Mohamed Kaâniche

According to our database1, Mohamed Kaâniche authored at least 103 papers between 1990 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
State of the art of network protocol reverse engineering tools.
J. Computer Virology and Hacking Techniques, 2018

Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned.
Journal of Systems and Software, 2018

IOMMU protection against I/O attacks: a vulnerability and a proof of concept.
J. Braz. Comp. Soc., 2018

A language-based intrusion detection approach for automotive embedded networks.
IJES, 2018

Specification-Based Protocol Obfuscation.
CoRR, 2018

Specification-Based Protocol Obfuscation.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling.
Proceedings of the 13th European Dependable Computing Conference, 2017

2016
Outils pour la rétro-conception de protocoles. Analyse et classification.
Technique et Science Informatiques, 2016

Bypassing IOMMU Protection against I/O Attacks.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Anomaly Detection and Root Cause Localization in Virtual Network Functions.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Towards Black-Box Anomaly Detection in Virtual Network Functions.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Protocol Reverse Engineering: Challenges and Obfuscation.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
A Model for Safety Case Confidence Assessment.
CoRR, 2015

Resilience Assessment: Accidental and Malicious Threats.
Proceedings of the 9th Workshop on Verification and Evaluation of Computer and Communication Systems, 2015

Tejo: A Supervised Anomaly Detection Scheme for NewSQL Databases.
Proceedings of the Software Engineering for Resilient Systems - 7th International Workshop, 2015

A Model for Safety Case Confidence Assessment.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Data Stream Clustering for Online Anomaly Detection in Cloud Applications.
Proceedings of the 11th European Dependable Computing Conference, 2015

Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds.
Proceedings of the 11th European Dependable Computing Conference, 2015

Security of ISP Access Networks: Practical Experiments.
Proceedings of the 11th European Dependable Computing Conference, 2015

Smart-TV Security Analysis: Practical Experiments.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Fiabilité de mission d'un avion. Évaluation stochastique en opération.
Technique et Science Informatiques, 2014

Identification de vulnérabilités web et génération de scénarios d'attaque.
Technique et Science Informatiques, 2014

An automated black box approach for web vulnerability identification and attack scenario generation.
J. Braz. Comp. Soc., 2014

La sécurité des box ADSL. Analyse de risques et expérimentations.
Ingénierie des Systèmes d'Information, 2014

An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications.
IJSSE, 2014

An Anomaly Detection Approach for Scale-Out Storage Systems.
Proceedings of the 26th IEEE International Symposium on Computer Architecture and High Performance Computing, 2014

An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures.
Proceedings of the Network and System Security - 8th International Conference, 2014

Towards resilient cyber-physical systems: The ADREAM project.
Proceedings of the 9th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2014

2013
Évaluation quantitative de la sécurité. Approche basée sur les vulnérabilités.
Technique et Science Informatiques, 2013

Aircraft operational reliability - A model-based approach and a case study.
Rel. Eng. & Sys. Safety, 2013

Engineering Resilient Systems: Models, Methods and Tools (Dagstuhl Seminar 13022).
Dagstuhl Reports, 2013

A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach.
Comput. J., 2013

Security of embedded automotive networks: state of the art and a research proposal.
Proceedings of the SAFECOMP 2013, 2013

An Automated Approach to Generate Web Applications Attack Scenarios.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Model-based safety analysis of human-robot interactions: The MIRAS walking assistance robot.
Proceedings of the IEEE 13th International Conference on Rehabilitation Robotics, 2013

Survey on security threats and protection mechanisms in embedded automotive networks.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2nd workshop on open resilient human-aware cyber-physical systems.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Message from the special issue editors.
J. Braz. Comp. Soc., 2012

Modeling the resilience of large and evolving systems
CoRR, 2012

Critical Utility Infrastructural Resilience
CoRR, 2012

Impact of Operational Reliability Re-assessment during Aircraft Missions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

A distributed platform of high interaction honeypots and experimental results.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Security-related vulnerability life cycle analysis.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Detecting attacks against data in web applications.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned.
Journal in Computer Virology, 2011

The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems.
IEEE Trans. Mob. Comput., 2011

It All Depends, and Increasingly So.
IEEE Security & Privacy, 2011

Modeling Aircraft Operational Reliability.
Proceedings of the Computer Safety, Reliability, and Security, 2011

A Clustering Approach for Web Vulnerabilities Detection.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

Operational reliability of an aircraft with adaptive missions.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

2010
Une analyse empirique du comportement d'attaquants. Expérimentations et résultats.
Technique et Science Informatiques, 2010

2009
Modélisation de la sreté de fonctionnement basée sur le langage AADL et les RdPSG.
Technique et Science Informatiques, 2009

PolyOrBAC: A security framework for Critical Infrastructures.
IJCIP, 2009

Safety modeling and evaluation of Automated Highway Systems.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Internet attacks monitoring with dynamic connection redirection mechanisms.
Journal in Computer Virology, 2008

Software dependability modeling using an industry-standard architecture description language
CoRR, 2008

The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation
CoRR, 2008

Modelling interdependencies between the electricity and information infrastructures
CoRR, 2008

Dependability Evaluation of a Replication Service for Mobile Applications in Dynamic Ad-Hoc Networks.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008

Collaborative Access Control For Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection II, 2008

The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation.
Proceedings of the Seventh European Dependable Computing Conference, 2008

Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures.
Proceedings of the Critical Information Infrastructure Security, 2008

Access control for cooperative systems: A comparative analysis.
Proceedings of the CRiSIS '08, 2008

2007
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture
CoRR, 2007

An architecture-based dependability modeling framework using AADL
CoRR, 2007

Empirical analysis and statistical modeling of attack processes based on honeypots
CoRR, 2007

Availability assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx logfiles : a case study
CoRR, 2007

Lessons Learned from the deployment of a high-interaction honeypot
CoRR, 2007

Modelling Interdependencies Between the Electricity and Information Infrastructures.
Proceedings of the Computer Safety, 2007

Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Access Control for Collaborative Systems: A Web Services Based Approach.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

2006
Modeling user perceived unavailability due to long response times.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

A System Dependability Modeling Framework Using AADL and GSPNs.
Proceedings of the Architecting Dependable Systems IV [the book is a result of the ICSE 2006 and DSN 2006 workshops], 2006

Lessons learned from the deployment of a high-interaction honeypot.
Proceedings of the Sixth European Dependable Computing Conference, 2006

2005
Web service availability - impact of error recovery and traffic model.
Rel. Eng. & Sys. Safety, 2005

Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx log files: A case study.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

2003
Multi-level modeling approach for the availability assessment of e-business applications.
Softw., Pract. Exper., 2003

Web Service Availability - Impact of Error Recovery.
Proceedings of the Computer Safety, 2003

A User-Perceived Availability Evaluation of a Web Based Travel Agency.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Event Log based Dependability Analysis of Windows NT and 2K Systems.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

2001
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models.
Proceedings of the Computer Safety, 2001

Measurement-Based Availability of Unix Systems in a Distributed Environment.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001

A framework for modeling availability of E-business systems.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

2000
A Dependability-Explicit Model for the Development of Computing Systems.
Proceedings of the Computer Safety, 2000

Dependability Engineering of Complex Computing Systems.
Proceedings of the 6th International Conference on Engineering of Complex Computer Systems (ICECCS 2000), 2000

1999
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security.
IEEE Trans. Software Eng., 1999

Dependability Evaluation of an Air Traffic Control Computing System.
Perform. Eval., 1999

SQUALE Dependability Assessment Criteria.
Proceedings of the Computer Safety, 1999

Evaluation de la sûreté de fonctionnement informatique. Fautes physiques, fautes de conception, malveillances.
, 1999

1998
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture.
Proceedings of the Digest of Papers: FTCS-28, 1998

1997
Qualitative and Quantitative Reliability Assessment.
IEEE Software, 1997

1996
Models and tools for quantitative assessment of operational security.
Proceedings of the Information Systems Security, 1996

Reliability of a commercial telecommunications system.
Proceedings of the Seventh International Symposium on Software Reliability Engineering, 1996

1995
Modeling computer systems evolutions: non-stationary processes and stochastic Petri nets-application to dependability growth.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995

1994
Software Reliability Analysis of Three Successive Generations of a Switching System.
Proceedings of the Dependable Computing, 1994

1993
Experience in software reliability: From data collection to quantitative evaluation.
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993

SoRel: A Tool for Reliability Growth Analysis and Prediction From Statistical Failure Data.
Proceedings of the Digest of Papers: FTCS-23, 1993

1992
Modèle hyperexponentiel en temps continu et en temps discret pour l'évaluation de la croissance de la sûreté de fonctionnement.
PhD thesis, 1992

The discrete time hyperexponential model for software reliability growth evaluation.
Proceedings of the Third International Symposium on Software Reliability Engineering, 1992

1991
The KAT (Knowledge-Action-Transformation) Approach to the Modeling and Evaluation of Reliability and Availability Growth.
IEEE Trans. Software Eng., 1991

1990
The transformation approach to the modeling and evaluation of the reliability and availability growth.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990


  Loading...