| Title |
Authors/Editors |
Venue |
Year |
Link |
| A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems. | Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro | ACM Comput. Surv. | 2024 | Link |
| Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment. | Valeria Valdés Ríos, Fatiha Zaïdi, Ana Rosa Cavalli, Angel Rego | ARES | 2024 | Link |
| AI4SOAR: A Security Intelligence Tool for Automated Incident Response. | Manh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca | ARES | 2024 | Link |
| Smart Assistants for Enhancing System Security and Resilience. | Andrey Sadovykh, Dragos Truscan, Martin A. Schneider, Wissam Mallouli, Ana R. Cavalli, Cristina Seceleanu, Tanwir Ahmad | FedCSIS (Communication Papers) | 2024 | Link |
| The SPATIAL Architecture: Design and Development Experiences from Gauging and Monitoring the AI Inference Capabilities of Modern Applications. | Abdul-Rasheed Ottun, Rasinthe Marasinghe, Toluwani Elemosho, Mohan Liyanage, Mohamad Ragab, Prachi Bagave, Marcus Westberg, Mehrdad Asadi, Michell Boerger, Chamara Sandeepa, Thulitha Senevirathna, Bartlomiej Siniarski, Madhusanka Liyanage, Vinh Hoa La, Manh-Dung Nguyen, Edgardo Montes de Oca, Tessa Oomen, João Fernando Ferreira Gonçalves, Illija Tanaskovic, Sasa Klopanovic, Nicolas Kourtellis, Claudio Soriente, Jason Pridmore, Ana Rosa Cavalli, Drasko Draskovic, Samuel Marchal, Shen Wang 0006, David Solans Noguero, Nikolay Tcholtchev, Aaron Yi Ding, Huber Flores | ICDCS | 2024 | Link |
| Diagnosis Automation Using Similarity Analysis: Application to Industrial Systems. | Ivan Orefice, Wissam Mallouli, Ana R. Cavalli, Filip Sebek, Alberto Lizarduy | ICSOFT | 2024 | Link |
| Enhancing IoT Security in 6G Networks: AI-Based Intrusion Detection, Penetration Testing, and Blockchain-Based Trust Management (Work-in-Progress Paper). | Vinh Hoa La, Wissam Mallouli, Manh-Dung Nguyen, Edgardo Montes de Oca, Ana R. Cavalli, Péter Vörös, Károly Kecskeméti, Mohammed Alshawki, Sándor Laki, Antonios Lalas, Sarantis Kalafatidis, Asterios Mpatziakas, Nikolaos Makris, Anastasios Drosou | IFIPIoT (2) | 2024 | Link |
| An Information-Theoretic Approach for Anomaly Detection in RPL-Based Internet of Things. | Vinh Hoa La, Edgardo Montes de Oca, Ana R. Cavalli | IFIPIoT (1) | 2024 | Link |
| A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. | Zujany Salazar, Fatiha Zaïdi, Huu Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca | IEEE Access | 2023 | Link |
| A deep learning anomaly detection framework with explainability and robustness. | Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca | ARES | 2023 | Link |
| The DYNABIC approach to resilience of critical infrastructures. | Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry 0001, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa Cavalli | ARES | 2023 | Link |
| HTTP/2 Attacks Generation using 5Greplay. | Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli | ARES | 2023 | Link |
| Testing techniques to assess impact and cascading effects. | Valeria Valdés, Ana Rosa Cavalli, Fatiha Zaïdi, Wissam Mallouli | CloudCom | 2023 | Link |
| 5G SUCI Catcher: Attack and Detection. | Lorens Barraud, Francesco G. Caccavale, Jean-Baptiste Peyrat, Wissam Mallouli, Véronique Capdevielle, Hicham Khalife, Ana Rosa Cavalli | CloudCom | 2023 | Link |
| Towards Smarter Security Orchestration and Automatic Response for CPS and IoT. | Phu Hong Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe, Erkuden Rios, Diego Sagasti, Gonzalo Nicolas, Valeria Valdés, Wissam Mallouli, Ana R. Cavalli, Nicolas Ferry 0001 | CloudCom | 2023 | Link |
| A Resilience Component for a Digital Twin. | Valeria Valdés, Fatiha Zaïdi, Ana Rosa Cavalli, Wissam Mallouli | FPS (2) | 2023 | Link |
| Cybersecurity, Monitoring, Explainability and Resilience. | Ana Rosa Cavalli, Edgardo Montes de Oca | ICMU | 2023 | Link |
| Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection. | Anis Bouaziz, Manh-Dung Nguyen, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli | ICSOFT | 2023 | Link |
| Cyber-Resilience Approaches for Cyber-Physical Systems. | Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro | CoRR | 2023 | Link |
| 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. | Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca | CoRR | 2023 | Link |
| Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. | George Amponis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana R. Cavalli, Dimitrios Klonidis, Evangelos K. Markakis, Panagiotis G. Sarigiannidis | EURASIP J. Wirel. Commun. Netw. | 2022 | Link |
| Special issue on information systems quality for digital transformation. | Ricardo Pérez-Castillo, Ana C. R. Paiva, Ana Rosa Cavalli | Softw. Qual. J. | 2022 | Link |
| A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. | Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Rosa Cavalli, Huu Nghia Nguyen, Edgardo Montes de Oca | ICSOFT | 2022 | Link |
| Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper). | Manh-Dung Nguyen, Vinh Hoa La, Ana R. Cavalli, Edgardo Montes de Oca | ICST Workshops | 2022 | Link |
| Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System. | Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, Monika Ewa Rakoczy | ICST Workshops | 2022 | Link |
| Digital Twin for IoT Environments: A Testing and Simulation Tool. | Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R. Cavalli | QUATIC | 2022 | Link |
| Switched-based Control Testbed to Assure Cyber-physical Resilience by Design. | Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro | SECRYPT | 2022 | Link |
| Testing Software and Systems - 33rd IFIP WG 6.1 International Conference, ICTSS 2021, London, UK, November 10-12, 2021, Proceedings | David Clark 0001, Héctor D. Menéndez 0001, Ana Rosa Cavalli | ICTSS | 2022 | Link |
| 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. | Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca | ARES | 2021 | Link |
| SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks. | Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis, George Guirgis, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis, Wissam Mallouli | ARES | 2021 | Link |
| A Framework for Security Monitoring of Real IoT Testbeds. | Vinh Hoa La, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli | ICSOFT | 2021 | Link |
| Security testing and resilience. | Ana Rosa Cavalli | ICST Workshops | 2021 | Link |
| Quality of Information and Communications Technology - 14th International Conference, QUATIC 2021, Algarve, Portugal, September 8-11, 2021, Proceedings | Ana C. R. Paiva, Ana Rosa Cavalli, Paula Ventura Martins, Ricardo Pérez-Castillo | QUATIC | 2021 | Link |
| Switched-Based Resilient Control of Cyber-Physical Systems. | Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García 0001 | IEEE Access | 2020 | Link |
| Metrics-driven DevSecOps. | Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes de Oca | ICSOFT | 2020 | Link |
| Cyber-Resilience Evaluation of Cyber-Physical Systems. | Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro | NCA | 2020 | Link |
| Cyber-Resilience Evaluation of Cyber-Physical Systems. | Mariana Segovia, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquín García-Alfaro | CoRR | 2020 | Link |
| A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication. | Raul A. Fuentes-Samaniego, Vinh Hoa La, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Raúl V. Ramírez-Velarde | Int. J. Auton. Adapt. Commun. Syst. | 2019 | Link |
| Guest Editorial: Special issue on Testing Software and Systems. | Hüsnü Yenigün, Nina Yevtushenko 0001, Ana Rosa Cavalli | Softw. Qual. J. | 2019 | Link |
| Reflective Attenuation of Cyber-Physical Attacks. | Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquín García-Alfaro | CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS | 2019 | Link |
| From Formal Test Objectives to TTCN-3 for Verifying ETCS Complex Software Control Systems. | Rabéa Ameur-Boulifa, Ana R. Cavalli, Stephane Maag | ICSOFT (Selected Papers) | 2019 | Link |
| Verifying Complex Software Control Systems from Test Objectives: Application to the ETCS System. | Rabéa Ameur-Boulifa, Ana R. Cavalli, Stephane Maag | ICSOFT | 2019 | Link |
| A Methodology for Enterprise Resource Planning Automation Testing Application to the Open Source ERP-ODOO. | Thierno Birahime Sambe, Stephane Maag, Ana R. Cavalli | ICSOFT | 2019 | Link |
| Attack Tolerance for Services-Based Applications in the Cloud. | Georges Ouffoué, Fatiha Zaïdi, Ana R. Cavalli | ICTSS | 2019 | Link |
| Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms. | Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli, Brecht Vermeulen, Matevz Vucnik | ICTSS | 2019 | Link |
| A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. | Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort | Comput. J. | 2018 | Link |
| A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper). | Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Joaquín García-Alfaro | FPS | 2018 | Link |
| Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion. | Sarah A. Dahab, Erika Silva, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli | ICSOFT | 2018 | Link |
| Smart Measurements and Analysis for Software Quality Enhancement. | Sarah A. Dahab, Stephane Maag, Wissam Mallouli, Ana R. Cavalli | ICSOFT (Selected Papers) | 2018 | Link |
| Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection. | Ana R. Cavalli, Antonio M. Ortiz, Georges Ouffoué, Cesar A. Sanchez, Fatiha Zaïdi | ICWS | 2018 | Link |
| An Attack-Tolerant Framework for Web Services. | Georges L. A. Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali | SCC | 2017 | Link |
| Model-Based Attack Tolerance. | Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali | AINA Workshops | 2017 | Link |
| A Study of Threat Detection Systems and Techniques in the Cloud. | Pamela Carvallo, Ana R. Cavalli, Natalia Kushik | CRiSIS | 2017 | Link |
| A Platform for Security Monitoring of Multi-cloud Applications. | Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli | Ershov Informatics Conference | 2017 | Link |
| Decreasing the complexity of deriving test suites against nondeterministic finite state machines. | Hüsnü Yenigün, Natalia Kushik, Jorge López, Nina Yevtushenko 0001, Ana R. Cavalli | EWDTS | 2017 | Link |
| Multi-cloud Applications Security Monitoring. | Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli, Erkuden Rios | GPC | 2017 | Link |
| Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection. | Pamela Carvallo, Ana R. Cavalli, Natalia Kushik | ICSOFT | 2017 | Link |
| How Web Services Can Be Tolerant to Intruders through Diversification. | Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali | ICWS | 2017 | Link |
| Testing Software and Systems - 29th IFIP WG 6.1 International Conference, ICTSS 2017, St. Petersburg, Russia, October 9-11, 2017, Proceedings | Nina Yevtushenko 0001, Ana Rosa Cavalli, Hüsnü Yenigün | ICTSS | 2017 | Link |
| Formal framework for defining trust in multi-organisation environment. | Khalifa Toumi, César Andrés, Ana R. Cavalli | Int. J. Auton. Adapt. Commun. Syst. | 2016 | Link |
| On adaptive experiments for nondeterministic finite state machines. | Natalia Kushik, Khaled El-Fakih, Nina Yevtushenko 0001, Ana R. Cavalli | Int. J. Softw. Tools Technol. Transf. | 2016 | Link |
| Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers. | Vinh Hoa La, Raul A. Fuentes-Samaniego, Ana R. Cavalli | AINA | 2016 | Link |
| QoE-Driven Service Optimization Aware of the Business Model. | Diego Rivera, Ana R. Cavalli | AINA Workshops | 2016 | Link |
| A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks. | Vinh Hoa La, Raul Fuentes, Ana R. Cavalli | APCC | 2016 | Link |
| A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory. | Rui Abreu 0001, César Andrés, Ana R. Cavalli | CRiSIS | 2016 | Link |
| Optimizing network utilization through source code state model representation. | Jorge López, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko 0001 | EWDTS | 2016 | Link |
| A Misbehavior Node Detection Algorithm for 6LoWPAN Wireless Sensor Networks. | Vinh Hoa La, Ana R. Cavalli | ICDCS Workshops | 2016 | Link |
| Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. | Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sánchez 0001, Fatiha Zaïdi | ICDCS Workshops | 2016 | Link |
| An Analysis of Secure M2M Communication in WSNs Using DTLS. | Raul A. Fuentes-Samaniego, Ana R. Cavalli, Juan Arturo Nolazco-Flores | ICDCS Workshops | 2016 | Link |
| An Implementation of a QoE Evaluation Technique Including Business Model Parameters. | Diego Rivera, Ana R. Cavalli, Natalia Kushik, Wissam Mallouli | ICSOFT-PT | 2016 | Link |
| Opportunistic media sharing for mobile networks. | Jorge Visca, Raul Fuentes, Ana R. Cavalli, Javier Baliosian | NOMS | 2016 | Link |
| Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State Machines. | Natalia Kushik, Jorge López, Ana R. Cavalli, Nina Yevtushenko 0001 | QRS | 2016 | Link |
| Effectively Testing of Timed Composite Systems using Test Case Prioritization. | Huu Nghia Nguyen, Fatiha Zaïdi, Ana R. Cavalli | SEKE | 2016 | Link |
| Path sampling, a robust alternative to gossiping for opportunistic network routing. | Jorge Visca, Javier Baliosian, Raul A. Fuentes-Samaniego, Ana R. Cavalli | WiMob | 2016 | Link |
| Special issue on formal active and passive testing of distributed and networked systems. | Ana R. Cavalli, Teruo Higashino, Manuel Núñez 0001 | Ann. des Télécommunications | 2015 | Link |
| A survey on formal active and passive testing with applications to the cloud. | Ana R. Cavalli, Teruo Higashino, Manuel Núñez 0001 | Ann. des Télécommunications | 2015 | Link |
| An effective attack detection approach in wireless mesh networks. | Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca, Wissam Mallouli | Int. J. Space Based Situated Comput. | 2015 | Link |
| An Active Testing Tool for Security Testing of Distributed Systems. | Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli | ARES | 2015 | Link |
| Process Mining for Trust Monitoring. | Jorge López, Stephane Maag, Cecilia Saint-Pierre, Javier Bustos-Jiménez, Ana R. Cavalli | AINA Workshops | 2015 | Link |
| A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks. | Vinh Hoa La, Ana Rosa Cavalli | BWCCA | 2015 | Link |
| QoE Evaluation Based on QoS and QoBiz Parameters Applied to an OTT Service. | Diego Rivera, Natalia Kushik, Camila Fuenzalida, Ana R. Cavalli, Nina Yevtushenko 0001 | ICWS | 2015 | Link |
| Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol. | Raul A. Fuentes-Samaniego, Ana R. Cavalli, Wissam Mallouli, Javier Baliosian | LANOMS | 2015 | Link |
| An Abstraction for the Interoperability Analysis of Security Policies. | Javier Baliosian, Ana R. Cavalli | NSS | 2015 | Link |
| A Survey on Wireless Sensors Networks Security Based on a Layered Approach. | Raul A. Fuentes-Samaniego, Ana Rosa Cavalli, Juan Arturo Nolazco-Flores, Javier Baliosian | WWIC | 2015 | Link |
| QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches. | Natalia Kushik, Jeevan Pokhrel, Nina Yevtushenko 0001, Ana R. Cavalli, Wissam Mallouli | Int. J. Organ. Collect. Intell. | 2014 | Link |
| Validation of a Trust Approach in Multi-Organization Environments. | Khalifa Toumi, Ana R. Cavalli, César Andrés | Int. J. Secur. Softw. Eng. | 2014 | Link |
| A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks. | Anderson Morais Paiva Morais, Ana R. Cavalli | Mob. Networks Appl. | 2014 | Link |
| QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System. | Jeevan Pokhrel, Felipe Lalanne, Ana R. Cavalli, Wissam Mallouli | AINA | 2014 | Link |
| A Framework for Distributed Testing of Timed Composite Systems. | Huu Nghia Nguyen, Fatiha Zaïdi, Ana R. Cavalli | APSEC (1) | 2014 | Link |
| ISER: A Platform for Security Interoperability of Multi-source Systems. | Khalifa Toumi, Fabien Autrel, Ana R. Cavalli, Sammy Haddad | CRiSIS | 2014 | Link |
| Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps. | Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli | FPS | 2014 | Link |
| A Formal Approach to Automatic Testing of Security Policies Specified in XACML. | Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli | FPS | 2014 | Link |
| On Modeling and Testing Security Properties of Vehicular Networks. | Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli | ICST Workshops | 2014 | Link |
| Détection de flux de contrôle illégaux dans les Smartphones. | Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli | INFORSID | 2014 | Link |
| Estimation of video QoE from MAC parameters in wireless network: A Random Neural Network approach. | Indira Paudel, Jeevan Pokhrel, Bachar Wehbi, Ana R. Cavalli, Badii Jouaber | ISCIT | 2014 | Link |
| How to Evaluate Trust Using MMT. | Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli | NSS | 2014 | Link |
| On Testing against Partial Non-observable Specifications. | Natalia Kushik, Nina Yevtushenko 0001, Ana R. Cavalli | QUATIC | 2014 | Link |
| Testing Network Protocols: formally, at runtime and online. | Xiaoping Che, Stéphane Maag, Jorge López, Ana R. Cavalli | SEKE | 2014 | |
| Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System. | Huu Nghia Nguyen, Ana R. Cavalli | SEKE | 2014 | |
| Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems. | Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli | SERE (Companion) | 2014 | Link |
| Evaluating Web Service QoE by Learning Logic Networks. | Natalia Kushik, Nina Yevtushenko 0001, Ana R. Cavalli, Wissam Mallouli, Jeevan Pokhrel | WEBIST (1) | 2014 | Link |
| Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study. | Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli | CoRR | 2014 | Link |
| Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols. | Pramila Mouttappa, Stephane Maag, Ana R. Cavalli | Comput. Networks | 2013 | Link |
| ICST 2010 Special Issue. | Ana R. Cavalli, Sudipto Ghosh 0001 | Softw. Test. Verification Reliab. | 2013 | Link |
| An Effective Attack Detection Approach in Wireless Mesh Networks. | Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca | AINA Workshops | 2013 | Link |
| Estimation of QoE of video traffic using a fuzzy expert system. | Jeevan Pokhrel, Bachar Wehbi, Anderson Nunes Paiva Morais, Ana R. Cavalli, Eric Allilaire | CCNC | 2013 | Link |
| Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case Study. | Pramila Mouttappa, Stephane Maag, Ana R. Cavalli | COMPSAC | 2013 | Link |
| Security Properties in Virtual Organizations. | Khalifa Toumi, César Andrés, Ana R. Cavalli | HPCC/EUC | 2013 | Link |
| Evaluating Quality of Web Services: A Short Survey. | Olga Kondratyeva, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko 0001 | ICWS | 2013 | Link |
| Evaluating Web Service Quality Using Finite State Models. | Olga Kondratyeva, Natalia Kushik, Ana R. Cavalli, Nina Yevtushenko 0001 | QSIC | 2013 | Link |
| Trust Ontology Based on Access Control Parameters in Multi-organization Environments. | Khalifa Toumi, César Andrés, Ana R. Cavalli | SITIS | 2013 | Link |
| Formal Characterization of Illegal Control Flow in Android System. | Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli | SITIS | 2013 | Link |
| A SPIN-based approach for detecting vulnerabilities in C programs. | Natalia Kushik, Amel Mammar, Ana R. Cavalli, Nina Yevtushenko 0001, Willy Jimenez, Edgardo Montes de Oca | Autom. Control. Comput. Sci. | 2012 | Link |
| A systematic approach to integrate common timed security rules within a TEFSM-based system specification. | Amel Mammar, Wissam Mallouli, Ana R. Cavalli | Inf. Softw. Technol. | 2012 | Link |
| An advanced approach for modeling and detecting software vulnerabilities. | Nahid Shahmehri, Amel Mammar, Edgardo Montes de Oca, David Byers, Ana R. Cavalli, Shanai Ardi, Willy Jimenez | Inf. Softw. Technol. | 2012 | Link |
| Tight bound on the length of distinguishing sequences for non-observable nondeterministic Finite-State Machines with a polynomial number of inputs and outputs. | Iksoon Hwang, Nina Yevtushenko 0001, Ana R. Cavalli | Inf. Process. Lett. | 2012 | Link |
| InRob: An approach for testing interoperability and robustness of real-time embedded software. | Maria de Fátima Mattiello-Francisco, Eliane Martins, Ana R. Cavalli, Edgar Toshiro Yano | J. Syst. Softw. | 2012 | Link |
| Applying formal methods to PCEP: an industrial case study from modeling to test generation. | Iksoon Hwang, Ana R. Cavalli, Mounir Lallali, Dominique Verchère | Softw. Test. Verification Reliab. | 2012 | Link |
| A vector based model approach for defining trust in Multi-Organization Environments. | Khalifa Toumi, César Andrés, Ana R. Cavalli, Mazen El Maarabani | CRiSIS | 2012 | Link |
| Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses. | Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli | CSS | 2012 | Link |
| An Event-Based Packet Dropping Detection Scheme for Wireless Mesh Networks. | Anderson Nunes Paiva Morais, Ana R. Cavalli | CSS | 2012 | Link |
| Role based interoperability security policies in collaborative systems. | Khalifa Toumi, Ana R. Cavalli, Mazen El Maarabani | CTS | 2012 | Link |
| How to Reduce the Cost of Passive Testing. | César Andrés, Ana R. Cavalli | HASE | 2012 | Link |
| Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments. | Khalifa Toumi, César Andrés, Ana R. Cavalli | ICISS | 2012 | Link |
| An IOSTS Based Passive Testing Approach for the Validation of Data-Centric Protocols. | Pramila Mouttappa, Stéphane Maag, Ana R. Cavalli | QSIC | 2012 | Link |
| A distributed intrusion detection scheme for wireless ad hoc networks. | Anderson Nunes Paiva Morais, Ana R. Cavalli | SAC | 2012 | Link |
| Testing Interoperability Security Policies. | Mazen El Maarabani, César Andrés, Ana R. Cavalli | SEKE | 2012 | |
| Quality of Experience as a Selection Criterion for Web Services. | Felipe Lalanne, Ana R. Cavalli, Stephane Maag | SITIS | 2012 | Link |
| VDC-Based Dynamic Code Analysis: Application to C Programs. | Wissam Mallouli, Amel Mammar, Ana R. Cavalli, Willy Jimenez | J. Internet Serv. Inf. Secur. | 2011 | Link |
| Route Manipulation Attack in Wireless Mesh Networks. | Anderson Nunes Paiva Morais, Ana R. Cavalli | AINA | 2011 | Link |
| Using Requirements Engineering in an Automatic Security Policy Derivation Process. | Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, Gouenou Coatrieux, Ana R. Cavalli, Amel Mammar | DPM/SETOP | 2011 | Link |
| Verification of Interoperability Security Policies by Model Checking. | Mazen El Maarabani, Ana R. Cavalli, Iksoon Hwang, Fatiha Zaïdi | HASE | 2011 | Link |
| Detection of Attacks in Wireless Mesh Networks. | Anderson Nunes Paiva Morais, Ana R. Cavalli | LADC | 2011 | Link |
| Using Testing Techniques for Vulnerability Detection in C Programs. | Amel Mammar, Ana R. Cavalli, Willy Jimenez, Wissam Mallouli, Edgardo Montes de Oca | ICTSS | 2011 | Link |
| FSM-Based Test Derivation Strategies for Systems with Time-Outs. | Maxim Zhigulin, Nina Yevtushenko 0001, Stéphane Maag, Ana R. Cavalli | QSIC | 2011 | Link |
| A model-based attack injection approach for security validation. | Anderson Nunes Paiva Morais, Ana R. Cavalli, Eliane Martins | SIN | 2011 | Link |
| A Quality of Experience Based Approach for Wireless Mesh Networks. | Anderson Nunes Paiva Morais, Ana R. Cavalli | WWIC | 2011 | Link |
| Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers | Joaquín García-Alfaro, Guillermo Navarro-Arribas, Ana R. Cavalli, Jean Leneutre | DPM/SETOP | 2011 | Link |
| Testing a probabilistic FSM using interval estimation. | Iksoon Hwang, Ana R. Cavalli | Comput. Networks | 2010 | Link |
| FSM-based conformance testing methods: A survey annotated with experimental evaluation. | Rita Dorofeeva, Khaled El-Fakih, Stéphane Maag, Ana R. Cavalli, Nina Yevtushenko 0001 | Inf. Softw. Technol. | 2010 | Link |
| WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition. | Ana R. Cavalli, Tien-Dung Cao, Wissam Mallouli, Eliane Martins, Andrey Sadovykh, Sébastien Salva, Fatiha Zaïdi | ICWS | 2010 | Link |
| Timed Extended Invariants for the Passive Testing of Web Services. | Gerardo Morales, Stéphane Maag, Ana R. Cavalli, Wissam Mallouli, Edgardo Montes de Oca, Bachar Wehbi | ICWS | 2010 | Link |
| A Formal Passive Testing Approach for Checking Real Time Constraints. | Fayçal Bessayah, Ana R. Cavalli | QUATIC | 2010 | Link |
| Testing Web Service Orchestrators in Context: A Symbolic Approach. | Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana R. Cavalli | SEFM | 2010 | Link |
| A Formal Approach for Interoperability Testing of Security Rules. | Mazen El Maarabani, Iksoon Hwang, Ana R. Cavalli | SITIS | 2010 | Link |
| A Fault Injection Tool for Testing Web Services Composition. | Fayçal Bessayah, Ana R. Cavalli, Willian Maja, Eliane Martins, Andre Willik Valenti | TAIC PART | 2010 | Link |
| Transmit and Reserve (TAR): A Coordinated Channel Access for IEEE 802.11 Networks. | Bachar Wehbi, Anis Laouiti, Ana R. Cavalli | WCNC | 2010 | Link |
| Analysis of the OLSR Protocol by Using Formal Passive Testing. | César Andrés, Stéphane Maag, Ana R. Cavalli, Mercedes G. Merayo, Manuel Núñez 0001 | APSEC | 2009 | Link |
| A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification. | Wissam Mallouli, Amel Mammar, Ana R. Cavalli | APSEC | 2009 | Link |
| Security Protocol Testing Using Attack Trees. | Anderson Nunes Paiva Morais, Eliane Martins, Ana R. Cavalli, Willy Jimenez | CSE (2) | 2009 | Link |
| Modeling, Validation, and Verification of PCEP Using the IF Language. | Iksoon Hwang, Mounir Lallali, Ana R. Cavalli, Dominique Verchère | FMOODS/FORTE | 2009 | Link |
| A Statistical Approach to Test Stochastic and Probabilistic Systems. | Mercedes G. Merayo, Iksoon Hwang, Manuel Núñez 0001, Ana R. Cavalli | ICFEM | 2009 | Link |
| A formal approach for specification and verification of fault injection process. | Fayçal Bessayah, Ana R. Cavalli, Eliane Martins | ICIS | 2009 | Link |
| An Automated Passive Testing Approach for the IMS PoC Service. | Felipe Lalanne, Stéphane Maag, Edgardo Montes de Oca, Ana R. Cavalli, Wissam Mallouli, Arnaud Gonguet | ASE | 2009 | Link |
| A Formal Passive Testing Approach to test a MANET Routing Protocol. | Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca, Fatiha Zaïdi | PerCom Workshops | 2009 | Link |
| Observability and Controllability Issues in Conformance Testing of Web Service Compositions. | Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Ana R. Cavalli | TestCom/FATES | 2009 | Link |
| Network protocol interoperability testing based on contextual signatures and passive testing. | Fatiha Zaïdi, Emmanuel Bayse, Ana R. Cavalli | SAC | 2009 | Link |
| A passive conformance testing approach for a MANET routing protocol. | Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca | SAC | 2009 | Link |
| Interoperability testing of presence service on IMS platform. | Mazen El Maarabani, Asma Adala, Iksoon Hwang, Ana R. Cavalli | TRIDENTCOM | 2009 | Link |
| A formal validation methodology for MANET routing protocols based on nodes' self similarity. | Stéphane Maag, Cyril Grepet, Ana R. Cavalli | Comput. Commun. | 2008 | Link |
| Context Ontology for Secure Interoperability. | Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli | ARES | 2008 | Link |
| Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking. | Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli | ADHOC-NOW | 2008 | Link |
| Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines. | Wissam Mallouli, Amel Mammar, Ana R. Cavalli | DS-RT | 2008 | Link |
| Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints. | Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli, Mounir Lallali | DS-RT | 2008 | Link |
| Automatic Timed Test Case Generation for Web Services Composition. | Mounir Lallali, Fatiha Zaïdi, Ana R. Cavalli, Iksoon Hwang | ECOWS | 2008 | Link |
| Security Rules Specification and Analysis Based on Passive Testing. | Wissam Mallouli, Fayçal Bessayah, Ana R. Cavalli, Azzedine Benameur | GLOBECOM | 2008 | Link |
| Use of invariant properties to evaluate the results of fault-injection-based robustness testing of protocol implementations. | Ana R. Cavalli, Eliane Martins, Anderson Nunes Paiva Morais | ICST Workshops | 2008 | Link |
| Testing Security Policies for Web Applications. | Wissam Mallouli, Gerardo Morales, Ana R. Cavalli | ICST Workshops | 2008 | Link |
| A Reactive Wireless Mesh Network Architecture. | Bachar Wehbi, Anis Laouiti, Ana R. Cavalli | Med-Hoc-Net | 2008 | Link |
| Efficient time synchronization mechanism for wireless multi hop networks. | Bachar Wehbi, Anis Laouiti, Ana R. Cavalli | PIMRC | 2008 | Link |
| Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study. | Wissam Mallouli, Mounir Lallali, Gerardo Morales, Ana R. Cavalli | SITIS | 2008 | Link |
| Interoperability of Context Based System Policies Using O2O Contract. | Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli | SITIS | 2008 | Link |
| Specification of Timed EFSM Fault Models in SDL. | Samrat S. Batth, Elisangela Rodrigues Vieira, Ana R. Cavalli, M. Ümit Uyar | FORTE | 2007 | Link |
| Testing Security Rules with Decomposable Activities. | Wissam Mallouli, Ana R. Cavalli | HASE | 2007 | Link |
| Towards an Automated Test Generation with Delayed Transitions for Timed Systems. | Elisangela Rodrigues Vieira, Ana R. Cavalli | RTCSA | 2007 | Link |
| A formal approach for testing security rules. | Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens | SACMAT | 2007 | Link |
| Regression and Performance Testing of an e-Learning Web Application: dotLRN. | Ana R. Cavalli, Stéphane Maag, Gerardo Morales | SITIS | 2007 | Link |
| Timed Modeling of Web Services Composition for Automatic Testing. | Mounir Lallali, Fatiha Zaïdi, Ana R. Cavalli | SITIS | 2007 | Link |
| A Reliable Approach for Transport Session Management. | Ana R. Cavalli, Dario Vieira | AICT/ICIW | 2006 | Link |
| Implementation Analysis of MSP. | Ana R. Cavalli, Dario Vieira, Timothy G. Griffin | ICN/ICONS/MCL | 2006 | Link |
| Parallel Passive Testing of System Protocols - Towards a Real-time Exhaustive Approach. | Baptiste Alcalde, Ana R. Cavalli | ICN/ICONS/MCL | 2006 | Link |
| An Enhanced Passive Testing Approach for Network Protocols. | Ana R. Cavalli, Dario Vieira | ICN/ICONS/MCL | 2006 | Link |
| Working Around BGP: An Improvement of BGP Session Maintenance. | Ana R. Cavalli, Dario Vieira | ICNS | 2006 | Link |
| MSP: A Novel Session Maintenance Protocol. | Ana R. Cavalli, Timothy G. Griffin, Dario Vieira | ICON | 2006 | Link |
| A Security Model for OLSR MANET Protocol. | Jean-Marie Orset, Ana R. Cavalli | MDM | 2006 | Link |
| Light Client Management Protocol for Wireless Mesh Networks. | Bachar Wehbi, Wissam Mallouli, Ana R. Cavalli | MDM | 2006 | Link |
| Application of Two Test Generation Tools to an Industrial Case Study. | Ana R. Cavalli, Stéphane Maag, Wissam Mallouli, Mikael Marche, Yves-Marie Quemener | TestCom | 2006 | Link |
| Secure hosts auto-configuration in mobile ad hoc networks. | Ana R. Cavalli, Jean-Marie Orset | Ad Hoc Networks | 2005 | Link |
| Une plate-forme de validation multi-protocoles et multi-services - résultats d'expérimentation. | Pierre Combes, Wei Monin, Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi, Richard Castanet, Marcien MacKaya, Patrice Laurençot | Ann. des Télécommunications | 2005 | Link |
| A passive testing approach based on invariants: application to the WAP | Emmanuel Bayse, Ana R. Cavalli, Manuel Núñez 0001, Fatiha Zaïdi | Comput. Networks | 2005 | Link |
| A Comparison between Two Maintenance Session Protocols. | Ana R. Cavalli, Timothy G. Griffin, Dario Vieira | AICT/SAPIR/ELETE | 2005 | Link |
| An EFSM-Based Intrusion Detection System for Ad Hoc Networks. | Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli | ATVA | 2005 | Link |
| Passive Testing - A Constrained Invariant Checking Approach. | Behrouz Tork Ladani, Baptiste Alcalde, Ana R. Cavalli | TestCom | 2005 | Link |
| Experimental Evaluation of FSM-Based Testing Methods. | Rita Dorofeeva, Nina Yevtushenko 0001, Khaled El-Fakih, Ana R. Cavalli | SEFM | 2005 | Link |
| Application of a Formal Testing Methodology to Wireless Telephony Networks. | Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi | J. Braz. Comput. Soc. | 2004 | Link |
| Network Protocol System Passive Testing for Fault Management: A Backward Checking Approach. | Baptiste Alcalde, Ana R. Cavalli, Dongluo Chen, Davy Khuu, David Lee 0001 | FORTE | 2004 | Link |
| A Validation Model for the DSR Protocol. | Ana R. Cavalli, Cyril Grepet, Stéphane Maag, Vincent Tortajada | ICDCS Workshops | 2004 | Link |
| Secure Hosts Autoconfiguration in Mobile Ad Hoc Networks. | Ana R. Cavalli, Jean-Marie Orset | ICDCS Workshops | 2004 | Link |
| A Testing Methodology for an Open Software E-learning Platform. | Ana R. Cavalli, Stéphane Maag, Sofia Papagiannaki, Georgios Verigakis, Fatiha Zaïdi | EDUTECH | 2004 | Link |
| A Multi-service and Multi-protocol Validation Platform-Experimentation Results. | Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi, Pierre Combes, Wei Monin, Richard Castanet, Marcien MacKaya, Patrice Laurençot | TestCom | 2004 | Link |
| Automated test scenarios generation for an e-barter system. | Ana R. Cavalli, Stéphane Maag | SAC | 2004 | Link |
| From UML models to automatic generated tests for the dotLRN e-learning platform. | Ana R. Cavalli, Stéphane Maag, Sofia Papagiannaki, Georgios Verigakis | TACoS | 2004 | Link |
| New approaches for passive testing using an Extended Finite State Machine specification. | Ana R. Cavalli, Caroline Gervy, Svetlana Prokopenko | Inf. Softw. Technol. | 2003 | Link |
| Test suite minimization for testing in context. | Ricardo Anido, Ana R. Cavalli, Luiz A. Paula Lima Jr., Nina Yevtushenko 0001 | Softw. Test. Verification Reliab. | 2003 | Link |
| TestNet: Let's Test Together!. | Ana R. Cavalli, Edgardo Montes de Oca, Manuel Núñez 0001 | TestCom | 2003 | Link |
| Fast Testing of Critical Properties through Passive Testing. | José Antonio Arnedo, Ana R. Cavalli, Manuel Núñez 0001 | TestCom | 2003 | Link |
| A New Algorithm for Service Interaction Detection. | Ana R. Cavalli, Stéphane Maag | ICFEM | 2002 | Link |
| Automated Generation of Interoperability Tests. | Cédric Besse, Ana R. Cavalli, Myungchul Kim, Fatiha Zaïdi | TestCom | 2002 | |
| Fault Detection within a Component of a System of Communicating FSMs. | Ana R. Cavalli, Svetlana Prokopenko, Nina Yevtushenko 0001 | TestCom | 2002 | |
| Partial Validation of a Design Specification with Respect to Requirements. | Cédric Besse, Ana R. Cavalli, Ferhat Khendek | APAQS | 2001 | Link |
| A Conformance Testing Method for Communication Protocols Modeled as Concurrent DFSMs. | Atsushi Fukada, Akio Nakata, Junji Kitamichi, Teruo Higashino, Ana R. Cavalli | ICOIN | 2001 | Link |
| A Service-Component Testing Method and a Suitable CORBA Architecture. | Ana R. Cavalli, Bruno Defude, Christian Rinderknecht, Fatiha Zaïdi | ISCC | 2001 | Link |
| Validation of the GSM-map protocol. | Ana R. Cavalli, Melania Ionescu | Ann. des Télécommunications | 2000 | Link |
| Fault Detection Power of a Widely Used Test Suite for a System of Communicating FSMs. | Ana R. Cavalli, Svetlana Prokopenko, Nina Yevtushenko 0001 | TestCom | 2000 | |
| Advanced Topics on SDL and MSC. | Ana R. Cavalli | Comput. Networks | 1999 | Link |
| Passive testing and application to the GSM-MAP protocol. | Marine Tabourier, Ana R. Cavalli | Inf. Softw. Technol. | 1999 | Link |
| A GSM-MAP Protocol Experiment Using Passive Testing. | Marine Tabourier, Ana R. Cavalli, Melania Ionescu | World Congress on Formal Methods | 1999 | Link |
| Hit-or-Jump: An algorithm for embedded testing with applications to IN services. | Ana R. Cavalli, David Lee 0001, Christian Rinderknecht, Fatiha Zaïdi | FORTE | 1999 | |
| An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol. | Cédric Besse, Ana R. Cavalli, David Lee 0001 | ASE | 1999 | Link |
| Different Approaches to Protocol and Service Testing. | Ana R. Cavalli | IWTCS | 1999 | |
| Generating Test Cases for a Timed I/O Automaton Model. | Teruo Higashino, Akio Nakata, Kenichi Taniguchi, Ana R. Cavalli | IWTCS | 1999 | |
| Test Suite Minimization for Embedded Nondeterministic Finite State Machines. | Nina Yevtushenko 0001, Ana R. Cavalli, Ricardo Anido | IWTCS | 1999 | |
| Application of Embedded Testing Methods to Service Validation. | Luiz A. Paula Lima Jr., Ana R. Cavalli | ICFEM | 1998 | Link |
| Test Suite Minimization for Testing in Context. | Nina Yevtushenko 0001, Ana R. Cavalli, Luiz A. Paula Lima Jr. | IWTCS | 1998 | |
| Formal Description Techniques and Protocol Specification, Testing and Verification, FORTE XI / PSTV XVIII'98, IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE XI) and Protocol Specification, Testing and Verification (PSTV XVIII), 3-6 November, 1998, Paris, France | Stanislaw Budkowski, Ana R. Cavalli, Elie Najm | FORTE | 1998 | |
| Test generation for the SSCOP-ATM networks protocol. | Ana R. Cavalli, Boo-Ho Lee, Toma Macavei | SDL Forum | 1997 | |
| SDL '97 Time for Testing, SDL, MSC and Trends - 8th International SDL Forum, Evry, France, 23-29 September 1997, Proceedings | Ana R. Cavalli, Amardeo Sarma | SDL Forum | 1997 | |
| Testing Methods for SDL Systems. | Ana R. Cavalli, Byoung-Moon Chin, Kilnam Chon | Comput. Networks ISDN Syst. | 1996 | Link |
| Standardization of Formal Methods in Conformance Testing of Communication Protocols. | Ana R. Cavalli, Jean Philippe Favreau, Marc Phalippou | Comput. Networks ISDN Syst. | 1996 | Link |
| A modal based verification for LOTOS. | Hacène Fouchal, Ana R. Cavalli | FORTE | 1994 | |
| A Compositional Verification Method for LOTOS. | Hacène Fouchal, Ana R. Cavalli | PODC | 1994 | Link |
| Improving Conformance Testing for LOTOS. | Ana R. Cavalli, Sung Un Kim, Patrick Maigron | FORTE | 1993 | |
| Formal Methods for Conformance Testing: Results and Perspectives. | Ana R. Cavalli, Jean Philippe Favreau, Marc Phalippou | Protocol Test Systems | 1993 | |
| Automated Protocol Conformance Test Generation Based on Formal Methods for LOTOS Specifications. | Ana R. Cavalli, Patrick Maigron, Sung Un Kim | Protocol Test Systems | 1992 | |
| Protocol Conformance Test Generation Using a Graph Rewriting System. | Ana R. Cavalli, Sung Un Kim | Protocol Test Systems | 1991 | |
| Exhaustive Analysis and Simulation for Distributed Systems, both Sides of the Same Coin. | Ana R. Cavalli, Etienne Paul | Distributed Comput. | 1988 | Link |
| Proof of Specification Properties by Using Finite State Machines and Temporal Logic. | Ana R. Cavalli, François Horn | PSTV | 1987 | |
| A method of automatic proof for the specification and verification of protocols. | Ana R. Cavalli | Comput. Commun. Rev. | 1984 | Link |
| A Decision Method for Linear Temporal Logic. | Ana R. Cavalli, Luis Fariñas del Cerro | CADE | 1984 | Link |
| Specification and Verification of Networks Protocols Using. | Ana R. Cavalli, Luis Fariñas del Cerro | Symposium on Programming | 1984 | Link |
| Temporal Logic Specification of a Virtual Ring LAN Access Protocol. | Daniel Schwabe 0001, Ana R. Cavalli | PSTV | 1984 | |