Ana R. Cavalli
Orcid: 0000-0003-2586-9071Affiliations:
- Montimage, Paris, France
- Telecom SudParis, SAMOVAR, Évry, France
According to our database1,
Ana R. Cavalli
authored at least 230 papers
between 1984 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Comput. Surv., August, 2024
Proceedings of the 19th International Conference on Software Technologies, 2024
The SPATIAL Architecture: Design and Development Experiences from Gauging and Monitoring the AI Inference Capabilities of Modern Applications.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
IEEE Access, 2023
Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection.
Proceedings of the 18th International Conference on Software Technologies, 2023
Proceedings of the Fourteenth International Conference on Mobile Computing and Ubiquitous Network, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Softw. Qual. J., 2022
Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications.
EURASIP J. Wirel. Commun. Netw., 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the Quality of Information and Communications Technology, 2022
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022
Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper).
Proceedings of the 15th IEEE International Conference on Software Testing, 2022
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic.
Proceedings of the 17th International Conference on Software Technologies, 2022
2021
Proceedings of the 14th IEEE International Conference on Software Testing, 2021
Proceedings of the 16th International Conference on Software Technologies, 2021
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
Proceedings of the 15th International Conference on Software Technologies, 2020
2019
Softw. Qual. J., 2019
A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication.
Int. J. Auton. Adapt. Commun. Syst., 2019
Proceedings of the Testing Software and Systems, 2019
Proceedings of the Testing Software and Systems, 2019
A Methodology for Enterprise Resource Planning Automation Testing Application to the Open Source ERP-ODOO.
Proceedings of the 14th International Conference on Software Technologies, 2019
From Formal Test Objectives to TTCN-3 for Verifying ETCS Complex Software Control Systems.
Proceedings of the Software Technologies - 14th International Conference, 2019
Verifying Complex Software Control Systems from Test Objectives: Application to the ETCS System.
Proceedings of the 14th International Conference on Software Technologies, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
2018
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System.
Comput. J., 2018
Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection.
Proceedings of the Web Services - ICWS 2018, 2018
Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion.
Proceedings of the 13th International Conference on Software Technologies, 2018
Proceedings of the Software Technologies - 13th International Conference, 2018
A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper).
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
2017
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the 12th International Conference on Software Technologies, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Decreasing the complexity of deriving test suites against nondeterministic finite state machines.
Proceedings of the 2017 IEEE East-West Design & Test Symposium, 2017
Proceedings of the Perspectives of System Informatics, 2017
Proceedings of the Risks and Security of Internet and Systems, 2017
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017
2016
Int. J. Softw. Tools Technol. Transf., 2016
Int. J. Auton. Adapt. Commun. Syst., 2016
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016
Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State Machines.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
Proceedings of the 2016 IEEE East-West Design & Test Symposium, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
Int. J. Space Based Situated Comput., 2015
Ann. des Télécommunications, 2015
Special issue on formal active and passive testing of distributed and networked systems.
Ann. des Télécommunications, 2015
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol.
Proceedings of the 2015 Latin American Network Operations and Management Symposium, 2015
Proceedings of the 2015 IEEE International Conference on Web Services, 2015
A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks.
Mob. Networks Appl., 2014
Int. J. Secur. Softw. Eng., 2014
QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches.
Int. J. Organ. Collect. Intell., 2014
Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study.
CoRR, 2014
Proceedings of the WEBIST 2014, 2014
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
Testing Network Protocols: formally, at runtime and online.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
Proceedings of the 9th International Conference on the Quality of Information and Communications Technology, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Estimation of video QoE from MAC parameters in wireless network: A Random Neural Network approach.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
Proceedings of the Actes du XXXIIème Congrès INFORSID, Lyon, France, 20-23 Mai 2014., 2014
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols.
Comput. Networks, 2013
Trust Ontology Based on Access Control Parameters in Multi-organization Environments.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the 2013 13th International Conference on Quality Software, 2013
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case Study.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
Applying formal methods to PCEP: an industrial case study from modeling to test generation.
Softw. Test. Verification Reliab., 2012
InRob: An approach for testing interoperability and robustness of real-time embedded software.
J. Syst. Softw., 2012
Tight bound on the length of distinguishing sequences for non-observable nondeterministic Finite-State Machines with a polynomial number of inputs and outputs.
Inf. Process. Lett., 2012
Inf. Softw. Technol., 2012
A systematic approach to integrate common timed security rules within a TEFSM-based system specification.
Inf. Softw. Technol., 2012
Autom. Control. Comput. Sci., 2012
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012
Testing Interoperability Security Policies.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
An IOSTS Based Passive Testing Approach for the Validation of Data-Centric Protocols.
Proceedings of the 2012 12th International Conference on Quality Software, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
2011
J. Internet Serv. Inf. Secur., 2011
Proceedings of the Wired/Wireless Internet Communications, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 11th International Conference on Quality Software, 2011
Proceedings of the Testing Software and Systems, 2011
Proceedings of the 5th Latin-American Symposium on Dependable Computing, 2011
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
FSM-based conformance testing methods: A survey annotated with experimental evaluation.
Inf. Softw. Technol., 2010
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010
Proceedings of the Testing, 2010
Proceedings of the Sixth International Conference on Signal-Image Technology and Internet-Based Systems, 2010
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010
Proceedings of the Quality of Information and Communications Technology, 2010
Proceedings of the IEEE International Conference on Web Services, 2010
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition.
Proceedings of the IEEE International Conference on Web Services, 2010
2009
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009
Network protocol interoperability testing based on contextual signatures and passive testing.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Observability and Controllability Issues in Conformance Testing of Web Service Compositions.
Proceedings of the Testing of Software and Communication Systems, 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the ASE 2009, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the Formal Methods and Software Engineering, 2009
Proceedings of the Formal Techniques for Distributed Systems, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009
2008
A formal validation methodology for MANET routing protocols based on nodes' self similarity.
Comput. Commun., 2008
Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Proceedings of the Advances in Ad Hoc Networking, 2008
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008
Use of invariant properties to evaluate the results of fault-injection-based robustness testing of protocol implementations.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the ECOWS 2008, 2008
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2007
2006
Proceedings of the Testing of Communicating Systems, 2006
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006
Proceedings of the 14th IEEE International Conference on Networks, 2006
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Parallel Passive Testing of System Protocols - Towards a Real-time Exhaustive Approach.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
2005
Comput. Networks, 2005
Une plate-forme de validation multi-protocoles et multi-services - résultats d'expérimentation.
Ann. des Télécommunications, 2005
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005
Proceedings of the Testing of Communicating Systems, 2005
Proceedings of the Automated Technology for Verification and Analysis, 2005
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005
2004
J. Braz. Comput. Soc., 2004
Proceedings of the International Workshop on Test and Analysis of Component Based Systems, 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the Testing of Communicating Systems, 16th IFIP International Conerence, 2004
Proceedings of the EDUTECH, 2004
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004
Network Protocol System Passive Testing for Fault Management: A Backward Checking Approach.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2004
2003
Softw. Test. Verification Reliab., 2003
New approaches for passive testing using an Extended Finite State Machine specification.
Inf. Softw. Technol., 2003
Proceedings of the Testing of Communicating Systems, 15th IFIP International Conference, 2003
Proceedings of the Testing of Communicating Systems, 15th IFIP International Conference, 2003
2002
Fault Detection within a Component of a System of Communicating FSMs.
Proceedings of the Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems, 2002
Automated Generation of Interoperability Tests.
Proceedings of the Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems, 2002
Proceedings of the Formal Methods and Software Engineering, 2002
2001
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001
A Conformance Testing Method for Communication Protocols Modeled as Concurrent DFSMs.
Proceedings of the 15th International Conference on Information Networking, 2001
Proceedings of the 2nd Asia-Pacific Conference on Quality Software (APAQS 2001), 2001
2000
Fault Detection Power of a Widely Used Test Suite for a System of Communicating FSMs.
Proceedings of the Testing of Communicating Systems: Tools and Techniques, IFIP TC6/WG6.1 13<sup>th</sup> International Conference on Testing Communicating Systems (TestCom 2000), August 29, 2000
1999
Test Suite Minimization for Embedded Nondeterministic Finite State Machines.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999
Generating Test Cases for a Timed I/O Automaton Model.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999
Different Approaches to Protocol and Service Testing.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999
Proceedings of the 14th IEEE International Conference on Automated Software Engineering, 1999
Hit-or-Jump: An algorithm for embedded testing with applications to IN services.
Proceedings of the Formal Methods for Protocol Engineering and Distributed Systems, 1999
Proceedings of the FM'99 - Formal Methods, 1999
1998
Test Suite Minimization for Testing in Context.
Proceedings of the Testing of Communicating Systems, IFIP TC6 11th International Workshop on Testing Communicating Systems (IWTCS), August 31, 1998
Proceedings of the Second IEEE International Conference on Formal Engineering Methods, 1998
1997
Test generation for the SSCOP-ATM networks protocol.
Proceedings of the SDL '97 Time for Testing, 1997
1996
Comput. Networks ISDN Syst., 1996
1994
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994
A modal based verification for LOTOS.
Proceedings of the Formal Description Techniques VII, 1994
1993
Formal Methods for Conformance Testing: Results and Perspectives.
Proceedings of the Protocol Test Systems, 1993
Improving Conformance Testing for LOTOS.
Proceedings of the Formal Description Techniques, VI, Proceedings of the IFIP TC6/WG6.1 Sixth International Conference on Formal Description Techniques, 1993
1992
Automated Protocol Conformance Test Generation Based on Formal Methods for LOTOS Specifications.
Proceedings of the Protocol Test Systems, V, 1992
1991
Protocol Conformance Test Generation Using a Graph Rewriting System.
Proceedings of the Protocol Test Systems, IV, 1991
1988
Exhaustive Analysis and Simulation for Distributed Systems, both Sides of the Same Coin.
Distributed Comput., 1988
1987
Proof of Specification Properties by Using Finite State Machines and Temporal Logic.
Proceedings of the Protocol Specification, 1987
1984
Comput. Commun. Rev., 1984
Temporal Logic Specification of a Virtual Ring LAN Access Protocol.
Proceedings of the Protocol Specification, 1984
Proceedings of the International Symposium on Programming, 1984
Proceedings of the 7th International Conference on Automated Deduction, 1984