selected publications
-
academic article
- Modeling and Verifying an Arrival Manager using the formal Event-B Method. . 2025
- An Event-B model of an automotive adaptive exterior light system. International Journal on Software Tools for Technology Transfer. 26:331-346. 2024
- A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard. International Journal on Software Tools for Technology Transfer. 22:333-347. 2019
- Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach. International Journal on Software Tools for Technology Transfer. 22:349-363. 2019
- Intrusion Detection Systems: A Cross-Domain Overview. IEEE Communications Surveys & Tutorials. 21:3639-3681. 2019
- Towards correct cloud resource allocation in FOSS applications. Future Generation Computer Systems. 91:392-406. 2018
- A formal approach to derive an aspect oriented programming-based implementation of a secure access control filter. Information and Software Technology. 92:158-178. 2017
- An automated approach for merging business process fragments. Computers in Industry. 82:104-118. 2016
- Modeling a landing gear system in Event-B. International Journal on Software Tools for Technology Transfer. 19:167-186. 2015
- A SPIN-based approach for detecting vulnerabilities in C programs. Automatic Control and Computer Sciences. 46:379-386. 2012
- A systematic approach to integrate common timed security rules within a TEFSM-based system specification. Information and Software Technology. 54:87-98. 2011
-
blog posting
- The Generic SysML/KAOS Domain Metamodel.. arXiv (Cornell University). 2018
-
chapter
- An Event-B Model of a Mechanical Lung Ventilator. Lecture notes in computer science. 307-323. 2024
- Proving Local Invariants in ASTDs. Lecture notes in computer science. 228-246. 2023
- Integrating Domain Modeling Within a Formal Requirements Engineering Method. Springer eBooks. 39-58. 2020
- An Event-B Model of an Automotive Adaptive Exterior Light System. Lecture notes in computer science. 351-366. 2020
- Intrusion Detection Using ASTDs. Advances in intelligent systems and computing. 1397-1411. 2020
- Modeling of a Speed Control System Using Event-B. Lecture notes in computer science. 367-381. 2020
- Modelling Hybrid Programs with Event-B. Lecture notes in computer science. 139-154. 2020
- An Event-B Model of the Hybrid ERTMS/ETCS Level 3 Standard. Lecture notes in computer science. 353-366. 2018
- Modeling the Hybrid ERTMS/ETCS Level 3 Standard Using a Formal Requirements Engineering Approach. Lecture notes in computer science. 262-276. 2018
- A Formal Guidance Approach for Correct Process Configuration. Lecture notes in computer science. 483-498. 2016
- On the Use of Domain and System Knowledge Modeling in Goal-Based Event-B Specifications. Lecture notes in computer science. 325-339. 2016
- Business Process Fragments Behavioral Merge. Lecture notes in computer science. 112-129. 2014
- Modeling a Landing Gear System in Event-B. Communications in computer and information science. 80-94. 2014
- Démonstration de la sécurité d'une application de signalisation en mode nominal et en modes dégradés par la preuve formelle. HAL (Le Centre pour la Communication Scientifique Directe). 2012
- Using Requirements Engineering in an Automatic Security Policy Derivation Process. Lecture notes in computer science. 155-172. 2012
- Using Testing Techniques for Vulnerability Detection in C Programs. Lecture notes in computer science. 80-96. 2011
- Modeling and testing secure web applications. HAL (Le Centre pour la Communication Scientifique Directe). 2010
-
conference paper
- A Tool-Supported Approach for Modeling and Verifying Hybrid Systems using EVENT-B and the Differential Equation Solver SAGEMATH. . 71-83. 2023
- Back Propagating B System Updates on SysML/KAOS Domain Models. . 160-169. 2018
- Extended Algebraic State-Transition Diagrams. . 146-155. 2018
- Towards Using Ontologies for Domain Modeling within the SysML/KAOS Approach. . 1-5. 2017
- Verification of SGAC Access Control Policies Using Alloy and ProB. . 120-123. 2017
- A tool for the generation of a secure access control filter. . 1-12. 2016
- An Event-B Based Approach for Ensuring Correct Configurable Business Processes. . 460-467. 2016
- Formal Verification of Cloud Resource Allocation in Business Processes Using Event-B. . 746-753. 2016
- Formal Development of a Secure Access Control Filter. . 173-180. 2016
- A Proved Approach for Building Correct Instances of UML Associations: Multiplicities Satisfaction. . 438-445. 2014
- A Behavior-Aware Systematic Approach for Merging Business Process Fragments. . 194-197. 2014
- Formal approach for generating privacy preserving user requirements-based business process fragments. . 2014
- Verifying the Precedence Property Pattern Using the B Method. . 229-233. 2014
- Process Decomposition Based on Semantics and Privacy-Aware Requirements-Driven Approach. . 654-657. 2013
- Proving the Absence Property Pattern Using the B Method. . 167-170. 2012
- Proving Non-interference on Reachability Properties: A Refinement Approach. . 25-32. 2011
- An overview of a proof-based approach to detecting C vulnerabilities. . 1343-1344. 2011
- A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification. . 489-496. 2009
- Software vulnerabilities, prevention and detection methods : a review. . 2009
- Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines. . 173-180. 2008
-
document
-
report