default search action
Ana R. Cavalli
Person information
- affiliation: Montimage, Paris, France
- affiliation: Telecom SudParis, SAMOVAR, Évry, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems. ACM Comput. Surv. 56(8): 202:1-202:37 (2024) - [c188]Valeria Valdés Ríos, Fatiha Zaïdi, Ana Rosa Cavalli, Angel Rego:
Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment. ARES 2024: 166:1-166:9 - [c187]Manh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
AI4SOAR: A Security Intelligence Tool for Automated Incident Response. ARES 2024: 170:1-170:8 - [c186]Andrey Sadovykh, Dragos Truscan, Martin A. Schneider, Wissam Mallouli, Ana R. Cavalli, Cristina Seceleanu, Tanwir Ahmad:
Smart Assistants for Enhancing System Security and Resilience. FedCSIS (Communication Papers) 2024: 151-158 - [c185]Abdul-Rasheed Ottun, Rasinthe Marasinghe, Toluwani Elemosho, Mohan Liyanage, Mohamad Ragab, Prachi Bagave, Marcus Westberg, Mehrdad Asadi, Michell Boerger, Chamara Sandeepa, Thulitha Senevirathna, Bartlomiej Siniarski, Madhusanka Liyanage, Vinh Hoa La, Manh-Dung Nguyen, Edgardo Montes de Oca, Tessa Oomen, João Fernando Ferreira Gonçalves, Illija Tanaskovic, Sasa Klopanovic, Nicolas Kourtellis, Claudio Soriente, Jason Pridmore, Ana Rosa Cavalli, Drasko Draskovic, Samuel Marchal, Shen Wang, David Solans Noguero, Nikolay Tcholtchev, Aaron Yi Ding, Huber Flores:
The SPATIAL Architecture: Design and Development Experiences from Gauging and Monitoring the AI Inference Capabilities of Modern Applications. ICDCS 2024: 947-959 - [c184]Ivan Orefice, Wissam Mallouli, Ana R. Cavalli, Filip Sebek, Alberto Lizarduy:
Diagnosis Automation Using Similarity Analysis: Application to Industrial Systems. ICSOFT 2024: 331-338 - 2023
- [j40]Zujany Salazar, Fatiha Zaïdi, Huu Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access 11: 43925-43944 (2023) - [c183]Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca:
A deep learning anomaly detection framework with explainability and robustness. ARES 2023: 134:1-134:7 - [c182]Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa Cavalli:
The DYNABIC approach to resilience of critical infrastructures. ARES 2023: 136:1-136:8 - [c181]Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli:
HTTP/2 Attacks Generation using 5Greplay. ARES 2023: 138:1-138:7 - [c180]Valeria Valdés, Ana Rosa Cavalli, Fatiha Zaïdi, Wissam Mallouli:
Testing techniques to assess impact and cascading effects. CloudCom 2023: 269-272 - [c179]Lorens Barraud, Francesco G. Caccavale, Jean-Baptiste Peyrat, Wissam Mallouli, Véronique Capdevielle, Hicham Khalife, Ana Rosa Cavalli:
5G SUCI Catcher: Attack and Detection. CloudCom 2023: 285-290 - [c178]Phu Hong Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe, Erkuden Rios, Diego Sagasti, Gonzalo Nicolas, Valeria Valdés, Wissam Mallouli, Ana R. Cavalli, Nicolas Ferry:
Towards Smarter Security Orchestration and Automatic Response for CPS and IoT. CloudCom 2023: 298-302 - [c177]Valeria Valdés, Fatiha Zaïdi, Ana Rosa Cavalli, Wissam Mallouli:
A Resilience Component for a Digital Twin. FPS (2) 2023: 93-104 - [c176]Ana Rosa Cavalli, Edgardo Montes de Oca:
Cybersecurity, Monitoring, Explainability and Resilience. ICMU 2023: 1-7 - [c175]Anis Bouaziz, Manh-Dung Nguyen, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli:
Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection. ICSOFT 2023: 510-517 - [i4]Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
Cyber-Resilience Approaches for Cyber-Physical Systems. CoRR abs/2302.05402 (2023) - [i3]Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. CoRR abs/2304.05719 (2023) - 2022
- [j39]George Amponis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana R. Cavalli, Dimitrios Klonidis, Evangelos K. Markakis, Panagiotis G. Sarigiannidis:
Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. EURASIP J. Wirel. Commun. Netw. 2022(1): 124 (2022) - [j38]Ricardo Pérez-Castillo, Ana C. R. Paiva, Ana Rosa Cavalli:
Special issue on information systems quality for digital transformation. Softw. Qual. J. 30(4): 953-954 (2022) - [c174]Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Rosa Cavalli, Huu Nghia Nguyen, Edgardo Montes de Oca:
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. ICSOFT 2022: 234-241 - [c173]Manh-Dung Nguyen, Vinh Hoa La, Ana R. Cavalli, Edgardo Montes de Oca:
Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper). ICST Workshops 2022: 7-10 - [c172]Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, Monika Ewa Rakoczy:
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System. ICST Workshops 2022: 40-48 - [c171]Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R. Cavalli:
Digital Twin for IoT Environments: A Testing and Simulation Tool. QUATIC 2022: 205-219 - [c170]Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
Switched-based Control Testbed to Assure Cyber-physical Resilience by Design. SECRYPT 2022: 681-686 - [e6]David Clark, Héctor D. Menéndez, Ana Rosa Cavalli:
Testing Software and Systems - 33rd IFIP WG 6.1 International Conference, ICTSS 2021, London, UK, November 10-12, 2021, Proceedings. Lecture Notes in Computer Science 13045, Springer 2022, ISBN 978-3-031-04672-8 [contents] - 2021
- [c169]Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. ARES 2021: 106:1-106:8 - [c168]Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis, George Guirgis, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis, Wissam Mallouli:
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks. ARES 2021: 108:1-108:10 - [c167]Vinh Hoa La, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli:
A Framework for Security Monitoring of Real IoT Testbeds. ICSOFT 2021: 645-652 - [c166]Ana Rosa Cavalli:
Security testing and resilience. ICST Workshops 2021: 1 - [e5]Ana C. R. Paiva, Ana Rosa Cavalli, Paula Ventura Martins, Ricardo Pérez-Castillo:
Quality of Information and Communications Technology - 14th International Conference, QUATIC 2021, Algarve, Portugal, September 8-11, 2021, Proceedings. Communications in Computer and Information Science 1439, Springer 2021, ISBN 978-3-030-85346-4 [contents] - 2020
- [j37]Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García:
Switched-Based Resilient Control of Cyber-Physical Systems. IEEE Access 8: 212194-212208 (2020) - [c165]Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes de Oca:
Metrics-driven DevSecOps. ICSOFT 2020: 228-233 - [c164]Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
Cyber-Resilience Evaluation of Cyber-Physical Systems. NCA 2020: 1-8 - [i2]Mariana Segovia, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquín García-Alfaro:
Cyber-Resilience Evaluation of Cyber-Physical Systems. CoRR abs/2009.06927 (2020)
2010 – 2019
- 2019
- [j36]Raul A. Fuentes-Samaniego, Vinh Hoa La, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Raúl V. Ramírez-Velarde:
A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication. Int. J. Auton. Adapt. Commun. Syst. 12(3): 218-243 (2019) - [j35]Hüsnü Yenigün, Nina Yevtushenko, Ana Rosa Cavalli:
Guest Editorial: Special issue on Testing Software and Systems. Softw. Qual. J. 27(2): 497-499 (2019) - [c163]Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquín García-Alfaro:
Reflective Attenuation of Cyber-Physical Attacks. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 19-34 - [c162]Rabéa Ameur-Boulifa, Ana R. Cavalli, Stephane Maag:
From Formal Test Objectives to TTCN-3 for Verifying ETCS Complex Software Control Systems. ICSOFT (Selected Papers) 2019: 156-178 - [c161]Rabéa Ameur-Boulifa, Ana R. Cavalli, Stephane Maag:
Verifying Complex Software Control Systems from Test Objectives: Application to the ETCS System. ICSOFT 2019: 397-406 - [c160]Thierno Birahime Sambe, Stephane Maag, Ana R. Cavalli:
A Methodology for Enterprise Resource Planning Automation Testing Application to the Open Source ERP-ODOO. ICSOFT 2019: 407-415 - [c159]Georges Ouffoué, Fatiha Zaïdi, Ana R. Cavalli:
Attack Tolerance for Services-Based Applications in the Cloud. ICTSS 2019: 242-258 - [c158]Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli, Brecht Vermeulen, Matevz Vucnik:
Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms. ICTSS 2019: 270-278 - 2018
- [j34]Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort:
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. Comput. J. 61(8): 1109-1122 (2018) - [c157]Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Joaquín García-Alfaro:
A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper). FPS 2018: 257-264 - [c156]Sarah A. Dahab, Erika Silva, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli:
Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion. ICSOFT 2018: 154-165 - [c155]Sarah A. Dahab, Stephane Maag, Wissam Mallouli, Ana R. Cavalli:
Smart Measurements and Analysis for Software Quality Enhancement. ICSOFT (Selected Papers) 2018: 194-219 - [c154]Ana R. Cavalli, Antonio M. Ortiz, Georges Ouffoué, Cesar A. Sanchez, Fatiha Zaïdi:
Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection. ICWS 2018: 472-486 - 2017
- [c153]Georges L. A. Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali:
An Attack-Tolerant Framework for Web Services. SCC 2017: 503-506 - [c152]Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali:
Model-Based Attack Tolerance. AINA Workshops 2017: 68-73 - [c151]Pamela Carvallo, Ana R. Cavalli, Natalia Kushik:
A Study of Threat Detection Systems and Techniques in the Cloud. CRiSIS 2017: 140-155 - [c150]Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli:
A Platform for Security Monitoring of Multi-cloud Applications. Ershov Informatics Conference 2017: 59-71 - [c149]Hüsnü Yenigün, Natalia Kushik, Jorge López, Nina Yevtushenko, Ana R. Cavalli:
Decreasing the complexity of deriving test suites against nondeterministic finite state machines. EWDTS 2017: 1-4 - [c148]Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli, Erkuden Rios:
Multi-cloud Applications Security Monitoring. GPC 2017: 748-758 - [c147]Pamela Carvallo, Ana R. Cavalli, Natalia Kushik:
Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection. ICSOFT 2017: 480-487 - [c146]Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali:
How Web Services Can Be Tolerant to Intruders through Diversification. ICWS 2017: 436-443 - [e4]Nina Yevtushenko, Ana Rosa Cavalli, Hüsnü Yenigün:
Testing Software and Systems - 29th IFIP WG 6.1 International Conference, ICTSS 2017, St. Petersburg, Russia, October 9-11, 2017, Proceedings. Lecture Notes in Computer Science 10533, Springer 2017, ISBN 978-3-319-67548-0 [contents] - 2016
- [j33]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Formal framework for defining trust in multi-organisation environment. Int. J. Auton. Adapt. Commun. Syst. 9(1/2): 164-178 (2016) - [j32]Natalia Kushik, Khaled El-Fakih, Nina Yevtushenko, Ana R. Cavalli:
On adaptive experiments for nondeterministic finite state machines. Int. J. Softw. Tools Technol. Transf. 18(3): 251-264 (2016) - [c145]Vinh Hoa La, Raul A. Fuentes-Samaniego, Ana R. Cavalli:
Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers. AINA 2016: 147-154 - [c144]Diego Rivera, Ana R. Cavalli:
QoE-Driven Service Optimization Aware of the Business Model. AINA Workshops 2016: 725-730 - [c143]Vinh Hoa La, Raul Fuentes, Ana R. Cavalli:
A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks. APCC 2016: 230-237 - [c142]Rui Abreu, César Andrés, Ana R. Cavalli:
A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory. CRiSIS 2016: 169-182 - [c141]Jorge López, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko:
Optimizing network utilization through source code state model representation. EWDTS 2016: 1-4 - [c140]Vinh Hoa La, Ana R. Cavalli:
A Misbehavior Node Detection Algorithm for 6LoWPAN Wireless Sensor Networks. ICDCS Workshops 2016: 49-54 - [c139]Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sánchez, Fatiha Zaïdi:
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. ICDCS Workshops 2016: 61-66 - [c138]Raul A. Fuentes-Samaniego, Ana R. Cavalli, Juan Arturo Nolazco-Flores:
An Analysis of Secure M2M Communication in WSNs Using DTLS. ICDCS Workshops 2016: 78-83 - [c137]Diego Rivera, Ana R. Cavalli, Natalia Kushik, Wissam Mallouli:
An Implementation of a QoE Evaluation Technique Including Business Model Parameters. ICSOFT-PT 2016: 138-145 - [c136]Jorge Visca, Raul Fuentes, Ana R. Cavalli, Javier Baliosian:
Opportunistic media sharing for mobile networks. NOMS 2016: 799-803 - [c135]Natalia Kushik, Jorge López, Ana R. Cavalli, Nina Yevtushenko:
Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State Machines. QRS 2016: 315-322 - [c134]Huu Nghia Nguyen, Fatiha Zaïdi, Ana R. Cavalli:
Effectively Testing of Timed Composite Systems using Test Case Prioritization. SEKE 2016: 408-413 - [c133]Jorge Visca, Javier Baliosian, Raul A. Fuentes-Samaniego, Ana R. Cavalli:
Path sampling, a robust alternative to gossiping for opportunistic network routing. WiMob 2016: 1-8 - 2015
- [j31]Ana R. Cavalli, Teruo Higashino, Manuel Núñez:
Special issue on formal active and passive testing of distributed and networked systems. Ann. des Télécommunications 70(3-4): 83-84 (2015) - [j30]Ana R. Cavalli, Teruo Higashino, Manuel Núñez:
A survey on formal active and passive testing with applications to the cloud. Ann. des Télécommunications 70(3-4): 85-93 (2015) - [j29]Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca, Wissam Mallouli:
An effective attack detection approach in wireless mesh networks. Int. J. Space Based Situated Comput. 5(2): 89-99 (2015) - [c132]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
An Active Testing Tool for Security Testing of Distributed Systems. ARES 2015: 735-740 - [c131]Jorge López, Stephane Maag, Cecilia Saint-Pierre, Javier Bustos-Jiménez, Ana R. Cavalli:
Process Mining for Trust Monitoring. AINA Workshops 2015: 605-610 - [c130]Vinh Hoa La, Ana Rosa Cavalli:
A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks. BWCCA 2015: 6-12 - [c129]Diego Rivera, Natalia Kushik, Camila Fuenzalida, Ana R. Cavalli, Nina Yevtushenko:
QoE Evaluation Based on QoS and QoBiz Parameters Applied to an OTT Service. ICWS 2015: 607-614 - [c128]Raul A. Fuentes-Samaniego, Ana R. Cavalli, Wissam Mallouli, Javier Baliosian:
Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol. LANOMS 2015: 69-72 - [c127]Javier Baliosian, Ana R. Cavalli:
An Abstraction for the Interoperability Analysis of Security Policies. NSS 2015: 418-427 - [c126]Raul A. Fuentes-Samaniego, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Javier Baliosian:
A Survey on Wireless Sensors Networks Security Based on a Layered Approach. WWIC 2015: 77-93 - 2014
- [j28]Natalia Kushik, Jeevan Pokhrel, Nina Yevtushenko, Ana R. Cavalli, Wissam Mallouli:
QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches. Int. J. Organ. Collect. Intell. 4(3): 44-64 (2014) - [j27]Khalifa Toumi, Ana R. Cavalli, César Andrés:
Validation of a Trust Approach in Multi-Organization Environments. Int. J. Secur. Softw. Eng. 5(1): 1-18 (2014) - [j26]Anderson Morais Paiva Morais, Ana R. Cavalli:
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks. Mob. Networks Appl. 19(1): 101-120 (2014) - [c125]Jeevan Pokhrel, Felipe Lalanne, Ana R. Cavalli, Wissam Mallouli:
QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System. AINA 2014: 629-634 - [c124]Huu Nghia Nguyen, Fatiha Zaïdi, Ana R. Cavalli:
A Framework for Distributed Testing of Timed Composite Systems. APSEC (1) 2014: 47-54 - [c123]Khalifa Toumi, Fabien Autrel, Ana R. Cavalli, Sammy Haddad:
ISER: A Platform for Security Interoperability of Multi-source Systems. CRiSIS 2014: 230-238 - [c122]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps. FPS 2014: 337-346 - [c121]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
A Formal Approach to Automatic Testing of Security Policies Specified in XACML. FPS 2014: 367-374 - [c120]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
On Modeling and Testing Security Properties of Vehicular Networks. ICST Workshops 2014: 42-50 - [c119]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Détection de flux de contrôle illégaux dans les Smartphones. INFORSID 2014: 27-43 - [c118]Indira Paudel, Jeevan Pokhrel, Bachar Wehbi, Ana R. Cavalli, Badii Jouaber:
Estimation of video QoE from MAC parameters in wireless network: A Random Neural Network approach. ISCIT 2014: 51-55 - [c117]Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli:
How to Evaluate Trust Using MMT. NSS 2014: 484-492 - [c116]Natalia Kushik, Nina Yevtushenko, Ana R. Cavalli:
On Testing against Partial Non-observable Specifications. QUATIC 2014: 230-233 - [c115]Xiaoping Che, Stéphane Maag, Jorge López, Ana R. Cavalli:
Testing Network Protocols: formally, at runtime and online. SEKE 2014: 90-93 - [c114]Huu Nghia Nguyen, Ana R. Cavalli:
Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System. SEKE 2014: 393-396 - [c113]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems. SERE (Companion) 2014: 149-157 - [c112]Natalia Kushik, Nina Yevtushenko, Ana R. Cavalli, Wissam Mallouli, Jeevan Pokhrel:
Evaluating Web Service QoE by Learning Logic Networks. WEBIST (1) 2014: 168-176 - [i1]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study. CoRR abs/1410.5789 (2014) - 2013
- [j25]Pramila Mouttappa, Stephane Maag, Ana R. Cavalli:
Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols. Comput. Networks 57(15): 2992-3008 (2013) - [j24]Ana R. Cavalli, Sudipto Ghosh:
ICST 2010 Special Issue. Softw. Test. Verification Reliab. 23(5): 351 (2013) - [c111]Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca:
An Effective Attack Detection Approach in Wireless Mesh Networks. AINA Workshops 2013: 1450-1455 - [c110]Jeevan Pokhrel, Bachar Wehbi, Anderson Nunes Paiva Morais, Ana R. Cavalli, Eric Allilaire:
Estimation of QoE of video traffic using a fuzzy expert system. CCNC 2013: 224-229 - [c109]Pramila Mouttappa, Stephane Maag, Ana R. Cavalli:
Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case Study. COMPSAC 2013: 1-10 - [c108]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Security Properties in Virtual Organizations. HPCC/EUC 2013: 238-245 - [c107]Olga Kondratyeva, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko:
Evaluating Quality of Web Services: A Short Survey. ICWS 2013: 587-594 - [c106]Olga Kondratyeva, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko:
Evaluating Web Service Quality Using Finite State Models. QSIC 2013: 95-102 - [c105]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Trust Ontology Based on Access Control Parameters in Multi-organization Environments. SITIS 2013: 285-292 - [c104]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Formal Characterization of Illegal Control Flow in Android System. SITIS 2013: 293-300 - 2012
- [j23]Natalia Kushik, Amel Mammar, Ana R. Cavalli, Nina Yevtushenko, Willy Jimenez, Edgardo Montes de Oca:
A SPIN-based approach for detecting vulnerabilities in C programs. Autom. Control. Comput. Sci. 46(7): 379-386 (2012) - [j22]Amel Mammar, Wissam Mallouli, Ana R. Cavalli:
A systematic approach to integrate common timed security rules within a TEFSM-based system specification. Inf. Softw. Technol. 54(1): 87-98 (2012) - [j21]Nahid Shahmehri, Amel Mammar, Edgardo Montes de Oca, David Byers, Ana R. Cavalli, Shanai Ardi, Willy Jimenez:
An advanced approach for modeling and detecting software vulnerabilities. Inf. Softw. Technol. 54(9): 997-1013 (2012) - [j20]Iksoon Hwang, Nina Yevtushenko, Ana R. Cavalli:
Tight bound on the length of distinguishing sequences for non-observable nondeterministic Finite-State Machines with a polynomial number of inputs and outputs. Inf. Process. Lett. 112(7): 298-301 (2012) - [j19]Maria de Fátima Mattiello-Francisco, Eliane Martins, Ana R. Cavalli, Edgar Toshiro Yano:
InRob: An approach for testing interoperability and robustness of real-time embedded software. J. Syst. Softw. 85(1): 3-15 (2012) - [j18]Iksoon Hwang, Ana R. Cavalli, Mounir Lallali, Dominique Verchère:
Applying formal methods to PCEP: an industrial case study from modeling to test generation. Softw. Test. Verification Reliab. 22(5): 343-361 (2012) - [c103]Khalifa Toumi, César Andrés, Ana R. Cavalli, Mazen El Maarabani:
A vector based model approach for defining trust in Multi-Organization Environments. CRiSIS 2012: 1-8 - [c102]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses. CSS 2012: 33-47 - [c101]Anderson Nunes Paiva Morais, Ana R. Cavalli:
An Event-Based Packet Dropping Detection Scheme for Wireless Mesh Networks. CSS 2012: 309-323 - [c100]Khalifa Toumi, Ana R. Cavalli, Mazen El Maarabani:
Role based interoperability security policies in collaborative systems. CTS 2012: 471-477 - [c99]César Andrés, Ana R. Cavalli:
How to Reduce the Cost of Passive Testing. HASE 2012: 209-216 - [c98]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments. ICISS 2012: 89-103 - [c97]Pramila Mouttappa, Stéphane Maag, Ana R. Cavalli:
An IOSTS Based Passive Testing Approach for the Validation of Data-Centric Protocols. QSIC 2012: 49-58 - [c96]Anderson Nunes Paiva Morais, Ana R. Cavalli:
A distributed intrusion detection scheme for wireless ad hoc networks. SAC 2012: 556-562 - [c95]Mazen El Maarabani, César Andrés, Ana R. Cavalli:
Testing Interoperability Security Policies. SEKE 2012: 464-469 - [c94]Felipe Lalanne, Ana R. Cavalli, Stephane Maag:
Quality of Experience as a Selection Criterion for Web Services. SITIS 2012: 519-526 - 2011
- [j17]Wissam Mallouli, Amel Mammar, Ana R. Cavalli, Willy Jimenez:
VDC-Based Dynamic Code Analysis: Application to C Programs. J. Internet Serv. Inf. Secur. 1(2/3): 4-20 (2011) - [c93]Anderson Nunes Paiva Morais, Ana R. Cavalli:
Route Manipulation Attack in Wireless Mesh Networks. AINA 2011: 501-508 - [c92]Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, Gouenou Coatrieux, Ana R. Cavalli, Amel Mammar:
Using Requirements Engineering in an Automatic Security Policy Derivation Process. DPM/SETOP 2011: 155-172 - [c91]Mazen El Maarabani, Ana R. Cavalli, Iksoon Hwang, Fatiha Zaïdi:
Verification of Interoperability Security Policies by Model Checking. HASE 2011: 376-381 - [c90]Anderson Nunes Paiva Morais, Ana R. Cavalli:
Detection of Attacks in Wireless Mesh Networks. LADC 2011: 45-54 - [c89]Amel Mammar, Ana R. Cavalli, Willy Jimenez, Wissam Mallouli, Edgardo Montes de Oca:
Using Testing Techniques for Vulnerability Detection in C Programs. ICTSS 2011: 80-96 - [c88]Maxim Zhigulin, Nina Yevtushenko, Stéphane Maag, Ana R. Cavalli:
FSM-Based Test Derivation Strategies for Systems with Time-Outs. QSIC 2011: 141-149 - [c87]Anderson Nunes Paiva Morais, Ana R. Cavalli, Eliane Martins:
A model-based attack injection approach for security validation. SIN 2011: 103-110 - [c86]Anderson Nunes Paiva Morais, Ana R. Cavalli:
A Quality of Experience Based Approach for Wireless Mesh Networks. WWIC 2011: 162-173 - [e3]Joaquín García-Alfaro, Guillermo Navarro-Arribas, Ana R. Cavalli, Jean Leneutre:
Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6514, Springer 2011, ISBN 978-3-642-19347-7 [contents] - 2010
- [j16]Iksoon Hwang, Ana R. Cavalli:
Testing a probabilistic FSM using interval estimation. Comput. Networks 54(7): 1108-1125 (2010) - [j15]Rita Dorofeeva, Khaled El-Fakih, Stéphane Maag, Ana R. Cavalli, Nina Yevtushenko:
FSM-based conformance testing methods: A survey annotated with experimental evaluation. Inf. Softw. Technol. 52(12): 1286-1297 (2010) - [c85]Ana R. Cavalli, Tien-Dung Cao, Wissam Mallouli, Eliane Martins, Andrey Sadovykh, Sébastien Salva, Fatiha Zaïdi:
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition. ICWS 2010: 377-384 - [c84]Gerardo Morales, Stéphane Maag, Ana R. Cavalli, Wissam Mallouli, Edgardo Montes de Oca, Bachar Wehbi:
Timed Extended Invariants for the Passive Testing of Web Services. ICWS 2010: 592-599 - [c83]Fayçal Bessayah, Ana R. Cavalli:
A Formal Passive Testing Approach for Checking Real Time Constraints. QUATIC 2010: 274-279 - [c82]Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana R. Cavalli:
Testing Web Service Orchestrators in Context: A Symbolic Approach. SEFM 2010: 257-267 - [c81]Mazen El Maarabani, Iksoon Hwang, Ana R. Cavalli:
A Formal Approach for Interoperability Testing of Security Rules. SITIS 2010: 277-284 - [c80]Fayçal Bessayah, Ana R. Cavalli, Willian Maja, Eliane Martins, Andre Willik Valenti:
A Fault Injection Tool for Testing Web Services Composition. TAIC PART 2010: 137-146 - [c79]Bachar Wehbi, Anis Laouiti, Ana R. Cavalli:
Transmit and Reserve (TAR): A Coordinated Channel Access for IEEE 802.11 Networks. WCNC 2010: 1-6
2000 – 2009
- 2009
- [c78]César Andrés, Stéphane Maag, Ana R. Cavalli, Mercedes G. Merayo, Manuel Núñez:
Analysis of the OLSR Protocol by Using Formal Passive Testing. APSEC 2009: 152-159 - [c77]Wissam Mallouli, Amel Mammar, Ana R. Cavalli:
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification. APSEC 2009: 489-496 - [c76]Anderson Nunes Paiva Morais, Eliane Martins, Ana R. Cavalli, Willy Jimenez:
Security Protocol Testing Using Attack Trees. CSE (2) 2009: 690-697 - [c75]Iksoon Hwang, Mounir Lallali, Ana R. Cavalli, Dominique Verchère:
Modeling, Validation, and Verification of PCEP Using the IF Language. FMOODS/FORTE 2009: 122-136 - [c74]Mercedes G. Merayo, Iksoon Hwang, Manuel Núñez, Ana R. Cavalli:
A Statistical Approach to Test Stochastic and Probabilistic Systems. ICFEM 2009: 186-205 - [c73]Fayçal Bessayah, Ana R. Cavalli, Eliane Martins:
A formal approach for specification and verification of fault injection process. ICIS 2009: 883-890 - [c72]Felipe Lalanne, Stéphane Maag, Edgardo Montes de Oca, Ana R. Cavalli, Wissam Mallouli, Arnaud Gonguet:
An Automated Passive Testing Approach for the IMS PoC Service. ASE 2009: 535-539 - [c71]Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca, Fatiha Zaïdi:
A Formal Passive Testing Approach to test a MANET Routing Protocol. PerCom Workshops 2009: 1-6 - [c70]Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana R. Cavalli:
Observability and Controllability Issues in Conformance Testing of Web Service Compositions. TestCom/FATES 2009: 217-222 - [c69]Fatiha Zaïdi, Emmanuel Bayse, Ana R. Cavalli:
Network protocol interoperability testing based on contextual signatures and passive testing. SAC 2009: 2-7 - [c68]Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca:
A passive conformance testing approach for a MANET routing protocol. SAC 2009: 207-211 - [c67]Mazen El Maarabani, Asma Adala, Iksoon Hwang, Ana R. Cavalli:
Interoperability testing of presence service on IMS platform. TRIDENTCOM 2009: 1-6 - 2008
- [j14]Stéphane Maag, Cyril Grepet, Ana R. Cavalli:
A formal validation methodology for MANET routing protocols based on nodes' self similarity. Comput. Commun. 31(4): 827-841 (2008) - [c66]Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Context Ontology for Secure Interoperability. ARES 2008: 821-827 - [c65]Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli:
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking. ADHOC-NOW 2008: 345-356 - [c64]Wissam Mallouli, Amel Mammar, Ana R. Cavalli:
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines. DS-RT 2008: 173-180 - [c63]Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli, Mounir Lallali:
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints. DS-RT 2008: 315-318 - [c62]Mounir Lallali, Fatiha Zaïdi, Ana R. Cavalli, Iksoon Hwang:
Automatic Timed Test Case Generation for Web Services Composition. ECOWS 2008: 53-62 - [c61]Wissam Mallouli, Fayçal Bessayah, Ana R. Cavalli, Azzedine Benameur:
Security Rules Specification and Analysis Based on Passive Testing. GLOBECOM 2008: 2078-2083 - [c60]Ana R. Cavalli, Eliane Martins, Anderson Nunes Paiva Morais:
Use of invariant properties to evaluate the results of fault-injection-based robustness testing of protocol implementations. ICST Workshops 2008: 21-30 - [c59]Wissam Mallouli, Gerardo Morales, Ana R. Cavalli:
Testing Security Policies for Web Applications. ICST Workshops 2008: 269-270 - [c58]Bachar Wehbi, Anis Laouiti, Ana R. Cavalli:
A Reactive Wireless Mesh Network Architecture. Med-Hoc-Net 2008: 203-214 - [c57]Bachar Wehbi, Anis Laouiti, Ana R. Cavalli:
Efficient time synchronization mechanism for wireless multi hop networks. PIMRC 2008: 1-6 - [c56]Wissam Mallouli, Mounir Lallali, Gerardo Morales, Ana R. Cavalli:
Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study. SITIS 2008: 128-136 - [c55]Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Interoperability of Context Based System Policies Using O2O Contract. SITIS 2008: 137-144 - 2007
- [c54]Samrat S. Batth, Elisangela Rodrigues Vieira, Ana R. Cavalli, M. Ümit Uyar:
Specification of Timed EFSM Fault Models in SDL. FORTE 2007: 50-65 - [c53]Wissam Mallouli, Ana R. Cavalli:
Testing Security Rules with Decomposable Activities. HASE 2007: 149-155 - [c52]Elisangela Rodrigues Vieira, Ana R. Cavalli:
Towards an Automated Test Generation with Delayed Transitions for Timed Systems. RTCSA 2007: 226-231 - [c51]Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens:
A formal approach for testing security rules. SACMAT 2007: 127-132 - [c50]Ana R. Cavalli, Stéphane Maag, Gerardo Morales:
Regression and Performance Testing of an e-Learning Web Application: dotLRN. SITIS 2007: 369-376 - [c49]Mounir Lallali, Fatiha Zaïdi, Ana R. Cavalli:
Timed Modeling of Web Services Composition for Automatic Testing. SITIS 2007: 417-426 - 2006
- [c48]Ana R. Cavalli, Dario Vieira:
A Reliable Approach for Transport Session Management. AICT/ICIW 2006: 63 - [c47]Ana R. Cavalli, Dario Vieira, Timothy G. Griffin:
Implementation Analysis of MSP. ICN/ICONS/MCL 2006: 17 - [c46]Baptiste Alcalde, Ana R. Cavalli:
Parallel Passive Testing of System Protocols - Towards a Real-time Exhaustive Approach. ICN/ICONS/MCL 2006: 42 - [c45]Ana R. Cavalli, Dario Vieira:
An Enhanced Passive Testing Approach for Network Protocols. ICN/ICONS/MCL 2006: 169 - [c44]Ana R. Cavalli, Dario Vieira:
Working Around BGP: An Improvement of BGP Session Maintenance. ICNS 2006: 41 - [c43]Ana R. Cavalli, Timothy G. Griffin, Dario Vieira:
MSP: A Novel Session Maintenance Protocol. ICON 2006: 1-6 - [c42]Jean-Marie Orset, Ana R. Cavalli:
A Security Model for OLSR MANET Protocol. MDM 2006: 122 - [c41]Bachar Wehbi, Wissam Mallouli, Ana R. Cavalli:
Light Client Management Protocol for Wireless Mesh Networks. MDM 2006: 123 - [c40]Ana R. Cavalli, Stéphane Maag, Wissam Mallouli, Mikael Marche, Yves-Marie Quemener:
Application of Two Test Generation Tools to an Industrial Case Study. TestCom 2006: 134-148 - 2005
- [j13]Ana R. Cavalli, Jean-Marie Orset:
Secure hosts auto-configuration in mobile ad hoc networks. Ad Hoc Networks 3(5): 656-667 (2005) - [j12]Pierre Combes, Wei Monin, Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi, Richard Castanet, Marcien MacKaya, Patrice Laurençot:
Une plate-forme de validation multi-protocoles et multi-services - résultats d'expérimentation. Ann. des Télécommunications 60(5-6): 588-609 (2005) - [j11]Emmanuel Bayse, Ana R. Cavalli, Manuel Núñez, Fatiha Zaïdi:
A passive testing approach based on invariants: application to the WAP. Comput. Networks 48(2): 235-245 (2005) - [c39]Ana R. Cavalli, Timothy G. Griffin, Dario Vieira:
A Comparison between Two Maintenance Session Protocols. AICT/SAPIR/ELETE 2005: 230-237 - [c38]Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli:
An EFSM-Based Intrusion Detection System for Ad Hoc Networks. ATVA 2005: 400-413 - [c37]Behrouz Tork Ladani, Baptiste Alcalde, Ana R. Cavalli:
Passive Testing - A Constrained Invariant Checking Approach. TestCom 2005: 9-22 - [c36]Rita Dorofeeva, Nina Yevtushenko, Khaled El-Fakih, Ana R. Cavalli:
Experimental Evaluation of FSM-Based Testing Methods. SEFM 2005: 23-32 - 2004
- [j10]Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi:
Application of a Formal Testing Methodology to Wireless Telephony Networks. J. Braz. Comput. Soc. 10(2): 56-72 (2004) - [c35]Baptiste Alcalde, Ana R. Cavalli, Dongluo Chen, Davy Khuu, David Lee:
Network Protocol System Passive Testing for Fault Management: A Backward Checking Approach. FORTE 2004: 150-166 - [c34]Ana R. Cavalli, Cyril Grepet, Stéphane Maag, Vincent Tortajada:
A Validation Model for the DSR Protocol. ICDCS Workshops 2004: 768-773 - [c33]Ana R. Cavalli, Jean-Marie Orset:
Secure Hosts Autoconfiguration in Mobile Ad Hoc Networks. ICDCS Workshops 2004: 809-814 - [c32]Ana R. Cavalli, Stéphane Maag, Sofia Papagiannaki, Georgios Verigakis, Fatiha Zaïdi:
A Testing Methodology for an Open Software E-learning Platform. EDUTECH 2004: 165-174 - [c31]Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi, Pierre Combes, Wei Monin, Richard Castanet, Marcien MacKaya, Patrice Laurençot:
A Multi-service and Multi-protocol Validation Platform-Experimentation Results. TestCom 2004: 17-32 - [c30]Ana R. Cavalli, Stéphane Maag:
Automated test scenarios generation for an e-barter system. SAC 2004: 795-799 - [c29]Ana R. Cavalli, Stéphane Maag, Sofia Papagiannaki, Georgios Verigakis:
From UML models to automatic generated tests for the dotLRN e-learning platform. TACoS 2004: 133-144 - 2003
- [j9]Ana R. Cavalli, Caroline Gervy, Svetlana Prokopenko:
New approaches for passive testing using an Extended Finite State Machine specification. Inf. Softw. Technol. 45(12): 837-852 (2003) - [j8]Ricardo Anido, Ana R. Cavalli, Luiz A. Paula Lima Jr., Nina Yevtushenko:
Test suite minimization for testing in context. Softw. Test. Verification Reliab. 13(3): 141-155 (2003) - [c28]Ana R. Cavalli, Edgardo Montes de Oca, Manuel Núñez:
TestNet: Let's Test Together!. TestCom 2003: 258-264 - [c27]José Antonio Arnedo, Ana R. Cavalli, Manuel Núñez:
Fast Testing of Critical Properties through Passive Testing. TestCom 2003: 295-310 - 2002
- [c26]Ana R. Cavalli, Stéphane Maag:
A New Algorithm for Service Interaction Detection. ICFEM 2002: 371-382 - [c25]Cédric Besse, Ana R. Cavalli, Myungchul Kim, Fatiha Zaïdi:
Automated Generation of Interoperability Tests. TestCom 2002: 169- - [c24]Ana R. Cavalli, Svetlana Prokopenko, Nina Yevtushenko:
Fault Detection within a Component of a System of Communicating FSMs. TestCom 2002: 317- - 2001
- [c23]Cédric Besse, Ana R. Cavalli, Ferhat Khendek:
Partial Validation of a Design Specification with Respect to Requirements. APAQS 2001: 131-140 - [c22]Atsushi Fukada, Akio Nakata, Junji Kitamichi, Teruo Higashino, Ana R. Cavalli:
A Conformance Testing Method for Communication Protocols Modeled as Concurrent DFSMs. ICOIN 2001: 155-162 - [c21]Ana R. Cavalli, Bruno Defude, Christian Rinderknecht, Fatiha Zaïdi:
A Service-Component Testing Method and a Suitable CORBA Architecture. ISCC 2001: 655-660 - 2000
- [j7]Ana R. Cavalli, Melania Ionescu:
Validation of the GSM-map protocol. Ann. des Télécommunications 55(1-2): 58-69 (2000) - [c20]Ana R. Cavalli, Svetlana Prokopenko, Nina Yevtushenko:
Fault Detection Power of a Widely Used Test Suite for a System of Communicating FSMs. TestCom 2000: 35-
1990 – 1999
- 1999
- [j6]Ana R. Cavalli:
Advanced Topics on SDL and MSC. Comput. Networks 31(17): 1783-1784 (1999) - [j5]Marine Tabourier, Ana R. Cavalli:
Passive testing and application to the GSM-MAP protocol. Inf. Softw. Technol. 41(11-12): 813-821 (1999) - [c19]Marine Tabourier, Ana R. Cavalli, Melania Ionescu:
A GSM-MAP Protocol Experiment Using Passive Testing. World Congress on Formal Methods 1999: 915-934 - [c18]Ana R. Cavalli, David Lee, Christian Rinderknecht, Fatiha Zaïdi:
Hit-or-Jump: An algorithm for embedded testing with applications to IN services. FORTE 1999: 41-56 - [c17]Cédric Besse, Ana R. Cavalli, David Lee:
An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol. ASE 1999: 73-80 - [c16]Ana R. Cavalli:
Different Approaches to Protocol and Service Testing. IWTCS 1999: 3-18 - [c15]Teruo Higashino, Akio Nakata, Kenichi Taniguchi, Ana R. Cavalli:
Generating Test Cases for a Timed I/O Automaton Model. IWTCS 1999: 197-214 - [c14]Nina Yevtushenko, Ana R. Cavalli, Ricardo Anido:
Test Suite Minimization for Embedded Nondeterministic Finite State Machines. IWTCS 1999: 237-250 - 1998
- [c13]Luiz A. Paula Lima Jr., Ana R. Cavalli:
Application of Embedded Testing Methods to Service Validation. ICFEM 1998: 212-221 - [c12]Nina Yevtushenko, Ana R. Cavalli, Luiz A. Paula Lima Jr.:
Test Suite Minimization for Testing in Context. IWTCS 1998: 127-146 - [e2]Stanislaw Budkowski, Ana R. Cavalli, Elie Najm:
Formal Description Techniques and Protocol Specification, Testing and Verification, FORTE XI / PSTV XVIII'98, IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE XI) and Protocol Specification, Testing and Verification (PSTV XVIII), 3-6 November, 1998, Paris, France. IFIP Conference Proceedings 135, Kluwer 1998, ISBN 0-412-84760-4 [contents] - 1997
- [c11]Ana R. Cavalli, Boo-Ho Lee, Toma Macavei:
Test generation for the SSCOP-ATM networks protocol. SDL Forum 1997: 277- - [e1]Ana R. Cavalli, Amardeo Sarma:
SDL '97 Time for Testing, SDL, MSC and Trends - 8th International SDL Forum, Evry, France, 23-29 September 1997, Proceedings. Elsevier 1997 [contents] - 1996
- [j4]Ana R. Cavalli, Byoung-Moon Chin, Kilnam Chon:
Testing Methods for SDL Systems. Comput. Networks ISDN Syst. 28(12): 1669-1683 (1996) - [j3]Ana R. Cavalli, Jean Philippe Favreau, Marc Phalippou:
Standardization of Formal Methods in Conformance Testing of Communication Protocols. Comput. Networks ISDN Syst. 29(1): 3-14 (1996) - 1994
- [c10]Hacène Fouchal, Ana R. Cavalli:
A modal based verification for LOTOS. FORTE 1994: 215-217 - [c9]Hacène Fouchal, Ana R. Cavalli:
A Compositional Verification Method for LOTOS. PODC 1994: 390 - 1993
- [c8]Ana R. Cavalli, Sung Un Kim, Patrick Maigron:
Improving Conformance Testing for LOTOS. FORTE 1993: 367-381 - [c7]Ana R. Cavalli, Jean Philippe Favreau, Marc Phalippou:
Formal Methods for Conformance Testing: Results and Perspectives. Protocol Test Systems 1993: 3-17 - 1992
- [c6]Ana R. Cavalli, Patrick Maigron, Sung Un Kim:
Automated Protocol Conformance Test Generation Based on Formal Methods for LOTOS Specifications. Protocol Test Systems 1992: 237-248 - 1991
- [c5]Ana R. Cavalli, Sung Un Kim:
Protocol Conformance Test Generation Using a Graph Rewriting System. Protocol Test Systems 1991: 285-288
1980 – 1989
- 1988
- [j2]Ana R. Cavalli, Etienne Paul:
Exhaustive Analysis and Simulation for Distributed Systems, both Sides of the Same Coin. Distributed Comput. 2(4): 213-225 (1988) - 1987
- [c4]Ana R. Cavalli, François Horn:
Proof of Specification Properties by Using Finite State Machines and Temporal Logic. PSTV 1987: 221-233 - 1984
- [j1]Ana R. Cavalli:
A method of automatic proof for the specification and verification of protocols. Comput. Commun. Rev. 14(2): 100-106 (1984) - [c3]Ana R. Cavalli, Luis Fariñas del Cerro:
A Decision Method for Linear Temporal Logic. CADE 1984: 113-127 - [c2]Ana R. Cavalli, Luis Fariñas del Cerro:
Specification and Verification of Networks Protocols Using. Symposium on Programming 1984: 59-73 - [c1]Daniel Schwabe, Ana R. Cavalli:
Temporal Logic Specification of a Virtual Ring LAN Access Protocol. PSTV 1984: 79-91
Coauthor Index
aka: Nora Cuppens-Boulahia
aka: Joaquín García-Alfaro
aka: Stephane Maag
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint