selected publications
-
academic article
- A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems. . 2024
- A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access. 11:43925-43944. 2023
- Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. EURASIP Journal on Wireless Communications and Networking. 2022. 2022
- Special issue on information systems quality for digital transformation. Software Quality Journal. 30:953-954. 2022
- Switched-Based Resilient Control of Cyber-Physical Systems. IEEE Access. 8:212194-212208. 2020
- Guest Editorial: Special issue on Testing Software and Systems. Software Quality Journal. 27:497-499. 2019
- A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. The Computer Journal. 61:1109-1122. 2018
- Modeling OMG SMM metrics using the Modelio modeling tool in the MEASURE project. HAL (Le Centre pour la Communication Scientifique Directe). 2017
- Special issue on formal active and passive testing of distributed and networked systems. Annals of Telecommunications. 70:83-84. 2015
- Parallel composition of nondeterministic Finite State Machines with Timeouts. . 2014
- A study of Intrusion-tolerant routing in Wireless Sensor Networks. Proceedings of the Institute for System Programming of RAS. 26:99-110. 2014
- Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study. arXiv (Cornell University). 2014
- A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks. Mobile Networks and Applications. 19:101-120. 2013
- Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols. Computer Networks. 57:2992-3008. 2013
- Generating attack scenarios for the system security validation. Networking Science. 2:69-80. 2012
- A SPIN-based approach for detecting vulnerabilities in C programs. Automatic Control and Computer Sciences. 46:379-386. 2012
- A systematic approach to integrate common timed security rules within a TEFSM-based system specification. Information and Software Technology. 54:87-98. 2011
- InRob: An approach for testing interoperability and robustness of real-time embedded software. Journal of Systems and Software. 85:3-15. 2011
- Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security. . 2010
- Un Mécanisme de Synchronisation pour les Réseaux Sans Fil Multi-Sauts. . 2007
- Un Modèle de validation pour le protocole de routage DSR. . 2005
- Application of a formal testing methodology to wireless telephony networks. Journal of the Brazilian Computer Society. 10:56-72. 2004
- Application of a formal testing methodology to wireless telephony networks. Journal of the Brazilian Computer Society. 10:64-80. 2004
-
blog posting
- Cyber-Resilience Approaches for Cyber-Physical Systems. arXiv (Cornell University). 2023
-
book
-
chapter
- Digital Twin for IoT Environments: A Testing and Simulation Tool. Communications in computer and information science. 205-219. 2022
- From Formal Test Objectives to TTCN-3 for Verifying ETCS Complex Software Control Systems. Communications in computer and information science. 156-178. 2020
- Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms. Lecture notes in computer science. 270-278. 2019
- Multimedia Quality of Experience. IGI Global eBooks. 999-1034. 2017
- A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory. Lecture notes in computer science. 169-182. 2017
- Symbolic-Based Monitoring for Embedded Applications. Human computer interaction.. 939-961. 2015
- Multimedia Quality of Experience. Advances in multimedia and interactive technologies book series. 250-284. 2015
- A Formal Approach to Automatic Testing of Security Policies Specified in XACML. Lecture notes in computer science. 367-374. 2015
- A Survey on Wireless Sensors Networks Security Based on a Layered Approach. Lecture notes in computer science. 77-93. 2015
- An Abstraction for the Interoperability Analysis of Security Policies. Lecture notes in computer science. 418-427. 2015
- Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses. Lecture notes in computer science. 33-47. 2012
- Modeling and testing secure web applications. HAL (Le Centre pour la Communication Scientifique Directe). 2010
- A Statistical Approach to Test Stochastic and Probabilistic Systems. Lecture notes in computer science. 186-205. 2009
- Modeling, Validation, and Verification of PCEP Using the IF Language. Lecture notes in computer science. 122-136. 2009
- A Reactive Wireless Mesh Network Architecture. IFIP International Federation for Information Processing/IFIP. 203-214. 2008
- Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking. Lecture notes in computer science. 345-356. 2008
- Security in Ad Hoc Networks. Signals and communication technology. 211-249. 2006
-
conference paper
- Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment. Proceedings of the 17th International Conference on Availability, Reliability and Security. 1-9. 2024
- Testing techniques to assess impact and cascading effects. . 269-272. 2023
- Cybersecurity, Monitoring, Explainability and Resilience. . 1-7. 2023
- Program. . 1-7. 2023
- Welcome Message from the General Co-Chairs. . 1-1. 2023
- A Cyber Digital Twin Framework to Support Cyber-Physical Systems Security. . 1-10. 2023
- HTTP/2 Attacks Generation using 5Greplay. Proceedings of the 17th International Conference on Availability, Reliability and Security. 1-7. 2023
- Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection. . 510-517. 2023
- Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper). . 2022
- A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. . 234-241. 2022
- 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. Proceedings of the 17th International Conference on Availability, Reliability and Security. 1-8. 2021
- A Framework for Security Monitoring of Real IoT Testbeds. . 645-652. 2021
- A Framework for Security Monitoring of Real IoT Testbeds. . 645-652. 2021
- A Methodology for Enterprise Resource Planning Automation Testing Application to the Open Source ERP-ODOO. . 407-415. 2019
- Verifying Complex Software Control Systems from Test Objectives: Application to the ETCS System. . 397-406. 2019
- Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion. . 154-165. 2018
- Decreasing the complexity of deriving test suites against nondeterministic finite state machines. . 1-4. 2017
- An Attack-Tolerant Framework for Web Services. . 503-506. 2017
- Monitoring techniques in practice: experiences and lessons learned. . 2016
- Path sampling, a robust alternative to gossiping for opportunistic network routing. . 1-8. 2016
- A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks. . 230-237. 2016
- Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State Machines. . 315-322. 2016
- A Misbehavior Node Detection Algorithm for 6LoWPAN Wireless Sensor Networks. . 49-54. 2016
- NetMM 2016 Organizing Committee and Reviewers. . lxi-lxi. 2016
- Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers. . 147-154. 2016
- A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks. . 6-12. 2015
- Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol. . 69-72. 2015
- Process Mining for Trust Monitoring. . 605-610. 2015
- A Framework for Distributed Testing of Timed Composite Systems. . 47-54. 2014
- On modeling and testing components of the European Train Control System. . 2014
- Performance evaluation of video transmission over 802.11n wireless network: A MAC layer perspective. . 1-6. 2014
- Extended Finite State Machine based Test Derivation Strategies for Telecommunication Protocols. Proceedings of the Spring/Summer young researchers' colloquium on software engineering. 2014
- Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case Study. . 1-10. 2013
- A vector based model approach for defining trust in Multi-Organization Environments. . 1-8. 2012
- How to Reduce the Cost of Passive Testing. . 209-216. 2012
- Verification of Interoperability Security Policies by Model Checking. . 376-381. 2011
- FSM-Based Test Derivation Strategies for Systems with Time-Outs. . 141-149. 2011
- Detection of Attacks in Wireless Mesh Networks. . 45-54. 2011
- Cost effective cross-layer protocol testing : a case study. HAL (Le Centre pour la Communication Scientifique Directe). 2011
- Route Manipulation Attack in Wireless Mesh Networks. . 501-508. 2011
- A Formal Approach for Interoperability Testing of Security Rules. . 277-284. 2010
- Transmit and Reserve (TAR): A Coordinated Channel Access for IEEE 802.11 Networks. . 1-6. 2010
- Analysis of the OLSR Protocol by Using Formal Passive Testing. . 152-159. 2009
- Software vulnerabilities, prevention and detection methods : a review. . 2009
- Security Protocol Testing Using Attack Trees. . 690-697. 2009
- ReDEx : Receiver Diversity Exploitation mechanism for 802.11 wireless networks. . 2008
- Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study. . 128-136. 2008
- Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines. . 173-180. 2008
- Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints. . 315-318. 2008
- Une approche de test de robustesse basée sur l'injection de fautes et le monitorage. . 2008
- An Enhanced Passive Testing Approach for Network Protocols. . 169-169. 2006
- Working Around BGP: An Improvement of BGP Session Maintenance. . 41-41. 2006
- A validation model for the DSR protocol. . 2004
- Secure hosts auto-configuration in mobile ad hoc networks. . 809-814. 2004
- An automatic and optimized test generation technique applying to TCP/IP protocol. . 73-80. 2003
- Partial validation of a design specification with respect to requirements. . 131-140. 2002
- A service-component testing method and a suitable CORBA architecture. . 655-660. 2002
-
document
- Testing Software and Systems. . 2022
- Security in Ad Hoc Networks. . 475-524. 2009