Остановите войну!
for scientists:
default search action
Amel Mammar
Person information
- affiliation: Télécom SudParis
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Amel Mammar, Meriem Belguidoum, Saddam Hocine Hiba:
A formal approach for the correct deployment of cloud applications. Sci. Comput. Program. 232: 103048 (2024) - [j28]Amel Mammar, Marc Frappier, Régine Laleau:
An Event-B model of an automotive adaptive exterior light system. Int. J. Softw. Tools Technol. Transf. 26(3): 331-346 (2024) - [j27]Amel Mammar, Marc Frappier:
Modeling of a speed control system using Event-B. Int. J. Softw. Tools Technol. Transf. 26(3): 347-363 (2024) - [c54]Amel Mammar:
An Event-B Model of a Mechanical Lung Ventilator. ABZ 2024: 307-323 - 2023
- [c53]Quelen Cartellier, Marc Frappier, Amel Mammar:
Proving Local Invariants in ASTDs. ICFEM 2023: 228-246 - [c52]Meryem Afendi, Amel Mammar, Régine Laleau:
A Tool-Supported Approach for Modeling and Verifying Hybrid Systems using EVENT-B and the Differential Equation Solver SAGEMATH. ICSOFT 2023: 71-83 - [c51]Amel Mammar, Michael Leuschel:
Modeling and Verifying an Arrival Manager Using Event-B. ABZ 2023: 321-339 - 2022
- [j26]Amel Mammar, Lazhar Hamel, Mohamed Graiet:
An Event-B-Based Approach to Model and Verify Behaviors for Component-Based Applications. Comput. J. 65(10): 2780-2800 (2022) - [j25]Amel Mammar, Meryem Afendi, Régine Laleau:
Modeling and proving hybrid programs with Event-B: An approach by generalization and instantiation. Sci. Comput. Program. 222: 102856 (2022) - [j24]Imed Abbassi, Amel Mammar, Mohamed Graiet:
A Correct-by-Construction Model for Verifying Transactional Composite Services Configuration. IEEE Trans. Serv. Comput. 15(5): 2511-2525 (2022) - [c50]Meryem Afendi, Amel Mammar, Régine Laleau:
Building Correct Hybrid Systems using Event-B and Sagemath: Illustration by the Hybrid Smart Heating System Case Study. ICECCS 2022: 91-96 - 2020
- [j23]Amel Mammar, Marc Frappier, Steve Jeffrey Tueno Fotso, Régine Laleau:
A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard. Int. J. Softw. Tools Technol. Transf. 22(3): 333-347 (2020) - [j22]Steve Jeffrey Tueno Fotso, Marc Frappier, Régine Laleau, Amel Mammar:
Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach. Int. J. Softw. Tools Technol. Transf. 22(3): 349-363 (2020) - [c49]Lionel N. Tidjon, Marc Frappier, Amel Mammar:
Intrusion Detection Using ASTDs. AINA 2020: 1397-1411 - [c48]Meryem Afendi, Régine Laleau, Amel Mammar:
Modelling Hybrid Programs with Event-B. ABZ 2020: 139-154 - [c47]Amel Mammar, Marc Frappier, Régine Laleau:
An Event-B Model of an Automotive Adaptive Exterior Light System. ABZ 2020: 351-366 - [c46]Amel Mammar, Marc Frappier:
Modeling of a Speed Control System Using Event-B. ABZ 2020: 367-381
2010 – 2019
- 2019
- [j21]Nghi Huynh, Marc Frappier, Herman Pooda, Amel Mammar, Régine Laleau:
SGAC: A Multi-Layered Access Control Model with Conflict Resolution Strategy. Comput. J. 62(12): 1707-1733 (2019) - [j20]Lionel N. Tidjon, Marc Frappier, Amel Mammar:
Intrusion Detection Systems: A Cross-Domain Overview. IEEE Commun. Surv. Tutorials 21(4): 3639-3681 (2019) - [j19]Sindyana Jlassi, Amel Mammar, Imed Abbassi, Mohamed Graiet:
Towards correct cloud resource allocation in FOSS applications. Future Gener. Comput. Syst. 91: 392-406 (2019) - [c45]Steve Jeffrey Tueno Fotso, Régine Laleau, Marc Frappier, Amel Mammar, Francois Thibodeau, Mama Nsangou Mouchili:
Assessment of a Formal Requirements Modeling Approach on a Transportation System. ICFEM 2019: 470-486 - [c44]Steve Jeffrey Tueno Fotso, Régine Laleau, Héctor Ruíz Barradas, Marc Frappier, Amel Mammar:
A Formal Requirements Modeling Approach: Application to Rail Communication. ICSOFT 2019: 170-177 - 2018
- [j18]Raphaël Chane-Yack-Fa, Marc Frappier, Amel Mammar, Alain Finkel:
Parameterized verification of monotone information systems. Formal Aspects Comput. 30(3-4): 463-489 (2018) - [c43]Steve Jeffrey Tueno Fotso, Amel Mammar, Régine Laleau, Marc Frappier:
Event-B Expression and Verification of Translation Rules Between SysML/KAOS Domain Models and B System Specifications. ABZ 2018: 55-70 - [c42]Steve Jeffrey Tueno Fotso, Marc Frappier, Régine Laleau, Amel Mammar:
Modeling the Hybrid ERTMS/ETCS Level 3 Standard Using a Formal Requirements Engineering Approach. ABZ 2018: 262-276 - [c41]Amel Mammar, Marc Frappier, Steve Jeffrey Tueno Fotso, Régine Laleau:
An Event-B Model of the Hybrid ERTMS/ETCS Level 3 Standard. ABZ 2018: 353-366 - [c40]Lionel N. Tidjon, Marc Frappier, Michael Leuschel, Amel Mammar:
Extended Algebraic State-Transition Diagrams. ICECCS 2018: 146-155 - [c39]Steve Jeffrey Tueno Fotso, Marc Frappier, Regine Laleau, Amel Mammar:
Back Propagating B System Updates on SysML/KAOS Domain Models. ICECCS 2018: 160-169 - [c38]Steve Jeffrey Tueno Fotso, Marc Frappier, Régine Laleau, Amel Mammar, Michael Leuschel:
Formalisation of SysML/KAOS Goal Assignments with B System Component Decompositions. IFM 2018: 377-397 - [i4]Steve Jeffrey Tueno Fotso, Marc Frappier, Amel Mammar, Régine Laleau:
From SysML/KAOS Domain Models to B System Specifications. CoRR abs/1803.01972 (2018) - [i3]Steve Jeffrey Tueno Fotso, Marc Frappier, Régine Laleau, Amel Mammar, Héctor Ruíz Barradas:
The Generic SysML/KAOS Domain Metamodel. CoRR abs/1811.04732 (2018) - 2017
- [j17]Mohamed Graiet, Lazhar Hamel, Amel Mammar, Samir Tata:
A verification and deployment approach for elastic component-based applications. Formal Aspects Comput. 29(6): 987-1011 (2017) - [j16]Amel Mammar, Thi Mai Nguyen, Régine Laleau:
A formal approach to derive an aspect oriented programming-based implementation of a secure access control filter. Inf. Softw. Technol. 92: 158-178 (2017) - [j15]Amel Mammar, Régine Laleau:
Modeling a landing gear system in Event-B. Int. J. Softw. Tools Technol. Transf. 19(2): 167-186 (2017) - [j14]Mohamed Graiet, Amel Mammar, Souha Boubaker, Walid Gaaloul:
Towards Correct Cloud Resource Allocation in Business Processes. IEEE Trans. Serv. Comput. 10(1): 23-36 (2017) - [c37]Nghi Huynh, Marc Frappier, Amel Mammar, Régine Laleau:
Verification of SGAC Access Control Policies Using Alloy and ProB. HASE 2017: 120-123 - [c36]Steve Tueno, Regine Laleau, Amel Mammar, Marc Frappier:
Towards Using Ontologies for Domain Modeling within the SysML/KAOS Approach. RE Workshops 2017: 1-5 - [i2]Steve Tueno, Régine Laleau, Amel Mammar, Marc Frappier:
The SysML/KAOS Domain Modeling Approach. CoRR abs/1710.00903 (2017) - [i1]Steve Tueno, Régine Laleau, Amel Mammar, Marc Frappier:
Formal Representation of SysML/KAOS Domain Model (Complete Version). CoRR abs/1712.07406 (2017) - 2016
- [j13]Mohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane:
An automated approach for merging business process fragments. Comput. Ind. 82: 104-118 (2016) - [j12]Nghi Huynh, Marc Frappier, Amel Mammar, Régine Laleau, Jules Desharnais:
A formal validation of the RBAC ANSI 2012 standard using B. Sci. Comput. Program. 131: 76-93 (2016) - [c35]Souha Boubaker, Amel Mammar, Mohamed Graiet, Walid Gaaloul:
Formal Verification of Cloud Resource Allocation in Business Processes Using Event-B. AINA 2016: 746-753 - [c34]Amel Mammar, Thi Mai Nguyen, Régine Laleau:
Formal Development of a Secure Access Control Filter. HASE 2016: 173-180 - [c33]Souha Boubaker, Amel Mammar, Mohamed Graiet, Walid Gaaloul:
A Formal Guidance Approach for Correct Process Configuration. ICSOC 2016: 483-498 - [c32]Souha Boubaker, Amel Mammar, Mohamed Graiet, Walid Gaaloul:
An Event-B Based Approach for Ensuring Correct Configurable Business Processes. ICWS 2016: 460-467 - [c31]Amel Mammar, Régine Laleau:
On the Use of Domain and System Knowledge Modeling in Goal-Based Event-B Specifications. ISoLA (1) 2016: 325-339 - [c30]Nghi Huynh, Marc Frappier, Herman Pooda, Amel Mammar, Regine Laleau:
SGAC: A patient-centered access control method. RCIS 2016: 1-12 - [c29]Thi Mai Nguyen, Amel Mammar, Regine Laleau, Samir Hameg:
A tool for the generation of a secure access control filter. RCIS 2016: 1-12 - 2015
- [j11]Amel Mammar, Marc Frappier:
Proof-based verification approaches for dynamic properties: application to the information system domain. Formal Aspects Comput. 27(2): 335-374 (2015) - 2014
- [c28]Mohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane:
Formal Approach for Generating Privacy Preserving User Requirements-Based Business Process Fragments. ACSC 2014: 89-98 - [c27]Amel Mammar, Régine Laleau:
A Proved Approach for Building Correct Instances of UML Associations: Multiplicities Satisfaction. APSEC (1) 2014: 438-445 - [c26]Amel Mammar, Régine Laleau:
Modeling a Landing Gear System in Event-B. ABZ (Case Study) 2014: 80-94 - [c25]Nghi Huynh, Marc Frappier, Amel Mammar, Régine Laleau, Jules Desharnais:
Validating the RBAC ANSI 2012 Standard Using B. ABZ 2014: 255-270 - [c24]Amel Mammar, Marc Frappier:
Verifying the Precedence Property Pattern Using the B Method. HASE 2014: 229-233 - [c23]Mohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane:
A Behavior-Aware Systematic Approach for Merging Business Process Fragments. ICECCS 2014: 194-197 - [c22]Mohamed Anis Zemni, Nejib Ben Hadj-Alouane, Amel Mammar:
Business Process Fragments Behavioral Merge. OTM Conferences 2014: 112-129 - [c21]Fama Diagne, Amel Mammar, Marc Frappier:
A Tool for Verifying Dynamic Properties in B. SEFM 2014: 290-295 - 2013
- [c20]Mohamed Anis Zemni, Nejib Ben Hadj-Alouane, Amel Mammar:
Process Decomposition Based on Semantics and Privacy-Aware Requirements-Driven Approach. iiWAS 2013: 654 - 2012
- [j10]Natalia Kushik, Amel Mammar, Ana R. Cavalli, Nina Yevtushenko, Willy Jimenez, Edgardo Montes de Oca:
A SPIN-based approach for detecting vulnerabilities in C programs. Autom. Control. Comput. Sci. 46(7): 379-386 (2012) - [j9]Amel Mammar, Wissam Mallouli, Ana R. Cavalli:
A systematic approach to integrate common timed security rules within a TEFSM-based system specification. Inf. Softw. Technol. 54(1): 87-98 (2012) - [j8]Nahid Shahmehri, Amel Mammar, Edgardo Montes de Oca, David Byers, Ana R. Cavalli, Shanai Ardi, Willy Jimenez:
An advanced approach for modeling and detecting software vulnerabilities. Inf. Softw. Technol. 54(9): 997-1013 (2012) - [c19]Amel Mammar, Marc Frappier, Raphaël Chane-Yack-Fa:
Proving the Absence Property Pattern Using the B Method. HASE 2012: 167-170 - [c18]Marc Frappier, Amel Mammar:
An Assertions-Based Approach to Verifying the Absence Property Pattern. ISSRE 2012: 361-370 - 2011
- [j7]Wissam Mallouli, Amel Mammar, Ana R. Cavalli, Willy Jimenez:
VDC-Based Dynamic Code Analysis: Application to C Programs. J. Internet Serv. Inf. Secur. 1(2/3): 4-20 (2011) - [c17]Marc Frappier, Amel Mammar:
Proving Non-interference on Reachability Properties: A Refinement Approach. APSEC 2011: 25-32 - [c16]Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, Gouenou Coatrieux, Ana R. Cavalli, Amel Mammar:
Using Requirements Engineering in an Automatic Security Policy Derivation Process. DPM/SETOP 2011: 155-172 - [c15]Amel Mammar, Ana R. Cavalli, Willy Jimenez, Wissam Mallouli, Edgardo Montes de Oca:
Using Testing Techniques for Vulnerability Detection in C Programs. ICTSS 2011: 80-96 - [c14]Amel Mammar:
An overview of a proof-based approach to detecting C vulnerabilities. SAC 2011: 1343-1344 - [c13]Amel Mammar, Marc Frappier, Fama Diagne:
A proof-based approach to verifying reachability properties. SAC 2011: 1651-1657 - [c12]Marc Frappier, Fama Diagne, Amel Mammar:
Proving Reachability in B using Substitution Refinement. B@FM 2011: 47-56
2000 – 2009
- 2009
- [j6]Amel Mammar:
A systematic approach to generate B preconditions: application to the database domain. Softw. Syst. Model. 8(3): 385-401 (2009) - [c11]Wissam Mallouli, Amel Mammar, Ana R. Cavalli:
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification. APSEC 2009: 489-496 - [p1]Amel Mammar, Régine Laleau:
UB2SQL. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 1168-1188 - 2008
- [j5]Amel Mammar, Régine Laleau:
Implémentation JAVA d'une spAcification B. Application aux bases de données. Tech. Sci. Informatiques 27(5): 537-570 (2008) - [c10]Wissam Mallouli, Amel Mammar, Ana R. Cavalli:
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines. DS-RT 2008: 173-180 - 2006
- [j4]Amel Mammar, Régine Laleau:
A formal approach based on UML and B for the specification and development of database applications. Autom. Softw. Eng. 13(4): 497-528 (2006) - [j3]Amel Mammar, Régine Laleau:
From a B formal specification to an executable code: application to the relational database domain. Inf. Softw. Technol. 48(4): 253-279 (2006) - [j2]Amel Mammar, Régine Laleau:
UB2SQL: A Tool for Building Database Applications Using UML and B Formal Method. J. Database Manag. 17(4): 70-89 (2006) - [c9]Amel Mammar, Frédéric Gervais, Régine Laleau:
Systematic Identification of Preconditions from Set-Based Integrity Constraints. INFORSID 2006: 595-610 - [c8]Nicolas Guelfi, Amel Mammar:
A formal framework to generate XPDL specifications from UML activity diagrams. SAC 2006: 1224-1231 - [c7]Amel Mammar:
A Formal Approach and its Tool Support for the Specification and the Verification of Structural Properties on UML Activity Diagrams. Software Engineering Research and Practice 2006: 988-994 - 2005
- [c6]Nicolas Guelfi, Amel Mammar:
A Formal Semantics of Timed Activity Diagrams and its PROMELA Translation. APSEC 2005: 283-290 - [c5]Amel Mammar, Sophie Ramel, Bertrand Grégoire, Michael Schmitt, Nicolas Guelfi:
Efficient: A Toolset for Building Trusted B2B Transactions. CAiSE 2005: 430-445 - 2003
- [c4]Amel Mammar, Régine Laleau:
Design of an Automatic Prover Dedicated to the Refinement of Database Applications. FME 2003: 834-854 - 2001
- [j1]Amel Mammar:
Développement formel par raffinement d'applications bases de données sûres. Ingénierie des Systèmes d Inf. 6(2): 41-72 (2001) - [c3]Amel Mammar:
Une Approche Formelle par Raffinement pour le Développement d'Applications Bases de Données Sûres. INFORSID 2001: 319-339 - 2000
- [c2]Régine Laleau, Amel Mammar:
An Overview of a Method and Its Support Tool for Generating B Specifications from UML Notations. ASE 2000: 269-272 - [c1]Régine Laleau, Amel Mammar:
A Generic Process to Refine a B Specification into a Relational Database Implementation. ZB 2000: 22-41
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint