default search action
Ana R. Cavalli
- > Home > Persons > Ana R. Cavalli
Publications
- 2024
- [c186]Manh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
AI4SOAR: A Security Intelligence Tool for Automated Incident Response. ARES 2024: 170:1-170:8 - [c184]Ivan Orefice, Wissam Mallouli, Ana R. Cavalli, Filip Sebek, Alberto Lizarduy:
Diagnosis Automation Using Similarity Analysis: Application to Industrial Systems. ICSOFT 2024: 331-338 - 2023
- [j40]Zujany Salazar, Fatiha Zaïdi, Huu Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access 11: 43925-43944 (2023) - [c183]Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca:
A deep learning anomaly detection framework with explainability and robustness. ARES 2023: 134:1-134:7 - [c182]Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa Cavalli:
The DYNABIC approach to resilience of critical infrastructures. ARES 2023: 136:1-136:8 - [c181]Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli:
HTTP/2 Attacks Generation using 5Greplay. ARES 2023: 138:1-138:7 - [c180]Valeria Valdés, Ana Rosa Cavalli, Fatiha Zaïdi, Wissam Mallouli:
Testing techniques to assess impact and cascading effects. CloudCom 2023: 269-272 - [c179]Lorens Barraud, Francesco G. Caccavale, Jean-Baptiste Peyrat, Wissam Mallouli, Véronique Capdevielle, Hicham Khalife, Ana Rosa Cavalli:
5G SUCI Catcher: Attack and Detection. CloudCom 2023: 285-290 - [c178]Phu Hong Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe, Erkuden Rios, Diego Sagasti, Gonzalo Nicolas, Valeria Valdés, Wissam Mallouli, Ana R. Cavalli, Nicolas Ferry:
Towards Smarter Security Orchestration and Automatic Response for CPS and IoT. CloudCom 2023: 298-302 - [c177]Valeria Valdés, Fatiha Zaïdi, Ana Rosa Cavalli, Wissam Mallouli:
A Resilience Component for a Digital Twin. FPS (2) 2023: 93-104 - [c175]Anis Bouaziz, Manh-Dung Nguyen, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli:
Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection. ICSOFT 2023: 510-517 - [i3]Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. CoRR abs/2304.05719 (2023) - 2022
- [j39]George Amponis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana R. Cavalli, Dimitrios Klonidis, Evangelos K. Markakis, Panagiotis G. Sarigiannidis:
Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. EURASIP J. Wirel. Commun. Netw. 2022(1): 124 (2022) - [c174]Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Rosa Cavalli, Huu Nghia Nguyen, Edgardo Montes de Oca:
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. ICSOFT 2022: 234-241 - [c172]Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, Monika Ewa Rakoczy:
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System. ICST Workshops 2022: 40-48 - [c171]Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R. Cavalli:
Digital Twin for IoT Environments: A Testing and Simulation Tool. QUATIC 2022: 205-219 - 2021
- [c169]Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. ARES 2021: 106:1-106:8 - [c168]Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis, George Guirgis, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis, Wissam Mallouli:
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks. ARES 2021: 108:1-108:10 - [c167]Vinh Hoa La, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli:
A Framework for Security Monitoring of Real IoT Testbeds. ICSOFT 2021: 645-652 - 2020
- [c165]Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes de Oca:
Metrics-driven DevSecOps. ICSOFT 2020: 228-233 - 2019
- [c158]Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli, Brecht Vermeulen, Matevz Vucnik:
Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms. ICTSS 2019: 270-278 - 2018
- [j34]Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort:
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. Comput. J. 61(8): 1109-1122 (2018) - [c156]Sarah A. Dahab, Erika Silva, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli:
Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion. ICSOFT 2018: 154-165 - [c155]Sarah A. Dahab, Stephane Maag, Wissam Mallouli, Ana R. Cavalli:
Smart Measurements and Analysis for Software Quality Enhancement. ICSOFT (Selected Papers) 2018: 194-219 - 2017
- [c150]Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli:
A Platform for Security Monitoring of Multi-cloud Applications. Ershov Informatics Conference 2017: 59-71 - [c148]Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli, Erkuden Rios:
Multi-cloud Applications Security Monitoring. GPC 2017: 748-758 - 2016
- [c139]Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sánchez, Fatiha Zaïdi:
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. ICDCS Workshops 2016: 61-66 - [c137]Diego Rivera, Ana R. Cavalli, Natalia Kushik, Wissam Mallouli:
An Implementation of a QoE Evaluation Technique Including Business Model Parameters. ICSOFT-PT 2016: 138-145 - 2015
- [j29]Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca, Wissam Mallouli:
An effective attack detection approach in wireless mesh networks. Int. J. Space Based Situated Comput. 5(2): 89-99 (2015) - [c128]Raul A. Fuentes-Samaniego, Ana R. Cavalli, Wissam Mallouli, Javier Baliosian:
Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol. LANOMS 2015: 69-72 - 2014
- [j28]Natalia Kushik, Jeevan Pokhrel, Nina Yevtushenko, Ana R. Cavalli, Wissam Mallouli:
QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches. Int. J. Organ. Collect. Intell. 4(3): 44-64 (2014) - [c125]Jeevan Pokhrel, Felipe Lalanne, Ana R. Cavalli, Wissam Mallouli:
QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System. AINA 2014: 629-634 - [c117]Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli:
How to Evaluate Trust Using MMT. NSS 2014: 484-492 - [c112]Natalia Kushik, Nina Yevtushenko, Ana R. Cavalli, Wissam Mallouli, Jeevan Pokhrel:
Evaluating Web Service QoE by Learning Logic Networks. WEBIST (1) 2014: 168-176 - 2012
- [j22]Amel Mammar, Wissam Mallouli, Ana R. Cavalli:
A systematic approach to integrate common timed security rules within a TEFSM-based system specification. Inf. Softw. Technol. 54(1): 87-98 (2012) - 2011
- [j17]Wissam Mallouli, Amel Mammar, Ana R. Cavalli, Willy Jimenez:
VDC-Based Dynamic Code Analysis: Application to C Programs. J. Internet Serv. Inf. Secur. 1(2/3): 4-20 (2011) - [c89]Amel Mammar, Ana R. Cavalli, Willy Jimenez, Wissam Mallouli, Edgardo Montes de Oca:
Using Testing Techniques for Vulnerability Detection in C Programs. ICTSS 2011: 80-96 - 2010
- [c85]Ana R. Cavalli, Tien-Dung Cao, Wissam Mallouli, Eliane Martins, Andrey Sadovykh, Sébastien Salva, Fatiha Zaïdi:
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition. ICWS 2010: 377-384 - [c84]Gerardo Morales, Stéphane Maag, Ana R. Cavalli, Wissam Mallouli, Edgardo Montes de Oca, Bachar Wehbi:
Timed Extended Invariants for the Passive Testing of Web Services. ICWS 2010: 592-599 - 2009
- [c77]Wissam Mallouli, Amel Mammar, Ana R. Cavalli:
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification. APSEC 2009: 489-496 - [c72]Felipe Lalanne, Stéphane Maag, Edgardo Montes de Oca, Ana R. Cavalli, Wissam Mallouli, Arnaud Gonguet:
An Automated Passive Testing Approach for the IMS PoC Service. ASE 2009: 535-539 - 2008
- [c65]Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli:
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking. ADHOC-NOW 2008: 345-356 - [c64]Wissam Mallouli, Amel Mammar, Ana R. Cavalli:
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines. DS-RT 2008: 173-180 - [c63]Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli, Mounir Lallali:
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints. DS-RT 2008: 315-318 - [c61]Wissam Mallouli, Fayçal Bessayah, Ana R. Cavalli, Azzedine Benameur:
Security Rules Specification and Analysis Based on Passive Testing. GLOBECOM 2008: 2078-2083 - [c59]Wissam Mallouli, Gerardo Morales, Ana R. Cavalli:
Testing Security Policies for Web Applications. ICST Workshops 2008: 269-270 - [c56]Wissam Mallouli, Mounir Lallali, Gerardo Morales, Ana R. Cavalli:
Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study. SITIS 2008: 128-136 - 2007
- [c53]Wissam Mallouli, Ana R. Cavalli:
Testing Security Rules with Decomposable Activities. HASE 2007: 149-155 - [c51]Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens:
A formal approach for testing security rules. SACMAT 2007: 127-132 - 2006
- [c41]Bachar Wehbi, Wissam Mallouli, Ana R. Cavalli:
Light Client Management Protocol for Wireless Mesh Networks. MDM 2006: 123 - [c40]Ana R. Cavalli, Stéphane Maag, Wissam Mallouli, Mikael Marche, Yves-Marie Quemener:
Application of Two Test Generation Tools to an Industrial Case Study. TestCom 2006: 134-148
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-13 01:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint