Mohamed Kaaniche
Mohamed Kaaniche
LAAS-CNRS, Toulouse, France
Verifisert e-postadresse på laas.fr - Startside
Sitert av
Sitert av
Experimenting with quantitative evaluation tools for monitoring operational security
R Ortalo, Y Deswarte, M Kaâniche
IEEE Transactions on Software Engineering 25 (5), 633-650, 1999
Survey on security threats and protection mechanisms in embedded automotive networks
I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013
Modelling interdependencies between the electricity and information infrastructures
JC Laprie, M Kanoun, K, Kaaniche
SAFECOMP 2007, 2007
Lessons learned from the deployment of a high-interaction honeypot
E Alata, V Nicomette, M Kaaniche, M Dacier, M Herrb
arXiv preprint arXiv:0704.0858, 2007
Quantitative assessment of operational security: Models and tools
M Dacier, Y Deswarte, M Kaâniche
Information Systems Security, ed. by SK Katsikas and D. Gritzalis, London …, 1996
A system dependability modeling framework using AADL and GSPNs
AE Rugina, K Kanoun, M Kaâniche
Architecting dependable systems IV, 14-38, 2007
A language-based intrusion detection approach for automotive embedded networks
I Studnia, E Alata, V Nicomette, M Kaâniche, Y Laarouchi
International Journal of Embedded Systems 10 (1), 1-12, 2018
Models and tools for quantitative assessment of operational security
M Dacier, Y Deswarte, M Kaaniche
Proc. 12th International Information Security Conference (IFIP SEC'96 …, 1996
The KAT (Knowledge-Action-Transformation) approach to the modeling and evaluation of reliability and availability growth
JC Laprie, K Kanoun, C Béounes, M Kaâniche
IEEE Transactions on Software Engineering 17 (4), 370, 1991
Anomaly detection and root cause localization in virtual network functions
C Sauvanaud, K Lazri, M Kaâniche, K Kanoun
2016 IEEE 27th International Symposium on Software Reliability Engineering …, 2016
The ADAPT tool: From AADL architectural models to stochastic petri nets through model transformation
AE Rugina, K Kanoun, M Kaâniche
2008 Seventh European Dependable Computing Conference, 85-90, 2008
State of the art of network protocol reverse engineering tools
J Duchêne, C Le Guernic, E Alata, V Nicomette, M Kaâniche
Journal of Computer Virology and Hacking Techniques 14, 53-68, 2018
A framework for dependability engineering of critical computing systems
M Kaâniche, JC Laprie, JP Blanquart
Safety Science 40 (9), 731-752, 2002
Empirical analysis and statistical modeling of attack processes based on honeypots
M Kaaniche, Y Deswarte, E Alata, M Dacier, V Nicomette
arXiv preprint arXiv:0704.0861, 2007
Qualitative and quantitative reliability assessment
K Kanoun, M Kaâniche, JP Laprie
IEEE Software 14 (2), 77-87, 1997
Guide de la sûreté de fonctionnement
JC Laprie, J Arlat, A Blanquart, Jean-Paul, Costes, Y Crouzet, Y Deswarte, ...
Cépaduès Éditions, 1995
Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned
C Sauvanaud, M Kaâniche, K Kanoun, K Lazri, GDS Silvestre
Journal of Systems and Software 139, 84-106, 2018
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned
V Nicomette, M Kaâniche, E Alata, M Herrb
Journal in computer virology 7, 143-157, 2011
A user—perceived availability evaluation of a web based travel agency
M Kaâniche, K Kanoun, M Martinello
Proceedding of the 2003 International Symposium on Dependable Systems and …, 2003
PolyOrBAC: a security framework for critical infrastructures
A Abou El Kalam, Y Deswarte, A Baïna, M Kaâniche
International Journal of Critical Infrastructure Protection 2 (4), 154-169, 2009
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20