186\/s13638-022-02204-5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04008882v1\">&#x27E8;hal-04008882&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04008882\/file\/s13638-022-02204-5.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04008882\/file\/s13638-022-02204-5.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04008882\/file\/s13638-022-02204-5.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04008882v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">George Amponis, Panagiotis Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana Cavalli, et al.. Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. <i>EURASIP Journal on Wireless Communications and Networking<\/i>, 2022, 2022, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1186\/s13638-022-02204-5\">&#x27E8;10.1186\/s13638-022-02204-5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04007779v1\">&#x27E8;hal-04007779&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04007779\/file\/Eurasip_journal%20%282%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04007779\/file\/Eurasip_journal%20%282%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04007779\/file\/Eurasip_journal%20%282%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04007779v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">George Amponis, Panagiotis Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana R Cavalli, et al.. Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. <i>EURASIP Journal on Wireless Communications and Networking<\/i>, 2022, 1, pp.124. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1186\/s13638-022-02204-5\">&#x27E8;10.1186\/s13638-022-02204-5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04476890v1\">&#x27E8;hal-04476890&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04476890v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Georges Ouffou\u00e9, Fatiha Za\u00efdi, Ana R Cavalli, Huu Nghia Nguyen. A Framework for the Attack Tolerance of Cloud Applications Based on Web Services. <i>Electronics<\/i>, 2020, 10 (1), pp.6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/electronics10010006\">&#x27E8;10.3390\/electronics10010006&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03113828v1\">&#x27E8;hal-03113828&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03113828\/file\/Version_final_paper_Electronics_journal.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03113828\/file\/Version_final_paper_Electronics_journal.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03113828\/file\/Version_final_paper_Electronics_journal.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03113828v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquin Garcia\u2010alfaro. Switched-based resilient control of cyber-physical systems. <i>IEEE Access<\/i>, 2020, 8 (3), pp.212194 - 212208. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2020.3039879\">&#x27E8;10.1109\/ACCESS.2020.3039879&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03113904v1\">&#x27E8;hal-03113904&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03113904\/file\/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03113904\/file\/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03113904\/file\/Switched-Based_Resilient_Control_of_Cyber-Physical_Systems.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03113904v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Raul Armando Fuentes Samaniego, Vinh Hoa La, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Ra\u00fal Valente Ramirez Velarde. A monitoring-based approach for WSN security using IEEE-802.15.4\/6LowPAN and DTLS communication. <i>International journal of autonomous and adaptive communications systems<\/i>, 2019, 12 (3), pp.218-243. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1504\/IJAACS.2019.10022471\">&#x27E8;10.1504\/IJAACS.2019.10022471&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02184618v1\">&#x27E8;hal-02184618&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02184618\/file\/A-monitoring_AuthorFinalVersion.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02184618\/file\/A-monitoring_AuthorFinalVersion.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02184618\/file\/A-monitoring_AuthorFinalVersion.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02184618v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Husnu Yenigun, Nina Yevtushenko, Ana Rosa Cavalli. Guest editorial: special issue on testing software and systems. <i>Software Quality Journal<\/i>, 2019, 27 (2), pp.497-499. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11219-019-09447-4\">&#x27E8;10.1007\/s11219-019-09447-4&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02481420v1\">&#x27E8;hal-02481420&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02481420v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khalifa Toumi, Mohamed Aouadi, Ana Rosa Cavalli, Wissam Mallouli, Jordi Puiggali Allepuz, et al.. A framework for testing and monitoring security policies: application to an electronic voting system. <i>The Computer Journal<\/i>, 2018, 61 (8), pp.1109 - 1122. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1093\/comjnl\/bxy018\">&#x27E8;10.1093\/comjnl\/bxy018&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02017364v1\">&#x27E8;hal-02017364&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02017364v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alessandra Bagnato, Andrey Sadovykh, Sarah Dahab, Stephane Maag, Ana Rosa Cavalli, et al.. Modeling OMG SMM metrics using the Modelio modeling tool in the MEASURE project. <i>G\u00e9nie logiciel : le magazine de l'ing\u00e9nierie du logiciel et des syst\u00e8mes<\/i>, 2017, 120, pp.46 - 52. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01534818v1\">&#x27E8;hal-01534818&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01534818v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Natalia Kushik, Khaled El-Fakhi, Nina Yevtushenko, Ana Rosa Cavalli. On adaptive experiments for nondeterministic finite state machines. <i>International Journal on Software Tools for Technology Transfer<\/i>, 2016, 18 (3), pp.251 - 264. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10009-014-0357-7\">&#x27E8;10.1007\/s10009-014-0357-7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01354241v1\">&#x27E8;hal-01354241&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01354241v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Diego Arturo Rivera Villagra, Ana Rosa Cavalli. Analysis and influence of economical decisions on the quality of experience of OTT services. <i>IEEE Latin America Transactions<\/i>, 2016, 14 (6), pp.2773 - 2776. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TLA.2016.7555253\">&#x27E8;10.1109\/TLA.2016.7555253&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01433979v1\">&#x27E8;hal-01433979&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01433979v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khalifa Toumi, C\u00e9sar Andr\u00e9s, Ana Rosa Cavalli. Formal framework for defining trust in multi-organisation environment. <i>International journal of autonomous and adaptive communications systems<\/i>, 2016, 9 (1-2), pp.164 - 178. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1504\/IJAACS.2016.075389\">&#x27E8;10.1504\/IJAACS.2016.075389&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01335534v1\">&#x27E8;hal-01335534&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01335534v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Felipe Barbosa Abreu, Anderson Morais, Ana Rosa Cavalli, Bachar Wehbi, Edgardo Montes de Oca, et al.. An effective attack detection approach in wireless mesh networks. <i>International Journal of Space-Based and Situated Computing<\/i>, 2015, 5 (2), pp.89 - 99. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1504\/IJSSC.2015.069204\">&#x27E8;10.1504\/IJSSC.2015.069204&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262770v1\">&#x27E8;hal-01262770&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262770v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Teruo Higashino, Manuel Nunez. A survey on formal active and passive testing with applications to the cloud. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2015, 70 (3), pp.85 - 93. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12243-015-0457-8\">&#x27E8;10.1007\/s12243-015-0457-8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262762v1\">&#x27E8;hal-01262762&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262762v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Teruo Higashino, Manuel Nunez. Special issue on formal active and passive testing of distributed and networked systems. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2015, 70 (3), pp.83 - 84. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12243-015-0459-6\">&#x27E8;10.1007\/s12243-015-0459-6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262755v1\">&#x27E8;hal-01262755&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262755v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mohamed Aouadi, Khalifa Toumi, Ana Rosa Cavalli. Testing security policies for distributed systems: vehicular networks as a case study. <i>International Journal of Computer Science Issues<\/i>, 2014, 11 (5), pp.68 - 77. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01331562v1\">&#x27E8;hal-01331562&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01331562v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olga Kondratyeva, Nina Yevtushenko, Ana Rosa Cavalli. \u041f\u0410\u0420\u0410\u041b\u041b\u0415\u041b\u042c\u041d\u0410\u042f \u041a\u041e\u041c\u041f\u041e\u0417\u0418\u0426\u0418\u042f \u041a\u041e\u041d\u0415\u0427\u041d\u042b\u0425 \u0410\u0412\u0422\u041e\u041c\u0410\u0422\u041e\u0412 \u0421 \u0422\u0410\u0419\u041c\u0410\u0423\u0422\u0410\u041c\u0418. <i>Journal of Control and Computer Science (Tomsk State University)<\/i>, 2014, 2 (27), pp.73 - 81. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01948353v1\">&#x27E8;hal-01948353&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01948353v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Vinh Hoa La, Ana Rosa Cavalli. Security attacks and solutions in Vehicular Ad Hoc Networks : a survey. <i>International journal on AdHoc networking systems (IJANS)<\/i>, 2014, 4 (2), pp.1 - 20. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5121\/ijans.2014.4201\">&#x27E8;10.5121\/ijans.2014.4201&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262473v1\">&#x27E8;hal-01262473&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262473v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khalifa Toumi, Ana Rosa Cavalli, Cesar Andres Sanchez. Validation of a trust approach in multi-organization environments. <i>International journal of secure software engineering<\/i>, 2014, 5 (1), pp.1 - 18. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4018\/ijsse.2014010101\">&#x27E8;10.4018\/ijsse.2014010101&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262565v1\">&#x27E8;hal-01262565&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262565v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olga Kondratyeva, Natalia Kushik, Ana Rosa Cavalli, Nina Yevtushenko. Using finite state models for quality evaluation at web service develoment steps. <i>International Journal of Services Computing<\/i>, 2013, 1 (1), pp.1 - 12. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262472v1\">&#x27E8;hal-01262472&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262472v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anderson Morais, Iksoon Hwang, Ana Rosa Cavalli, Eliane Martins. Generating attack scenarios for the system security validation. <i>Networking science<\/i>, 2013, 2 (3 & 4), pp.69-80. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s13119-012-0012-0\">&#x27E8;10.1007\/s13119-012-0012-0&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00848049v1\">&#x27E8;hal-00848049&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00848049v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. Using passive testing based on symbolic execution and slicing techniques : application to the validation of communication protocols. <i>Computer Networks<\/i>, 2013, 57 (15), pp.2992 - 3008. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comnet.2013.06.019\">&#x27E8;10.1016\/j.comnet.2013.06.019&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01273640v1\">&#x27E8;hal-01273640&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01273640v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Iksoon Hwang, Nina Yevtushenko, Ana Rosa Cavalli. Tight bound on the length of distinguishing sequences for non-observable nondeterministic finite-state machines with a polynomial number of inputs and outputs. <i>Information Processing Letters<\/i>, 2012, 112 (7), pp.298-301. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.ipl.2011.12.012\">&#x27E8;10.1016\/j.ipl.2011.12.012&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00711769v1\">&#x27E8;hal-00711769&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00711769v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hwang Iksoon, Mounir Lallali, Ana Rosa Cavalli, Dominique Verchere. Applying formal methods to PCEP: an industrial case study from modeling to test generation.. <i>Journal of Software Testing, Verification and Reliability<\/i>, 2012, 22 (5), pp.343--361. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/stvr.445\">&#x27E8;10.1002\/stvr.445&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.univ-brest.fr\/hal-00706162v1\">&#x27E8;hal-00706162&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.univ-brest.fr\/hal-00706162v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Natalia Kushik, Amel Mammar, Ana Rosa Cavalli, Nina Yevtushenko, Willy Ronald Jimenez Freitez, et al.. A SPIN-based approach for detecting vulnerabilities in C programs. <i>Automatic Control and Computer Sciences<\/i>, 2012, 46 (7), pp.379-386. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3103\/S0146411612070115\">&#x27E8;10.3103\/S0146411612070115&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00772243v1\">&#x27E8;hal-00772243&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00772243v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Amel Mammar, Wissam Mallouli, Ana Rosa Cavalli. A systematic approach to integrate common timed security rules within a TEFSM-based system specification. <i>Information and Software Technology<\/i>, 2012, 54 (1), pp.87-98. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.infsof.2011.07.004\">&#x27E8;10.1016\/j.infsof.2011.07.004&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00711778v1\">&#x27E8;hal-00711778&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00711778v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fatima Mattiello-Francisco, Eliane Martins, Ana Rosa Cavalli, Edgard Toshiro Yano. InRob : an approach for testing interoperability and robustness of real-time embedded software. <i>Journal of Systems and Software<\/i>, 2012, 85 (1), pp.3-15. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jss.2011.02.034\">&#x27E8;10.1016\/j.jss.2011.02.034&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00711774v1\">&#x27E8;hal-00711774&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00711774v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nahid Shahmehri, Amel Mammar, Edgardo Montes de Oca, David Byers, Ana Rosa Cavalli, et al.. An advanced approach for modeling and detecting software vulnerabilities. <i>Information and Software Technology<\/i>, 2012, 54 (9), pp.997-1013. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.infsof.2012.03.004\">&#x27E8;10.1016\/j.infsof.2012.03.004&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00739075v1\">&#x27E8;hal-00739075&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00739075v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Rita Dorofeeva, Khaled El-Fakhi, Stephane Maag, Ana Rosa Cavalli, Nina Yevtushenko. FSM-based conformance testing methods : a survey annotated with experimental evaluation. <i>Information and Software Technology<\/i>, 2010, 52 (12), pp.1286-1297. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.infsof.2010.07.001\">&#x27E8;10.1016\/j.infsof.2010.07.001&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00593960v1\">&#x27E8;hal-00593960&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00593960v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Iksoon Hwang, Ana Rosa Cavalli. Testing a probabilistic FSM using interval estimation. <i>Computer Networks<\/i>, 2010, 54 (7), pp.1108 - 1125 <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comnet.2009.10.014\">&#x27E8;10.1016\/j.comnet.2009.10.014&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00472884v1\">&#x27E8;hal-00472884&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00472884v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anderson Morais, Ana Rosa Cavalli, Eliane Martins. G\u00e9n\u00e9ration de scripts d'attaque pour la validation de la s\u00e9curit\u00e9. <i>G\u00e9nie logiciel : le magazine de l'ing\u00e9nierie du logiciel et des syst\u00e8mes<\/i>, 2010, 94, pp.39 - 44. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01465755v1\">&#x27E8;hal-01465755&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01465755v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2008<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Stephane Maag, Cyril Grepet, Ana Rosa Cavalli. A formal validation methodology for MANET routing protocols based on nodes' self similarity. <i>Computer Communications<\/i>, 2008, 31 (4), pp.827 - 841. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comcom.2007.10.031\">&#x27E8;10.1016\/j.comcom.2007.10.031&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01354849v1\">&#x27E8;hal-01354849&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01354849v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Communication dans un congr\u00e8s<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Phu Nguyen, Hui Song, Rustem Dautov, Nicolas Ferry, Angel Rego, et al.. Knowledge Systematization for Security Orchestration in CPS and IoT Systems. <i>CSR 2025 - IEEE International Conference on Cyber Security and Resilience<\/i>, Aug 2025, Chania, Greece. pp.672-678, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CSR64739.2025.11130008\">&#x27E8;10.1109\/CSR64739.2025.11130008&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05285485v1\">&#x27E8;hal-05285485&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05285485\/file\/DYNABIC_SOAR_SLR_paper_IEEE_CSR_2025.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05285485\/file\/DYNABIC_SOAR_SLR_paper_IEEE_CSR_2025.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05285485\/file\/DYNABIC_SOAR_SLR_paper_IEEE_CSR_2025.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05285485v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Vinh Hoa La, Wissam Mallouli, Manh Dung Nguyen, Edgardo Montes de Oca, Ana R Cavalli, et al.. Enhancing IoT security in 6G networks: AI-Based intrusion detection, penetration testing, and Blockchain-based trust management(work-in-progress paper ). <i>the 7th IFIP International Internet of Things Conference (IoT 2024)<\/i>, Universit\u00e9 de C\u00f4te d'Azur, Nov 2024, Nice, France. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-82065-6_5\">&#x27E8;10.1007\/978-3-031-82065-6_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04902431v1\">&#x27E8;hal-04902431&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04902431\/file\/iot2024-2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04902431\/file\/iot2024-2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04902431\/file\/iot2024-2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04902431v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ivan Orefice, Wissam Mallouli, Ana R Cavalli, Filip Sebek, Alberto Lizarduy. Diagnosis automation using similarity analysis: application to industrial systems. <i>19th International Conference on Software Technologies(ICSOFT)<\/i>, Jul 2024, Dijon, France. pp.331-338, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0012719200003753\">&#x27E8;10.5220\/0012719200003753&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04902424v1\">&#x27E8;hal-04902424&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04902424\/file\/icsoft2024.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04902424\/file\/icsoft2024.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04902424\/file\/icsoft2024.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04902424v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Valeria Vald\u00e9s R\u00edos, Fatiha Zaidi, Ana Rosa Cavalli, Angel Rego. Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment. <i>The 19th International Conference on Availability, Reliability and Security (ARES '24)<\/i>, Jul 2024, Vienna (AUSTRIA), Australia. pp.1-9, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3664476.3670444\">&#x27E8;10.1145\/3664476.3670444&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04901146v1\">&#x27E8;hal-04901146&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04901146v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anis Bouaziz, Manh-Dung Nguyen, Valeria Vald\u00e9s, Ana R Cavalli, Wissam Mallouli. Study on adversarial attacks techniques, learning methods and countermeasures: application to anomaly detection. <i>18th International Conference on Software Technologies (ICSOFT)<\/i>, Jul 2023, Rome, France. pp.510-517, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0012125100003538\">&#x27E8;10.5220\/0012125100003538&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04476913v1\">&#x27E8;hal-04476913&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04476913v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Francesco Caccavale, Huu-Nghia Nguyen, Ana R Cavalli, Edgardo Montes de Oca, Wissam Mallouli. HTTP\/2 attacks generation using 5Greplay. <i>The 18th International Conference on Availability, Reliability and Security (ARES )<\/i>, Aug 2023, Benevento Italy, France. pp.1-7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3600160.3605062\">&#x27E8;10.1145\/3600160.3605062&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04476907v1\">&#x27E8;hal-04476907&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04476907v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Edgardo Montes de Oca. Cybersecurity, monitoring, explainability and resilience. <i>2023 Fourteenth International Conference on Mobile Computing and Ubiquitous Network (ICMU)<\/i>, Nov 2023, Kyoto, France. pp.1-7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.23919\/ICMU58504.2023.10412157\">&#x27E8;10.23919\/ICMU58504.2023.10412157&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04476909v1\">&#x27E8;hal-04476909&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04476909v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Phu Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe, et al.. Towards Smarter Security Orchestration and Automatic Response for CPS and IoT. <i>IEEE CloudCom 2023 - 14th IEEE International Conference on Cloud Computing Technology and Science<\/i>, IEEE, Dec 2023, Naples (Napoli), Italy. pp.298-302, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CloudCom59040.2023.00055\">&#x27E8;10.1109\/CloudCom59040.2023.00055&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04526166v1\">&#x27E8;hal-04526166&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04526166\/file\/DYNABIC_SOAR_WP5_workshop_paper__Cam_Ready_.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04526166\/file\/DYNABIC_SOAR_WP5_workshop_paper__Cam_Ready_.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04526166\/file\/DYNABIC_SOAR_WP5_workshop_paper__Cam_Ready_.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04526166v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Valeria Vald\u00e9s R\u00edos, Ana R Cavalli, Fatiha Za\u00efdi, Wissam Mallouli. Testing techniques to assess impact and cascading effects. <i>2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)<\/i>, Dec 2023, Naples, France. pp.269-272, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CloudCom59040.2023.00050\">&#x27E8;10.1109\/CloudCom59040.2023.00050&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04587814v1\">&#x27E8;hal-04587814&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04587814v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry, Jean-Yves Tigli, et al.. The DYNABIC approach to resilience of critical infrastructures. <i>The 18th International Conference on Availability, Reliability and Security (ARES )<\/i>, Aug 2023, Benevento Italy, France. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3600160.3605055\">&#x27E8;10.1145\/3600160.3605055&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04476904v1\">&#x27E8;hal-04476904&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04476904v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Valeria Vald\u00e9s, Fatiha Zaidi, Ana Rosa Cavalli, Wissam Mallouli. A Resilience Component for\u00a0a\u00a0Digital Twin. <i>Foundations and Practice of Security<\/i>, 2023, Bordeaux, France. pp.93-104, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-57540-2_8\">&#x27E8;10.1007\/978-3-031-57540-2_8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04901421v1\">&#x27E8;hal-04901421&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04901421v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Vinh Hoa La, Edgardo Montes De Oca, Wissam Mallouli, Ana R Cavalli. A framework for security monitoring of real IoT testbeds. <i>16th International Conference on Software Technologies (ICSOFT)<\/i>, Lisbonne University, Jul 2022, Lisbonne, Portugal. pp.645-652, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0010578506450652\">&#x27E8;10.5220\/0010578506450652&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04478481v1\">&#x27E8;hal-04478481&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04478481v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R Cavalli. Digital twin for IoT environments : a testing and simulation tool. <i>15th International Conference on the Quality of Information and Communications Technology(QUATIC) \u00b7<\/i>, University of Castilla-La Mancha, Sep 2022, Talavera de la Reina, Spain. pp.205-219, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-14179-9_14\">&#x27E8;10.1007\/978-3-031-14179-9_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04039592v1\">&#x27E8;hal-04039592&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04039592\/file\/QUATIC_2022%20%283%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04039592\/file\/QUATIC_2022%20%283%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04039592\/file\/QUATIC_2022%20%283%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04039592v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Manh-Dung Nguyen, Vinh Hoa La, Ana R Cavalli, Edgardo Montes De Oca. Towards improving explainability, resilience and performance of cybersecurity analysis of 5G\/IoT networks. <i>2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)<\/i>, M\u00e4lardalen University, Apr 2022, Valencia (Espagne), Spain. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICSTW55395.2022.00016\">&#x27E8;10.1109\/ICSTW55395.2022.00016&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04477901v1\">&#x27E8;hal-04477901&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04477901v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Manh-Dung Nguyen, Vinh Hoa La, Ana R Cavalli, Edgardo Montes de Oca. Towards improving explainability, resilience and performance of cybersecurity analysis of 5G\/IoT networks (work-in-progress paper). <i>2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)<\/i>, Apr 2022, Valencia, Spain. pp.7-10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICSTW55395.2022.00016\">&#x27E8;10.1109\/ICSTW55395.2022.00016&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04016695v1\">&#x27E8;hal-04016695&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04016695\/file\/ITEQS_2022.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04016695\/file\/ITEQS_2022.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04016695\/file\/ITEQS_2022.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04016695v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Zujany Salazar, Ana R Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Za\u00efdi, et al.. Monitoring approaches for security and safety analysis: application to a load position system. <i>International Conference on Software Testing, Verification and Validation Workshops (ICSTW)<\/i>, Universitat Polit\u00e8cnica de Val\u00e8ncia and Open Universiteit, Apr 2022, Valencia (Espagne), mars 2007, Spain. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICSTW55395.2022.00021\">&#x27E8;10.1109\/ICSTW55395.2022.00021&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04477933v1\">&#x27E8;hal-04477933&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04477933v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Za\u00efdi, et al.. Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System. <i>2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)<\/i>, Apr 2022, Valencia, Spain. pp.40-48, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICSTW55395.2022.00021\">&#x27E8;10.1109\/ICSTW55395.2022.00021&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03974746v1\">&#x27E8;hal-03974746&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03974746v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Zujany Salazar, Fatiha Za\u00efdi, Wissam Mallouli, Ana R Cavalli, Huu Nghia Nguyen, et al.. A formal approach for complex attacks generation based on mutation of 5G network traffic. <i>17th International Conference on Software Technologies (ICSOFT)<\/i>, Institute of Business Informatics Wroclaw; Department of Computing Sydney, Macquarie Univ., Sydney, Australia, Jul 2022, Lisbon (Portugal), Portugal. pp.234-241, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0011319000003266\">&#x27E8;10.5220\/0011319000003266&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04477834v1\">&#x27E8;hal-04477834&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04477834v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Zujany Salazar, Fatiha Za\u00efdi, Wissam Mallouli, Ana Cavalli, Huu Nguyen, et al.. A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. <i>17th International Conference on Software Technologies<\/i>, Jul 2022, Lisbon, Portugal. pp.234-241, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0011319000003266\">&#x27E8;10.5220\/0011319000003266&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03974768v1\">&#x27E8;hal-03974768&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03974768v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Jose Rubio-Hernan, Ana Cavalli, Joaquin Garcia\u2010alfaro. Switched-based control testbed to assure cyber-physical resilience by design. <i>SECRYPT 2022 : 19th International Conference on Security and Cryptography<\/i>, Jul 2022, Lisbon, Portugal. pp.681-686, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0011327300003283\">&#x27E8;10.5220\/0011327300003283&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03843016v1\">&#x27E8;hal-03843016&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03843016\/file\/secrypt2022a-preprint.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03843016\/file\/secrypt2022a-preprint.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03843016\/file\/secrypt2022a-preprint.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03843016v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, et al.. SANCUS: multi-layers vulnerability management framework for cloud-native 5G networks. <i>The 16th International Conference on Availability, Reliability and Security (ARES)<\/i>, Aug 2022, Vienna, Austria. pp.1-10. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04478439v1\">&#x27E8;hal-04478439&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04478439v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R Cavalli, Edgardo Montes de Oca. 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. <i>ARES 2021: The 16th International Conference on Availability, Reliability and Security<\/i>, Aug 2021, Vienna, Austria. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3465481.3470079\">&#x27E8;10.1145\/3465481.3470079&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04064212v1\">&#x27E8;hal-04064212&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04064212\/file\/ens_workshop_2021_mmt_5greplay.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04064212\/file\/ens_workshop_2021_mmt_5greplay.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04064212\/file\/ens_workshop_2021_mmt_5greplay.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04064212v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R Cavalli, Edgardo Montes de Oca. 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. <i>ARES 2021: The 16th International Conference on Availability, Reliability and Security<\/i>, Aug 2021, Vienna Austria, France. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3465481.3470079\">&#x27E8;10.1145\/3465481.3470079&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04050929v1\">&#x27E8;hal-04050929&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04050929\/file\/5greplay_a_5G_Network_Traffic_Fuzzer.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04050929\/file\/5greplay_a_5G_Network_Traffic_Fuzzer.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04050929\/file\/5greplay_a_5G_Network_Traffic_Fuzzer.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04050929v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Charilaos Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, et al.. SANCUS: Multi-layers vulnerability management framework for cloud-native 5G networks. <i>The 16th International Conference on Availability, Reliability and Security (ARES)<\/i>, Aug 2021, Vienna Austria, France. pp.1-10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3465481.3470092\">&#x27E8;10.1145\/3465481.3470092&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04587817v1\">&#x27E8;hal-04587817&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04587817v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes De Oca. Metrics-driven DevSecOps. <i>ICSOFT<\/i>, Jul 2020, On line streaming, Australia. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03113928v1\">&#x27E8;hal-03113928&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03113928v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia-Alfaro. Cyber-resilience evaluation of Cyber-Physical Systems. <i>International Symposium on Network Computing and Applications<\/i>, Nov 2020, Cambridge, MA (online), United States. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NCA51143.2020.9306741\">&#x27E8;10.1109\/NCA51143.2020.9306741&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03115317v1\">&#x27E8;hal-03115317&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03115317v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Georges Ouffou\u00e9, Fatiha Za\u00efdi, Ana R Cavalli. Attack tolerance for services-based applications in the cloud. <i>ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems<\/i>, Oct 2019, Paris, France. pp.242-258, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-31280-0_15\">&#x27E8;10.1007\/978-3-030-31280-0_15&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-02526356v1\">&#x27E8;hal-02526356&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-02526356\/file\/482770_1_En_15_Chapter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02526356\/file\/482770_1_En_15_Chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02526356\/file\/482770_1_En_15_Chapter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02526356v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana R Cavalli, Brecht Vermeulen, et al.. Industrial IoT security monitoring and test on Fed4Fire+ platforms. <i>ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems<\/i>, Oct 2019, Paris, France. pp.270-278, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-31280-0_17\">&#x27E8;10.1007\/978-3-030-31280-0_17&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-02526342v1\">&#x27E8;hal-02526342&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-02526342\/file\/482770_1_En_17_Chapter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02526342\/file\/482770_1_En_17_Chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02526342\/file\/482770_1_En_17_Chapter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02526342v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Thierno Sambe, Stephane Maag, Ana Cavalli. A methodology for enterprise resource planning automation testing application to the Open Source ERP-ODOO. <i>ICSOFT 2019: 14th International Conference on Software Technologies<\/i>, Jul 2019, Prague, Czech Republic. pp.407-415, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0007923004070415\">&#x27E8;10.5220\/0007923004070415&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02268593v1\">&#x27E8;hal-02268593&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02268593v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquin Garcia-Alfaro. Reflective attenuation of cyber-physical attacks. <i>CyberICPS 2019 : 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems<\/i>, Sep 2019, Luxembourg, Luxembourg. pp.19-34, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-42048-2_2\">&#x27E8;10.1007\/978-3-030-42048-2_2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02434486v1\">&#x27E8;hal-02434486&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02434486v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Antonio M. Ortiz, Georges Ouffou\u00e9, Cesar Andres Sanchez, Fatiha Zaidi. Design of a secure shield for internet and web-based services using software reflection. <i>IEEE International Conference on Web Services (ICWS)<\/i>, Jun 2018, Seattle, United States. pp.472 - 486, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-94289-6_30\">&#x27E8;10.1007\/978-3-319-94289-6_30&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02017535v1\">&#x27E8;hal-02017535&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02017535v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sarah Dahab, Erika Fernanda Silva Balocchi, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli. Enhancing software development process quality based on metrics correlation and suggestion. <i>The 13th International Conference on Software Technologies (ICSOFT)<\/i>, Jul 2018, Porto, Portugal. pp.120 - 131, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006856501540165\">&#x27E8;10.5220\/0006856501540165&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01977133v1\">&#x27E8;hal-01977133&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01977133v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sarah Dahab, Stephane Maag, Wissam Mallouli, Ana Cavalli. Smart measurements and analysis for software quality enhancement. <i>ICSOFT 2018: International Conference on Software Technologies<\/i>, Jul 2018, Porto, Portugal. pp.194-219, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-29157-0_9\">&#x27E8;10.1007\/978-3-030-29157-0_9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02268574v1\">&#x27E8;hal-02268574&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02268574v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro. A study on mitigation techniques for SCADA-driven cyber-physical systems. <i>FPS 2018: 11th International Symposium on Foundations & Practice of Security<\/i>, Nov 2018, Montreal, Canada. pp.257 - 264, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-18419-3_17\">&#x27E8;10.1007\/978-3-030-18419-3_17&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02014254v1\">&#x27E8;hal-02014254&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02014254v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pamela Carvallo, Ana Rosa Cavalli, Wissam Mallouli. A platform for security monitoring of multi-cloud applications. <i>PSI 2017 : 11th International Adrei Ershov Informatics Conference<\/i>, Jun 2017, Moscou, Russia. pp.59 - 71, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-74313-4_5\">&#x27E8;10.1007\/978-3-319-74313-4_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01695148v1\">&#x27E8;hal-01695148&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01695148v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pamela Carvallo, Ana Rosa Cavalli, Natalia Kushik. A study of threat detection systems and techniques in the cloud. <i>CRISIS 2017 : 12th International Conference on Risks and Security of Internet and Systems<\/i>, Sep 2017, Dinard, France. pp.140 - 155, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-76687-4_10\">&#x27E8;10.1007\/978-3-319-76687-4_10&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01745762v1\">&#x27E8;hal-01745762&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01745762v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pamela Carvallo, Ana Rosa Cavalli, Wissam Mallouli, Erkuden Rios. Multi-cloud applications security monitoring. <i>GPC 2017 : 12th International Conference on Green, Pervasive, and Cloud Computing<\/i>, May 2017, Cetara, Italy. pp.748 - 758, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-57186-7_54\">&#x27E8;10.1007\/978-3-319-57186-7_54&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01583350v1\">&#x27E8;hal-01583350&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01583350v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pamela Carvallo, Ana Rosa Cavalli, Natalia Kushik. Automatic derivation and validation of a cloud dataset for insider threat detection. <i>ICSOFT 2017 : 12th International Conference on Software Technologies<\/i>, Jul 2017, Madrid, Spain. pp.480 - 487, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006480904800487\">&#x27E8;10.5220\/0006480904800487&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01583232v1\">&#x27E8;hal-01583232&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01583232v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Georges Ouffou\u00e9, Fatiha Zaidi, Ana Rosa Cavalli, Mounir Lallali. How web services can be tolerant to intruders through diversification. <i>ICWS 2017 : 24th IEEE International Conference on Web Services<\/i>, Jun 2017, Honolulu, United States. pp.436 - 443, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICWS.2017.50\">&#x27E8;10.1109\/ICWS.2017.50&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01592719v1\">&#x27E8;hal-01592719&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01592719v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Georges Ouffou\u00e9, Fatiha Zaidi, Ana Rosa Cavalli, Mounir Lallali. Model-based attack tolerance. <i>FINA 2017 : 13th International Symposium on Frontiers of Information Systems and Network Applications<\/i>, Mar 2017, Taipei, Taiwan. pp.68 - 73, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WAINA.2017.88\">&#x27E8;10.1109\/WAINA.2017.88&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01583439v1\">&#x27E8;hal-01583439&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01583439v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Georges Ouffou\u00e9, Fatiha Zaidi, Ana Rosa Cavalli, Mounir Lallali. An attack-tolerant framework for web services. <i>SCC 2017 : 14th International Conference on Services Computing<\/i>, Jun 2017, Honolulu, United States. pp.503 - 506, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SCC.2017.75\">&#x27E8;10.1109\/SCC.2017.75&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01695155v1\">&#x27E8;hal-01695155&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01695155v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Husnu Yenigun, Natalia Kushik, Jorge L\u00f3pez, Nina Yevtushenko, Ana Rosa Cavalli. Decreasing the complexity of deriving test suites against nondeterministic Finite State Machines. <i>EWDTS 2017 : 15th IEEE East-West Design & Test Symposium<\/i>, Sep 2017, Novi Sad, Serbia. pp.1 - 4, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/EWDTS.2017.8110091\">&#x27E8;10.1109\/EWDTS.2017.8110091&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01669274v1\">&#x27E8;hal-01669274&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01669274v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Rui Abreu, C\u00e9sar Andr\u00e9s, Ana Rosa Cavalli. A framework to reduce the cost of monitoring and diagnosis using game theory. <i>CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems<\/i>, Sep 2016, Roscoff, France. pp.169 - 182, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-54876-0_14\">&#x27E8;10.1007\/978-3-319-54876-0_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01487740v1\">&#x27E8;hal-01487740&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01487740v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Wissam Mallouli. Monitoring techniques in practice: experiences and lessons learned. <i>SAM 2016: 9th System Analysis and Modelling Conference <\/i>, Oct 2016, Saint Malo, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01586259v1\">&#x27E8;hal-01586259&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01586259v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Raul Armando Fuentes Samaniego, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores. An analysis of secure M2M communication in WSNs using DTLS. <i>STAM 2016 : 2nd IEEE International Workshop on Security Testing and Monitoring<\/i>, Jun 2016, Nara, Japan. pp.78 - 83, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICDCSW.2016.13\">&#x27E8;10.1109\/ICDCSW.2016.13&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01416148v1\">&#x27E8;hal-01416148&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01416148v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Natalia Kushik, Jorge Eleazar Lopez Coronado, Ana Rosa Cavalli, Nina Yevtushenko. Optimizing protocol passive testing through 'Gedanken' experiments with Finite State Machines. <i>QRS 2016 : International Conference on Software Quality, Reliability and Security<\/i>, Aug 2016, Vienna, Austria. pp.315 - 322, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/QRS.2016.43\">&#x27E8;10.1109\/QRS.2016.43&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01432412v1\">&#x27E8;hal-01432412&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01432412v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Vinh Hoa La, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli. A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks. <i>APCC 2016 : 22nd Asia-Pacific Conference on Communications<\/i>, Aug 2016, Yogyakarta, Indonesia. pp.230 - 237, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/APCC.2016.7581493\">&#x27E8;10.1109\/APCC.2016.7581493&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01391251v1\">&#x27E8;hal-01391251&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01391251v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Vinh Hoa La, Ana Rosa Cavalli. A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks. <i>STAM 2016: 2nd IEEE International Workshop on Security Testing And Monitoring<\/i>, Jun 2016, Nara, Japan. pp.49 - 54, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICDCSW.2016.11\">&#x27E8;10.1109\/ICDCSW.2016.11&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01415351v1\">&#x27E8;hal-01415351&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01415351v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Vinh Hoa La, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli. Network monitoring using MMT: an application based on the user-agent field in HTTP headers. <i>AINA 2016 : 30th International Conference on Advanced Information Networking and Applications<\/i>, Mar 2016, Crans-Montana, Switzerland. pp.147 - 154, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/AINA.2016.41\">&#x27E8;10.1109\/AINA.2016.41&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01335530v1\">&#x27E8;hal-01335530&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01335530v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jorge Eleazar Lopez Coronado, Natalia Kushik, Ana Rosa Cavalli, Nina Yevtushenko. Optimizing network utilization through source code state model representation. <i>EWDTS 2016 : 14th East-West Design & Test Symposium<\/i>, Oct 2016, Yerevan, Armenia. pp.1 - 4, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/EWDTS.2016.7807732\">&#x27E8;10.1109\/EWDTS.2016.7807732&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01433929v1\">&#x27E8;hal-01433929&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01433929v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Huu Nghia Nguyen, Fatiha Zaidi, Ana Rosa Cavalli. Effectively testing of timed composite systems using test case prioritization. <i>SEKE 2016 : 28th International Conference on Software Engineering and Knowledge Engineering<\/i>, Jul 2016, San Francisco, United States. pp.1 - 6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.18293\/SEKE2016-153\">&#x27E8;10.18293\/SEKE2016-153&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01358350v1\">&#x27E8;hal-01358350&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01358350v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Georges Ouffou\u00e9, Antonio Ortiz, Ana Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, et al.. Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. <i>2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW)<\/i>, Jun 2016, Nara, France. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICDCSW.2016.27\">&#x27E8;10.1109\/ICDCSW.2016.27&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01767065v1\">&#x27E8;hal-01767065&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01767065v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Diego Arturo Rivera Villagra, Ana Rosa Cavalli, Natalia Kushik, Wissam Mallouli. An implementation of a QoE evaluation technique including business model parameters. <i>ICSOFT-PT 2016 : 11th International Conference on Software Paradigm Trends<\/i>, Aug 2016, Lisbon, Portugal. pp.138 - 145, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006005001380145\">&#x27E8;10.5220\/0006005001380145&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01369532v1\">&#x27E8;hal-01369532&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01369532v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Diego Arturo Rivera Villagra, Ana Rosa Cavalli. QoE-driven service optimization aware of the business model. <i>WAINA 2016 : 30th International Conference on Advanced Information Networking and Applications Workshops <\/i>, Mar 2016, Crans-Montana, Switzerland. pp.725 - 730, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WAINA.2016.105\">&#x27E8;10.1109\/WAINA.2016.105&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01335539v1\">&#x27E8;hal-01335539&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01335539v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jorge Visca, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli, Javier Ernesto Baliosian. Opportunistic media sharing for mobile networks. <i>NOMS 2016 : IEEE\/IFIP Network Operations and Management Symposium<\/i>, Apr 2016, Istanbul, Turkey. pp.799 - 803, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS.2016.7502902\">&#x27E8;10.1109\/NOMS.2016.7502902&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01348024v1\">&#x27E8;hal-01348024&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01348024v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jorge Visca, Javier Ernesto Baliosian, Raul Armando Fuentes Samaniego, Ana Rosa Cavalli. Path sampling : a robust alternative to gossiping for opportunistic network routing. <i>WIMOB 2016 : 12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications<\/i>, Oct 2016, New York, United States. pp.1 - 8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WiMOB.2016.7763244\">&#x27E8;10.1109\/WiMOB.2016.7763244&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01433849v1\">&#x27E8;hal-01433849&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01433849v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mohamed Aouadi, Khalifa Toumi, Ana Rosa Cavalli. An active testing tool for security testing of distributed systems. <i>ARES 2015 : 10th International Conference on Availability, Reliability and Security<\/i>, Aug 2015, Toulouse, France. pp.735 - 740, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2015.97\">&#x27E8;10.1109\/ARES.2015.97&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263726v1\">&#x27E8;hal-01263726&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263726v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Javier Ernesto Baliosian, Ana Rosa Cavalli. An abstraction for the interoperability analysis of security policies. <i>NSS 2015 : 9th International Conference on Network and System Security <\/i>, Nov 2015, New York, United States. pp.418 - 427, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-25645-0_30\">&#x27E8;10.1007\/978-3-319-25645-0_30&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263746v1\">&#x27E8;hal-01263746&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263746v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Raul Armando Fuentes Samaniego, Ana Rosa Cavalli, Wissam Mallouli, Javier Ernesto Baliosian. Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol. <i>LANOMS 2015 : 8th Latin American Network Operations and Management Symposium<\/i>, Oct 2015, Joao Pessoa, Brazil. pp.69 - 72, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/LANOMS.2015.7332672\">&#x27E8;10.1109\/LANOMS.2015.7332672&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263742v1\">&#x27E8;hal-01263742&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263742v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Vinh Hoa La, Ana Rosa Cavalli. A comparative evaluation of two intrusion-tolerant routing protocols for Wireless Sensor Networks. <i>BWCCA 2015: 10th International Conference on Broadband and Wireless Computing, Communication and Applications<\/i>, Nov 2015, Krakow, Poland. pp.6 - 12, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BWCCA.2015.104\">&#x27E8;10.1109\/BWCCA.2015.104&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01341539v1\">&#x27E8;hal-01341539&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01341539v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jorge Eleazar Lopez Coronado, Stephane Maag, Cecilia Saint-Pierre, Javier Alejandro Bustos Jimenez, Ana Rosa Cavalli. Process mining for trust monitoring. <i>WAINA 2015 : 29th International Conference on Advanced Information Networking and Applications Workshops <\/i>, Mar 2015, Gwangiu, South Korea. pp.605 - 610, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WAINA.2015.71\">&#x27E8;10.1109\/WAINA.2015.71&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01255094v1\">&#x27E8;hal-01255094&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01255094v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Diego Arturo Rivera Villagra, Natalia Kushik, Camila Fuenzalida Nunez, Ana Rosa Cavalli, Nina Yevtushenko. QoE evaluation based on QoS and QoBiz parameters applied to an OTT service. <i>ICWS 2015 : 22nd IEEE International Conference on Web Services<\/i>, Jun 2015, New York, United States. pp.607 - 614, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICWS.2015.86\">&#x27E8;10.1109\/ICWS.2015.86&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01269646v1\">&#x27E8;hal-01269646&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01269646v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mohamed Aouadi, Khalifa Toumi, Ana Rosa Cavalli. On modeling and testing security properties of vehicular networks. <i>ICSTW 2014 : 7th International Conference on Software Testing, Verification and Validation Workshops<\/i>, Mar 2014, Cleveland, United States. pp.42 - 50, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICSTW.2014.56\">&#x27E8;10.1109\/ICSTW.2014.56&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01285747v1\">&#x27E8;hal-01285747&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01285747v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Xiaoping Che, Stephane Maag, Jorge Eleazar Lopez Coronado, Ana Rosa Cavalli. Testing network protocols : formally, at runtime and online. <i>SEKE 2014 : 26th International Conference on Software Engineering and Knowledge Engineering<\/i>, Jul 2014, Vancouver, Canada. pp.90 - 93. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263332v1\">&#x27E8;hal-01263332&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263332v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariem Graa, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Ana Cavalli. D\u00e9tection de flux de contr\u00f4le ill\u00e9gaux dans les Smartphones. <i>INFORSID 2014 : 32\u00e8me congr\u00e8s de l'INFormatique des ORganisations et Syst\u00e8mes d'Information et de D\u00e9cision<\/i>, May 2014, Lyon, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01009849v1\">&#x27E8;hal-01009849&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01009849\/file\/Article_Mariem_Graa_INFORSID2014.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01009849\/file\/Article_Mariem_Graa_INFORSID2014.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01009849\/file\/Article_Mariem_Graa_INFORSID2014.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01009849v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariem Graa, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Ana Cavalli. Detection of illegal control flow in Android System: Protecting private data used by Smartphone Apps. <i>FPS 2014 : the 7th International Symposium on Foundations & Practice of Security<\/i>, Nov 2014, Montr\u00e9al, Canada. pp.337 - 346, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-17040-4_22\">&#x27E8;10.1007\/978-3-319-17040-4_22&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01214033v1\">&#x27E8;hal-01214033&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01214033\/file\/Article.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01214033\/file\/Article.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01214033\/file\/Article.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01214033v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariem Graa, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Ana Cavalli. Protection against Code Obfuscation Attacks based on control dependencies in Android Systems. <i>TC 2014 : 8th International Workshop on Trustworthy Computing<\/i>, Jun 2014, San Francisco, United States. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01010902v1\">&#x27E8;hal-01010902&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01010902\/file\/bare_conf.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01010902\/file\/bare_conf.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01010902\/file\/bare_conf.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01010902v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Natalia Kushik, Anton Kolomeez, Ana Rosa Cavalli, Nina Yevtushenko. Extended Finite State Machine based test derivation strategies for telecommunication protocols. <i>SYRCoSE 2014 : 8th Spring\/Summer Young Researchers\u2019 Colloquium on Software Engineering <\/i>, May 2014, Saint-P\u00e9tersbourg, Russia. pp.108 - 113, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.15514\/SYRCOSE-2014-8-15\">&#x27E8;10.15514\/SYRCOSE-2014-8-15&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262562v1\">&#x27E8;hal-01262562&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262562v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Natalia Kushik, Nina Yevtushenko, Ana Rosa Cavalli. On testing against partial non-observable specifications. <i>QUATIC 2014 : 9th International Conference on the Quality of Information and Communications Technology<\/i>, Sep 2014, Guimaraes, Portugal. pp.230 - 233, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/QUATIC.2014.38\">&#x27E8;10.1109\/QUATIC.2014.38&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262783v1\">&#x27E8;hal-01262783&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262783v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Natalia Kushik, Nina Yevtushenko, Ana Rosa Cavalli, Wissam Mallouli, Jeevan Pokhrel. Evaluating web service QoE by learning logic networks. <i>WEBIST 2014 : 10th International Conference on Web Information Systems and Technologies<\/i>, Apr 2014, Barcelone, Spain. pp.168 - 176, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0004855801680176\">&#x27E8;10.5220\/0004855801680176&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262476v1\">&#x27E8;hal-01262476&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262476v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Huu Nghia Nguyen, Fatiha Za\u00efdi, Ana Cavalli. A Framework for Distributed Testing of Timed Composite Systems. <i>2014 21st Asia-Pacific Software Engineering Conference (APSEC)<\/i>, Dec 2014, Jeju, France. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/APSEC.2014.16\">&#x27E8;10.1109\/APSEC.2014.16&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01760336v1\">&#x27E8;hal-01760336&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01760336v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Huu Nghia Nguyen, Ana Rosa Cavalli. Formal verification of coordination systems' requirements : a case study on the European Train Control System. <i>SEKE 2014 : 26th International Conference on Software Engineering and Knowledge Engineering<\/i>, Jul 2014, Vancouver, Canada. pp.393 - 396. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262566v1\">&#x27E8;hal-01262566&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262566v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Indira Paudel, Jeevan Pokhrel, Bachar Wehbi, Ana Rosa Cavalli, Badii Jouaber. Estimation of video QoE from MAC parameters in wireless network : a Random Neural Network approach. <i>ISCIT 2014 : 14th International Symposium on Communications and Information Technologies<\/i>, Sep 2014, Incheon, South Korea. pp.51 - 55, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ISCIT.2014.7011868\">&#x27E8;10.1109\/ISCIT.2014.7011868&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262789v1\">&#x27E8;hal-01262789&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262789v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jeevan Pokhrel, Indira Paudel, Bachar Wehbi, Ana Rosa Cavalli, Badii Jouaber. Performance evaluation of video transmission over 802.11n wireless network : a MAC layer perspective. <i>SaCoNeT 2014 : 5th International Conference on Smart Communications in Network Technologies<\/i>, Jun 2014, Vilanova I La Geltr\u00fa, Spain. pp.1 - 6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SaCoNeT.2014.6867761\">&#x27E8;10.1109\/SaCoNeT.2014.6867761&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262788v1\">&#x27E8;hal-01262788&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262788v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jeevan Pokhrel, Felipe Lalanne Rojas, Ana Rosa Cavalli, Wissam Mallouli. QoE estimation for web service selection using a Fuzzy-Rough hybrid expert system. <i>AINA 2014 : 28th IEEE International Conference on Advanced Information Networking and Applications<\/i>, May 2014, Victoria, Bc, Canada. pp.629 - 634, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/AINA.2014.77\">&#x27E8;10.1109\/AINA.2014.77&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262475v1\">&#x27E8;hal-01262475&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262475v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Cesar Andres Sanchez, Ana Rosa Cavalli, Nina Yevtushenko, Jo\u00e3o Santos, Rui Abreu. On modeling and testing components of the European Train Control System. <i>IPCT 2014 : International Conference on Advances in Information Processing And Communication Technology<\/i>, Jun 2014, Rome, Italy. pp.31 - 35, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.15224\/978-1-63248-021-7-72\">&#x27E8;10.15224\/978-1-63248-021-7-72&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262564v1\">&#x27E8;hal-01262564&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262564v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, C\u00e9sar Andr\u00e9s, Ana Rosa Cavalli. How to evaluate trust using MMT. <i>NSS 2014 : 8th International Conference on Network and System Security<\/i>, Oct 2014, Xi'An, China. pp.484 - 492, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-11698-3_37\">&#x27E8;10.1007\/978-3-319-11698-3_37&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262784v1\">&#x27E8;hal-01262784&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262784v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Felipe Barbosa Abreu, Anderson Morais, Ana Rosa Cavalli, Bachar Wehbi, Edgardo Montes de Oca. An effective attack detection approach in wireless mesh networks. <i>NetMM '13 : International Workshop on Network Management and Monitoring<\/i>, Mar 2013, Barcelona, Spain. pp.1450 -1455, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WAINA.2013.1\">&#x27E8;10.1109\/WAINA.2013.1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00842731v1\">&#x27E8;hal-00842731&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00842731v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Antonio Cuadra-S\u00e1nchez, Maria del Mar Cutanda-Rodriguez, Andreas Aurelius, Kjell Brunnstr\u00f6m, Jorge E. L\u00f3pez de Vergara, et al.. Ecosystem for customer experience assurance. <i>SACONET 2013 : International Conference on Smart Communications in Network Technologies<\/i>, Jun 2013, Paris, France. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SaCoNeT.2013.6654553\">&#x27E8;10.1109\/SaCoNeT.2013.6654553&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262114v1\">&#x27E8;hal-01262114&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262114v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariem Graa, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Ana Cavalli. Formal Characterization of Illegal Control Flow in Android System. <i>SITIS 2013 : 9th International Conference on Signal Image Technology & Internet Systems<\/i>, Dec 2013, Kyoto, Japan. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00924480v1\">&#x27E8;hal-00924480&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00924480\/file\/bare_conf.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00924480\/file\/bare_conf.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00924480\/file\/bare_conf.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00924480v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olga Kondratyeva, Ana Rosa Cavalli, Natalia Kushik, Nina Yevtushenko. Evaluating quality of web services: a short survey. <i>ICWS 2013 : 20th International Conference on Web Services<\/i>, Jun 2013, Santa Clara, United States. pp.587 - 594, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICWS.2013.83\">&#x27E8;10.1109\/ICWS.2013.83&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01274984v1\">&#x27E8;hal-01274984&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01274984v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olga Kondratyeva, Natalia Kushik, Ana Rosa Cavalli, Nina Yevtushenko. Evaluating Web service quality using finite state models. <i>QSIC 2013 : 13th International Conference on Quality Software<\/i>, Jul 2013, Nanjing, China. pp.95 - 102, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/QSIC.2013.52\">&#x27E8;10.1109\/QSIC.2013.52&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262103v1\">&#x27E8;hal-01262103&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01262103v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. Monitoring based on IOSTS for testing functional and security properties: application to an automotive case study. <i>COMPSAC 2013 : 37th Annual International Computer Software & Applications Conference<\/i>, Jul 2013, Kyoto, Japan. pp.1 - 10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/COMPSAC.2013.5\">&#x27E8;10.1109\/COMPSAC.2013.5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01275006v1\">&#x27E8;hal-01275006&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01275006v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jeevan Pokhrel, Bachar Wehbi, Morais Anderson, Ana Rosa Cavalli, Eric Allilaire. Estimation of QoE of video traffic using a fuzzy expert system. <i>CCNC '13 : The 10th Annual IEEE Consumer Communications and Networking Conference<\/i>, Jan 2013, Las Vegas, United States. pp.224-229, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCNC.2013.6488450\">&#x27E8;10.1109\/CCNC.2013.6488450&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00816061v1\">&#x27E8;hal-00816061&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00816061v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">C\u00e9sar Andr\u00e9s, Ana Rosa Cavalli. How to reduce the cost of passive testing. <i>HASE '12 : 14th IEEE International High-Assurance Systems Engineering symposium<\/i>, Oct 2012, Omaha, United States. pp.209-216, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/HASE.2012.36\">&#x27E8;10.1109\/HASE.2012.36&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00771884v1\">&#x27E8;hal-00771884&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00771884v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mazen El Maarabani, Cesar Andres, Ana Rosa Cavalli. Testing interoperability security policies. <i>SEKE '12 : The 24th International Conference on Software Engineering and Knowledge Engineering<\/i>, Jul 2012, San Francisco, United States. pp.464-469. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00744694v1\">&#x27E8;hal-00744694&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00744694v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariem Graa, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Ana Cavalli. Detecting control flow in Smarphones: Combining static and dynamic analyses. <i>CSS 2012: The 4th International Symposium on Cyberspace Safety and Security<\/i>, Dec 2012, Melbourne, Australia. pp.33 - 47, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-35362-8_4\">&#x27E8;10.1007\/978-3-642-35362-8_4&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00785180v1\">&#x27E8;hal-00785180&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00785180\/file\/Article.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00785180\/file\/Article.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00785180\/file\/Article.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00785180v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Felipe Lalanne Rojas, Ana Rosa Cavalli, Stephane Maag. Quality of experience as a selection criterion for web services. <i>SITIS '12 : The 8th International Conference on Signal-Image Technology & Internet Systems<\/i>, Nov 2012, Sorrento, Italy. pp.519-526, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SITIS.2012.81\">&#x27E8;10.1109\/SITIS.2012.81&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00772763v1\">&#x27E8;hal-00772763&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00772763v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wissam Mallouli, Mounir Lallali, Gerardo Morales, Ana Rosa Cavalli. Modeling and testing secure web-based systems : application to an industrial case study. <i>SITIS '08 : The Fourth International Conference on Signal-Image Technology & Internet-Based Systems<\/i>, Nov 2012, Bali, Indonesia. pp.128-136, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SITIS.2008.58\">&#x27E8;10.1109\/SITIS.2008.58&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00796034v1\">&#x27E8;hal-00796034&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00796034v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anderson Morais, Ana Rosa Cavalli. A distributed intrusion detection scheme for wireless ad hoc networks. <i>SAC '12 : The 27th Annual ACM Symposium on Applied Computing<\/i>, Mar 2012, Trento, Italy. pp.556-562, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2245276.2245382\">&#x27E8;10.1145\/2245276.2245382&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00738916v1\">&#x27E8;hal-00738916&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00738916v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anderson Morais, Ana Rosa Cavalli. A event-based packet dropping detection scheme for wireless mesh networks. <i>CSS '12 : The 4th International Symposium on Cyberspace Safety and Security<\/i>, Dec 2012, Melbourne, Australia. pp.309-323, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-35362-8_24\">&#x27E8;10.1007\/978-3-642-35362-8_24&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00816664v1\">&#x27E8;hal-00816664&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00816664v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anderson Morais, Ana Rosa Cavalli, Hai Anh Tran, Abdelhamid Mellouk, Brice Augustin, et al.. Managing customer experience through service quality monitoring. <i>Conference Future Network & Mobile Summit 2012<\/i>, Jul 2012, Berl\u00edn, Germany. pp.1-9. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00771815v1\">&#x27E8;hal-00771815&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00771815v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. Improving protocol validation by an IOSTS-based passive testing approach. <i>STV '12 : System Testing and Validation Workshop<\/i>, Oct 2012, Paris, France. pp.87-95. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00738521v1\">&#x27E8;hal-00738521&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00738521v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. An IOSTS based passive testing approach for the validation of data-centric protocols. <i>QSIC '12 : 12th International Conference of Quality Software<\/i>, Aug 2012, Xi'An, China. pp.49-58, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/QSIC.2012.33\">&#x27E8;10.1109\/QSIC.2012.33&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00747198v1\">&#x27E8;hal-00747198&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00747198v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khalifa Toumi, C\u00e9sar Andr\u00e9s, Ana Rosa Cavalli. Trust-OrBAC : a trust access control model in multi-organization environments. <i>ICISS '12 : 8th International Conference on Information Systems Security<\/i>, Dec 2012, Guwahati, India. pp.89-103, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-35130-3_7\">&#x27E8;10.1007\/978-3-642-35130-3_7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00767797v1\">&#x27E8;hal-00767797&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00767797v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khalifa Toumi, Ana Rosa Cavalli, Mazen El Maarabani. Role based interoperability security policies in collaborative systems. <i>SECOTS '12 : International Symposium on Security in Collaboration Technologies and Systems<\/i>, May 2012, Denver, United States. pp.471-477, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CTS.2012.6261092\">&#x27E8;10.1109\/CTS.2012.6261092&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00738970v1\">&#x27E8;hal-00738970&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00738970v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khalifa Toumi, C\u00e9sar Andr\u00e9s, Ana Rosa Cavalli, Mazen El Maarabani. A vector based model approach for defining trust in multi-organization environments. <i>CRiSIS '12 : 7th International Conference on Risks and Security of Internet and Systems<\/i>, Oct 2012, Cork, Ireland. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CRISIS.2012.6378939\">&#x27E8;10.1109\/CRISIS.2012.6378939&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00768221v1\">&#x27E8;hal-00768221&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00768221v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Khalifa Toumi, C\u00e9sar Andr\u00e9s, Ana Rosa Cavalli. Setting trust evaluations with fuzzy logic in MOE. <i>STV '12: System Testing and Validation Workshop<\/i>, Oct 2012, Paris, France. pp.49-58. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00767987v1\">&#x27E8;hal-00767987&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00767987v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2011<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mazen El Maarabani, Ana Rosa Cavalli, Iksoon Hwang, Fatiha Za\u00efdi. Verification of interoperability security policies by model checking. <i>HASE '11 : The 13th IEEE International High Assurance Systems Engineering Symposium<\/i>, Nov 2011, Boca Raton, United States. pp.376 -381, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/HASE.2011.17\">&#x27E8;10.1109\/HASE.2011.17&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00738626v1\">&#x27E8;hal-00738626&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00738626v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Fr\u00e9d\u00e9ric Cuppens, et al.. Using requirements engineering in an automatic security policy derivation process. <i>DPM - SETOP 2011 : 6th International Workshop on Data Privacy Management and 4th International Workshop on Autonomous and Spontaneous Security<\/i>, Sep 2011, Leuven, Belgium. pp.155-172, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-28879-1_11\">&#x27E8;10.1007\/978-3-642-28879-1_11&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00738844v1\">&#x27E8;hal-00738844&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00738844v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Natalia Kushik, Amel Mammar, Ana Rosa Cavalli, Nina Yevtushenko, Edgardo Montes de Oca. A SPIN-based approach for detecting vulnerabilities in C programs. <i>PSSV 2011 : 2nd Workshop on Program Semantics, Specification and Verification : Theory and Applications<\/i>, Jun 2011, St Petersburg, Russia. pp.131 - 143. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01465027v1\">&#x27E8;hal-01465027&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01465027v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Amel Mammar, Ana Rosa Cavalli, Willy Ronald Jimenez Freitez, Wissam Mallouli, Edgardo Montes de Oca. Using testing techniques for vulnerability detection in C programs. <i>23th International Conference on Testing Software and Systems (ICTSS)<\/i>, Nov 2011, Paris, France. pp.80-96, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-24580-0_7\">&#x27E8;10.1007\/978-3-642-24580-0_7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01303013v1\">&#x27E8;hal-01303013&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01303013\/file\/978-3-642-24580-0_7_Chapter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01303013\/file\/978-3-642-24580-0_7_Chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01303013\/file\/978-3-642-24580-0_7_Chapter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01303013v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anderson Morais, Ana Rosa Cavalli. Route manipulation attack in wireless mesh networks. <i>AINA 2011 : 25th International Conference on Advanced Information Networking and Applications<\/i>, Mar 2011, Biopolis, Singapore. pp.501 - 508, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/AINA.2011.11\">&#x27E8;10.1109\/AINA.2011.11&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01465746v1\">&#x27E8;hal-01465746&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01465746v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anderson Morais, Ana Rosa Cavalli. Detection of attacks in wireless mesh networks. <i>LADC 2011 : 5th Latin-American Symposium on Dependable Computing<\/i>, Apr 2011, Sao Jose Dos Campos, Brazil. pp.45 - 54, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/LADC.2011.13\">&#x27E8;10.1109\/LADC.2011.13&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01301634v1\">&#x27E8;hal-01301634&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01301634v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anderson Morais, Ana Rosa Cavalli. A quality of experience based approach for wireless mesh networks. <i>9th Wired\/Wireless Internet Communications (WWIC)<\/i>, Jun 2011, Vilanova I La Geltr\u00fa, Spain. pp.162-173, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-21560-5_14\">&#x27E8;10.1007\/978-3-642-21560-5_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01301638v1\">&#x27E8;hal-01301638&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01301638\/file\/978-3-642-21560-5_14_Chapter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01301638\/file\/978-3-642-21560-5_14_Chapter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01301638\/file\/978-3-642-21560-5_14_Chapter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01301638v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anderson Morais, Ana Rosa Cavalli, Eliane Martins. A model-based attack injection approach for security validation. <i>SIN '11 : 4th international conference on Security of information and networks<\/i>, Nov 2011, Sydney, Australia. pp.103-110, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2070425.2070443\">&#x27E8;10.1145\/2070425.2070443&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00711762v1\">&#x27E8;hal-00711762&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00711762v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Marcelo Odin, Jose Pablo Escobedo, Ana Rosa Cavalli, Stephane Maag, Ariel Sabiguero. Cost effective cross-layer protocol testing : a case study. <i>CASE 2011 : Congreso Argentino de Sistemas Embebidos<\/i>, Mar 2011, Buenos Aires, Argentina. pp.103 - 108. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01303607v1\">&#x27E8;hal-01303607&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01303607v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maxim Zhigulin, Stephane Maag, Ana Rosa Cavalli, Nina Yevtushenko. FSM-based test derivation strategies for systems with time-outs. <i>QSIC 2011 : 11th International Conference On Quality Software<\/i>, Jul 2011, Madrid, Spain. pp.141 - 149, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/QSIC.2011.30\">&#x27E8;10.1109\/QSIC.2011.30&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01303601v1\">&#x27E8;hal-01303601&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01303601v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fay\u00e7al Bessayah, Ana Rosa Cavalli. A formal passive testing approach for checking real time constraints. <i>QUATIC 2010 : 7th International Conference on the Quality of Information and Communications Technology<\/i>, Sep 2010, Porto, Portugal. pp.274 - 279, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/QUATIC.2010.55\">&#x27E8;10.1109\/QUATIC.2010.55&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01306297v1\">&#x27E8;hal-01306297&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01306297v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fay\u00e7al Bessayah, Ana Rosa Cavalli, William Maja, Eliane Martins, Andre Willik  Valenti. A fault injection tool for testing web services composition. <i>TAIC PART 2010 : Testing: Academic & Industrial Conference Practice and Research Techniques<\/i>, Sep 2010, Windsor, United Kingdom. pp.137 - 146, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-15585-7_13\">&#x27E8;10.1007\/978-3-642-15585-7_13&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01306763v1\">&#x27E8;hal-01306763&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01306763v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Tien-Dung Cao, Wissam Mallouli, Eliane Martins, Andrey Sadovykh, et al.. Webmov : a dedicated framework for the modelling and testing of web services composition. <i>ICWS 2010 : 8th International Conference on Web Services<\/i>, Jul 2010, Miami, United States. pp.377 - 384, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICWS.2010.24\">&#x27E8;10.1109\/ICWS.2010.24&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01306746v1\">&#x27E8;hal-01306746&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01306746v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mazen El Maarabani, Iksoon Hwang, Ana Rosa Cavalli. A formal approach for interoperability testing of security rules. <i>SITIS 2010 : 6th International Conference on Signal-Image Technology & Internet-Based Systems<\/i>, Dec 2010, Kuala Lumpur, Malaysia. pp.277 - 284, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SITIS.2010.53\">&#x27E8;10.1109\/SITIS.2010.53&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01305099v1\">&#x27E8;hal-01305099&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01305099v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana Rosa Cavalli. Testing web service orchestrators in context : a symbolic approach. <i>SEFM 2010 : 8th IEEE International Conference on Software Engineering and Formal Methods<\/i>, Sep 2010, Pisa, Italy. pp.257 - 267, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SEFM.2010.30\">&#x27E8;10.1109\/SEFM.2010.30&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01306744v1\">&#x27E8;hal-01306744&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01306744v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Anderson Morais, Ana Rosa Cavalli, Eliane Martins. Attack scripts generation for security validation. <i>SEC-SY '10 : S\u00e9curit\u00e9 des Syst\u00e8mes d'Information et les Environnements Collaboratifs<\/i>, May 2010, Marseille, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00727714v1\">&#x27E8;hal-00727714&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00727714v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gerardo Morales, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca, et al.. Timed extended invariants for the passive testing of Web services. <i>ICWS 2010 : 8th International Conference on Web Services<\/i>, Jul 2010, Miami, United States. pp.592 - 599, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICWS.2010.17\">&#x27E8;10.1109\/ICWS.2010.17&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01309503v1\">&#x27E8;hal-01309503&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01309503v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. Transmit and reserve (tar) : a coordinated channel access for IEEE 802.11 networks. <i>WCNC 2010 : IEEE Wireless Communications and Networking Conference<\/i>, Apr 2010, Sidney, Australia. pp.1 - 6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WCNC.2010.5506240\">&#x27E8;10.1109\/WCNC.2010.5506240&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01306741v1\">&#x27E8;hal-01306741&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01306741v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Morais Anderson, Ana Rosa Cavalli, Eliane Martins, Willy Ronald Jimenez Freitez. Security protocol testing using attack trees. <i>CSE '09 : 12th IEEE International Conference on Computational Science and Engineering<\/i>, Aug 2009, Vancouver, Canada. pp.690-697, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CSE.2009.206\">&#x27E8;10.1109\/CSE.2009.206&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00446770v1\">&#x27E8;hal-00446770&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00446770v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">C\u00e9sar Andr\u00e9s, Stephane Maag, Ana Rosa Cavalli, Mercedes Merayo, Manuel Nunez. Analysis of the OLSR protocol by using formal passive testing. <i>APSEC 2009 : 16th Asia-Pacific Software Engineering Conference<\/i>, Dec 2009, Penang, Malaysia. pp.152 - 159, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/APSEC.2009.37\">&#x27E8;10.1109\/APSEC.2009.37&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01366249v1\">&#x27E8;hal-01366249&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01366249v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fay\u00e7al Bessayah, Ana Rosa Cavalli, Eliane Martins. A formal approach for specification and verification of fault injection process. <i>ICIS '09 : International Conference on Interaction Sciences<\/i>, Dec 2009, Phoenix, United States. pp.883-890, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1655925.1656086\">&#x27E8;10.1145\/1655925.1656086&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00771611v1\">&#x27E8;hal-00771611&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00771611v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Azzedine Benameur, Wissam Mallouli, Keqin Li. A passive testing approach for security checking and its practical usage for web services monitoring. <i>NOTERE 2009 : 9e Conf\u00e9rence Internationale sur Les NOuvelles TEchnologies de la REpartition<\/i>, Jun 2009, Montr\u00e9al, Canada. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01360187v1\">&#x27E8;hal-01360187&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01360187\/file\/notere09.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01360187\/file\/notere09.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01360187\/file\/notere09.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01360187v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Stephane Maag, Edgardo Montes de Oca, Fatiha Zaidi. A formal passive testing approach to test a MANET routing protocol. <i>PWN 2009 : 5th IEEE PerCom Workshop on Pervasive Wireless Networking <\/i>, Mar 2009, Galveston, United States. pp.1 - 6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/PERCOM.2009.4912874\">&#x27E8;10.1109\/PERCOM.2009.4912874&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01369686v1\">&#x27E8;hal-01369686&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01369686v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Stephane Maag, Edgardo Montes de Oca. A passive conformance testing approach for a MANET routing protocol. <i>SAC '09 : 24th Annual ACM Symposium on Applied Computing<\/i>, Mar 2009, Hawai, United States. pp.207-211, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1529282.1529326\">&#x27E8;10.1145\/1529282.1529326&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00771619v1\">&#x27E8;hal-00771619&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00771619v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mazen El Maarabani, Asma Adala, Iksoon Hwang, Ana Rosa Cavalli. Interoperability testing of presence service on IMS platform. <i>TridentCom 2009 : 5th International Conference onTestbeds and Research Infrastructures for the Development of Networks & Communities and Workshops<\/i>, Apr 2009, Washington, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TRIDENTCOM.2009.4976260\">&#x27E8;10.1109\/TRIDENTCOM.2009.4976260&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00442192v1\">&#x27E8;hal-00442192&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00442192v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana Rosa Cavalli. Observability and controllability issues in conformance testing of Web service compositions. <i>TESTCOM\/FATES 2009 : 21st IFIP International Conference on Testing of Communicating Systems and 9th International Workshop on Formal Approaches to Testing of Software<\/i>, Nov 2009, Eindhoven, Netherlands. pp.217 - 222, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-05031-2_15\">&#x27E8;10.1007\/978-3-642-05031-2_15&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01360755v1\">&#x27E8;hal-01360755&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01360755v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Iksoon Hwang, Mounir Lallali, Ana Rosa Cavalli, Dominique Verch\u00e8re. Modeling, validation, and verification of PCEP using the IF language. <i>FMOODS\/FORTE 2009 : 11th Formal Methods for Open Object-Based Distributed Systems and 29th Formal Techniques for Networked and Distributed Systems<\/i>, Jun 2009, Lisboa, Portugal. pp.122 - 136, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-02138-1_8\">&#x27E8;10.1007\/978-3-642-02138-1_8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00446605v1\">&#x27E8;hal-00446605&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00446605v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Willy Ronald Jimenez Freitez, Amel Mammar, Ana Rosa Cavalli. Software vulnerabilities, prevention and detection methods : a review. <i>SEC-MDA 2009 : Security in Model Driven Architecture <\/i>, Jun 2009, Enschede, Netherlands. pp.1 - 11. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01367445v1\">&#x27E8;hal-01367445&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01367445\/file\/GET_sec-mda09.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01367445\/file\/GET_sec-mda09.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01367445\/file\/GET_sec-mda09.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01367445v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Felipe Lalanne Rojas, Stephane Maag, Edgardo Montes de Oca, Ana Rosa Cavalli, Wissam Mallouli, et al.. An automated passive testing approach for the IMS PoC service. <i>ASE 2009 : 24th IEEE\/ACM International Conference on Automated Software Engineering<\/i>, Nov 2009, Auckland, New Zealand. pp.535 - 539, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ASE.2009.33\">&#x27E8;10.1109\/ASE.2009.33&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01316417v1\">&#x27E8;hal-01316417&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01316417v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wissam Mallouli, Amel Mammar, Ana Rosa Cavalli. A formal framework to integrate timed security rules within a TEFSM-based system specification. <i>APSEC 2009 : 16th AsiaPacific Software Engineering Conference<\/i>, Dec 2009, Batu Ferringhi, Malaysia. pp.489 - 496, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/APSEC.2009.52\">&#x27E8;10.1109\/APSEC.2009.52&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00444089v1\">&#x27E8;hal-00444089&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00444089\/file\/mallouli2009.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00444089\/file\/mallouli2009.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00444089\/file\/mallouli2009.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00444089v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wissam Mallouli, Amel Mammar, Ana Cavalli. Prise en Compte de R\u00e8gles de S\u00e9curit\u00e9 Temporelles dans une Sp\u00e9ci\ufb01cation TEFSM d'un Syst\u00e8me. <i>CFIP'2009<\/i>, Oct 2009, Strasbourg, France. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/inria-00419463v1\">&#x27E8;inria-00419463&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/inria-00419463\/file\/34.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00419463\/file\/34.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00419463\/file\/34.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00419463v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Amel Mammar, Ana Rosa Cavalli, Edgardo Montes de Oca, Shanai Ardi, David Byers, et al.. Mod\u00e9lisation et d\u00e9tection formelles de vuln\u00e9rabilit\u00e9s logicielles par le test passif. <i>SAR-SSI 2009 : 4eme Conf\u00e9rence sur la S\u00e9curit\u00e9 des Architectures R\u00e9seaux et des Syst\u00e8mes d'Information <\/i>, Jun 2009, Luchon, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00444066v1\">&#x27E8;hal-00444066&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00444066v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Eliane Martins, Ana Rosa Cavalli, Jean Arlat, Regina Moraes, Taisy Weber. RobustWeb : development and validation of SOA applications based on Web services. <i>Colloquium of Computation : Brazil \/ INRIA, Cooperations, Advances and Challenges<\/i>, Jul 2009, Rio Grande Do Sul, Brazil. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00448589v1\">&#x27E8;hal-00448589&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00448589v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fatima Mattiello-Francisco, Eliane Martins, Andr\u00e9 Corsetti, Ana Rosa Cavalli, Edgard Yano. Extended interoperability models for timed system robustness testing. <i>LATINCOM '09 : IEEE Latin-American Conference on Communications<\/i>, Sep 2009, Medelin, Colombia. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/LATINCOM.2009.5304903\">&#x27E8;10.1109\/LATINCOM.2009.5304903&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00448581v1\">&#x27E8;hal-00448581&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00448581v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mercedes Merayo, Iksoon Hwang, Manuel Nunez, Ana Rosa Cavalli. A statistical approach to test stochastic and probabilistic systems. <i>ICFEM 2009 : 11th International Conference on Formal Engineering Methods<\/i>, Dec 2009, Rio De Janeiro, Brazil. pp.186 - 205, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-10373-5_10\">&#x27E8;10.1007\/978-3-642-10373-5_10&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01360751v1\">&#x27E8;hal-01360751&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01360751v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Fatiha Zaidi, Emmanuel Bayse, Ana Rosa Cavalli. Network protocol interoperability testing based on contextual signatures and passive testing. <i>SAC 2009 : 24th Annual ACM Symposium on Applied Computing<\/i>, Mar 2009, Honolulu (Hawaii), United States. pp.2 - 7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1529282.1529284\">&#x27E8;10.1145\/1529282.1529284&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01316444v1\">&#x27E8;hal-01316444&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01316444v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2008<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Cavalli, Eliane Martins, Anderson Morais, Bruno Moreira. Une approche de test de robustesse bas\u00e9e sur l'injection de fautes et le monitorage. <i>Colloque Francophone sur l'Ing\u00e9nierie des Protocoles (CFIP)<\/i>, Mar 2008, Les Arcs, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00250162v1\">&#x27E8;hal-00250162&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00250162\/file\/submission_55.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00250162\/file\/submission_55.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00250162\/file\/submission_55.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00250162v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Eliane Martins, Anderson Morais. Use of invariant properties to evaluate the results of fault-injection-based robustness testing of protocol implementations. <i>ICSTW 2008 : 1st International Conference on Software Testing Verification and Validation Workshop<\/i>, Apr 2008, Lillehammer, Norway. pp.21 - 30, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICSTW.2008.51\">&#x27E8;10.1109\/ICSTW.2008.51&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01326406v1\">&#x27E8;hal-01326406&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01326406v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">C\u00e9line Coma, Nora Cuppens-Bouhlahia, Fr\u00e9d\u00e9ric Cuppens, Ana Rosa Cavalli. Context ontology for secure interoperability. <i>FARES 2008 : International Workshop on Frontiers in Availability, Reliability and Security<\/i>, Mar 2008, Barcelona, Spain. pp.821-827, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2008.133\">&#x27E8;10.1109\/ARES.2008.133&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00796516v1\">&#x27E8;hal-00796516&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00796516v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wissam Mallouli, Fay\u00e7al Bessayah, Ana Rosa Cavalli, Azzedine Benameur. Security rules specification and analysis based on passive testing. <i>GLOBECOM 2008 : IEEE Global Telecommunications Conference<\/i>, Nov 2008, New Orleans, United States. pp.1 - 6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/GLOCOM.2008.ECP.400\">&#x27E8;10.1109\/GLOCOM.2008.ECP.400&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01378696v1\">&#x27E8;hal-01378696&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01378696v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wissam Mallouli, Bachar Wehbi, Ana Rosa Cavalli. Distributed monitoring in Ad Hoc networks : conformance and security checking. <i> AdHoc-NOW 2008 : 7th International Conference on Ad Hoc Networks and Wireless<\/i>, Sep 2008, Sophia-Antipolis, France. pp.345 - 356, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-85209-4_27\">&#x27E8;10.1007\/978-3-540-85209-4_27&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01327393v1\">&#x27E8;hal-01327393&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01327393v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wissam Mallouli, Gerardo Morales, Ana Rosa Cavalli. Testing security policies for web applications. <i>ICSTW '08 : IEEE International Conference on Software Testing Verification and Validation Workshop<\/i>, Apr 2008, Lillehammer, Norway. pp.269-270, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICSTW.2008.45\">&#x27E8;10.1109\/ICSTW.2008.45&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00796098v1\">&#x27E8;hal-00796098&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00796098v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wissam Mallouli, Amel Mammar, Ana Rosa Cavalli. Modeling system security rules with time constraints using timed extended finite state machines. <i>DS-RT 2008 : 12th IEEE\/ACM International Symposium on Distributed Simulation an Real Time Applications<\/i>, Oct 2008, Vancouver, Canada. pp.173 - 180, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/DS-RT.2008.22\">&#x27E8;10.1109\/DS-RT.2008.22&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01380237v1\">&#x27E8;hal-01380237&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01380237v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Eliane Martins, Anderson Morais, Ana Rosa Cavalli. Generating attack scenarios for the validation of security protocol implementations. <i>SAST '08 : 2nd Brazilian Workshop on Systematic and Automated Software Testing<\/i>, Oct 2008, Campinas, Brazil. pp.21-33. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00796077v1\">&#x27E8;hal-00796077&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00796077v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. A reactive wireless mesh network architecture. <i>Med-Hoc-Net 2008 : Seventh Annual Mediterranean Ad Hoc Networking Workshop : Advances in Ad Hoc Networking<\/i>, Jun 2008, Palma De Mallorca, Spain. pp.203 - 214, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-0-387-09490-8_18\">&#x27E8;10.1007\/978-0-387-09490-8_18&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01373149v1\">&#x27E8;hal-01373149&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01373149v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. ReDEx : Receiver Diversity Exploitation mechanism for 802.11 wireless networks. <i>ICLAN 2008 : International Conference on the Latest Advances in Networks<\/i>, Dec 2008, Toulouse, France. pp.1 - 6. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01394732v1\">&#x27E8;hal-01394732&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01394732v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Bachar Wehbi, Anis Laouiti, Ana Rosa Cavalli. Efficient time synchronization mechanism for wireless multi hop networks. <i>PIMRC 2008 : IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications<\/i>, Sep 2008, Cannes, France. pp.1 - 6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/PIMRC.2008.4699638\">&#x27E8;10.1109\/PIMRC.2008.4699638&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01379599v1\">&#x27E8;hal-01379599&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01379599v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2007<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Rosa Cavalli, Stephane Maag, Gerardo Morales. Regression and performance testing of an e-learning Web application : dotLRN. <i>SITIS 2007 : 3rd International Conference on Signal Image Technology and Internet-Based Systems<\/i>, Dec 2007, Shangai, China. pp.369 - 376, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SITIS.2007.129\">&#x27E8;10.1109\/SITIS.2007.129&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328016v1\">&#x27E8;hal-01328016&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01328016v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2006<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ana Cavalli, Timothy Griffin, Dario Vieira. MSP: A Novel Session Maintenance Protocol. <i>2006 14th IEEE International Conference on Networks<\/i>, Sep 2006, Singapore, France. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICON.2006.302611\">&#x27E8;10.1109\/ICON.2006.302611&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04085693v1\">&#x27E8;hal-04085693&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04085693v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Dario Vieira, Ana Cavalli. V\u00e9rification et analyse de performance d'un protocole de gestion de session. <i>CFIP 2006: Colloque Francophone sur l'Ing\u00e9nierie des Protocoles<\/i>, Eric Fleury and Farouk Kamoun, Oct 2006, Tozeur, Tunisie. 12 p. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/inria-00111718v1\">&#x27E8;inria-00111718&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/inria-00111718\/file\/CFIP-ID-30.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00111718\/file\/CFIP-ID-30.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00111718\/file\/CFIP-ID-30.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00111718v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2003<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">C\u00e9dric Besse, Ana Cavalli, Fatiha Za\u00efdi. G\u00e9n\u00e9ration de tests d'int\u00e9rop\u00e9rabilit\u00e9 pour le protocole TCP. <i>4\u00e8me Colloque Francophone sur la Mod\u00e9lisation des Syst\u00e8mes R\u00e9actifs (MSR '03)<\/i>, Oct 2003, Metz, France. pp.447-461. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01530440v1\">&#x27E8;hal-01530440&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01530440v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Chapitre d'ouvrage<\/p>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R Cavalli, Edgardo Montes De Oca. 5Greplay: a 5G network traffic fuzzer - application to attack injection. <i>ARES '21 : Actes de la 16e Conf\u00e9rence internationale sur la disponibilit\u00e9, la fiabilit\u00e9 et la s\u00e9curit\u00e9<\/i>, ACM, pp.1-8, 2021, 9781450390514. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3465481.3470079\">&#x27E8;10.1145\/3465481.3470079&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04478392v1\">&#x27E8;hal-04478392&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04478392v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Rab\u00e9a Ameur-Boulifa, Ana R Cavalli, Stephane Maag. From formal test objectives to TTCN-3 for verifying ETCS complex software control systems. <i>Communications in Computer and Information Science<\/i>, 1250, Springer International Publishing; Springer, pp.156-178, 2020, Communications in Computer and Information Science (CCIS), 978-3-030-52990-1. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-52991-8_8\">&#x27E8;10.1007\/978-3-030-52991-8_8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02904831v1\">&#x27E8;hal-02904831&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02904831v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jeevan Pokhrel, Natalia Kushik, Bachar Wehbi, Nina Yevtushenko, Ana Rosa Cavalli. Multimedia Quality of Experience. <i>Emerging research on networked multimedia communication systems<\/i>, Information Science Reference, pp.250 - 284, 2015, Advances in multimedia and interactive technologies book series, 978-1-466-68850-6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4018\/978-1-4666-8850-6.ch008\">&#x27E8;10.4018\/978-1-4666-8850-6.ch008&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263826v1\">&#x27E8;hal-01263826&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263826v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Antonio Cuadra  Sanchez, Maria del Mar Cutanda Rodriguez, Andreas Aurelius, Kjell Brunnstr\u00f6m, Jorge E. L\u00f3pez de Vergara, et al.. An ecosystem for customer experience management. <i>Quality of experience engineering for customer added value services: from evaluation to monitoring<\/i>, Wiley, pp.1 - 256, 2014, ISTE, 978-1-84821-672-3. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/9781118984352.ch2\">&#x27E8;10.1002\/9781118984352.ch2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01255095v1\">&#x27E8;hal-01255095&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01255095v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Pramila Mouttappa, Stephane Maag, Ana Rosa Cavalli. Symbolic-based monitoring for embedded applications. <i>Handbook of research on embedded systems design<\/i>, IGI Global, pp.52 - 74, 2014, Advances in Systems Analysis, Software Engineering, and High Performance Computing book series, 978-1-466-66194-3. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4018\/978-1-4666-6194-3.ch003\">&#x27E8;10.4018\/978-1-4666-6194-3.ch003&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263345v1\">&#x27E8;hal-01263345&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263345v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2011<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wissam Mallouli, Bachar Wehbi, Ana Rosa Cavalli, Stephane Maag. Formal supervision of mobile ad hoc networks for security flaws detection. <i>Security engineering techniques and solutions for information systems : management and implementation<\/i>, IGI Global, 2011, 978-1-615-20803-6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4018\/978-1-61520-803-6\">&#x27E8;10.4018\/978-1-61520-803-6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00690721v1\">&#x27E8;hal-00690721&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00690721v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wissam Mallouli, Mounir Lallali, Amel Mammar, Gerardo Morales, Ana Rosa Cavalli. Modeling and testing secure web applications. <i>Web-based information technologies and distributed systems<\/i>, Atlantis Press, pp.207-255, 2010, Atlantis Ambient and Pervasive Intelligence, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-94-91216-32-9_10\">&#x27E8;10.1007\/978-94-91216-32-9_10&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00673835v1\">&#x27E8;hal-00673835&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00673835v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jean-Marie Orset, Ana Rosa Cavalli. Security in ad hoc networks. <i>Wireless and mobile network security : security basics, security in on-the-shelf and emerging technologies<\/i>, iSTE-WILEY, pp.475-524, 2009, 978-1-84821-117-9. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00801279v1\">&#x27E8;hal-00801279&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00801279v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>N\u00b0sp\u00e9cial de revue\/special issue<\/p>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ricardo Perez-Castillo, Ana Paiva, Ana Rosa Cavalli. Special issue on information systems quality for digital transformation. <i>Software Quality Journal<\/i>, 30 (4), pp.953-954, 2022, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11219-022-09608-y\">&#x27E8;10.1007\/s11219-022-09608-y&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04476915v1\">&#x27E8;hal-04476915&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04476915v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Ouvrages<\/p>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nina Yevtushenko, Ana Rosa Cavalli, Husnu Yenigun. Testing Software and Systems. Springer International Publishing, LNCS-10533, 2017, Lecture Notes in Computer Science, 978-3-319-67548-0. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-67549-7\">&#x27E8;10.1007\/978-3-319-67549-7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01678967v1\">&#x27E8;hal-01678967&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/inria.hal.science\/hal-01678967v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Proceedings\/Recueil des communications<\/p>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David Clark, H\u00e9ctor D. Men\u00e9ndez, Ana R Cavalli. Testing Software and Systems. <i>IFIP International Conference on Testing Software and Systems (ICTSS)<\/i>, 13045, 2022, Lecture Notes in Computer Science, 978-3-031-04673-5. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-04673-5\">&#x27E8;10.1007\/978-3-031-04673-5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04478239v1\">&#x27E8;hal-04478239&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04478239v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Rapport<\/p>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R Cavalli, Joaquin Garcia\u2010alfaro. Cyber-resilience approaches for cyber-physical systems. T\u00e9l\u00e9com SudParis (Institut Mines-T\u00e9l\u00e9com). 2023. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04495662v1\">&#x27E8;hal-04495662&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/2302.05402\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/2302.05402\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04495662v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":4266,"parent":2438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":""},"class_list":["post-3509","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=3509"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3509\/revisions"}],"predecessor-version":[{"id":3510,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3509\/revisions\/3510"}],"up":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/2438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media\/4266"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=3509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}