Marc Frappier

Orcid: 0000-0002-4402-2514

According to our database1, Marc Frappier authored at least 118 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Event-B model of an automotive adaptive exterior light system.
Int. J. Softw. Tools Technol. Transf., June, 2024

Modeling of a speed control system using Event-B.
Int. J. Softw. Tools Technol. Transf., June, 2024

Impact of Inaccurate Contamination Ratio on Robust Unsupervised Anomaly Detection.
CoRR, 2024

Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation.
CoRR, 2024

Psychological Profiling in Cybersecurity: A Look at LLMs and Psycholinguistic Features.
CoRR, 2024

Modelling a Mechanical Lung Ventilation System Using TASTD.
Proceedings of the Rigorous State-Based Methods - 10th International Conference, 2024

Modeling and Verification of Solidity Smart Contracts with the B Method.
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024

Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

2023
Characterizing Financial Market Coverage using Artificial Intelligence.
CoRR, 2023

TASTD: A Real-Time Extension for ASTD.
Proceedings of the Rigorous State-Based Methods - 9th International Conference, 2023

Modelling an Automotive Software System with TASTD.
Proceedings of the Rigorous State-Based Methods - 9th International Conference, 2023

Proving Local Invariants in ASTDs.
Proceedings of the Formal Methods and Software Engineering, 2023

2022
Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems.
CoRR, 2022

A Revealing Large-Scale Evaluation of Unsupervised Anomaly Detection Algorithms.
CoRR, 2022

Development of Monitoring Systems for Anomaly Detection Using ASTD Specifications.
Proceedings of the Theoretical Aspects of Software Engineering, 2022

SCADA Radio Blackbox Reverse Engineering.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

2021
Statistical Approach For Cloud Security: Microsoft Office 365 audit logs case study.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

2020
A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard.
Int. J. Softw. Tools Technol. Transf., 2020

Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach.
Int. J. Softw. Tools Technol. Transf., 2020

Translating Alloy and extensions to classical B.
Sci. Comput. Program., 2020

Verifying SGAC Access Control Policies: A Comparison of ProB, Alloy and Z3.
Proceedings of the Rigorous State-Based Methods - 7th International Conference, 2020

Intrusion Detection Using ASTDs.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Intrusion Detection Systems: A Cross-Domain Overview.
IEEE Commun. Surv. Tutorials, 2019

SGAC: A Multi-Layered Access Control Model with Conflict Resolution Strategy.
Comput. J., 2019

A Formal Requirements Modeling Approach: Application to Rail Communication.
Proceedings of the 14th International Conference on Software Technologies, 2019

Assessment of a Formal Requirements Modeling Approach on a Transportation System.
Proceedings of the Formal Methods and Software Engineering, 2019

2018
Parameterized verification of monotone information systems.
Formal Aspects Comput., 2018

The Generic SysML/KAOS Domain Metamodel.
CoRR, 2018

From SysML/KAOS Domain Models to B System Specifications.
CoRR, 2018

Formalisation of SysML/KAOS Goal Assignments with B System Component Decompositions.
Proceedings of the Integrated Formal Methods - 14th International Conference, 2018

Extended Algebraic State-Transition Diagrams.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

Back Propagating B System Updates on SysML/KAOS Domain Models.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

An Event-B Model of the Hybrid ERTMS/ETCS Level 3 Standard.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2018

A Translation from Alloy to B.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2018

Event-B Expression and Verification of Translation Rules Between SysML/KAOS Domain Models and B System Specifications.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2018

2017
Formal Representation of SysML/KAOS Domain Model (Complete Version).
CoRR, 2017

The SysML/KAOS Domain Modeling Approach.
CoRR, 2017

Formal Specification for Ambient Assisted Living Scenarios.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2017

Towards Using Ontologies for Domain Modeling within the SysML/KAOS Approach.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017

Verification of SGAC Access Control Policies Using Alloy and ProB.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

2016
A formal validation of the RBAC ANSI 2012 standard using B.
Sci. Comput. Program., 2016

SGAC: A patient-centered access control method.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

Modelling a Hemodialysis Machine Using Algebraic State-Transition Diagrams and B-like Methods.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2016

2015
Proof-based verification approaches for dynamic properties: application to the information system domain.
Formal Aspects Comput., 2015

Formal refinement of extended state machines.
Proceedings of the Proceedings 17th International Workshop on Refinement, 2015

Model-Based Robustness Testing in Event-B Using Mutation.
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015

2014
Supervisory control theory with Alloy.
Sci. Comput. Program., 2014

Refinement patterns for ASTDs.
Formal Aspects Comput., 2014

A Tool for Verifying Dynamic Properties in B.
Proceedings of the Software Engineering and Formal Methods - 12th International Conference, 2014

Verifying the Precedence Property Pattern Using the B Method.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Validating the RBAC ANSI 2012 Standard Using B.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2014

2013
Abstract State Machines, Alloy, B and Z Selected papers from ABZ 2010.
Sci. Comput. Program., 2013

Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

2012
Refinement patterns for ASTD.
ACM SIGSOFT Softw. Eng. Notes, 2012

An Assertions-Based Approach to Verifying the Absence Property Pattern.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

A Design by Contract Approach to Verify Access Control Policies.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

Proving the Absence Property Pattern Using the B Method.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Modeling the Supervisory Control Theory with Alloy.
Proceedings of the Abstract State Machines, Alloy, B, VDM, and Z, 2012

2011
Combining UML, ASTD and B for the formal specification of an access control filter.
Innov. Syst. Softw. Eng., 2011

Enforcing ASTD Access-Control Policies with WS-BPEL Processes in SOA Environments.
Int. J. Syst. Serv. Oriented Eng., 2011

Proving Reachability in B using Substitution Refinement.
Proceedings of the B 2011 Workshop, 2011

A Four-concern-oriented Secure IS Development Approach.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A proof-based approach to verifying reachability properties.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Pervasive safety application with model checking in smart houses: The INOVUS intelligent oven.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

A Metamodel of the B Modeling of Access-Control Policies: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011

Specification and Verification of Access Control Policies in EB3SEC: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011

A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011

A SAT-Based Approach for the Construction of Reusable Control System Components.
Proceedings of the Formal Methods for Industrial Critical Systems, 2011

Expressing Access Control Policies with an Event-Based Approach.
Proceedings of the Advanced Information Systems Engineering Workshops, 2011

Proving Non-interference on Reachability Properties: A Refinement Approach.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2010
Modélisation de politiques de sécurité à l'aide d'une algèbre de processus. Présentation de la méthode EB<sup>3</sup>SEC.
Ingénierie des Systèmes d Inf., 2010

From ASTD Access Control Policies to WS-BPEL Processes Deployed in a SOA Environment.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

Distinction-based and verification-assisted knowledge modeling.
Proceedings of the Third International Workshop on Requirements Engineering and Law, 2010

Systematic Translation Rules from astd to Event-B.
Proceedings of the Integrated Formal Methods - 8th International Conference, 2010

Comparison of Model Checking Tools for Information Systems.
Proceedings of the Formal Methods and Software Engineering, 2010

Model-driven Engineering of Functional Security Policies.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 3, ISAS, Funchal, Madeira, Portugal, June 8, 2010

2009
Generating relational database transactions from eb<sup>3</sup> attribute definitions.
Softw. Syst. Model., 2009

Efficient symbolic computation of process expressions.
Sci. Comput. Program., 2009

Modélisation de politiques de sécurité à l'aide d'une algèbre de processus.
Proceedings of the Actes du XXVIIème Congrès INFORSID, Toulouse, France, 26-29 mai 2009, 2009

Automatic Generation of Error Messages for the Symbolic Execution of EB3 Process Expressions.
Proceedings of the Integrated Formal Methods, 7th International Conference, 2009

Formal Modeling for Deploying Improvement and Innovation in Information Technology.
Proceedings of the KMIS 2009 - Proceedings of the International Conference on Knowledge Management and Information Sharing, Funchal, 2009

2008
Applying CSP || B to information systems.
Softw. Syst. Model., 2008

Extending statecharts with process algebra operators.
Innov. Syst. Softw. Eng., 2008

2007
Synthesizing Information Systems: the APIS Project.
Proceedings of the First International Conference on Research Challenges in Information Science, 2007

Domain specific languages: another silver bullet?
Proceedings of the Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007

Efficient Symbolic Execution of Large Quantifications in a Process Algebra.
Proceedings of the Formal Methods and Software Engineering, 2007

Refinement of eb<sup>3</sup> Process Patterns into B Specifications.
Proceedings of the B 2007: Formal Specification and Development in B, 2007

2006
Efficient Interpretation of Large Quantifications in a Process Algebra.
Proceedings of the Modelling, 2006

EB3TG: A Tool Synthesizing Relational Database Transactions from EB3 Attribute Definitions.
Proceedings of the ICEIS 2006, 2006

2005
State-based versus event-based specifications for information systems: a comparison of B and eb<sup>3</sup>.
Softw. Syst. Model., 2005

mucROSE: automated measurement of COSMIC-FFP for Rational Rose RealTime.
Inf. Softw. Technol., 2005

How to Synthesize Relational Database Transactions From EB3 Attribute Definitions?
Proceedings of the Modelling, 2005

Generating Relational Database Transactions From Recursive Functions Defined on EB<sup>3</sup> Traces.
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005

Synthesizing B Specifications from EB<sup>3</sup> Attribute Definitions.
Proceedings of the Integrated Formal Methods, 5th International Conference, 2005

2004
How to Verify Dynamic Properties of Information Systems.
Proceedings of the 2nd International Conference on Software Engineering and Formal Methods (SEFM 2004), 2004

SMP: A Process-Driven Approach to Project Management.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Synthesis of State Feedback Controllers for Parameterized Discrete Event Systems.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

2003
EB 3: an entity-based black-box specification method for information systems.
Softw. Syst. Model., 2003

Proving Event Ordering Properties for Information Systems.
Proceedings of the ZB 2003: Formal Specification and Development in Z and B, 2003

Investigating Discrete Controllability with Kleene Algebra.
Proceedings of the Relational and Kleene-Algebraic Methods in Computer Science: 7th International Seminar on Relational Methods in Computer Science and 2nd International Workshop on Applications of Kleene Algebra, 2003

2002
A Formal Definition of Function Points for Automated Measurement of B Specifications.
Proceedings of the Formal Methods and Software Engineering, 2002

2001
Relational methods in computer science - Preface.
Inf. Sci., 2001

Towards a Computer-Aided Design of Reactive Systems.
Proceedings of the Computer Aided Systems Theory, 2001

Formalizing COSMIC-FFP Using ROOM.
Proceedings of the 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 2001

2000
Semantic distance between specifications.
Theor. Comput. Sci., 2000

A calculus of program adaptation and its applications.
Sci. Comput. Program., 2000

1999
Combining JSD and Cleanroom for Object-Oriented Scenario Specification.
Proceedings of the Behavioral Specifications of Businesses and Systems, 1999

1998
Integration of Sequential Scenarios.
IEEE Trans. Software Eng., 1998

Unifying Program Construction and Modification.
Log. J. IGPL, 1998

Mathematical Foundations for Program Transformations.
Proceedings of the Logic Programming Synthesis and Transformation, 1998

A Specification Method for Cleanroom's Black Box Description.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
A Calculus of Program Modifications.
Proceedings of the 1997 ACM SIGSOFT Symposium on Symposium on Software Reusability, 1997

Retrieving Software Components that Minimize Adaptation Effort.
Proceedings of the 1997 International Conference on Automated Software Engineering, 1997

Detecting Feature Interactions on Relational Specifications.
Proceedings of the Feature Interactions in Telecommunications Networks IV, 1997

Defining and detecting feature interactions.
Proceedings of the Algorithmic Languages and Calculi, 1997

1996
A Relational Calculus for Program Construction by Parts.
Sci. Comput. Program., 1996

1995
Program Construction by Parts.
Proceedings of the Mathematics of Program Construction, 1995

1994
A process for verification based inspections.
Proceedings of the SEKE'94, 1994


  Loading...