Wissam Mallouli
Wissam Mallouli
Montimage
Bestätigte E-Mail-Adresse bei montimage.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A formal approach for testing security rules
W Mallouli, JM Orset, A Cavalli, N Cuppens, F Cuppens
Proceedings of the 12th ACM symposium on Access control models and …, 2007
612007
Timed extended invariants for the passive testing of web services
G Morales, S Maag, A Cavalli, W Mallouli, EM De Oca, B Wehbi
2010 IEEE International Conference on Web Services, 592-599, 2010
552010
Two complementary tools for the formal testing of distributed systems with time constraints
AR Cavalli, EM De Oca, W Mallouli, M Lallali
2008 12th IEEE/ACM International Symposium on Distributed Simulation and …, 2008
552008
Webmov: A dedicated framework for the modelling and testing of web services composition
A Cavalli, TD Cao, W Mallouli, E Martins, A Sadovykh, S Salva, F Zaidi
2010 IEEE International Conference on Web Services, 377-384, 2010
332010
Security rules specification and analysis based on passive testing
W Mallouli, F Bessayah, A Cavalli, A Benameur
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
272008
Online network traffic security inspection using mmt tool
W Mallouli, B Wehbi, EM de Oca, M Bourdelles
System testing and validation 192, 2012
262012
QoE estimation for web service selection using a fuzzy-rough hybrid expert system
J Pokhrel, F Lalanne, A Cavalli, W Mallouli
2014 IEEE 28th International Conference on Advanced Information Networking …, 2014
232014
A passive testing approach for security checking and its practical usage for web services monitoring
AR Cavalli, A Benameur, W Mallouli, K Li
NOTERE 2009: 9e Conférence Internationale sur Les NOuvelles TEchnologies de …, 2009
222009
Towards a security monitoring plane for named data networking and its application against content poisoning attack
HL Mai, T Nguyen, G Doyen, R Cogranne, W Mallouli, EM de Oca, ...
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018
182018
A security monitoring system for internet of things
V Casola, A De Benedictis, A Riccio, D Rivera, W Mallouli, EM de Oca
Internet of Things 7, 100080, 2019
162019
SLA-driven monitoring of multi-cloud application components using the MUSA framework
E Rios, W Mallouli, M Rak, V Casola, AM Ortiz
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
162016
Multi-cloud applications security monitoring
P Carvallo, AR Cavalli, W Mallouli, E Rios
International Conference on Green, Pervasive, and Cloud Computing, 748-758, 2017
152017
Light client management protocol for wireless mesh networks
B Wehbi, W Mallouli, A Cavalli
7th International Conference on Mobile Data Management (MDM'06), 123-123, 2006
152006
A security monitoring plane for named data networking deployment
T Nguyen, HL Mai, G Doyen, R Cogranne, W Mallouli, EM De Oca, ...
IEEE Communications Magazine 56 (11), 88-94, 2018
142018
Service level agreement-based GDPR compliance and security assurance in (multi) cloud-based systems
E Rios, E Iturbe, X Larrucea, M Rak, W Mallouli, J Dominiak, V Muntés, ...
IET Software 13 (3), 213-222, 2019
132019
Using testing techniques for vulnerability detection in C programs
A Mammar, A Cavalli, W Jimenez, W Mallouli, EM de Oca
IFIP International Conference on Testing Software and Systems, 80-96, 2011
132011
An effective attack detection approach in wireless mesh networks
FB Abreu, A Morais, A Cavalli, B Wehbi, EM Oca, W Mallouli
International Journal of Space-Based and Situated Computing 5 (2), 89-99, 2015
122015
QoE prediction for multimedia services: Comparing fuzzy and logic network approaches
N Kushik, J Pokhrel, N Yevtushenko, A Cavalli, W Mallouli
International Journal of Organizational and Collective Intelligence (IJOCI …, 2014
122014
Modeling and testing secure web-based systems: application to an industrial case study
W Mallouli, M Lallali, G Morales, AR Cavalli
2008 IEEE International Conference on Signal Image Technology and Internet …, 2008
122008
Reliable detection of interest flooding attack in real deployment of named data networking
T Nguyen, HL Mai, R Cogranne, G Doyen, W Mallouli, L Nguyen, ...
IEEE Transactions on Information Forensics and Security 14 (9), 2470-2485, 2019
112019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20