Publications - Ana R. Cavalli

Title Authors/Editors Venue Year Link
A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems.Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-AlfaroACM Comput. Surv.2024Link
Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment.Valeria Valdés Ríos, Fatiha Zaïdi, Ana Rosa Cavalli, Angel RegoARES2024Link
AI4SOAR: A Security Intelligence Tool for Automated Incident Response.Manh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de OcaARES2024Link
Smart Assistants for Enhancing System Security and Resilience.Andrey Sadovykh, Dragos Truscan, Martin A. Schneider, Wissam Mallouli, Ana R. Cavalli, Cristina Seceleanu, Tanwir AhmadFedCSIS (Communication Papers)2024Link
The SPATIAL Architecture: Design and Development Experiences from Gauging and Monitoring the AI Inference Capabilities of Modern Applications.Abdul-Rasheed Ottun, Rasinthe Marasinghe, Toluwani Elemosho, Mohan Liyanage, Mohamad Ragab, Prachi Bagave, Marcus Westberg, Mehrdad Asadi, Michell Boerger, Chamara Sandeepa, Thulitha Senevirathna, Bartlomiej Siniarski, Madhusanka Liyanage, Vinh Hoa La, Manh-Dung Nguyen, Edgardo Montes de Oca, Tessa Oomen, João Fernando Ferreira Gonçalves, Illija Tanaskovic, Sasa Klopanovic, Nicolas Kourtellis, Claudio Soriente, Jason Pridmore, Ana Rosa Cavalli, Drasko Draskovic, Samuel Marchal, Shen Wang 0006, David Solans Noguero, Nikolay Tcholtchev, Aaron Yi Ding, Huber FloresICDCS2024Link
Diagnosis Automation Using Similarity Analysis: Application to Industrial Systems.Ivan Orefice, Wissam Mallouli, Ana R. Cavalli, Filip Sebek, Alberto LizarduyICSOFT2024Link
Enhancing IoT Security in 6G Networks: AI-Based Intrusion Detection, Penetration Testing, and Blockchain-Based Trust Management (Work-in-Progress Paper).Vinh Hoa La, Wissam Mallouli, Manh-Dung Nguyen, Edgardo Montes de Oca, Ana R. Cavalli, Péter Vörös, Károly Kecskeméti, Mohammed Alshawki, Sándor Laki, Antonios Lalas, Sarantis Kalafatidis, Asterios Mpatziakas, Nikolaos Makris, Anastasios DrosouIFIPIoT (2)2024Link
An Information-Theoretic Approach for Anomaly Detection in RPL-Based Internet of Things.Vinh Hoa La, Edgardo Montes de Oca, Ana R. CavalliIFIPIoT (1)2024Link
A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks.Zujany Salazar, Fatiha Zaïdi, Huu Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de OcaIEEE Access2023Link
A deep learning anomaly detection framework with explainability and robustness.Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de OcaARES2023Link
The DYNABIC approach to resilience of critical infrastructures.Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry 0001, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa CavalliARES2023Link
HTTP/2 Attacks Generation using 5Greplay.Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam MallouliARES2023Link
Testing techniques to assess impact and cascading effects.Valeria Valdés, Ana Rosa Cavalli, Fatiha Zaïdi, Wissam MallouliCloudCom2023Link
5G SUCI Catcher: Attack and Detection.Lorens Barraud, Francesco G. Caccavale, Jean-Baptiste Peyrat, Wissam Mallouli, Véronique Capdevielle, Hicham Khalife, Ana Rosa CavalliCloudCom2023Link
Towards Smarter Security Orchestration and Automatic Response for CPS and IoT.Phu Hong Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe, Erkuden Rios, Diego Sagasti, Gonzalo Nicolas, Valeria Valdés, Wissam Mallouli, Ana R. Cavalli, Nicolas Ferry 0001CloudCom2023Link
A Resilience Component for a Digital Twin.Valeria Valdés, Fatiha Zaïdi, Ana Rosa Cavalli, Wissam MallouliFPS (2)2023Link
Cybersecurity, Monitoring, Explainability and Resilience.Ana Rosa Cavalli, Edgardo Montes de OcaICMU2023Link
Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection.Anis Bouaziz, Manh-Dung Nguyen, Valeria Valdés, Ana Rosa Cavalli, Wissam MallouliICSOFT2023Link
Cyber-Resilience Approaches for Cyber-Physical Systems.Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-AlfaroCoRR2023Link
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection.Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de OcaCoRR2023Link
Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications.George Amponis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana R. Cavalli, Dimitrios Klonidis, Evangelos K. Markakis, Panagiotis G. SarigiannidisEURASIP J. Wirel. Commun. Netw.2022Link
Special issue on information systems quality for digital transformation.Ricardo Pérez-Castillo, Ana C. R. Paiva, Ana Rosa CavalliSoftw. Qual. J.2022Link
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic.Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Rosa Cavalli, Huu Nghia Nguyen, Edgardo Montes de OcaICSOFT2022Link
Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper).Manh-Dung Nguyen, Vinh Hoa La, Ana R. Cavalli, Edgardo Montes de OcaICST Workshops2022Link
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System.Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, Monika Ewa RakoczyICST Workshops2022Link
Digital Twin for IoT Environments: A Testing and Simulation Tool.Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R. CavalliQUATIC2022Link
Switched-based Control Testbed to Assure Cyber-physical Resilience by Design.Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-AlfaroSECRYPT2022Link
Testing Software and Systems - 33rd IFIP WG 6.1 International Conference, ICTSS 2021, London, UK, November 10-12, 2021, ProceedingsDavid Clark 0001, Héctor D. Menéndez 0001, Ana Rosa CavalliICTSS2022Link
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection.Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de OcaARES2021Link
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks.Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis, George Guirgis, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis, Wissam MallouliARES2021Link
A Framework for Security Monitoring of Real IoT Testbeds.Vinh Hoa La, Edgardo Montes de Oca, Wissam Mallouli, Ana R. CavalliICSOFT2021Link
Security testing and resilience.Ana Rosa CavalliICST Workshops2021Link
Quality of Information and Communications Technology - 14th International Conference, QUATIC 2021, Algarve, Portugal, September 8-11, 2021, ProceedingsAna C. R. Paiva, Ana Rosa Cavalli, Paula Ventura Martins, Ricardo Pérez-CastilloQUATIC2021Link
Switched-Based Resilient Control of Cyber-Physical Systems.Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García 0001IEEE Access2020Link
Metrics-driven DevSecOps.Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes de OcaICSOFT2020Link
Cyber-Resilience Evaluation of Cyber-Physical Systems.Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-AlfaroNCA2020Link
Cyber-Resilience Evaluation of Cyber-Physical Systems.Mariana Segovia, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquín García-AlfaroCoRR2020Link
A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication.Raul A. Fuentes-Samaniego, Vinh Hoa La, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Raúl V. Ramírez-VelardeInt. J. Auton. Adapt. Commun. Syst.2019Link
Guest Editorial: Special issue on Testing Software and Systems.Hüsnü Yenigün, Nina Yevtushenko 0001, Ana Rosa CavalliSoftw. Qual. J.2019Link
Reflective Attenuation of Cyber-Physical Attacks.Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquín García-AlfaroCyberICPS/SECPRE/SPOSE/ADIoT@ESORICS2019Link
From Formal Test Objectives to TTCN-3 for Verifying ETCS Complex Software Control Systems.Rabéa Ameur-Boulifa, Ana R. Cavalli, Stephane MaagICSOFT (Selected Papers)2019Link
Verifying Complex Software Control Systems from Test Objectives: Application to the ETCS System.Rabéa Ameur-Boulifa, Ana R. Cavalli, Stephane MaagICSOFT2019Link
A Methodology for Enterprise Resource Planning Automation Testing Application to the Open Source ERP-ODOO.Thierno Birahime Sambe, Stephane Maag, Ana R. CavalliICSOFT2019Link
Attack Tolerance for Services-Based Applications in the Cloud.Georges Ouffoué, Fatiha Zaïdi, Ana R. CavalliICTSS2019Link
Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms.Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli, Brecht Vermeulen, Matevz VucnikICTSS2019Link
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System.Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb MontfortComput. J.2018Link
A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper).Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Joaquín García-AlfaroFPS2018Link
Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion.Sarah A. Dahab, Erika Silva, Stephane Maag, Ana Rosa Cavalli, Wissam MallouliICSOFT2018Link
Smart Measurements and Analysis for Software Quality Enhancement.Sarah A. Dahab, Stephane Maag, Wissam Mallouli, Ana R. CavalliICSOFT (Selected Papers)2018Link
Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection.Ana R. Cavalli, Antonio M. Ortiz, Georges Ouffoué, Cesar A. Sanchez, Fatiha ZaïdiICWS2018Link
An Attack-Tolerant Framework for Web Services.Georges L. A. Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir LallaliSCC2017Link
Model-Based Attack Tolerance.Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir LallaliAINA Workshops2017Link
A Study of Threat Detection Systems and Techniques in the Cloud.Pamela Carvallo, Ana R. Cavalli, Natalia KushikCRiSIS2017Link
A Platform for Security Monitoring of Multi-cloud Applications.Pamela Carvallo, Ana R. Cavalli, Wissam MallouliErshov Informatics Conference2017Link
Decreasing the complexity of deriving test suites against nondeterministic finite state machines.Hüsnü Yenigün, Natalia Kushik, Jorge López, Nina Yevtushenko 0001, Ana R. CavalliEWDTS2017Link
Multi-cloud Applications Security Monitoring.Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli, Erkuden RiosGPC2017Link
Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection.Pamela Carvallo, Ana R. Cavalli, Natalia KushikICSOFT2017Link
How Web Services Can Be Tolerant to Intruders through Diversification.Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir LallaliICWS2017Link
Testing Software and Systems - 29th IFIP WG 6.1 International Conference, ICTSS 2017, St. Petersburg, Russia, October 9-11, 2017, ProceedingsNina Yevtushenko 0001, Ana Rosa Cavalli, Hüsnü YenigünICTSS2017Link
Formal framework for defining trust in multi-organisation environment.Khalifa Toumi, César Andrés, Ana R. CavalliInt. J. Auton. Adapt. Commun. Syst.2016Link
On adaptive experiments for nondeterministic finite state machines.Natalia Kushik, Khaled El-Fakih, Nina Yevtushenko 0001, Ana R. CavalliInt. J. Softw. Tools Technol. Transf.2016Link
Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers.Vinh Hoa La, Raul A. Fuentes-Samaniego, Ana R. CavalliAINA2016Link
QoE-Driven Service Optimization Aware of the Business Model.Diego Rivera, Ana R. CavalliAINA Workshops2016Link
A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks.Vinh Hoa La, Raul Fuentes, Ana R. CavalliAPCC2016Link
A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory.Rui Abreu 0001, César Andrés, Ana R. CavalliCRiSIS2016Link
Optimizing network utilization through source code state model representation.Jorge López, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko 0001EWDTS2016Link
A Misbehavior Node Detection Algorithm for 6LoWPAN Wireless Sensor Networks.Vinh Hoa La, Ana R. CavalliICDCS Workshops2016Link
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sánchez 0001, Fatiha ZaïdiICDCS Workshops2016Link
An Analysis of Secure M2M Communication in WSNs Using DTLS.Raul A. Fuentes-Samaniego, Ana R. Cavalli, Juan Arturo Nolazco-FloresICDCS Workshops2016Link
An Implementation of a QoE Evaluation Technique Including Business Model Parameters.Diego Rivera, Ana R. Cavalli, Natalia Kushik, Wissam MallouliICSOFT-PT2016Link
Opportunistic media sharing for mobile networks.Jorge Visca, Raul Fuentes, Ana R. Cavalli, Javier BaliosianNOMS2016Link
Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State Machines.Natalia Kushik, Jorge López, Ana R. Cavalli, Nina Yevtushenko 0001QRS2016Link
Effectively Testing of Timed Composite Systems using Test Case Prioritization.Huu Nghia Nguyen, Fatiha Zaïdi, Ana R. CavalliSEKE2016Link
Path sampling, a robust alternative to gossiping for opportunistic network routing.Jorge Visca, Javier Baliosian, Raul A. Fuentes-Samaniego, Ana R. CavalliWiMob2016Link
Special issue on formal active and passive testing of distributed and networked systems.Ana R. Cavalli, Teruo Higashino, Manuel Núñez 0001Ann. des Télécommunications2015Link
A survey on formal active and passive testing with applications to the cloud.Ana R. Cavalli, Teruo Higashino, Manuel Núñez 0001Ann. des Télécommunications2015Link
An effective attack detection approach in wireless mesh networks.Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca, Wissam MallouliInt. J. Space Based Situated Comput.2015Link
An Active Testing Tool for Security Testing of Distributed Systems.Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. CavalliARES2015Link
Process Mining for Trust Monitoring.Jorge López, Stephane Maag, Cecilia Saint-Pierre, Javier Bustos-Jiménez, Ana R. CavalliAINA Workshops2015Link
A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks.Vinh Hoa La, Ana Rosa CavalliBWCCA2015Link
QoE Evaluation Based on QoS and QoBiz Parameters Applied to an OTT Service.Diego Rivera, Natalia Kushik, Camila Fuenzalida, Ana R. Cavalli, Nina Yevtushenko 0001ICWS2015Link
Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol.Raul A. Fuentes-Samaniego, Ana R. Cavalli, Wissam Mallouli, Javier BaliosianLANOMS2015Link
An Abstraction for the Interoperability Analysis of Security Policies.Javier Baliosian, Ana R. CavalliNSS2015Link
A Survey on Wireless Sensors Networks Security Based on a Layered Approach.Raul A. Fuentes-Samaniego, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Javier BaliosianWWIC2015Link
QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches.Natalia Kushik, Jeevan Pokhrel, Nina Yevtushenko 0001, Ana R. Cavalli, Wissam MallouliInt. J. Organ. Collect. Intell.2014Link
Validation of a Trust Approach in Multi-Organization Environments.Khalifa Toumi, Ana R. Cavalli, César AndrésInt. J. Secur. Softw. Eng.2014Link
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks.Anderson Morais Paiva Morais, Ana R. CavalliMob. Networks Appl.2014Link
QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System.Jeevan Pokhrel, Felipe Lalanne, Ana R. Cavalli, Wissam MallouliAINA2014Link
A Framework for Distributed Testing of Timed Composite Systems.Huu Nghia Nguyen, Fatiha Zaïdi, Ana R. CavalliAPSEC (1)2014Link
ISER: A Platform for Security Interoperability of Multi-source Systems.Khalifa Toumi, Fabien Autrel, Ana R. Cavalli, Sammy HaddadCRiSIS2014Link
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps.Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. CavalliFPS2014Link
A Formal Approach to Automatic Testing of Security Policies Specified in XACML.Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. CavalliFPS2014Link
On Modeling and Testing Security Properties of Vehicular Networks.Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. CavalliICST Workshops2014Link
Détection de flux de contrôle illégaux dans les Smartphones.Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. CavalliINFORSID2014Link
Estimation of video QoE from MAC parameters in wireless network: A Random Neural Network approach.Indira Paudel, Jeevan Pokhrel, Bachar Wehbi, Ana R. Cavalli, Badii JouaberISCIT2014Link
How to Evaluate Trust Using MMT.Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. CavalliNSS2014Link
On Testing against Partial Non-observable Specifications.Natalia Kushik, Nina Yevtushenko 0001, Ana R. CavalliQUATIC2014Link
Testing Network Protocols: formally, at runtime and online.Xiaoping Che, Stéphane Maag, Jorge López, Ana R. CavalliSEKE2014
Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System.Huu Nghia Nguyen, Ana R. CavalliSEKE2014
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems.Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. CavalliSERE (Companion)2014Link
Evaluating Web Service QoE by Learning Logic Networks.Natalia Kushik, Nina Yevtushenko 0001, Ana R. Cavalli, Wissam Mallouli, Jeevan PokhrelWEBIST (1)2014Link
Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study.Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. CavalliCoRR2014Link
Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols.Pramila Mouttappa, Stephane Maag, Ana R. CavalliComput. Networks2013Link
ICST 2010 Special Issue.Ana R. Cavalli, Sudipto Ghosh 0001Softw. Test. Verification Reliab.2013Link
An Effective Attack Detection Approach in Wireless Mesh Networks.Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de OcaAINA Workshops2013Link
Estimation of QoE of video traffic using a fuzzy expert system.Jeevan Pokhrel, Bachar Wehbi, Anderson Nunes Paiva Morais, Ana R. Cavalli, Eric AllilaireCCNC2013Link
Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case Study.Pramila Mouttappa, Stephane Maag, Ana R. CavalliCOMPSAC2013Link
Security Properties in Virtual Organizations.Khalifa Toumi, César Andrés, Ana R. CavalliHPCC/EUC2013Link
Evaluating Quality of Web Services: A Short Survey.Olga Kondratyeva, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko 0001ICWS2013Link
Evaluating Web Service Quality Using Finite State Models.Olga Kondratyeva, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko 0001QSIC2013Link
Trust Ontology Based on Access Control Parameters in Multi-organization Environments.Khalifa Toumi, César Andrés, Ana R. CavalliSITIS2013Link
Formal Characterization of Illegal Control Flow in Android System.Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. CavalliSITIS2013Link
A SPIN-based approach for detecting vulnerabilities in C programs.Natalia Kushik, Amel Mammar, Ana R. Cavalli, Nina Yevtushenko 0001, Willy Jimenez, Edgardo Montes de OcaAutom. Control. Comput. Sci.2012Link
A systematic approach to integrate common timed security rules within a TEFSM-based system specification.Amel Mammar, Wissam Mallouli, Ana R. CavalliInf. Softw. Technol.2012Link
An advanced approach for modeling and detecting software vulnerabilities.Nahid Shahmehri, Amel Mammar, Edgardo Montes de Oca, David Byers, Ana R. Cavalli, Shanai Ardi, Willy JimenezInf. Softw. Technol.2012Link
Tight bound on the length of distinguishing sequences for non-observable nondeterministic Finite-State Machines with a polynomial number of inputs and outputs.Iksoon Hwang, Nina Yevtushenko 0001, Ana R. CavalliInf. Process. Lett.2012Link
InRob: An approach for testing interoperability and robustness of real-time embedded software.Maria de Fátima Mattiello-Francisco, Eliane Martins, Ana R. Cavalli, Edgar Toshiro YanoJ. Syst. Softw.2012Link
Applying formal methods to PCEP: an industrial case study from modeling to test generation.Iksoon Hwang, Ana R. Cavalli, Mounir Lallali, Dominique VerchèreSoftw. Test. Verification Reliab.2012Link
A vector based model approach for defining trust in Multi-Organization Environments.Khalifa Toumi, César Andrés, Ana R. Cavalli, Mazen El MaarabaniCRiSIS2012Link
Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses.Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. CavalliCSS2012Link
An Event-Based Packet Dropping Detection Scheme for Wireless Mesh Networks.Anderson Nunes Paiva Morais, Ana R. CavalliCSS2012Link
Role based interoperability security policies in collaborative systems.Khalifa Toumi, Ana R. Cavalli, Mazen El MaarabaniCTS2012Link
How to Reduce the Cost of Passive Testing.César Andrés, Ana R. CavalliHASE2012Link
Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments.Khalifa Toumi, César Andrés, Ana R. CavalliICISS2012Link
An IOSTS Based Passive Testing Approach for the Validation of Data-Centric Protocols.Pramila Mouttappa, Stéphane Maag, Ana R. CavalliQSIC2012Link
A distributed intrusion detection scheme for wireless ad hoc networks.Anderson Nunes Paiva Morais, Ana R. CavalliSAC2012Link
Testing Interoperability Security Policies.Mazen El Maarabani, César Andrés, Ana R. CavalliSEKE2012
Quality of Experience as a Selection Criterion for Web Services.Felipe Lalanne, Ana R. Cavalli, Stephane MaagSITIS2012Link
VDC-Based Dynamic Code Analysis: Application to C Programs.Wissam Mallouli, Amel Mammar, Ana R. Cavalli, Willy JimenezJ. Internet Serv. Inf. Secur.2011Link
Route Manipulation Attack in Wireless Mesh Networks.Anderson Nunes Paiva Morais, Ana R. CavalliAINA2011Link
Using Requirements Engineering in an Automatic Security Policy Derivation Process.Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, Gouenou Coatrieux, Ana R. Cavalli, Amel MammarDPM/SETOP2011Link
Verification of Interoperability Security Policies by Model Checking.Mazen El Maarabani, Ana R. Cavalli, Iksoon Hwang, Fatiha ZaïdiHASE2011Link
Detection of Attacks in Wireless Mesh Networks.Anderson Nunes Paiva Morais, Ana R. CavalliLADC2011Link
Using Testing Techniques for Vulnerability Detection in C Programs.Amel Mammar, Ana R. Cavalli, Willy Jimenez, Wissam Mallouli, Edgardo Montes de OcaICTSS2011Link
FSM-Based Test Derivation Strategies for Systems with Time-Outs.Maxim Zhigulin, Nina Yevtushenko 0001, Stéphane Maag, Ana R. CavalliQSIC2011Link
A model-based attack injection approach for security validation.Anderson Nunes Paiva Morais, Ana R. Cavalli, Eliane MartinsSIN2011Link
A Quality of Experience Based Approach for Wireless Mesh Networks.Anderson Nunes Paiva Morais, Ana R. CavalliWWIC2011Link
Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected PapersJoaquín García-Alfaro, Guillermo Navarro-Arribas, Ana R. Cavalli, Jean LeneutreDPM/SETOP2011Link
Testing a probabilistic FSM using interval estimation.Iksoon Hwang, Ana R. CavalliComput. Networks2010Link
FSM-based conformance testing methods: A survey annotated with experimental evaluation.Rita Dorofeeva, Khaled El-Fakih, Stéphane Maag, Ana R. Cavalli, Nina Yevtushenko 0001Inf. Softw. Technol.2010Link
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition.Ana R. Cavalli, Tien-Dung Cao, Wissam Mallouli, Eliane Martins, Andrey Sadovykh, Sébastien Salva, Fatiha ZaïdiICWS2010Link
Timed Extended Invariants for the Passive Testing of Web Services.Gerardo Morales, Stéphane Maag, Ana R. Cavalli, Wissam Mallouli, Edgardo Montes de Oca, Bachar WehbiICWS2010Link
A Formal Passive Testing Approach for Checking Real Time Constraints.Fayçal Bessayah, Ana R. CavalliQUATIC2010Link
Testing Web Service Orchestrators in Context: A Symbolic Approach.Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana R. CavalliSEFM2010Link
A Formal Approach for Interoperability Testing of Security Rules.Mazen El Maarabani, Iksoon Hwang, Ana R. CavalliSITIS2010Link
A Fault Injection Tool for Testing Web Services Composition.Fayçal Bessayah, Ana R. Cavalli, Willian Maja, Eliane Martins, Andre Willik ValentiTAIC PART2010Link
Transmit and Reserve (TAR): A Coordinated Channel Access for IEEE 802.11 Networks.Bachar Wehbi, Anis Laouiti, Ana R. CavalliWCNC2010Link
Analysis of the OLSR Protocol by Using Formal Passive Testing.César Andrés, Stéphane Maag, Ana R. Cavalli, Mercedes G. Merayo, Manuel Núñez 0001APSEC2009Link
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification.Wissam Mallouli, Amel Mammar, Ana R. CavalliAPSEC2009Link
Security Protocol Testing Using Attack Trees.Anderson Nunes Paiva Morais, Eliane Martins, Ana R. Cavalli, Willy JimenezCSE (2)2009Link
Modeling, Validation, and Verification of PCEP Using the IF Language.Iksoon Hwang, Mounir Lallali, Ana R. Cavalli, Dominique VerchèreFMOODS/FORTE2009Link
A Statistical Approach to Test Stochastic and Probabilistic Systems.Mercedes G. Merayo, Iksoon Hwang, Manuel Núñez 0001, Ana R. CavalliICFEM2009Link
A formal approach for specification and verification of fault injection process.Fayçal Bessayah, Ana R. Cavalli, Eliane MartinsICIS2009Link
An Automated Passive Testing Approach for the IMS PoC Service.Felipe Lalanne, Stéphane Maag, Edgardo Montes de Oca, Ana R. Cavalli, Wissam Mallouli, Arnaud GonguetASE2009Link
A Formal Passive Testing Approach to test a MANET Routing Protocol.Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca, Fatiha ZaïdiPerCom Workshops2009Link
Observability and Controllability Issues in Conformance Testing of Web Service Compositions.Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana R. CavalliTestCom/FATES2009Link
Network protocol interoperability testing based on contextual signatures and passive testing.Fatiha Zaïdi, Emmanuel Bayse, Ana R. CavalliSAC2009Link
A passive conformance testing approach for a MANET routing protocol.Ana R. Cavalli, Stéphane Maag, Edgardo Montes de OcaSAC2009Link
Interoperability testing of presence service on IMS platform.Mazen El Maarabani, Asma Adala, Iksoon Hwang, Ana R. CavalliTRIDENTCOM2009Link
A formal validation methodology for MANET routing protocols based on nodes' self similarity.Stéphane Maag, Cyril Grepet, Ana R. CavalliComput. Commun.2008Link
Context Ontology for Secure Interoperability.Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. CavalliARES2008Link
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking.Wissam Mallouli, Bachar Wehbi, Ana R. CavalliADHOC-NOW2008Link
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.Wissam Mallouli, Amel Mammar, Ana R. CavalliDS-RT2008Link
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints.Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli, Mounir LallaliDS-RT2008Link
Automatic Timed Test Case Generation for Web Services Composition.Mounir Lallali, Fatiha Zaïdi, Ana R. Cavalli, Iksoon HwangECOWS2008Link
Security Rules Specification and Analysis Based on Passive Testing.Wissam Mallouli, Fayçal Bessayah, Ana R. Cavalli, Azzedine BenameurGLOBECOM2008Link
Use of invariant properties to evaluate the results of fault-injection-based robustness testing of protocol implementations.Ana R. Cavalli, Eliane Martins, Anderson Nunes Paiva MoraisICST Workshops2008Link
Testing Security Policies for Web Applications.Wissam Mallouli, Gerardo Morales, Ana R. CavalliICST Workshops2008Link
A Reactive Wireless Mesh Network Architecture.Bachar Wehbi, Anis Laouiti, Ana R. CavalliMed-Hoc-Net2008Link
Efficient time synchronization mechanism for wireless multi hop networks.Bachar Wehbi, Anis Laouiti, Ana R. CavalliPIMRC2008Link
Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study.Wissam Mallouli, Mounir Lallali, Gerardo Morales, Ana R. CavalliSITIS2008Link
Interoperability of Context Based System Policies Using O2O Contract.Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. CavalliSITIS2008Link
Specification of Timed EFSM Fault Models in SDL.Samrat S. Batth, Elisangela Rodrigues Vieira, Ana R. Cavalli, M. Ümit UyarFORTE2007Link
Testing Security Rules with Decomposable Activities.Wissam Mallouli, Ana R. CavalliHASE2007Link
Towards an Automated Test Generation with Delayed Transitions for Timed Systems.Elisangela Rodrigues Vieira, Ana R. CavalliRTCSA2007Link
A formal approach for testing security rules.Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric CuppensSACMAT2007Link
Regression and Performance Testing of an e-Learning Web Application: dotLRN.Ana R. Cavalli, Stéphane Maag, Gerardo MoralesSITIS2007Link
Timed Modeling of Web Services Composition for Automatic Testing.Mounir Lallali, Fatiha Zaïdi, Ana R. CavalliSITIS2007Link
A Reliable Approach for Transport Session Management.Ana R. Cavalli, Dario VieiraAICT/ICIW2006Link
Implementation Analysis of MSP.Ana R. Cavalli, Dario Vieira, Timothy G. GriffinICN/ICONS/MCL2006Link
Parallel Passive Testing of System Protocols - Towards a Real-time Exhaustive Approach.Baptiste Alcalde, Ana R. CavalliICN/ICONS/MCL2006Link
An Enhanced Passive Testing Approach for Network Protocols.Ana R. Cavalli, Dario VieiraICN/ICONS/MCL2006Link
Working Around BGP: An Improvement of BGP Session Maintenance.Ana R. Cavalli, Dario VieiraICNS2006Link
MSP: A Novel Session Maintenance Protocol.Ana R. Cavalli, Timothy G. Griffin, Dario VieiraICON2006Link
A Security Model for OLSR MANET Protocol.Jean-Marie Orset, Ana R. CavalliMDM2006Link
Light Client Management Protocol for Wireless Mesh Networks.Bachar Wehbi, Wissam Mallouli, Ana R. CavalliMDM2006Link
Application of Two Test Generation Tools to an Industrial Case Study.Ana R. Cavalli, Stéphane Maag, Wissam Mallouli, Mikael Marche, Yves-Marie QuemenerTestCom2006Link
Secure hosts auto-configuration in mobile ad hoc networks.Ana R. Cavalli, Jean-Marie OrsetAd Hoc Networks2005Link
Une plate-forme de validation multi-protocoles et multi-services - résultats d'expérimentation.Pierre Combes, Wei Monin, Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi, Richard Castanet, Marcien MacKaya, Patrice LaurençotAnn. des Télécommunications2005Link
A passive testing approach based on invariants: application to the WAPEmmanuel Bayse, Ana R. Cavalli, Manuel Núñez 0001, Fatiha ZaïdiComput. Networks2005Link
A Comparison between Two Maintenance Session Protocols.Ana R. Cavalli, Timothy G. Griffin, Dario VieiraAICT/SAPIR/ELETE2005Link
An EFSM-Based Intrusion Detection System for Ad Hoc Networks.Jean-Marie Orset, Baptiste Alcalde, Ana R. CavalliATVA2005Link
Passive Testing - A Constrained Invariant Checking Approach.Behrouz Tork Ladani, Baptiste Alcalde, Ana R. CavalliTestCom2005Link
Experimental Evaluation of FSM-Based Testing Methods.Rita Dorofeeva, Nina Yevtushenko 0001, Khaled El-Fakih, Ana R. CavalliSEFM2005Link
Application of a Formal Testing Methodology to Wireless Telephony Networks.Ana R. Cavalli, Amel Mederreg, Fatiha ZaïdiJ. Braz. Comput. Soc.2004Link
Network Protocol System Passive Testing for Fault Management: A Backward Checking Approach.Baptiste Alcalde, Ana R. Cavalli, Dongluo Chen, Davy Khuu, David Lee 0001FORTE2004Link
A Validation Model for the DSR Protocol.Ana R. Cavalli, Cyril Grepet, Stéphane Maag, Vincent TortajadaICDCS Workshops2004Link
Secure Hosts Autoconfiguration in Mobile Ad Hoc Networks.Ana R. Cavalli, Jean-Marie OrsetICDCS Workshops2004Link
A Testing Methodology for an Open Software E-learning Platform.Ana R. Cavalli, Stéphane Maag, Sofia Papagiannaki, Georgios Verigakis, Fatiha ZaïdiEDUTECH2004Link
A Multi-service and Multi-protocol Validation Platform-Experimentation Results.Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi, Pierre Combes, Wei Monin, Richard Castanet, Marcien MacKaya, Patrice LaurençotTestCom2004Link
Automated test scenarios generation for an e-barter system.Ana R. Cavalli, Stéphane MaagSAC2004Link
From UML models to automatic generated tests for the dotLRN e-learning platform.Ana R. Cavalli, Stéphane Maag, Sofia Papagiannaki, Georgios VerigakisTACoS2004Link
New approaches for passive testing using an Extended Finite State Machine specification.Ana R. Cavalli, Caroline Gervy, Svetlana ProkopenkoInf. Softw. Technol.2003Link
Test suite minimization for testing in context.Ricardo Anido, Ana R. Cavalli, Luiz A. Paula Lima Jr., Nina Yevtushenko 0001Softw. Test. Verification Reliab.2003Link
TestNet: Let's Test Together!.Ana R. Cavalli, Edgardo Montes de Oca, Manuel Núñez 0001TestCom2003Link
Fast Testing of Critical Properties through Passive Testing.José Antonio Arnedo, Ana R. Cavalli, Manuel Núñez 0001TestCom2003Link
A New Algorithm for Service Interaction Detection.Ana R. Cavalli, Stéphane MaagICFEM2002Link
Automated Generation of Interoperability Tests.Cédric Besse, Ana R. Cavalli, Myungchul Kim, Fatiha ZaïdiTestCom2002
Fault Detection within a Component of a System of Communicating FSMs.Ana R. Cavalli, Svetlana Prokopenko, Nina Yevtushenko 0001TestCom2002
Partial Validation of a Design Specification with Respect to Requirements.Cédric Besse, Ana R. Cavalli, Ferhat KhendekAPAQS2001Link
A Conformance Testing Method for Communication Protocols Modeled as Concurrent DFSMs.Atsushi Fukada, Akio Nakata, Junji Kitamichi, Teruo Higashino, Ana R. CavalliICOIN2001Link
A Service-Component Testing Method and a Suitable CORBA Architecture.Ana R. Cavalli, Bruno Defude, Christian Rinderknecht, Fatiha ZaïdiISCC2001Link
Validation of the GSM-map protocol.Ana R. Cavalli, Melania IonescuAnn. des Télécommunications2000Link
Fault Detection Power of a Widely Used Test Suite for a System of Communicating FSMs.Ana R. Cavalli, Svetlana Prokopenko, Nina Yevtushenko 0001TestCom2000
Advanced Topics on SDL and MSC.Ana R. CavalliComput. Networks1999Link
Passive testing and application to the GSM-MAP protocol.Marine Tabourier, Ana R. CavalliInf. Softw. Technol.1999Link
A GSM-MAP Protocol Experiment Using Passive Testing.Marine Tabourier, Ana R. Cavalli, Melania IonescuWorld Congress on Formal Methods1999Link
Hit-or-Jump: An algorithm for embedded testing with applications to IN services.Ana R. Cavalli, David Lee 0001, Christian Rinderknecht, Fatiha ZaïdiFORTE1999
An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol.Cédric Besse, Ana R. Cavalli, David Lee 0001ASE1999Link
Different Approaches to Protocol and Service Testing.Ana R. CavalliIWTCS1999
Generating Test Cases for a Timed I/O Automaton Model.Teruo Higashino, Akio Nakata, Kenichi Taniguchi, Ana R. CavalliIWTCS1999
Test Suite Minimization for Embedded Nondeterministic Finite State Machines.Nina Yevtushenko 0001, Ana R. Cavalli, Ricardo AnidoIWTCS1999
Application of Embedded Testing Methods to Service Validation.Luiz A. Paula Lima Jr., Ana R. CavalliICFEM1998Link
Test Suite Minimization for Testing in Context.Nina Yevtushenko 0001, Ana R. Cavalli, Luiz A. Paula Lima Jr.IWTCS1998
Formal Description Techniques and Protocol Specification, Testing and Verification, FORTE XI / PSTV XVIII'98, IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE XI) and Protocol Specification, Testing and Verification (PSTV XVIII), 3-6 November, 1998, Paris, FranceStanislaw Budkowski, Ana R. Cavalli, Elie NajmFORTE1998
Test generation for the SSCOP-ATM networks protocol.Ana R. Cavalli, Boo-Ho Lee, Toma MacaveiSDL Forum1997
SDL '97 Time for Testing, SDL, MSC and Trends - 8th International SDL Forum, Evry, France, 23-29 September 1997, ProceedingsAna R. Cavalli, Amardeo SarmaSDL Forum1997
Testing Methods for SDL Systems.Ana R. Cavalli, Byoung-Moon Chin, Kilnam ChonComput. Networks ISDN Syst.1996Link
Standardization of Formal Methods in Conformance Testing of Communication Protocols.Ana R. Cavalli, Jean Philippe Favreau, Marc PhalippouComput. Networks ISDN Syst.1996Link
A modal based verification for LOTOS.Hacène Fouchal, Ana R. CavalliFORTE1994
A Compositional Verification Method for LOTOS.Hacène Fouchal, Ana R. CavalliPODC1994Link
Improving Conformance Testing for LOTOS.Ana R. Cavalli, Sung Un Kim, Patrick MaigronFORTE1993
Formal Methods for Conformance Testing: Results and Perspectives.Ana R. Cavalli, Jean Philippe Favreau, Marc PhalippouProtocol Test Systems1993
Automated Protocol Conformance Test Generation Based on Formal Methods for LOTOS Specifications.Ana R. Cavalli, Patrick Maigron, Sung Un KimProtocol Test Systems1992
Protocol Conformance Test Generation Using a Graph Rewriting System.Ana R. Cavalli, Sung Un KimProtocol Test Systems1991
Exhaustive Analysis and Simulation for Distributed Systems, both Sides of the Same Coin.Ana R. Cavalli, Etienne PaulDistributed Comput.1988Link
Proof of Specification Properties by Using Finite State Machines and Temporal Logic.Ana R. Cavalli, François HornPSTV1987
A method of automatic proof for the specification and verification of protocols.Ana R. CavalliComput. Commun. Rev.1984Link
A Decision Method for Linear Temporal Logic.Ana R. Cavalli, Luis Fariñas del CerroCADE1984Link
Specification and Verification of Networks Protocols Using.Ana R. Cavalli, Luis Fariñas del CerroSymposium on Programming1984Link
Temporal Logic Specification of a Virtual Ring LAN Access Protocol.Daniel Schwabe 0001, Ana R. CavalliPSTV1984