Ana R. Cavalli

Orcid: 0000-0003-2586-9071

Affiliations:
  • Montimage, Paris, France
  • Telecom SudParis, SAMOVAR, Évry, France


According to our database1, Ana R. Cavalli authored at least 224 papers between 1984 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cyber-Resilience Approaches for Cyber-Physical Systems.
CoRR, 2023

A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks.
IEEE Access, 2023

Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection.
Proceedings of the 18th International Conference on Software Technologies, 2023

Cybersecurity, Monitoring, Explainability and Resilience.
Proceedings of the Fourteenth International Conference on Mobile Computing and Ubiquitous Network, 2023

Testing techniques to assess impact and cascading effects.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

Towards Smarter Security Orchestration and Automatic Response for CPS and IoT.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

5G SUCI Catcher: Attack and Detection.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

The DYNABIC approach to resilience of critical infrastructures.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

A deep learning anomaly detection framework with explainability and robustness.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

HTTP/2 Attacks Generation using 5Greplay.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Special issue on information systems quality for digital transformation.
Softw. Qual. J., 2022

Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications.
EURASIP J. Wirel. Commun. Netw., 2022

Switched-based Control Testbed to Assure Cyber-physical Resilience by Design.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Digital Twin for IoT Environments: A Testing and Simulation Tool.
Proceedings of the Quality of Information and Communications Technology, 2022

Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper).
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic.
Proceedings of the 17th International Conference on Software Technologies, 2022

2021
Security testing and resilience.
Proceedings of the 14th IEEE International Conference on Software Testing, 2021

A Framework for Security Monitoring of Real IoT Testbeds.
Proceedings of the 16th International Conference on Software Technologies, 2021

SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Switched-Based Resilient Control of Cyber-Physical Systems.
IEEE Access, 2020

Cyber-Resilience Evaluation of Cyber-Physical Systems.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Metrics-driven DevSecOps.
Proceedings of the 15th International Conference on Software Technologies, 2020

2019
Guest Editorial: Special issue on Testing Software and Systems.
Softw. Qual. J., 2019

A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication.
Int. J. Auton. Adapt. Commun. Syst., 2019

Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms.
Proceedings of the Testing Software and Systems, 2019

Attack Tolerance for Services-Based Applications in the Cloud.
Proceedings of the Testing Software and Systems, 2019

A Methodology for Enterprise Resource Planning Automation Testing Application to the Open Source ERP-ODOO.
Proceedings of the 14th International Conference on Software Technologies, 2019

From Formal Test Objectives to TTCN-3 for Verifying ETCS Complex Software Control Systems.
Proceedings of the Software Technologies - 14th International Conference, 2019

Verifying Complex Software Control Systems from Test Objectives: Application to the ETCS System.
Proceedings of the 14th International Conference on Software Technologies, 2019

Reflective Attenuation of Cyber-Physical Attacks.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System.
Comput. J., 2018

Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection.
Proceedings of the Web Services - ICWS 2018, 2018

Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion.
Proceedings of the 13th International Conference on Software Technologies, 2018

Smart Measurements and Analysis for Software Quality Enhancement.
Proceedings of the Software Technologies - 13th International Conference, 2018

A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper).
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

2017
How Web Services Can Be Tolerant to Intruders through Diversification.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection.
Proceedings of the 12th International Conference on Software Technologies, 2017

Multi-cloud Applications Security Monitoring.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Decreasing the complexity of deriving test suites against nondeterministic finite state machines.
Proceedings of the 2017 IEEE East-West Design & Test Symposium, 2017

A Platform for Security Monitoring of Multi-cloud Applications.
Proceedings of the Perspectives of System Informatics, 2017

A Study of Threat Detection Systems and Techniques in the Cloud.
Proceedings of the Risks and Security of Internet and Systems, 2017

Model-Based Attack Tolerance.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

An Attack-Tolerant Framework for Web Services.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

2016
On adaptive experiments for nondeterministic finite state machines.
Int. J. Softw. Tools Technol. Transf., 2016

Formal framework for defining trust in multi-organisation environment.
Int. J. Auton. Adapt. Commun. Syst., 2016

Path sampling, a robust alternative to gossiping for opportunistic network routing.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Effectively Testing of Timed Composite Systems using Test Case Prioritization.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State Machines.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Opportunistic media sharing for mobile networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

An Implementation of a QoE Evaluation Technique Including Business Model Parameters.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016

Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

A Misbehavior Node Detection Algorithm for 6LoWPAN Wireless Sensor Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

An Analysis of Secure M2M Communication in WSNs Using DTLS.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

Optimizing network utilization through source code state model representation.
Proceedings of the 2016 IEEE East-West Design & Test Symposium, 2016

A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory.
Proceedings of the Risks and Security of Internet and Systems, 2016

A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

QoE-Driven Service Optimization Aware of the Business Model.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
An effective attack detection approach in wireless mesh networks.
Int. J. Space Based Situated Comput., 2015

A survey on formal active and passive testing with applications to the cloud.
Ann. des Télécommunications, 2015

Special issue on formal active and passive testing of distributed and networked systems.
Ann. des Télécommunications, 2015

A Survey on Wireless Sensors Networks Security Based on a Layered Approach.
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015

An Abstraction for the Interoperability Analysis of Security Policies.
Proceedings of the Network and System Security - 9th International Conference, 2015

Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol.
Proceedings of the 2015 Latin American Network Operations and Management Symposium, 2015

QoE Evaluation Based on QoS and QoBiz Parameters Applied to an OTT Service.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Process Mining for Trust Monitoring.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

An Active Testing Tool for Security Testing of Distributed Systems.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks.
Mob. Networks Appl., 2014

Validation of a Trust Approach in Multi-Organization Environments.
Int. J. Secur. Softw. Eng., 2014

QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches.
Int. J. Organ. Collect. Intell., 2014

Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study.
CoRR, 2014

Evaluating Web Service QoE by Learning Logic Networks.
Proceedings of the WEBIST 2014, 2014

Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Testing Network Protocols: formally, at runtime and online.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

On Testing against Partial Non-observable Specifications.
Proceedings of the 9th International Conference on the Quality of Information and Communications Technology, 2014

How to Evaluate Trust Using MMT.
Proceedings of the Network and System Security - 8th International Conference, 2014

Estimation of video QoE from MAC parameters in wireless network: A Random Neural Network approach.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

Détection de flux de contrôle illégaux dans les Smartphones.
Proceedings of the Actes du XXXIIème Congrès INFORSID, Lyon, France, 20-23 Mai 2014., 2014

On Modeling and Testing Security Properties of Vehicular Networks.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

A Formal Approach to Automatic Testing of Security Policies Specified in XACML.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

ISER: A Platform for Security Interoperability of Multi-source Systems.
Proceedings of the Risks and Security of Internet and Systems, 2014

A Framework for Distributed Testing of Timed Composite Systems.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
ICST 2010 Special Issue.
Softw. Test. Verification Reliab., 2013

Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols.
Comput. Networks, 2013

Trust Ontology Based on Access Control Parameters in Multi-organization Environments.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Formal Characterization of Illegal Control Flow in Android System.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Evaluating Web Service Quality Using Finite State Models.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

Evaluating Quality of Web Services: A Short Survey.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Security Properties in Virtual Organizations.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case Study.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Estimation of QoE of video traffic using a fuzzy expert system.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

An Effective Attack Detection Approach in Wireless Mesh Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Applying formal methods to PCEP: an industrial case study from modeling to test generation.
Softw. Test. Verification Reliab., 2012

InRob: An approach for testing interoperability and robustness of real-time embedded software.
J. Syst. Softw., 2012

Tight bound on the length of distinguishing sequences for non-observable nondeterministic Finite-State Machines with a polynomial number of inputs and outputs.
Inf. Process. Lett., 2012

An advanced approach for modeling and detecting software vulnerabilities.
Inf. Softw. Technol., 2012

A systematic approach to integrate common timed security rules within a TEFSM-based system specification.
Inf. Softw. Technol., 2012

A SPIN-based approach for detecting vulnerabilities in C programs.
Autom. Control. Comput. Sci., 2012

Quality of Experience as a Selection Criterion for Web Services.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Testing Interoperability Security Policies.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

A distributed intrusion detection scheme for wireless ad hoc networks.
Proceedings of the ACM Symposium on Applied Computing, 2012

An IOSTS Based Passive Testing Approach for the Validation of Data-Centric Protocols.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments.
Proceedings of the Information Systems Security, 8th International Conference, 2012

How to Reduce the Cost of Passive Testing.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Role based interoperability security policies in collaborative systems.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

An Event-Based Packet Dropping Detection Scheme for Wireless Mesh Networks.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

A vector based model approach for defining trust in Multi-Organization Environments.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
VDC-Based Dynamic Code Analysis: Application to C Programs.
J. Internet Serv. Inf. Secur., 2011

A Quality of Experience Based Approach for Wireless Mesh Networks.
Proceedings of the Wired/Wireless Internet Communications, 2011

A model-based attack injection approach for security validation.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

FSM-Based Test Derivation Strategies for Systems with Time-Outs.
Proceedings of the 11th International Conference on Quality Software, 2011

Using Testing Techniques for Vulnerability Detection in C Programs.
Proceedings of the Testing Software and Systems, 2011

Detection of Attacks in Wireless Mesh Networks.
Proceedings of the 5th Latin-American Symposium on Dependable Computing, 2011

Verification of Interoperability Security Policies by Model Checking.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Using Requirements Engineering in an Automatic Security Policy Derivation Process.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Route Manipulation Attack in Wireless Mesh Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
FSM-based conformance testing methods: A survey annotated with experimental evaluation.
Inf. Softw. Technol., 2010

Testing a probabilistic FSM using interval estimation.
Comput. Networks, 2010

Transmit and Reserve (TAR): A Coordinated Channel Access for IEEE 802.11 Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

A Fault Injection Tool for Testing Web Services Composition.
Proceedings of the Testing, 2010

A Formal Approach for Interoperability Testing of Security Rules.
Proceedings of the Sixth International Conference on Signal-Image Technology and Internet-Based Systems, 2010

Testing Web Service Orchestrators in Context: A Symbolic Approach.
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010

A Formal Passive Testing Approach for Checking Real Time Constraints.
Proceedings of the Quality of Information and Communications Technology, 2010

Timed Extended Invariants for the Passive Testing of Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition.
Proceedings of the IEEE International Conference on Web Services, 2010

2009
Interoperability testing of presence service on IMS platform.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Network protocol interoperability testing based on contextual signatures and passive testing.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A passive conformance testing approach for a MANET routing protocol.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Observability and Controllability Issues in Conformance Testing of Web Service Compositions.
Proceedings of the Testing of Software and Communication Systems, 2009

A Formal Passive Testing Approach to test a MANET Routing Protocol.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Automated Passive Testing Approach for the IMS PoC Service.
Proceedings of the ASE 2009, 2009

A formal approach for specification and verification of fault injection process.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A Statistical Approach to Test Stochastic and Probabilistic Systems.
Proceedings of the Formal Methods and Software Engineering, 2009

Modeling, Validation, and Verification of PCEP Using the IF Language.
Proceedings of the Formal Techniques for Distributed Systems, 2009

Security Protocol Testing Using Attack Trees.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009

Analysis of the OLSR Protocol by Using Formal Passive Testing.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009

2008
A formal validation methodology for MANET routing protocols based on nodes' self similarity.
Comput. Commun., 2008

Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Interoperability of Context Based System Policies Using O2O Contract.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Efficient time synchronization mechanism for wireless multi hop networks.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

A Reactive Wireless Mesh Network Architecture.
Proceedings of the Advances in Ad Hoc Networking, 2008

Testing Security Policies for Web Applications.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Use of invariant properties to evaluate the results of fault-injection-based robustness testing of protocol implementations.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Security Rules Specification and Analysis Based on Passive Testing.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Automatic Timed Test Case Generation for Web Services Composition.
Proceedings of the ECOWS 2008, 2008

Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

Context Ontology for Secure Interoperability.
Proceedings of the The Third International Conference on Availability, 2008

2007
Timed Modeling of Web Services Composition for Automatic Testing.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Regression and Performance Testing of an e-Learning Web Application: dotLRN.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A formal approach for testing security rules.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Towards an Automated Test Generation with Delayed Transitions for Timed Systems.
Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), 2007

Testing Security Rules with Decomposable Activities.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Specification of Timed EFSM Fault Models in SDL.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2007

2006
Application of Two Test Generation Tools to an Industrial Case Study.
Proceedings of the Testing of Communicating Systems, 2006

Light Client Management Protocol for Wireless Mesh Networks.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

A Security Model for OLSR MANET Protocol.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

MSP: A Novel Session Maintenance Protocol.
Proceedings of the 14th IEEE International Conference on Networks, 2006

Working Around BGP: An Improvement of BGP Session Maintenance.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Implementation Analysis of MSP.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

An Enhanced Passive Testing Approach for Network Protocols.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Parallel Passive Testing of System Protocols - Towards a Real-time Exhaustive Approach.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

A Reliable Approach for Transport Session Management.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
A passive testing approach based on invariants: application to the WAP
Comput. Networks, 2005

Une plate-forme de validation multi-protocoles et multi-services - résultats d'expérimentation.
Ann. des Télécommunications, 2005

Secure hosts auto-configuration in mobile ad hoc networks.
Ad Hoc Networks, 2005

Experimental Evaluation of FSM-Based Testing Methods.
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005

Passive Testing - A Constrained Invariant Checking Approach.
Proceedings of the Testing of Communicating Systems, 2005

An EFSM-Based Intrusion Detection System for Ad Hoc Networks.
Proceedings of the Automated Technology for Verification and Analysis, 2005

A Comparison between Two Maintenance Session Protocols.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005

2004
Application of a Formal Testing Methodology to Wireless Telephony Networks.
J. Braz. Comput. Soc., 2004

From UML models to automatic generated tests for the dotLRN e-learning platform.
Proceedings of the International Workshop on Test and Analysis of Component Based Systems, 2004

Automated test scenarios generation for an e-barter system.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

A Multi-service and Multi-protocol Validation Platform-Experimentation Results.
Proceedings of the Testing of Communicating Systems, 16th IFIP International Conerence, 2004

A Testing Methodology for an Open Software E-learning Platform.
Proceedings of the EDUTECH, 2004

Secure Hosts Autoconfiguration in Mobile Ad Hoc Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

A Validation Model for the DSR Protocol.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

Network Protocol System Passive Testing for Fault Management: A Backward Checking Approach.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2004

2003
Test suite minimization for testing in context.
Softw. Test. Verification Reliab., 2003

New approaches for passive testing using an Extended Finite State Machine specification.
Inf. Softw. Technol., 2003

TestNet: Let's Test Together!.
Proceedings of the Testing of Communicating Systems, 15th IFIP International Conference, 2003

Fast Testing of Critical Properties through Passive Testing.
Proceedings of the Testing of Communicating Systems, 15th IFIP International Conference, 2003

2002
Fault Detection within a Component of a System of Communicating FSMs.
Proceedings of the Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems, 2002

Automated Generation of Interoperability Tests.
Proceedings of the Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems, 2002

A New Algorithm for Service Interaction Detection.
Proceedings of the Formal Methods and Software Engineering, 2002

2001
A Service-Component Testing Method and a Suitable CORBA Architecture.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

A Conformance Testing Method for Communication Protocols Modeled as Concurrent DFSMs.
Proceedings of the 15th International Conference on Information Networking, 2001

Partial Validation of a Design Specification with Respect to Requirements.
Proceedings of the 2nd Asia-Pacific Conference on Quality Software (APAQS 2001), 2001

2000
Validation of the GSM-map protocol.
Ann. des Télécommunications, 2000

Fault Detection Power of a Widely Used Test Suite for a System of Communicating FSMs.
Proceedings of the Testing of Communicating Systems: Tools and Techniques, IFIP TC6/WG6.1 13<sup>th</sup> International Conference on Testing Communicating Systems (TestCom 2000), August 29, 2000

1999
Passive testing and application to the GSM-MAP protocol.
Inf. Softw. Technol., 1999

Advanced Topics on SDL and MSC.
Comput. Networks, 1999

Test Suite Minimization for Embedded Nondeterministic Finite State Machines.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999

Generating Test Cases for a Timed I/O Automaton Model.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999

Different Approaches to Protocol and Service Testing.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999

An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol.
Proceedings of the 14th IEEE International Conference on Automated Software Engineering, 1999

Hit-or-Jump: An algorithm for embedded testing with applications to IN services.
Proceedings of the Formal Methods for Protocol Engineering and Distributed Systems, 1999

A GSM-MAP Protocol Experiment Using Passive Testing.
Proceedings of the FM'99 - Formal Methods, 1999

1998
Test Suite Minimization for Testing in Context.
Proceedings of the Testing of Communicating Systems, IFIP TC6 11th International Workshop on Testing Communicating Systems (IWTCS), August 31, 1998

Application of Embedded Testing Methods to Service Validation.
Proceedings of the Second IEEE International Conference on Formal Engineering Methods, 1998

1997
Test generation for the SSCOP-ATM networks protocol.
Proceedings of the SDL '97 Time for Testing, 1997

1996
Standardization of Formal Methods in Conformance Testing of Communication Protocols.
Comput. Networks ISDN Syst., 1996

Testing Methods for SDL Systems.
Comput. Networks ISDN Syst., 1996

1994
A Compositional Verification Method for LOTOS.
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

A modal based verification for LOTOS.
Proceedings of the Formal Description Techniques VII, 1994

1993
Formal Methods for Conformance Testing: Results and Perspectives.
Proceedings of the Protocol Test Systems, 1993

Improving Conformance Testing for LOTOS.
Proceedings of the Formal Description Techniques, VI, Proceedings of the IFIP TC6/WG6.1 Sixth International Conference on Formal Description Techniques, 1993

1992
Automated Protocol Conformance Test Generation Based on Formal Methods for LOTOS Specifications.
Proceedings of the Protocol Test Systems, V, 1992

1991
Protocol Conformance Test Generation Using a Graph Rewriting System.
Proceedings of the Protocol Test Systems, IV, 1991

1988
Exhaustive Analysis and Simulation for Distributed Systems, both Sides of the Same Coin.
Distributed Comput., 1988

1987
Proof of Specification Properties by Using Finite State Machines and Temporal Logic.
Proceedings of the Protocol Specification, 1987

1984
A method of automatic proof for the specification and verification of protocols.
Comput. Commun. Rev., 1984

Temporal Logic Specification of a Virtual Ring LAN Access Protocol.
Proceedings of the Protocol Specification, 1984

Specification and Verification of Networks Protocols Using.
Proceedings of the International Symposium on Programming, 1984

A Decision Method for Linear Temporal Logic.
Proceedings of the 7th International Conference on Automated Deduction, 1984


  Loading...