Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mohamed Kaâniche
@article{DBLP:journals/virology/AdelinNANMK22, author = {Remi Adelin and Cyrius Nugier and Eric Alata and Vincent Nicomette and Vincent Migliore and Mohamed Ka{\^{a}}niche}, title = {Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {18}, number = {4}, pages = {425--452}, year = {2022}, url = {https://doi.org/10.1007/s11416-022-00426-1}, doi = {10.1007/S11416-022-00426-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/AdelinNANMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/GimenezRAAKN21, author = {Pierre{-}Fran{\c{c}}ois Gimenez and Jonathan Roux and Eric Alata and Guillaume Auriol and Mohamed Ka{\^{a}}niche and Vincent Nicomette}, title = {{RIDS:} Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {5}, number = {3}, pages = {24:1}, year = {2021}, url = {https://doi.org/10.1145/3441458}, doi = {10.1145/3441458}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/GimenezRAAKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/CayreGANKM21, author = {Romain Cayre and Florent Galtier and Guillaume Auriol and Vincent Nicomette and Mohamed Ka{\^{a}}niche and G{\'{e}}raldine Vache Marconato}, title = {WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {376--387}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00049}, doi = {10.1109/DSN48987.2021.00049}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/CayreGANKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/CayreGANKM21a, author = {Romain Cayre and Florent Galtier and Guillaume Auriol and Vincent Nicomette and Mohamed Ka{\^{a}}niche and G{\'{e}}raldine Vache Marconato}, title = {InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {388--399}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00050}, doi = {10.1109/DSN48987.2021.00050}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/CayreGANKM21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CayreMGKNA21, author = {Romain Cayre and G{\'{e}}raldine Vache Marconato and Florent Galtier and Mohamed Ka{\^{a}}niche and Vincent Nicomette and Guillaume Auriol}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {386--388}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468258}, doi = {10.1145/3448300.3468258}, timestamp = {Mon, 28 Jun 2021 17:39:52 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CayreMGKNA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/DamienGFNKA20, author = {Ali{\'{e}}nor Damien and Pierre{-}Fran{\c{c}}ois Gimenez and Nathalie Feyt and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Eric Alata}, editor = {Marco Vieira and Henrique Madeira and Nuno Antunes and Zheng Zheng}, title = {On-board Diagnosis: {A} First Step from Detection to Prevention of Intrusions on Avionics Applications}, booktitle = {31st {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2020, Coimbra, Portugal, October 12-15, 2020}, pages = {358--368}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISSRE5003.2020.00041}, doi = {10.1109/ISSRE5003.2020.00041}, timestamp = {Tue, 17 Nov 2020 13:34:50 +0100}, biburl = {https://dblp.org/rec/conf/issre/DamienGFNKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/BourdonGAKMNL20, author = {Malcolm Bourdon and Pierre{-}Fran{\c{c}}ois Gimenez and Eric Alata and Mohamed Ka{\^{a}}niche and Vincent Migliore and Vincent Nicomette and Youssef Laarouchi}, title = {Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices}, booktitle = {19th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2020, Cambridge, MA, USA, November 24-27, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NCA51143.2020.9306726}, doi = {10.1109/NCA51143.2020.9306726}, timestamp = {Tue, 12 Jan 2021 15:26:07 +0100}, biburl = {https://dblp.org/rec/conf/nca/BourdonGAKMNL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/GaltierCAKN20, author = {Florent Galtier and Romain Cayre and Guillaume Auriol and Mohamed Ka{\^{a}}niche and Vincent Nicomette}, title = {A PSD-based fingerprinting approach to detect IoT device spoofing}, booktitle = {25th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2020, Perth, Australia, December 1-4, 2020}, pages = {40--49}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/PRDC50213.2020.00015}, doi = {10.1109/PRDC50213.2020.00015}, timestamp = {Wed, 27 Jan 2021 14:35:01 +0100}, biburl = {https://dblp.org/rec/conf/prdc/GaltierCAKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BachyNKA19, author = {Yann Bachy and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Eric Alata}, title = {Smart-TV security: risk analysis and experiments on Smart-TV communication channels}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {15}, number = {1}, pages = {61--76}, year = {2019}, url = {https://doi.org/10.1007/s11416-018-0320-3}, doi = {10.1007/S11416-018-0320-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BachyNKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/CayreNAAKM19, author = {Romain Cayre and Vincent Nicomette and Guillaume Auriol and Eric Alata and Mohamed Ka{\^{a}}niche and G{\'{e}}raldine Vache Marconato}, editor = {Katinka Wolter and Ina Schieferdecker and Barbara Gallina and Michel Cukier and Roberto Natella and Naghmeh Ramezani Ivaki and Nuno Laranjeiro}, title = {Mirage: Towards a Metasploit-Like Framework for IoT}, booktitle = {30th {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2019, Berlin, Germany, October 28-31, 2019}, pages = {261--270}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISSRE.2019.00034}, doi = {10.1109/ISSRE.2019.00034}, timestamp = {Mon, 28 Dec 2020 11:31:03 +0100}, biburl = {https://dblp.org/rec/conf/issre/CayreNAAKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/DamienMNAK19, author = {Ali{\'{e}}nor Damien and Michael Marcourt and Vincent Nicomette and Eric Alata and Mohamed Ka{\^{a}}niche}, title = {Implementation of a Host-Based Intrusion Detection System for Avionic Applications}, booktitle = {24th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2019, Kyoto, Japan, December 1-3, 2019}, pages = {178--187}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PRDC47002.2019.00048}, doi = {10.1109/PRDC47002.2019.00048}, timestamp = {Thu, 06 Feb 2020 16:12:03 +0100}, biburl = {https://dblp.org/rec/conf/prdc/DamienMNAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vecos/2019, editor = {Pierre Ganty and Mohamed Ka{\^{a}}niche}, title = {Verification and Evaluation of Computer and Communication Systems - 13th International Conference, VECoS 2019, Porto, Portugal, October 9, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11847}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35092-5}, doi = {10.1007/978-3-030-35092-5}, isbn = {978-3-030-35091-8}, timestamp = {Wed, 13 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vecos/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/StudniaANKL18, author = {Ivan Studnia and Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Youssef Laarouchi}, title = {A language-based intrusion detection approach for automotive embedded networks}, journal = {Int. J. Embed. Syst.}, volume = {10}, number = {1}, pages = {1--12}, year = {2018}, url = {https://doi.org/10.1504/IJES.2018.10010488}, doi = {10.1504/IJES.2018.10010488}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/StudniaANKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbcs/MorganANK18, author = {Beno{\^{\i}}t Morgan and Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche}, title = {{IOMMU} protection against {I/O} attacks: a vulnerability and a proof of concept}, journal = {J. Braz. Comput. Soc.}, volume = {24}, number = {1}, pages = {2:1--2:11}, year = {2018}, url = {https://doi.org/10.1186/s13173-017-0066-7}, doi = {10.1186/S13173-017-0066-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbcs/MorganANK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/SauvanaudKKLS18, author = {Carla Sauvanaud and Mohamed Ka{\^{a}}niche and Karama Kanoun and Kahina Lazri and Guthemberg Silvestre}, title = {Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned}, journal = {J. Syst. Softw.}, volume = {139}, pages = {84--106}, year = {2018}, url = {https://doi.org/10.1016/j.jss.2018.01.039}, doi = {10.1016/J.JSS.2018.01.039}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/SauvanaudKKLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/DucheneGANK18, author = {Julien Duch{\^{e}}ne and Colas Le Guernic and Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche}, title = {State of the art of network protocol reverse engineering tools}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {14}, number = {1}, pages = {53--68}, year = {2018}, url = {https://doi.org/10.1007/s11416-016-0289-8}, doi = {10.1007/S11416-016-0289-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/DucheneGANK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/DucheneANKG18, author = {Julien Duch{\^{e}}ne and Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Colas Le Guernic}, title = {Specification-Based Protocol Obfuscation}, booktitle = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28, 2018}, pages = {478--489}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSN.2018.00056}, doi = {10.1109/DSN.2018.00056}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/DucheneANKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/AverlantAKNM18, author = {Guillaume Averlant and Eric Alata and Mohamad Ka{\^{a}}niche and Vincent Nicomette and Yuxiao Mao}, title = {{SAAC:} Secure Android Application Context a Runtime Based Policy and its Architecture}, booktitle = {17th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2018, Cambridge, MA, USA, November 1-3, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCA.2018.8548343}, doi = {10.1109/NCA.2018.8548343}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/AverlantAKNM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/RouxAAKNC18, author = {Jonathan Roux and Eric Alata and Guillaume Auriol and Mohamed Ka{\^{a}}niche and Vincent Nicomette and Romain Cayre}, title = {RadIoT: Radio Communications Intrusion Detection for IoT - {A} Protocol Independent Approach}, booktitle = {17th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2018, Cambridge, MA, USA, November 1-3, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCA.2018.8548286}, doi = {10.1109/NCA.2018.8548286}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/RouxAAKNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-09464, author = {Julien Duch{\^{e}}ne and Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Colas Le Guernic}, title = {Specification-Based Protocol Obfuscation}, journal = {CoRR}, volume = {abs/1807.09464}, year = {2018}, url = {http://arxiv.org/abs/1807.09464}, eprinttype = {arXiv}, eprint = {1807.09464}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-09464.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-03934, author = {Jonathan Roux and Eric Alata and Guillaume Auriol and Mohamed Ka{\^{a}}niche and Vincent Nicomette and Romain Cayre}, title = {RadIoT: Radio Communications Intrusion Detection for IoT - {A} Protocol Independent Approach}, journal = {CoRR}, volume = {abs/1811.03934}, year = {2018}, url = {http://arxiv.org/abs/1811.03934}, eprinttype = {arXiv}, eprint = {1811.03934}, timestamp = {Fri, 23 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-03934.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/RouxAANK17, author = {Jonathan Roux and Eric Alata and Guillaume Auriol and Vincent Nicomette and Mohamed Ka{\^{a}}niche}, title = {Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling}, booktitle = {13th European Dependable Computing Conference, {EDCC} 2017, Geneva, Switzerland, September 4-8, 2017}, pages = {147--150}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EDCC.2017.11}, doi = {10.1109/EDCC.2017.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/RouxAANK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/AverlantMANK17, author = {Guillaume Averlant and Beno{\^{\i}}t Morgan and Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche}, editor = {Dong Seong Kim and Masato Kitakami and Vijay Varadharajan}, title = {An Abstraction Model and a Comparative Analysis of Intel and {ARM} Hardware Isolation Mechanisms}, booktitle = {22nd {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2017, Christchurch, New Zealand, January 22-25, 2017}, pages = {245--254}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PRDC.2017.48}, doi = {10.1109/PRDC.2017.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/AverlantMANK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/AlataNDGK16, author = {Eric Alata and Vincent Nicomette and Julien Duch{\^{e}}ne and Colas Le Guernic and Mohamed Ka{\^{a}}niche}, title = {Outils pour la r{\'{e}}tro-conception de protocoles. Analyse et classification}, journal = {Tech. Sci. Informatiques}, volume = {35}, number = {6}, pages = {609--640}, year = {2016}, url = {https://doi.org/10.3166/tsi.35.609-640}, doi = {10.3166/TSI.35.609-640}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/AlataNDGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/DucheneGANK16, author = {Julien Duch{\^{e}}ne and Colas Le Guernic and Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Jean{-}Louis Lanet and Axel Legay}, title = {Protocol Reverse Engineering: Challenges and Obfuscation}, booktitle = {Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10158}, pages = {139--144}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54876-0\_11}, doi = {10.1007/978-3-319-54876-0\_11}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/crisis/DucheneGANK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SauvanaudLKK16, author = {Carla Sauvanaud and Kahina Lazri and Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {Towards Black-Box Anomaly Detection in Virtual Network Functions}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} Workshops 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {254--257}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN-W.2016.17}, doi = {10.1109/DSN-W.2016.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SauvanaudLKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/SauvanaudLKK16, author = {Carla Sauvanaud and Kahina Lazri and Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {Anomaly Detection and Root Cause Localization in Virtual Network Functions}, booktitle = {27th {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2016, Ottawa, ON, Canada, October 23-27, 2016}, pages = {196--206}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ISSRE.2016.32}, doi = {10.1109/ISSRE.2016.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/SauvanaudLKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ladc/MorganANK16, author = {Beno{\^{\i}}t Morgan and Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche}, title = {Bypassing {IOMMU} Protection against {I/O} Attacks}, booktitle = {2016 Seventh Latin-American Symposium on Dependable Computing, {LADC} 2016, Cali, Colombia, October 19-21, 2016}, pages = {145--150}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/LADC.2016.31}, doi = {10.1109/LADC.2016.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ladc/MorganANK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/BachyBNAKCL15, author = {Yann Bachy and Frederic Basse and Vincent Nicomette and Eric Alata and Mohamed Ka{\^{a}}niche and Jean{-}Christophe Courr{\`{e}}ge and Pierre Lukjanenko}, title = {Smart-TV Security Analysis: Practical Experiments}, booktitle = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015}, pages = {497--504}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSN.2015.41}, doi = {10.1109/DSN.2015.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/BachyBNAKCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/ProbstAKN15, author = {Thibaut Probst and Eric Alata and Mohamed Ka{\^{a}}niche and Vincent Nicomette}, title = {Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds}, booktitle = {11th European Dependable Computing Conference, {EDCC} 2015, Paris, France, September 7-11, 2015}, pages = {49--60}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EDCC.2015.10}, doi = {10.1109/EDCC.2015.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/ProbstAKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/SauvanaudSKK15, author = {Carla Sauvanaud and Guthemberg Silvestre and Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {Data Stream Clustering for Online Anomaly Detection in Cloud Applications}, booktitle = {11th European Dependable Computing Conference, {EDCC} 2015, Paris, France, September 7-11, 2015}, pages = {120--131}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EDCC.2015.22}, doi = {10.1109/EDCC.2015.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/SauvanaudSKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/BachyNAKC15, author = {Yann Bachy and Vincent Nicomette and Eric Alata and Mohamed Ka{\^{a}}niche and Jean{-}Christophe Courr{\`{e}}ge}, title = {Security of {ISP} Access Networks: Practical Experiments}, booktitle = {11th European Dependable Computing Conference, {EDCC} 2015, Paris, France, September 7-11, 2015}, pages = {205--212}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EDCC.2015.27}, doi = {10.1109/EDCC.2015.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/BachyNAKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/MorganANKA15, author = {Beno{\^{\i}}t Morgan and Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Guillaume Averlant}, editor = {Guojun Wang and Tatsuhiro Tsuchiya and Dong Xiang}, title = {Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring}, booktitle = {21st {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2015, Zhangjiajie, China, November 18-20, 2015}, pages = {189--198}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PRDC.2015.46}, doi = {10.1109/PRDC.2015.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/MorganANKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/GuiochetHK15, author = {J{\'{e}}r{\'{e}}mie Guiochet and Quynh Anh Do Hoang and Mohamed Ka{\^{a}}niche}, editor = {Floor Koornneef and Coen van Gulijk}, title = {A Model for Safety Case Confidence Assessment}, booktitle = {Computer Safety, Reliability, and Security - 34th International Conference, {SAFECOMP} 2015 Delft, The Netherlands, September 23-25, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9337}, pages = {313--327}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24255-2\_23}, doi = {10.1007/978-3-319-24255-2\_23}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/GuiochetHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serene/SilvestreSKK15, author = {Guthemberg Silvestre and Carla Sauvanaud and Mohamed Ka{\^{a}}niche and Karama Kanoun}, editor = {Alessandro Fantechi and Patrizio Pelliccione}, title = {Tejo: {A} Supervised Anomaly Detection Scheme for NewSQL Databases}, booktitle = {Software Engineering for Resilient Systems - 7th International Workshop, {SERENE} 2015, Paris, France, September 7-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9274}, pages = {114--127}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23129-7\_9}, doi = {10.1007/978-3-319-23129-7\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/serene/SilvestreSKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vecos/Kaaniche15, author = {Mohamed Ka{\^{a}}niche}, editor = {Belgacem Ben Hedia and Florin Popentiu Vladicescu}, title = {Resilience Assessment: Accidental and Malicious Threats}, booktitle = {Proceedings of the 9th Workshop on Verification and Evaluation of Computer and Communication Systems, VECoS 2015, Bucharest, Romania, September 10-11, 2015}, series = {{CEUR} Workshop Proceedings}, volume = {1431}, pages = {9}, publisher = {CEUR-WS.org}, year = {2015}, url = {https://ceur-ws.org/Vol-1431/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:15 +0100}, biburl = {https://dblp.org/rec/conf/vecos/Kaaniche15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GuiochetHK15, author = {J{\'{e}}r{\'{e}}mie Guiochet and Quynh Anh Do Hoang and Mohamed Ka{\^{a}}niche}, title = {A Model for Safety Case Confidence Assessment}, journal = {CoRR}, volume = {abs/1512.04467}, year = {2015}, url = {http://arxiv.org/abs/1512.04467}, eprinttype = {arXiv}, eprint = {1512.04467}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GuiochetHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/LudinardTTNKAAB14, author = {Romaric Ludinard and Eric Totel and Fr{\'{e}}d{\'{e}}ric Tronel and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Eric Alata and Rim Akrout and Yann Bachy}, title = {An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {1}, pages = {19--38}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014010102}, doi = {10.4018/IJSSE.2014010102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/LudinardTTNKAAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isi/BachyNAKC14, author = {Yann Bachy and Vincent Nicomette and Eric Alata and Mohamed Ka{\^{a}}niche and Jean{-}Christophe Courr{\`{e}}ge}, title = {La s{\'{e}}curit{\'{e}} des box {ADSL.} Analyse de risques et exp{\'{e}}rimentations}, journal = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.}, volume = {19}, number = {6}, pages = {63--88}, year = {2014}, url = {https://doi.org/10.3166/isi.19.6.63-88}, doi = {10.3166/ISI.19.6.63-88}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isi/BachyNAKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbcs/AkroutAKN14, author = {Rim Akrout and Eric Alata and Mohamed Ka{\^{a}}niche and Vincent Nicomette}, title = {An automated black box approach for web vulnerability identification and attack scenario generation}, journal = {J. Braz. Comput. Soc.}, volume = {20}, number = {1}, pages = {4:1--4:16}, year = {2014}, url = {https://doi.org/10.1186/1678-4804-20-4}, doi = {10.1186/1678-4804-20-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbcs/AkroutAKN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/TiassouKKSP14, author = {Kossi Tiassou and Karama Kanoun and Mohamed Ka{\^{a}}niche and Christel Seguin and Chris Papadopoulos}, title = {Fiabilit{\'{e}} de mission d'un avion. {\'{E}}valuation stochastique en op{\'{e}}ration}, journal = {Tech. Sci. Informatiques}, volume = {33}, number = {9-10}, pages = {777--807}, year = {2014}, url = {https://doi.org/10.3166/tsi.33.777-807}, doi = {10.3166/TSI.33.777-807}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/TiassouKKSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/AkroutAKN14, author = {Rim Akrout and Eric Alata and Mohamed Ka{\^{a}}niche and Vincent Nicomette}, title = {Identification de vuln{\'{e}}rabilit{\'{e}}s web et g{\'{e}}n{\'{e}}ration de sc{\'{e}}narios d'attaque}, journal = {Tech. Sci. Informatiques}, volume = {33}, number = {9-10}, pages = {809--840}, year = {2014}, url = {https://doi.org/10.3166/tsi.33.809-840}, doi = {10.3166/TSI.33.809-840}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/AkroutAKN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dtis/ArlatDK14, author = {Jean Arlat and Michel Diaz and Mohamed Ka{\^{a}}niche}, title = {Towards resilient cyber-physical systems: The {ADREAM} project}, booktitle = {Proceedings of the 9th International Conference on Design {\&} Technology of Integrated Systems in Nanoscale Era, {DTIS} 2014, Santorini, Greece, May 6-8, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/DTIS.2014.6850642}, doi = {10.1109/DTIS.2014.6850642}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/dtis/ArlatDK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ProbstAKN14, author = {Thibaut Probst and Eric Alata and Mohamed Ka{\^{a}}niche and Vincent Nicomette}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {1--14}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_1}, doi = {10.1007/978-3-319-11698-3\_1}, timestamp = {Thu, 14 Oct 2021 10:08:32 +0200}, biburl = {https://dblp.org/rec/conf/nss/ProbstAKN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sbac-pad/SilvestreSKK14, author = {Guthemberg Silvestre and Carla Sauvanaud and Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {An Anomaly Detection Approach for Scale-Out Storage Systems}, booktitle = {26th {IEEE} International Symposium on Computer Architecture and High Performance Computing, {SBAC-PAD} 2014, Paris, France, October 22-24, 2014}, pages = {294--301}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SBAC-PAD.2014.42}, doi = {10.1109/SBAC-PAD.2014.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sbac-pad/SilvestreSKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MarconatoKN13, author = {G{\'{e}}raldine Vache Marconato and Mohamed Ka{\^{a}}niche and Vincent Nicomette}, title = {A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach}, journal = {Comput. J.}, volume = {56}, number = {4}, pages = {422--439}, year = {2013}, url = {https://doi.org/10.1093/comjnl/bxs112}, doi = {10.1093/COMJNL/BXS112}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MarconatoKN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/TiassouKKSP13, author = {Kossi Tiassou and Karama Kanoun and Mohamed Ka{\^{a}}niche and Christel Seguin and Chris Papadopoulos}, title = {Aircraft operational reliability - {A} model-based approach and a case study}, journal = {Reliab. Eng. Syst. Saf.}, volume = {120}, pages = {163--176}, year = {2013}, url = {https://doi.org/10.1016/j.ress.2013.07.008}, doi = {10.1016/J.RESS.2013.07.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ress/TiassouKKSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/MarconatoNK13, author = {G{\'{e}}raldine Vache Marconato and Vincent Nicomette and Mohamed Ka{\^{a}}niche}, title = {{\'{E}}valuation quantitative de la s{\'{e}}curit{\'{e}}. Approche bas{\'{e}}e sur les vuln{\'{e}}rabilit{\'{e}}s}, journal = {Tech. Sci. Informatiques}, volume = {32}, number = {1}, pages = {41--75}, year = {2013}, url = {https://doi.org/10.3166/tsi.32.41-75}, doi = {10.3166/TSI.32.41-75}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/MarconatoNK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KaanicheHKS13, author = {Mohamed Ka{\^{a}}niche and Michael D. Harrison and Hermann Kopetz and Daniel P. Siewiorek}, title = {2\({}^{\mbox{nd}}\) workshop on open resilient human-aware cyber-physical systems}, booktitle = {43rd Annual {IEEE/IFIP} Conference on Dependable Systems and Networks Workshop, {DSN} Workshops 2013, Budapest, Hungary, June 24-27, 2013}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSNW.2013.6615524}, doi = {10.1109/DSNW.2013.6615524}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/KaanicheHKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/StudniaNADKL13, author = {Ivan Studnia and Vincent Nicomette and Eric Alata and Yves Deswarte and Mohamed Ka{\^{a}}niche and Youssef Laarouchi}, title = {Survey on security threats and protection mechanisms in embedded automotive networks}, booktitle = {43rd Annual {IEEE/IFIP} Conference on Dependable Systems and Networks Workshop, {DSN} Workshops 2013, Budapest, Hungary, June 24-27, 2013}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSNW.2013.6615528}, doi = {10.1109/DSNW.2013.6615528}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/StudniaNADKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icorr/GuiochetHKP13, author = {J{\'{e}}r{\'{e}}mie Guiochet and Quynh Anh Do Hoang and Mohamed Ka{\^{a}}niche and David Powell}, title = {Model-based safety analysis of human-robot interactions: The {MIRAS} walking assistance robot}, booktitle = {{IEEE} 13th International Conference on Rehabilitation Robotics, {ICORR} 2013, Seattle, WA, USA, June 24-26, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICORR.2013.6650433}, doi = {10.1109/ICORR.2013.6650433}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icorr/GuiochetHKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ladc/AlataKNA13, author = {Eric Alata and Mohamed Ka{\^{a}}niche and Vincent Nicomette and Rim Akrout}, title = {An Automated Approach to Generate Web Applications Attack Scenarios}, booktitle = {Sixth Latin-American Symposium on Dependable Computing, {LADC} 2013, Rio de Janeiro, Brazil, April 1-5, 2013}, pages = {78--85}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/LADC.2013.22}, doi = {10.1109/LADC.2013.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ladc/AlataKNA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/StudniaNADKL13, author = {Ivan Studnia and Vincent Nicomette and Eric Alata and Yves Deswarte and Mohamed Ka{\^{a}}niche and Youssef Laarouchi}, editor = {Jean{-}Charles Fabre and Philippe Qu{\'{e}}r{\'{e}} and Mario Trapp}, title = {Security of embedded automotive networks: state of the art and a research proposal}, booktitle = {{SAFECOMP} 2013 - Workshop {CARS} (2nd Workshop on Critical Automotive applications : Robustness {\&} Safety) of the 32nd International Conference on Computer Safety, Reliability and Security, Toulouse, France, 2013}, publisher = {{HAL}}, year = {2013}, url = {http://hal.archives-ouvertes.fr/SAFECOMP2013-CARS/hal-00848234}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/StudniaNADKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/safecomp/2013, editor = {Friedemann Bitsch and J{\'{e}}r{\'{e}}mie Guiochet and Mohamed Ka{\^{a}}niche}, title = {Computer Safety, Reliability, and Security - 32nd International Conference, {SAFECOMP} 2013, Toulouse, France, September 24-27, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8153}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40793-2}, doi = {10.1007/978-3-642-40793-2}, isbn = {978-3-642-40792-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/HeiselKRT13, author = {Maritta Heisel and Mohamed Ka{\^{a}}niche and Alexander B. Romanovsky and Elena Troubitsyna}, title = {Engineering Resilient Systems: Models, Methods and Tools (Dagstuhl Seminar 13022)}, journal = {Dagstuhl Reports}, volume = {3}, number = {1}, pages = {30--46}, year = {2013}, url = {https://doi.org/10.4230/DagRep.3.1.30}, doi = {10.4230/DAGREP.3.1.30}, timestamp = {Thu, 22 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/HeiselKRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbcs/BuzatoDK12, author = {Luiz Eduardo Buzato and Elias P. Duarte Jr. and Mohamed Ka{\^{a}}niche}, title = {Message from the special issue editors}, journal = {J. Braz. Comput. Soc.}, volume = {18}, number = {1}, pages = {1--2}, year = {2012}, url = {https://doi.org/10.1007/s13173-012-0056-8}, doi = {10.1007/S13173-012-0056-8}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbcs/BuzatoDK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/LudinardTTNKAAB12, author = {Romaric Ludinard and Eric Totel and Frederic Tronel and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Eric Alata and Rim Akrout and Yann Bachy}, editor = {Fabio Martinelli and Jean{-}Louis Lanet and William M. Fitzgerald and Simon N. Foley}, title = {Detecting attacks against data in web applications}, booktitle = {7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CRISIS.2012.6378943}, doi = {10.1109/CRISIS.2012.6378943}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/LudinardTTNKAAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/MarconatoNK12, author = {G{\'{e}}raldine Vache Marconato and Vincent Nicomette and Mohamed Ka{\^{a}}niche}, editor = {Fabio Martinelli and Jean{-}Louis Lanet and William M. Fitzgerald and Simon N. Foley}, title = {Security-related vulnerability life cycle analysis}, booktitle = {7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CRISIS.2012.6378954}, doi = {10.1109/CRISIS.2012.6378954}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/MarconatoNK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/StudniaNKA12, author = {Ivan Studnia and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Eric Alata}, editor = {Nora Cuppens{-}Boulahia and Philip Fong and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Stephen Marsh and Jan{-}Philipp Stegh{\"{o}}fer}, title = {A distributed platform of high interaction honeypots and experimental results}, booktitle = {Tenth Annual International Conference on Privacy, Security and Trust, {PST} 2012, Paris, France, July 16-18, 2012}, pages = {229--230}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PST.2012.6297946}, doi = {10.1109/PST.2012.6297946}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/StudniaNKA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/TiassouKKSP12, author = {Kossi Tiassou and Karama Kanoun and Mohamed Ka{\^{a}}niche and Christel Seguin and Chris Papadopoulos}, title = {Impact of Operational Reliability Re-assessment during Aircraft Missions}, booktitle = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012, Irvine, CA, USA, October 8-11, 2012}, pages = {219--224}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SRDS.2012.37}, doi = {10.1109/SRDS.2012.37}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/srds/TiassouKKSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1211-5736, author = {Giovanna Dondossola and Geert Deconinck and Felicita Di Giandomenico and Susanna Donatelli and Mohamed Ka{\^{a}}niche and Paulo Ver{\'{\i}}ssimo}, title = {Critical Utility Infrastructural Resilience}, journal = {CoRR}, volume = {abs/1211.5736}, year = {2012}, url = {http://arxiv.org/abs/1211.5736}, eprinttype = {arXiv}, eprint = {1211.5736}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1211-5736.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1211-5738, author = {Mohamed Ka{\^{a}}niche and Paolo Lollini and Andrea Bondavalli and Karama Kanoun}, title = {Modeling the resilience of large and evolving systems}, journal = {CoRR}, volume = {abs/1211.5738}, year = {2012}, url = {http://arxiv.org/abs/1211.5738}, eprinttype = {arXiv}, eprint = {1211.5738}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1211-5738.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KaanicheM11, author = {Mohamed Ka{\^{a}}niche and Aad P. A. van Moorsel}, title = {It All Depends, and Increasingly So}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {6}, pages = {56--57}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.165}, doi = {10.1109/MSP.2011.165}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KaanicheM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/BondavalliHKLMS11, author = {Andrea Bondavalli and Ossama Hamouda and Mohamed Ka{\^{a}}niche and Paolo Lollini and Istv{\'{a}}n Majzik and Hans{-}Peter Schwefel}, title = {The {HIDENETS} Holistic Approach for the Analysis of Large Critical Mobile Systems}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {10}, number = {6}, pages = {783--796}, year = {2011}, url = {https://doi.org/10.1109/TMC.2010.222}, doi = {10.1109/TMC.2010.222}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/BondavalliHKLMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/NicometteKAH11, author = {Vincent Nicomette and Mohamed Ka{\^{a}}niche and Eric Alata and Matthieu Herrb}, title = {Set-up and deployment of a high-interaction honeypot: experiment and lessons learned}, journal = {J. Comput. Virol.}, volume = {7}, number = {2}, pages = {143--157}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0144-2}, doi = {10.1007/S11416-010-0144-2}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/NicometteKAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewdc/TiassouKKSP11, author = {Kossi Tiassou and Karama Kanoun and Mohamed Ka{\^{a}}niche and Christel Seguin and Chris Papadopoulos}, editor = {Felicita Di Giandomenico}, title = {Operational reliability of an aircraft with adaptive missions}, booktitle = {Proceedings of the 13th European Workshop on Dependable Computing, {EWDC} '11, Pisa, Italy, May 11-12, 2011}, pages = {9--14}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978582.1978585}, doi = {10.1145/1978582.1978585}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ewdc/TiassouKKSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/DessiatnikoffAAKN11, author = {Anthony Dessiatnikoff and Rim Akrout and Eric Alata and Mohamed Ka{\^{a}}niche and Vincent Nicomette}, editor = {Leon Alkalai and Timothy Tsai and Tomohiro Yoneda}, title = {A Clustering Approach for Web Vulnerabilities Detection}, booktitle = {17th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2011, Pasadena, CA, USA, December 12-14, 2011}, pages = {194--203}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PRDC.2011.31}, doi = {10.1109/PRDC.2011.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/DessiatnikoffAAKN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/TiassouKKSP11, author = {Kossi Tiassou and Karama Kanoun and Mohamed Ka{\^{a}}niche and Christel Seguin and Chris Papadopoulos}, editor = {Francesco Flammini and Sandro Bologna and Valeria Vittorini}, title = {Modeling Aircraft Operational Reliability}, booktitle = {Computer Safety, Reliability, and Security - 30th International Conference, {SAFECOMP} 2011, Naples, Italy, September 19-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6894}, pages = {157--170}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24270-0\_12}, doi = {10.1007/978-3-642-24270-0\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/TiassouKKSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/NicometteKAH10, author = {Vincent Nicomette and Mohamed Ka{\^{a}}niche and Eric Alata and Matthieu Herrb}, title = {Une analyse empirique du comportement d'attaquants. Exp{\'{e}}rimentations et r{\'{e}}sultats}, journal = {Tech. Sci. Informatiques}, volume = {29}, number = {6}, pages = {691--720}, year = {2010}, url = {https://doi.org/10.3166/tsi.29.691-720}, doi = {10.3166/TSI.29.691-720}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/NicometteKAH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serene/HamoudaKK10, author = {Ossama Hamouda and Mohamed Ka{\^{a}}niche and Karama Kanoun}, editor = {Giovanna Di Marzo Serugendo and John S. Fitzgerald}, title = {Availability modelling of a virtual black box for automotive systems}, booktitle = {Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems, {SERENE} '10, London, United Kingdom, April 15-16, 2010}, pages = {52--60}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/2401736.2401742}, doi = {10.1145/2401736.2401742}, timestamp = {Mon, 22 Jul 2019 17:31:47 +0200}, biburl = {https://dblp.org/rec/conf/serene/HamoudaKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KalamDBK09, author = {Anas Abou El Kalam and Yves Deswarte and Amine Ba{\"{\i}}na and Mohamed Ka{\^{a}}niche}, title = {PolyOrBAC: {A} security framework for Critical Infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {4}, pages = {154--169}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.08.005}, doi = {10.1016/J.IJCIP.2009.08.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KalamDBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/RuginaKK09, author = {Ana{-}Elena Rugina and Karama Kanoun and Mohamed Ka{\^{a}}niche}, title = {Mod{\'{e}}lisation de la sret{\'{e}} de fonctionnement bas{\'{e}}e sur le langage {AADL} et les RdPSG}, journal = {Tech. Sci. Informatiques}, volume = {28}, number = {1}, pages = {7--37}, year = {2009}, url = {https://doi.org/10.3166/tsi.28.7-37}, doi = {10.3166/TSI.28.7-37}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/RuginaKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HamoudaKK09, author = {Ossama Hamouda and Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {Safety modeling and evaluation of Automated Highway Systems}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {73--82}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270352}, doi = {10.1109/DSN.2009.5270352}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/HamoudaKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/AlataANOK08, author = {Eric Alata and Ion Alberdi and Vincent Nicomette and Philippe Owezarski and Mohamed Ka{\^{a}}niche}, title = {Internet attacks monitoring with dynamic connection redirection mechanisms}, journal = {J. Comput. Virol.}, volume = {4}, number = {2}, pages = {127--136}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0067-8}, doi = {10.1007/S11416-007-0067-8}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/AlataANOK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BainaDKK08, author = {Amine Ba{\"{\i}}na and Yves Deswarte and Anas Abou El Kalam and Mohamed Ka{\^{a}}niche}, editor = {Mohamed Jmaiel and Mohamed Mosbah}, title = {Access control for cooperative systems: {A} comparative analysis}, booktitle = {CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008}, pages = {19--26}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CRISIS.2008.4757460}, doi = {10.1109/CRISIS.2008.4757460}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/BainaDKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/BeccutiFKK08, author = {Marco Beccuti and Giuliana Franceschinis and Mohamed Ka{\^{a}}niche and Karama Kanoun}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {48--59}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_5}, doi = {10.1007/978-3-642-03552-4\_5}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/critis/BeccutiFKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/RuginaKK08, author = {Ana{-}Elena Rugina and Karama Kanoun and Mohamed Ka{\^{a}}niche}, title = {The {ADAPT} Tool: From {AADL} Architectural Models to Stochastic Petri Nets through Model Transformation}, booktitle = {Seventh European Dependable Computing Conference, {EDCC-7} 2008, Kaunas, Lithuania, 7-9 May 2008}, pages = {85--90}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EDCC-7.2008.14}, doi = {10.1109/EDCC-7.2008.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/RuginaKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/BainaKDK08, author = {Amine Ba{\"{\i}}na and Anas Abou El Kalam and Yves Deswarte and Mohamed Ka{\^{a}}niche}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Collaborative Access Control For Critical Infrastructures}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {189--201}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_14}, doi = {10.1007/978-0-387-88523-0\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/BainaKDK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isas/MatthiesenHKS08, author = {Erling Vestergaard Matthiesen and Ossama Hamouda and Mohamed Ka{\^{a}}niche and Hans{-}Peter Schwefel}, editor = {Takashi Nanya and Fumihiro Maruyama and Andr{\'{a}}s Pataricza and Miroslaw Malek}, title = {Dependability Evaluation of a Replication Service for Mobile Applications in Dynamic Ad-Hoc Networks}, booktitle = {Service Availability, 5th International Service Availability Symposium, {ISAS} 2008, Tokyo, Japan, May 19-21, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5017}, pages = {171--186}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68129-8\_14}, doi = {10.1007/978-3-540-68129-8\_14}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/isas/MatthiesenHKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0809-4107, author = {Jean{-}Claude Laprie and Karama Kanoun and Mohamed Ka{\^{a}}niche}, title = {Modelling interdependencies between the electricity and information infrastructures}, journal = {CoRR}, volume = {abs/0809.4107}, year = {2008}, url = {http://arxiv.org/abs/0809.4107}, eprinttype = {arXiv}, eprint = {0809.4107}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0809-4107.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0809-4108, author = {Ana{-}Elena Rugina and Karama Kanoun and Mohamed Ka{\^{a}}niche}, title = {The {ADAPT} Tool: From {AADL} Architectural Models to Stochastic Petri Nets through Model Transformation}, journal = {CoRR}, volume = {abs/0809.4108}, year = {2008}, url = {http://arxiv.org/abs/0809.4108}, eprinttype = {arXiv}, eprint = {0809.4108}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0809-4108.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0809-4109, author = {Ana{-}Elena Rugina and Peter H. Feiler and Karama Kanoun and Mohamed Ka{\^{a}}niche}, title = {Software dependability modeling using an industry-standard architecture description language}, journal = {CoRR}, volume = {abs/0809.4109}, year = {2008}, url = {http://arxiv.org/abs/0809.4109}, eprinttype = {arXiv}, eprint = {0809.4109}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0809-4109.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/KalamDBK07, author = {Anas Abou El Kalam and Yves Deswarte and Amine Ba{\"{\i}}na and Mohamed Ka{\^{a}}niche}, title = {Access Control for Collaborative Systems: {A} Web Services Based Approach}, booktitle = {2007 {IEEE} International Conference on Web Services {(ICWS} 2007), July 9-13, 2007, Salt Lake City, Utah, {USA}}, pages = {1064--1071}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICWS.2007.30}, doi = {10.1109/ICWS.2007.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/KalamDBK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/CourtesHKKP07, author = {Ludovic Court{\`{e}}s and Ossama Hamouda and Mohamed Ka{\^{a}}niche and Marc{-}Olivier Killijian and David Powell}, title = {Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices}, booktitle = {13th {IEEE} Pacific Rim International Symposium on Dependable Computing {(PRDC} 2007), 17-19 December, 2007, Melbourne, Victoria, Australia}, pages = {139--146}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PRDC.2007.21}, doi = {10.1109/PRDC.2007.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/CourtesHKKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/LaprieKK07, author = {Jean{-}Claude Laprie and Karama Kanoun and Mohamed Ka{\^{a}}niche}, editor = {Francesca Saglietti and Norbert Oster}, title = {Modelling Interdependencies Between the Electricity and Information Infrastructures}, booktitle = {Computer Safety, Reliability, and Security, 26th International Conference, {SAFECOMP} 2007, Nuremberg, Germany, September 18-21, 2007}, series = {Lecture Notes in Computer Science}, volume = {4680}, pages = {54--67}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75101-4\_5}, doi = {10.1007/978-3-540-75101-4\_5}, timestamp = {Sat, 30 Sep 2023 09:55:40 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/LaprieKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0704-0858, author = {Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Marc Dacier and Matthieu Herrb}, title = {Lessons Learned from the deployment of a high-interaction honeypot}, journal = {CoRR}, volume = {abs/0704.0858}, year = {2007}, url = {http://arxiv.org/abs/0704.0858}, eprinttype = {arXiv}, eprint = {0704.0858}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0704-0858.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0704-0860, author = {Cristina Simache and Mohamed Ka{\^{a}}niche}, title = {Availability assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx logfiles : a case study}, journal = {CoRR}, volume = {abs/0704.0860}, year = {2007}, url = {http://arxiv.org/abs/0704.0860}, eprinttype = {arXiv}, eprint = {0704.0860}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0704-0860.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0704-0861, author = {Mohamed Ka{\^{a}}niche and Yves Deswarte and Eric Alata and Marc Dacier and Vincent Nicomette}, title = {Empirical analysis and statistical modeling of attack processes based on honeypots}, journal = {CoRR}, volume = {abs/0704.0861}, year = {2007}, url = {http://arxiv.org/abs/0704.0861}, eprinttype = {arXiv}, eprint = {0704.0861}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0704-0861.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0704-0865, author = {Ana{-}Elena Rugina and Karama Kanoun and Mohamed Ka{\^{a}}niche}, title = {An architecture-based dependability modeling framework using {AADL}}, journal = {CoRR}, volume = {abs/0704.0865}, year = {2007}, url = {http://arxiv.org/abs/0704.0865}, eprinttype = {arXiv}, eprint = {0704.0865}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0704-0865.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0704-0879, author = {Mohamed Ka{\^{a}}niche and Luigi Romano and Zbigniew Kalbarczyk and Ravishankar K. Iyer and Richard M. Karcich}, title = {A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based {RAID} Storage Architecture}, journal = {CoRR}, volume = {abs/0704.0879}, year = {2007}, url = {http://arxiv.org/abs/0704.0879}, eprinttype = {arXiv}, eprint = {0704.0879}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0704-0879.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/AlataNKDH06, author = {Eric Alata and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Marc Dacier and Matthieu Herrb}, title = {Lessons learned from the deployment of a high-interaction honeypot}, booktitle = {Sixth European Dependable Computing Conference, {EDCC} 2006, Coimbra, Portugal, 18-20 October 2006}, pages = {39--46}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/EDCC.2006.17}, doi = {10.1109/EDCC.2006.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/AlataNKDH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/RuginaKK06, author = {Ana{-}Elena Rugina and Karama Kanoun and Mohamed Ka{\^{a}}niche}, editor = {Rog{\'{e}}rio de Lemos and Cristina Gacek and Alexander B. Romanovsky}, title = {A System Dependability Modeling Framework Using {AADL} and GSPNs}, booktitle = {Architecting Dependable Systems {IV} [the book is a result of {DSN} 2006 workshops, Philadelphia, PA, {USA]}}, series = {Lecture Notes in Computer Science}, volume = {4615}, pages = {14--38}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74035-3\_2}, doi = {10.1007/978-3-540-74035-3\_2}, timestamp = {Mon, 26 Feb 2024 07:46:57 +0100}, biburl = {https://dblp.org/rec/conf/icse/RuginaKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/MartinelloKKM06, author = {Magnos Martinello and Mohamed Ka{\^{a}}niche and Karama Kanoun and Carlos Aguilar Melchor}, title = {Modeling user perceived unavailability due to long response times}, booktitle = {20th International Parallel and Distributed Processing Symposium {(IPDPS} 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IPDPS.2006.1639671}, doi = {10.1109/IPDPS.2006.1639671}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/MartinelloKKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/MartinelloKK05, author = {Magnos Martinello and Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {Web service availability - impact of error recovery and traffic model}, journal = {Reliab. Eng. Syst. Saf.}, volume = {89}, number = {1}, pages = {6--16}, year = {2005}, url = {https://doi.org/10.1016/j.ress.2004.08.003}, doi = {10.1016/J.RESS.2004.08.003}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/MartinelloKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/SimacheK05, author = {Cristina Simache and Mohamed Ka{\^{a}}niche}, title = {Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx log files: {A} case study}, booktitle = {11th {IEEE} Pacific Rim International Symposium on Dependable Computing {(PRDC} 2005), 12-14 December, 2005, Changsha, Hunan, China}, pages = {49--56}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PRDC.2005.20}, doi = {10.1109/PRDC.2005.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/SimacheK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/edcc/2005, editor = {Mario Dal Cin and Mohamed Ka{\^{a}}niche and Andr{\'{a}}s Pataricza}, title = {Dependable Computing - EDCC-5, 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3463}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b107276}, doi = {10.1007/B107276}, isbn = {3-540-25723-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edcc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip/2004sf, editor = {Mohamed Ka{\^{a}}niche}, title = {Student Forum, {IFIP} 18th World Computer Congress - Student Forum, 22-27 August 2004, Toulouse, France}, publisher = {Kluwer}, year = {2004}, timestamp = {Mon, 28 Feb 2005 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip/2004sf.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/KaanicheKR03, author = {Mohamed Ka{\^{a}}niche and Karama Kanoun and Mourad Rabah}, title = {Multi-level modeling approach for the availability assessment of e-business applications}, journal = {Softw. Pract. Exp.}, volume = {33}, number = {14}, pages = {1323--1341}, year = {2003}, url = {https://doi.org/10.1002/spe.550}, doi = {10.1002/SPE.550}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spe/KaanicheKR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KaanicheKM03, author = {Mohamed Ka{\^{a}}niche and Karama Kanoun and Magnos Martinello}, title = {A User-Perceived Availability Evaluation of a Web Based Travel Agency}, booktitle = {2003 International Conference on Dependable Systems and Networks {(DSN} 2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings}, pages = {709--718}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DSN.2003.1209986}, doi = {10.1109/DSN.2003.1209986}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/KaanicheKM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/MartinelloKK03, author = {Magnos Martinello and Mohamed Ka{\^{a}}niche and Karama Kanoun}, editor = {Stuart Anderson and Massimo Felici and Bev Littlewood}, title = {Web Service Availability - Impact of Error Recovery}, booktitle = {Computer Safety, Reliability, and Security, 22nd International Conference, {SAFECOMP} 2003, Edinburgh, UK, September 23-26, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2788}, pages = {165--178}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39878-3\_14}, doi = {10.1007/978-3-540-39878-3\_14}, timestamp = {Sun, 02 Jun 2019 21:26:43 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/MartinelloKK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/SimacheKS02, author = {Cristina Simache and Mohamed Ka{\^{a}}niche and Ayda Sa{\"{\i}}dane}, title = {Event Log based Dependability Analysis of Windows {NT} and 2K Systems}, booktitle = {9th Pacific Rim International Symposium on Dependable Computing {(PRDC} 2002), 16-18 December 2002, Tsukuba-City, Ibarski, Japan}, pages = {311--315}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/PRDC.2002.1185651}, doi = {10.1109/PRDC.2002.1185651}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/SimacheKS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/KaanicheKR01, author = {Mohamed Ka{\^{a}}niche and Karama Kanoun and Mourad Rabah}, editor = {J. Jenny Li and Ronald P. Luijten and E. K. Park}, title = {A framework for modeling availability of E-business systems}, booktitle = {Proceedings of the 10th International Conference on Computer Communications and Networks, {ICCCN} 2001, 15-17 October, 2001, Scottsdale, Arizona, {USA}}, pages = {40--45}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ICCCN.2001.956217}, doi = {10.1109/ICCCN.2001.956217}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/KaanicheKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/SimacheK01, author = {Cristina Simache and Mohamed Ka{\^{a}}niche}, title = {Measurement-Based Availability of Unix Systems in a Distributed Environment}, booktitle = {12th International Symposium on Software Reliability Engineering {(ISSRE} 2001), 27-30 November 2001, Hong Kong, China}, pages = {346--355}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ISSRE.2001.989489}, doi = {10.1109/ISSRE.2001.989489}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/SimacheK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/KaanicheGAB01, author = {Mohamed Ka{\^{a}}niche and Yannick Le Gu{\'{e}}dart and Jean Arlat and Thierry Boyer}, editor = {Udo Voges}, title = {An Investigation on Mutation Strategies for Fault Injection into {RDD-100} Models}, booktitle = {Computer Safety, Reliability and Security, 20th International Conference, {SAFECOMP} 2001, Budapest, Hungary, September 26-28, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2187}, pages = {130--144}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45416-0\_14}, doi = {10.1007/3-540-45416-0\_14}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/KaanicheGAB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/KaanicheLB00, author = {Mohamed Ka{\^{a}}niche and Jean{-}Claude Laprie and Jean{-}Paul Blanquart}, title = {Dependability Engineering of Complex Computing Systems}, booktitle = {6th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2000), 11-15 September 2000, Tokyo, Japan}, pages = {36}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICECCS.2000.873926}, doi = {10.1109/ICECCS.2000.873926}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/KaanicheLB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/KaanicheLB00, author = {Mohamed Ka{\^{a}}niche and Jean{-}Claude Laprie and Jean{-}Paul Blanquart}, editor = {Floor Koornneef and Meine van der Meulen}, title = {A Dependability-Explicit Model for the Development of Computing Systems}, booktitle = {Computer Safety, Reliability and Security, 19th International Conference, {SAFECOMP} 2000, Rotterdam, The Netherlands, October 24-27, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1943}, pages = {107--116}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-40891-6\_10}, doi = {10.1007/3-540-40891-6\_10}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/KaanicheLB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Kaaniche99, author = {Mohamed Ka{\^{a}}niche}, title = {Evaluation de la s{\^{u}}ret{\'{e}} de fonctionnement informatique. Fautes physiques, fautes de conception, malveillances}, year = {1999}, url = {https://tel.archives-ouvertes.fr/tel-00142168}, timestamp = {Thu, 28 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/hal/Kaaniche99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pe/FotaKK99, author = {Nicolae Fota and Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {Dependability Evaluation of an Air Traffic Control Computing System}, journal = {Perform. Evaluation}, volume = {35}, number = {3-4}, pages = {253--273}, year = {1999}, url = {https://doi.org/10.1016/S0166-5316(99)00011-5}, doi = {10.1016/S0166-5316(99)00011-5}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pe/FotaKK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/OrtaloDK99, author = {Rodolphe Ortalo and Yves Deswarte and Mohamed Ka{\^{a}}niche}, title = {Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security}, journal = {{IEEE} Trans. Software Eng.}, volume = {25}, number = {5}, pages = {633--650}, year = {1999}, url = {https://doi.org/10.1109/32.815323}, doi = {10.1109/32.815323}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/OrtaloDK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/DeswarteKCG99, author = {Yves Deswarte and Mohamed Ka{\^{a}}niche and Pierre Corneillie and John Goodson}, editor = {Massimo Felici and Karama Kanoun and Alberto Pasquini}, title = {{SQUALE} Dependability Assessment Criteria}, booktitle = {Computer Safety, Reliability and Security, 18th International Conference, SAFECOMP'99, Toulouse, France, September, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1698}, pages = {27--38}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48249-0\_3}, doi = {10.1007/3-540-48249-0\_3}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/DeswarteKCG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftcs/KaanicheRKIK98, author = {Mohamed Ka{\^{a}}niche and Luigi Romano and Zbigniew Kalbarczyk and Ravishankar K. Iyer and Richard M. Karcich}, title = {A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based {RAID} Storage Architecture}, booktitle = {Digest of Papers: FTCS-28, The Twenty-Eigth Annual International Symposium on Fault-Tolerant Computing, Munich, Germany, June 23-25, 1998}, pages = {6--15}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/FTCS.1998.689450}, doi = {10.1109/FTCS.1998.689450}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ftcs/KaanicheRKIK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/KanounKL97, author = {Karama Kanoun and Mohamed Ka{\^{a}}niche and Jean{-}Claude Laprie}, title = {Qualitative and Quantitative Reliability Assessment}, journal = {{IEEE} Softw.}, volume = {14}, number = {2}, pages = {77--87}, year = {1997}, url = {https://doi.org/10.1109/52.582977}, doi = {10.1109/52.582977}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/KanounKL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/KaanicheK96, author = {Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {Reliability of a commercial telecommunications system}, booktitle = {Seventh International Symposium on Software Reliability Engineering, {ISSRE} 1996, White Plains, NY, USA, October 30, 1996-Nov. 2, 1996}, pages = {207--212}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/ISSRE.1996.558807}, doi = {10.1109/ISSRE.1996.558807}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/KaanicheK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/FotaKKP96, author = {Nicolae Fota and Mohamed Ka{\^{a}}niche and Karama Kanoun and Alain Peytavin}, editor = {Erwin Schoitsch}, title = {Safety Analysis and Evaluation of an Air Traffic Control Computing System}, booktitle = {15th International Conference on Computer Safety, Reliability and Security, Safe Comp 1996, Vienna, Austria, October 23-25 1996}, pages = {219--229}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/978-1-4471-0937-2\_19}, doi = {10.1007/978-1-4471-0937-2\_19}, timestamp = {Tue, 25 Jun 2019 15:55:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/FotaKKP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DacierDK96, author = {Marc Dacier and Yves Deswarte and Mohamed Ka{\^{a}}niche}, editor = {Sokratis K. Katsikas and Dimitris Gritzalis}, title = {Models and tools for quantitative assessment of operational security}, booktitle = {Information Systems Security, Facing the information society of the 21st Century}, series = {{IFIP} Conference Proceedings}, volume = {54}, pages = {177--186}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Thu, 03 Jan 2002 12:08:24 +0100}, biburl = {https://dblp.org/rec/conf/sec/DacierDK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pnpm/LaprieKK95, author = {Jean{-}Claude Laprie and Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {Modeling computer systems evolutions: non-stationary processes and stochastic Petri nets-application to dependability growth}, booktitle = {Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, {PNPM} 1995, Durham, NC, USA, October 3-6, 1995}, pages = {221--230}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/PNPM.1995.524338}, doi = {10.1109/PNPM.1995.524338}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pnpm/LaprieKK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/KaanicheKCM94, author = {Mohamed Ka{\^{a}}niche and Karama Kanoun and Michel Cukier and Marta Rettelbusch de Bastos Martini}, editor = {Klaus Echtle and Dieter K. Hammer and David Powell}, title = {Software Reliability Analysis of Three Successive Generations of a Switching System}, booktitle = {Dependable Computing - EDCC-1, First European Dependable Computing Conference, Berlin, Germany, October 4-6, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {852}, pages = {473--490}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58426-9\_153}, doi = {10.1007/3-540-58426-9\_153}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/edcc/KaanicheKCM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftcs/KanounKLM93, author = {Karama Kanoun and Mohamed Ka{\^{a}}niche and Jean{-}Claude Laprie and Sylvain Metge}, title = {SoRel: {A} Tool for Reliability Growth Analysis and Prediction From Statistical Failure Data}, booktitle = {Digest of Papers: FTCS-23, The Twenty-Third Annual International Symposium on Fault-Tolerant Computing, Toulouse, France, June 22-24, 1993}, pages = {654--659}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/FTCS.1993.627370}, doi = {10.1109/FTCS.1993.627370}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ftcs/KanounKLM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/KanounKL93, author = {Karama Kanoun and Mohamed Ka{\^{a}}niche and Jean{-}Claude Laprie}, title = {Experience in software reliability: From data collection to quantitative evaluation}, booktitle = {Fourth International Symposium on Software Reliability Engineering, {ISSRE} 1993, Denver, CO, USA, November 3-6, 1993}, pages = {234--245}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/ISSRE.1993.624293}, doi = {10.1109/ISSRE.1993.624293}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/KanounKL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/KaanicheK93, author = {Mohamed Ka{\^{a}}niche and Karama Kanoun}, editor = {Janusz G{\'{o}}rski}, title = {Software Failure Data Analysis of two Successive Generations of a Switching System}, booktitle = {The 12th International Conference on Computer Safety, Reliability and Security, {SAFECOMP} 1993, Pozna{\'{n}}-Kiekrz, Poland, October 27-29, 1993}, pages = {230--239}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/978-1-4471-2061-2\_24}, doi = {10.1007/978-1-4471-2061-2\_24}, timestamp = {Mon, 24 Jun 2019 15:52:03 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/KaanicheK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Kaaniche92, author = {Mohamed Ka{\^{a}}niche}, title = {Mod{\`{e}}le hyperexponentiel en temps continu et en temps discret pour l'{\'{e}}valuation de la croissance de la s{\^{u}}ret{\'{e}} de fonctionnement}, school = {National Polytechnic Institute of Toulouse, France}, year = {1992}, url = {https://tel.archives-ouvertes.fr/tel-00142181}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Kaaniche92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/KaanicheK92, author = {Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {The discrete time hyperexponential model for software reliability growth evaluation}, booktitle = {Third International Symposium on Software Reliability Engineering, {ISSRE} 1992, Research Triangle Park, NC, USA, October 7-10, 1992}, pages = {64--75}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/ISSRE.1992.285857}, doi = {10.1109/ISSRE.1992.285857}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/KaanicheK92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/LaprieKBK91, author = {Jean{-}Claude Laprie and Karama Kanoun and Christian B{\'{e}}ounes and Mohamed Ka{\^{a}}niche}, title = {The {KAT} (Knowledge-Action-Transformation) Approach to the Modeling and Evaluation of Reliability and Availability Growth}, journal = {{IEEE} Trans. Software Eng.}, volume = {17}, number = {4}, pages = {370--382}, year = {1991}, url = {https://doi.org/10.1109/32.90436}, doi = {10.1109/32.90436}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/LaprieKBK91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftcs/LaprieBKK90, author = {Jean{-}Claude Laprie and Christian B{\'{e}}ounes and Mohamed Ka{\^{a}}niche and Karama Kanoun}, title = {The transformation approach to the modeling and evaluation of the reliability and availability growth}, booktitle = {Proceedings of the 20th International Symposium on Fault-Tolerant Computing, {FTCS} 1990, Newcastle Upon Tyne, UK, 26-28 June, 1990}, pages = {364--371}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/FTCS.1990.89390}, doi = {10.1109/FTCS.1990.89390}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ftcs/LaprieBKK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.