Mohamed Kaâniche
Orcid: 0000-0002-2647-5472Affiliations:
- LAAS, Toulouse, France
According to our database1,
Mohamed Kaâniche
authored at least 115 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2022
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol.
J. Comput. Virol. Hacking Tech., 2022
2021
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment.
ACM Trans. Cyber Phys. Syst., 2021
Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020
2019
J. Comput. Virol. Hacking Tech., 2019
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019
2018
J. Comput. Virol. Hacking Tech., 2018
Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned.
J. Syst. Softw., 2018
J. Braz. Comput. Soc., 2018
Int. J. Embed. Syst., 2018
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling.
Proceedings of the 13th European Dependable Computing Conference, 2017
2016
Tech. Sci. Informatiques, 2016
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
Proceedings of the 9th Workshop on Verification and Evaluation of Computer and Communication Systems, 2015
Proceedings of the Software Engineering for Resilient Systems - 7th International Workshop, 2015
Proceedings of the Computer Safety, Reliability, and Security, 2015
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Proceedings of the 11th European Dependable Computing Conference, 2015
Proceedings of the 11th European Dependable Computing Conference, 2015
Proceedings of the 11th European Dependable Computing Conference, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
2014
Tech. Sci. Informatiques, 2014
Tech. Sci. Informatiques, 2014
An automated black box approach for web vulnerability identification and attack scenario generation.
J. Braz. Comput. Soc., 2014
Ingénierie des Systèmes d Inf., 2014
Int. J. Secur. Softw. Eng., 2014
Proceedings of the 26th IEEE International Symposium on Computer Architecture and High Performance Computing, 2014
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the 9th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2014
2013
Tech. Sci. Informatiques, 2013
Reliab. Eng. Syst. Saf., 2013
Dagstuhl Reports, 2013
Comput. J., 2013
Proceedings of the SAFECOMP 2013, 2013
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013
Model-based safety analysis of human-robot interactions: The MIRAS walking assistance robot.
Proceedings of the IEEE 13th International Conference on Rehabilitation Robotics, 2013
Survey on security threats and protection mechanisms in embedded automotive networks.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
2011
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned.
J. Comput. Virol., 2011
IEEE Trans. Mob. Comput., 2011
Proceedings of the Computer Safety, Reliability, and Security, 2011
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011
Proceedings of the 13th European Workshop on Dependable Computing, 2011
2010
Tech. Sci. Informatiques, 2010
Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems, 2010
2009
Tech. Sci. Informatiques, 2009
Int. J. Crit. Infrastructure Prot., 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
J. Comput. Virol., 2008
Software dependability modeling using an industry-standard architecture description language
CoRR, 2008
Dependability Evaluation of a Replication Service for Mobile Applications in Dynamic Ad-Hoc Networks.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008
Proceedings of the Critical Infrastructure Protection II, 2008
The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation.
Proceedings of the Seventh European Dependable Computing Conference, 2008
Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures.
Proceedings of the Critical Information Infrastructure Security, 2008
Proceedings of the CRiSIS '08, 2008
2007
CoRR, 2007
Availability assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx logfiles : a case study
CoRR, 2007
Proceedings of the Computer Safety, 2007
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
2006
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
Proceedings of the Architecting Dependable Systems IV [the book is a result of DSN 2006 workshops, 2006
Proceedings of the Sixth European Dependable Computing Conference, 2006
2005
Reliab. Eng. Syst. Saf., 2005
Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx log files: A case study.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005
2003
Multi-level modeling approach for the availability assessment of e-business applications.
Softw. Pract. Exp., 2003
Proceedings of the Computer Safety, 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
2002
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002
2001
Proceedings of the Computer Safety, 2001
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001
2000
Proceedings of the Computer Safety, 2000
Proceedings of the 6th International Conference on Engineering of Complex Computer Systems (ICECCS 2000), 2000
1999
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security.
IEEE Trans. Software Eng., 1999
Perform. Evaluation, 1999
Evaluation de la sûreté de fonctionnement informatique. Fautes physiques, fautes de conception, malveillances.
, 1999
1998
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture.
Proceedings of the Digest of Papers: FTCS-28, 1998
1997
1996
Models and tools for quantitative assessment of operational security.
Proceedings of the Information Systems Security, 1996
Proceedings of the 15th International Conference on Computer Safety, 1996
Proceedings of the Seventh International Symposium on Software Reliability Engineering, 1996
1995
Modeling computer systems evolutions: non-stationary processes and stochastic Petri nets-application to dependability growth.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995
1994
Proceedings of the Dependable Computing, 1994
1993
Proceedings of the 12th International Conference on Computer Safety, 1993
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993
SoRel: A Tool for Reliability Growth Analysis and Prediction From Statistical Failure Data.
Proceedings of the Digest of Papers: FTCS-23, 1993
1992
Modèle hyperexponentiel en temps continu et en temps discret pour l'évaluation de la croissance de la sûreté de fonctionnement.
PhD thesis, 1992
Proceedings of the Third International Symposium on Software Reliability Engineering, 1992
1991
The KAT (Knowledge-Action-Transformation) Approach to the Modeling and Evaluation of Reliability and Availability Growth.
IEEE Trans. Software Eng., 1991
1990
The transformation approach to the modeling and evaluation of the reliability and availability growth.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990