default search action
Alexandre Vernotte
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c11]Frédéric Tamagnan, Fabrice Bouquet, Alexandre Vernotte, Bruno Legeard:
Regression Test Generation by Usage Coverage Driven Clustering on User Traces. ICSTW 2023: 82-89 - 2022
- [j4]Antoine Chevrot, Alexandre Vernotte, Bruno Legeard:
CAE: Contextual auto-encoder for multivariate time-series anomaly detection in air transportation. Comput. Secur. 116: 102652 (2022) - [j3]Alexandre Vernotte, Aymeric Cretin, Bruno Legeard, Fabien Peureux:
A domain-specific language to design false data injection tests for air traffic control systems. Int. J. Softw. Tools Technol. Transf. 24(2): 127-158 (2022) - 2021
- [i1]Antoine Chevrot, Alexandre Vernotte, Bruno Legeard:
DAE : Discriminatory Auto-Encoder for multivariate time-series anomaly detection in air transportation. CoRR abs/2109.04247 (2021) - 2020
- [c10]Aymeric Cretin, Alexandre Vernotte, Antoine Chevrot, Fabien Peureux, Bruno Legeard:
Test Data Generation for False Data Injection Attack Testing in Air Traffic Surveillance. ICST Workshops 2020: 143-152
2010 – 2019
- 2018
- [j2]Alexandre Vernotte, Margus Välja, Matus Korman, Gunnar Björkman, Mathias Ekstedt, Robert Lagerström:
Load balancing of renewable energy: a cyber security analysis. Energy Inform. 1(1) (2018) - 2017
- [c9]Matus Korman, Margus Välja, Gunnar Björkman, Mathias Ekstedt, Alexandre Vernotte, Robert Lagerström:
Analyzing the Effectiveness of Attack Countermeasures in a SCADA System. SPSR-SG@CPSWeek 2017: 73-78 - [c8]Alexandre Vernotte, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis. EDOC Workshops 2017: 127-136 - 2016
- [j1]Mark Utting, Bruno Legeard, Fabrice Bouquet, Elizabeta Fourneret, Fabien Peureux, Alexandre Vernotte:
Recent Advances in Model-Based Testing. Adv. Comput. 101: 53-120 (2016) - [c7]Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström:
pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. ARES 2016: 278-283 - [c6]Pontus Johnson, Alexandre Vernotte, Dan Gorton, Mathias Ekstedt, Robert Lagerström:
Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs. RISK 2016: 37-52 - 2015
- [b1]Alexandre Vernotte:
A pattern-driven and model-based vulnerability testing for Web applications. (Une approche à base de modèles et de patterns pour le test de vulnérabilités d'applications Web). University of Franche-Comté, Besançon, France, 2015 - [c5]Alexandre Vernotte, Cornel Botea, Bruno Legeard, Arthur Molnar, Fabien Peureux:
Risk-Driven Vulnerability Testing: Results from eHealth Experiments Using Patterns and Model-Based Approach. RISK 2015: 93-109 - 2014
- [c4]Alexandre Vernotte, Frédéric Dadeau, Franck Lebeau, Bruno Legeard, Fabien Peureux, François Piat:
Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities. ICISS 2014: 358-377 - [c3]Julien Botella, Bruno Legeard, Fabien Peureux, Alexandre Vernotte:
Risk-Based Vulnerability Testing Using Security Test Patterns. ISoLA (2) 2014: 337-352 - 2013
- [c2]Franck Lebeau, Bruno Legeard, Fabien Peureux, Alexandre Vernotte:
Model-Based Vulnerability Testing for Web Applications. ICST Workshops 2013: 445-452 - [c1]Alexandre Vernotte:
Research Questions for Model-Based Vulnerability Testing of Web Applications. ICST 2013: 505-506
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint