![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Mohamed Kaâniche
Mohamad Kaâniche
Person information
- affiliation: LAAS, Toulouse, France
Refine list
![note](https://dblp.uni-trier.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c76]Romain Cayre
, Vincent Nicomette
, Guillaume Auriol
, Mohamed Kaâniche
, Aurélien Francillon
:
OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers. AsiaCCS 2024 - [c75]Florent Galtier, Guillaume Auriol, Vincent Nicomette, Paul L. R. Olivier, Romain Cayre, Mohamed Kaâniche:
Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit. DIMVA 2024: 525-544 - 2022
- [j30]Remi Adelin
, Cyrius Nugier
, Eric Alata, Vincent Nicomette, Vincent Migliore, Mohamed Kaâniche:
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol. J. Comput. Virol. Hacking Tech. 18(4): 425-452 (2022) - 2021
- [j29]Pierre-François Gimenez, Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment. ACM Trans. Cyber Phys. Syst. 5(3): 24:1 (2021) - [c74]Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips. DSN 2021: 376-387 - [c73]Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections. DSN 2021: 388-399 - [c72]Romain Cayre, Géraldine Vache Marconato, Florent Galtier, Mohamed Kaâniche, Vincent Nicomette, Guillaume Auriol:
Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller. WISEC 2021: 386-388 - 2020
- [c71]Aliénor Damien, Pierre-François Gimenez, Nathalie Feyt, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications. ISSRE 2020: 358-368 - [c70]Malcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, Youssef Laarouchi:
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices. NCA 2020: 1-8 - [c69]Florent Galtier, Romain Cayre, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:
A PSD-based fingerprinting approach to detect IoT device spoofing. PRDC 2020: 40-49
2010 – 2019
- 2019
- [j28]Yann Bachy
, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
Smart-TV security: risk analysis and experiments on Smart-TV communication channels. J. Comput. Virol. Hacking Tech. 15(1): 61-76 (2019) - [c68]Romain Cayre, Vincent Nicomette, Guillaume Auriol, Eric Alata, Mohamed Kaâniche, Géraldine Vache Marconato:
Mirage: Towards a Metasploit-Like Framework for IoT. ISSRE 2019: 261-270 - [c67]Aliénor Damien, Michael Marcourt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche:
Implementation of a Host-Based Intrusion Detection System for Avionic Applications. PRDC 2019: 178-187 - [e4]Pierre Ganty, Mohamed Kaâniche:
Verification and Evaluation of Computer and Communication Systems - 13th International Conference, VECoS 2019, Porto, Portugal, October 9, 2019, Proceedings. Lecture Notes in Computer Science 11847, Springer 2019, ISBN 978-3-030-35091-8 [contents] - 2018
- [j27]Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi:
A language-based intrusion detection approach for automotive embedded networks. Int. J. Embed. Syst. 10(1): 1-12 (2018) - [j26]Benoît Morgan
, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
IOMMU protection against I/O attacks: a vulnerability and a proof of concept. J. Braz. Comput. Soc. 24(1): 2:1-2:11 (2018) - [j25]Carla Sauvanaud
, Mohamed Kaâniche, Karama Kanoun, Kahina Lazri, Guthemberg Silvestre:
Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned. J. Syst. Softw. 139: 84-106 (2018) - [j24]Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
State of the art of network protocol reverse engineering tools. J. Comput. Virol. Hacking Tech. 14(1): 53-68 (2018) - [c66]Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic:
Specification-Based Protocol Obfuscation. DSN 2018: 478-489 - [c65]Guillaume Averlant, Eric Alata, Mohamad Kaâniche, Vincent Nicomette, Yuxiao Mao:
SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture. NCA 2018: 1-5 - [c64]Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. NCA 2018: 1-8 - [i14]Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic:
Specification-Based Protocol Obfuscation. CoRR abs/1807.09464 (2018) - [i13]Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. CoRR abs/1811.03934 (2018) - 2017
- [c63]Jonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche:
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling. EDCC 2017: 147-150 - [c62]Guillaume Averlant, Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms. PRDC 2017: 245-254 - 2016
- [j23]Eric Alata, Vincent Nicomette, Julien Duchêne, Colas Le Guernic, Mohamed Kaâniche:
Outils pour la rétro-conception de protocoles. Analyse et classification. Tech. Sci. Informatiques 35(6): 609-640 (2016) - [c61]Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
Protocol Reverse Engineering: Challenges and Obfuscation. CRiSIS 2016: 139-144 - [c60]Carla Sauvanaud
, Kahina Lazri, Mohamed Kaâniche, Karama Kanoun:
Towards Black-Box Anomaly Detection in Virtual Network Functions. DSN Workshops 2016: 254-257 - [c59]Carla Sauvanaud
, Kahina Lazri, Mohamed Kaâniche, Karama Kanoun:
Anomaly Detection and Root Cause Localization in Virtual Network Functions. ISSRE 2016: 196-206 - [c58]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
Bypassing IOMMU Protection against I/O Attacks. LADC 2016: 145-150 - 2015
- [c57]Yann Bachy, Frederic Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, Pierre Lukjanenko:
Smart-TV Security Analysis: Practical Experiments. DSN 2015: 497-504 - [c56]Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds. EDCC 2015: 49-60 - [c55]Carla Sauvanaud
, Guthemberg Silvestre, Mohamed Kaâniche, Karama Kanoun:
Data Stream Clustering for Online Anomaly Detection in Cloud Applications. EDCC 2015: 120-131 - [c54]Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège:
Security of ISP Access Networks: Practical Experiments. EDCC 2015: 205-212 - [c53]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Guillaume Averlant:
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring. PRDC 2015: 189-198 - [c52]Jérémie Guiochet, Quynh Anh Do Hoang, Mohamed Kaâniche:
A Model for Safety Case Confidence Assessment. SAFECOMP 2015: 313-327 - [c51]Guthemberg Silvestre, Carla Sauvanaud
, Mohamed Kaâniche, Karama Kanoun:
Tejo: A Supervised Anomaly Detection Scheme for NewSQL Databases. SERENE 2015: 114-127 - [c50]Mohamed Kaâniche:
Resilience Assessment: Accidental and Malicious Threats. VECoS 2015: 9 - [i12]Jérémie Guiochet, Quynh Anh Do Hoang, Mohamed Kaâniche:
A Model for Safety Case Confidence Assessment. CoRR abs/1512.04467 (2015) - 2014
- [j22]Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications. Int. J. Secur. Softw. Eng. 5(1): 19-38 (2014) - [j21]Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège:
La sécurité des box ADSL. Analyse de risques et expérimentations. Ingénierie des Systèmes d Inf. 19(6): 63-88 (2014) - [j20]Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
An automated black box approach for web vulnerability identification and attack scenario generation. J. Braz. Comput. Soc. 20(1): 4:1-4:16 (2014) - [j19]Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos
:
Fiabilité de mission d'un avion. Évaluation stochastique en opération. Tech. Sci. Informatiques 33(9-10): 777-807 (2014) - [j18]Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
Identification de vulnérabilités web et génération de scénarios d'attaque. Tech. Sci. Informatiques 33(9-10): 809-840 (2014) - [c49]Jean Arlat, Michel Diaz, Mohamed Kaâniche:
Towards resilient cyber-physical systems: The ADREAM project. DTIS 2014: 1-5 - [c48]Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. NSS 2014: 1-14 - [c47]Guthemberg Silvestre, Carla Sauvanaud
, Mohamed Kaâniche, Karama Kanoun:
An Anomaly Detection Approach for Scale-Out Storage Systems. SBAC-PAD 2014: 294-301 - 2013
- [j17]Géraldine Vache Marconato, Mohamed Kaâniche, Vincent Nicomette:
A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach. Comput. J. 56(4): 422-439 (2013) - [j16]Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos
:
Aircraft operational reliability - A model-based approach and a case study. Reliab. Eng. Syst. Saf. 120: 163-176 (2013) - [j15]Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche:
Évaluation quantitative de la sécurité. Approche basée sur les vulnérabilités. Tech. Sci. Informatiques 32(1): 41-75 (2013) - [c46]Mohamed Kaâniche, Michael D. Harrison
, Hermann Kopetz, Daniel P. Siewiorek
:
2nd workshop on open resilient human-aware cyber-physical systems. DSN Workshops 2013: 1-2 - [c45]Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi:
Survey on security threats and protection mechanisms in embedded automotive networks. DSN Workshops 2013: 1-12 - [c44]Jérémie Guiochet, Quynh Anh Do Hoang, Mohamed Kaâniche, David Powell:
Model-based safety analysis of human-robot interactions: The MIRAS walking assistance robot. ICORR 2013: 1-7 - [c43]Eric Alata, Mohamed Kaâniche, Vincent Nicomette, Rim Akrout:
An Automated Approach to Generate Web Applications Attack Scenarios. LADC 2013: 78-85 - [c42]Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi:
Security of embedded automotive networks: state of the art and a research proposal. CARS@SAFECOMP 2013 - [e3]Friedemann Bitsch, Jérémie Guiochet, Mohamed Kaâniche:
Computer Safety, Reliability, and Security - 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings. Lecture Notes in Computer Science 8153, Springer 2013, ISBN 978-3-642-40792-5 [contents] - [i11]Maritta Heisel, Mohamed Kaâniche, Alexander B. Romanovsky, Elena Troubitsyna:
Engineering Resilient Systems: Models, Methods and Tools (Dagstuhl Seminar 13022). Dagstuhl Reports 3(1): 30-46 (2013) - 2012
- [j14]Luiz Eduardo Buzato, Elias P. Duarte Jr., Mohamed Kaâniche:
Message from the special issue editors. J. Braz. Comput. Soc. 18(1): 1-2 (2012) - [c41]Romaric Ludinard
, Eric Totel, Frederic Tronel
, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
Detecting attacks against data in web applications. CRiSIS 2012: 1-8 - [c40]Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche:
Security-related vulnerability life cycle analysis. CRiSIS 2012: 1-8 - [c39]Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
A distributed platform of high interaction honeypots and experimental results. PST 2012: 229-230 - [c38]Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos
:
Impact of Operational Reliability Re-assessment during Aircraft Missions. SRDS 2012: 219-224 - [i10]Giovanna Dondossola, Geert Deconinck, Felicita Di Giandomenico, Susanna Donatelli, Mohamed Kaâniche, Paulo Veríssimo:
Critical Utility Infrastructural Resilience. CoRR abs/1211.5736 (2012) - [i9]Mohamed Kaâniche, Paolo Lollini, Andrea Bondavalli, Karama Kanoun:
Modeling the resilience of large and evolving systems. CoRR abs/1211.5738 (2012) - 2011
- [j13]Mohamed Kaâniche, Aad P. A. van Moorsel:
It All Depends, and Increasingly So. IEEE Secur. Priv. 9(6): 56-57 (2011) - [j12]Andrea Bondavalli
, Ossama Hamouda, Mohamed Kaâniche, Paolo Lollini
, István Majzik
, Hans-Peter Schwefel:
The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems. IEEE Trans. Mob. Comput. 10(6): 783-796 (2011) - [j11]Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb:
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. J. Comput. Virol. 7(2): 143-157 (2011) - [c37]Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos
:
Operational reliability of an aircraft with adaptive missions. EWDC 2011: 9-14 - [c36]Anthony Dessiatnikoff, Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
A Clustering Approach for Web Vulnerabilities Detection. PRDC 2011: 194-203 - [c35]Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos
:
Modeling Aircraft Operational Reliability. SAFECOMP 2011: 157-170 - 2010
- [j10]Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb:
Une analyse empirique du comportement d'attaquants. Expérimentations et résultats. Tech. Sci. Informatiques 29(6): 691-720 (2010) - [c34]Ossama Hamouda, Mohamed Kaâniche, Karama Kanoun:
Availability modelling of a virtual black box for automotive systems. SERENE 2010: 52-60
2000 – 2009
- 2009
- [j9]Anas Abou El Kalam
, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
PolyOrBAC: A security framework for Critical Infrastructures. Int. J. Crit. Infrastructure Prot. 2(4): 154-169 (2009) - [j8]Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
Modélisation de la sreté de fonctionnement basée sur le langage AADL et les RdPSG. Tech. Sci. Informatiques 28(1): 7-37 (2009) - [c33]Ossama Hamouda, Mohamed Kaâniche, Karama Kanoun:
Safety modeling and evaluation of Automated Highway Systems. DSN 2009: 73-82 - 2008
- [j7]Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche:
Internet attacks monitoring with dynamic connection redirection mechanisms. J. Comput. Virol. 4(2): 127-136 (2008) - [c32]Amine Baïna, Yves Deswarte
, Anas Abou El Kalam
, Mohamed Kaâniche:
Access control for cooperative systems: A comparative analysis. CRiSIS 2008: 19-26 - [c31]Marco Beccuti
, Giuliana Franceschinis, Mohamed Kaâniche, Karama Kanoun:
Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures. CRITIS 2008: 48-59 - [c30]Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation. EDCC 2008: 85-90 - [c29]Amine Baïna, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaâniche:
Collaborative Access Control For Critical Infrastructures. Critical Infrastructure Protection 2008: 189-201 - [c28]Erling Vestergaard Matthiesen, Ossama Hamouda, Mohamed Kaâniche, Hans-Peter Schwefel:
Dependability Evaluation of a Replication Service for Mobile Applications in Dynamic Ad-Hoc Networks. ISAS 2008: 171-186 - [i8]Jean-Claude Laprie, Karama Kanoun, Mohamed Kaâniche:
Modelling interdependencies between the electricity and information infrastructures. CoRR abs/0809.4107 (2008) - [i7]Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation. CoRR abs/0809.4108 (2008) - [i6]Ana-Elena Rugina, Peter H. Feiler, Karama Kanoun, Mohamed Kaâniche:
Software dependability modeling using an industry-standard architecture description language. CoRR abs/0809.4109 (2008) - 2007
- [c27]Anas Abou El Kalam
, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
Access Control for Collaborative Systems: A Web Services Based Approach. ICWS 2007: 1064-1071 - [c26]Ludovic Courtès, Ossama Hamouda, Mohamed Kaâniche, Marc-Olivier Killijian, David Powell:
Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices. PRDC 2007: 139-146 - [c25]Jean-Claude Laprie, Karama Kanoun, Mohamed Kaâniche:
Modelling Interdependencies Between the Electricity and Information Infrastructures. SAFECOMP 2007: 54-67 - [i5]Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb:
Lessons Learned from the deployment of a high-interaction honeypot. CoRR abs/0704.0858 (2007) - [i4]Cristina Simache, Mohamed Kaâniche:
Availability assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx logfiles : a case study. CoRR abs/0704.0860 (2007) - [i3]Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette:
Empirical analysis and statistical modeling of attack processes based on honeypots. CoRR abs/0704.0861 (2007) - [i2]Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
An architecture-based dependability modeling framework using AADL. CoRR abs/0704.0865 (2007) - [i1]Mohamed Kaâniche, Luigi Romano, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Richard M. Karcich:
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture. CoRR abs/0704.0879 (2007) - 2006
- [c24]Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier
, Matthieu Herrb:
Lessons learned from the deployment of a high-interaction honeypot. EDCC 2006: 39-46 - [c23]Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
A System Dependability Modeling Framework Using AADL and GSPNs. WADS 2006: 14-38 - [c22]Magnos Martinello, Mohamed Kaâniche, Karama Kanoun, Carlos Aguilar Melchor:
Modeling user perceived unavailability due to long response times. IPDPS 2006 - 2005
- [j6]Magnos Martinello, Mohamed Kaâniche, Karama Kanoun:
Web service availability - impact of error recovery and traffic model. Reliab. Eng. Syst. Saf. 89(1): 6-16 (2005) - [c21]Cristina Simache, Mohamed Kaâniche:
Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx log files: A case study. PRDC 2005: 49-56 - [e2]Mario Dal Cin, Mohamed Kaâniche, András Pataricza:
Dependable Computing - EDCC-5, 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005, Proceedings. Lecture Notes in Computer Science 3463, Springer 2005, ISBN 3-540-25723-3 [contents] - 2004
- [e1]Mohamed Kaâniche:
Student Forum, IFIP 18th World Computer Congress - Student Forum, 22-27 August 2004, Toulouse, France. Kluwer 2004 [contents] - 2003
- [j5]Mohamed Kaâniche, Karama Kanoun, Mourad Rabah
:
Multi-level modeling approach for the availability assessment of e-business applications. Softw. Pract. Exp. 33(14): 1323-1341 (2003) - [c20]Mohamed Kaâniche, Karama Kanoun, Magnos Martinello:
A User-Perceived Availability Evaluation of a Web Based Travel Agency. DSN 2003: 709-718 - [c19]Magnos Martinello, Mohamed Kaâniche, Karama Kanoun:
Web Service Availability - Impact of Error Recovery. SAFECOMP 2003: 165-178 - 2002
- [c18]Cristina Simache, Mohamed Kaâniche, Ayda Saïdane:
Event Log based Dependability Analysis of Windows NT and 2K Systems. PRDC 2002: 311-315 - 2001
- [c17]Mohamed Kaâniche, Karama Kanoun, Mourad Rabah
:
A framework for modeling availability of E-business systems. ICCCN 2001: 40-45 - [c16]Cristina Simache, Mohamed Kaâniche:
Measurement-Based Availability of Unix Systems in a Distributed Environment. ISSRE 2001: 346-355 - [c15]Mohamed Kaâniche, Yannick Le Guédart, Jean Arlat, Thierry Boyer:
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models. SAFECOMP 2001: 130-144 - 2000
- [c14]Mohamed Kaâniche, Jean-Claude Laprie, Jean-Paul Blanquart:
Dependability Engineering of Complex Computing Systems. ICECCS 2000: 36- - [c13]Mohamed Kaâniche, Jean-Claude Laprie, Jean-Paul Blanquart:
A Dependability-Explicit Model for the Development of Computing Systems. SAFECOMP 2000: 107-116
1990 – 1999
- 1999
- [b2]Mohamed Kaâniche:
Evaluation de la sûreté de fonctionnement informatique. Fautes physiques, fautes de conception, malveillances. National Polytechnic Institute of Toulouse, France, 1999 - [j4]Nicolae Fota, Mohamed Kaâniche, Karama Kanoun:
Dependability Evaluation of an Air Traffic Control Computing System. Perform. Evaluation 35(3-4): 253-273 (1999) - [j3]Rodolphe Ortalo
, Yves Deswarte, Mohamed Kaâniche:
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Trans. Software Eng. 25(5): 633-650 (1999) - [c12]Yves Deswarte, Mohamed Kaâniche, Pierre Corneillie, John Goodson:
SQUALE Dependability Assessment Criteria. SAFECOMP 1999: 27-38 - 1998
- [c11]Mohamed Kaâniche, Luigi Romano,