Wissam Mallouli
Wissam Mallouli
Bestätigte E-Mail-Adresse bei montimage.com - Startseite
Zitiert von
Zitiert von
A formal approach for testing security rules
W Mallouli, JM Orset, A Cavalli, N Cuppens, F Cuppens
Proceedings of the 12th ACM symposium on Access control models and …, 2007
Two complementary tools for the formal testing of distributed systems with time constraints
AR Cavalli, EM De Oca, W Mallouli, M Lallali
2008 12th IEEE/ACM International Symposium on Distributed Simulation and …, 2008
Timed extended invariants for the passive testing of web services
G Morales, S Maag, A Cavalli, W Mallouli, EM De Oca, B Wehbi
2010 IEEE International Conference on Web Services, 592-599, 2010
Webmov: A dedicated framework for the modelling and testing of web services composition
A Cavalli, TD Cao, W Mallouli, E Martins, A Sadovykh, S Salva, F Zaidi
2010 IEEE International Conference on Web Services, 377-384, 2010
Online network traffic security inspection using MMT tool
W Mallouli, B Wehbi, EM de Oca, M Bourdelles
System testing and validation 192, 2012
Security rules specification and analysis based on passive testing
W Mallouli, F Bessayah, A Cavalli, A Benameur
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
QoE estimation for web service selection using a fuzzy-rough hybrid expert system
J Pokhrel, F Lalanne, A Cavalli, W Mallouli
2014 IEEE 28th International Conference on Advanced Information Networking …, 2014
A passive testing approach for security checking and its practical usage for web services monitoring
AR Cavalli, A Benameur, W Mallouli, K Li
NOTERE 2009: 9e Conférence Internationale sur Les NOuvelles TEchnologies de …, 2009
A security monitoring system for internet of things
V Casola, A De Benedictis, A Riccio, D Rivera, W Mallouli, EM de Oca
Internet of Things 7, 100080, 2019
Towards a security monitoring plane for named data networking and its application against content poisoning attack
HL Mai, T Nguyen, G Doyen, R Cogranne, W Mallouli, EM de Oca, ...
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018
SLA-driven monitoring of multi-cloud application components using the MUSA framework
E Rios, W Mallouli, M Rak, V Casola, AM Ortiz
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Service level agreement-based GDPR compliance and security assurance in (multi) cloud-based systems
E Rios, E Iturbe, X Larrucea, M Rak, W Mallouli, J Dominiak, V Muntés, ...
IET Software 13 (3), 213-222, 2019
A security monitoring plane for named data networking deployment
T Nguyen, HL Mai, G Doyen, R Cogranne, W Mallouli, EM De Oca, ...
IEEE Communications Magazine 56 (11), 88-94, 2018
Multi-cloud applications security monitoring
P Carvallo, AR Cavalli, W Mallouli, E Rios
International Conference on Green, Pervasive, and Cloud Computing, 748-758, 2017
Light client management protocol for wireless mesh networks
B Wehbi, W Mallouli, A Cavalli
7th International Conference on Mobile Data Management (MDM'06), 123-123, 2006
Reliable detection of interest flooding attack in real deployment of named data networking
T Nguyen, HL Mai, R Cogranne, G Doyen, W Mallouli, L Nguyen, ...
IEEE Transactions on Information Forensics and Security 14 (9), 2470-2485, 2019
QoE prediction for multimedia services: Comparing fuzzy and logic network approaches
N Kushik, J Pokhrel, N Yevtushenko, A Cavalli, W Mallouli
International Journal of Organizational and Collective Intelligence (IJOCI …, 2014
Dynamic security assurance in multi-cloud DevOps
E Rios, E Iturbe, W Mallouli, M Rak
2017 IEEE Conference on Communications and Network Security (CNS), 467-475, 2017
Using testing techniques for vulnerability detection in C programs
A Mammar, A Cavalli, W Jimenez, W Mallouli, EM de Oca
IFIP International Conference on Testing Software and Systems, 80-96, 2011
Modeling and testing secure web-based systems: application to an industrial case study
W Mallouli, M Lallali, G Morales, AR Cavalli
2008 IEEE International Conference on Signal Image Technology and Internet …, 2008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20