Security attacks and solutions in vehicular ad hoc networks: a survey VH La, AR Cavalli International journal on AdHoc networking systems (IJANS) 4 (2), 1-20, 2014 | 248 | 2014 |
FSM-based conformance testing methods: a survey annotated with experimental evaluation R Dorofeeva, K El-Fakih, S Maag, AR Cavalli, N Yevtushenko Information and software technology 52 (12), 1286-1297, 2010 | 220 | 2010 |
A passive testing approach based on invariants: application to the WAP E Bayse, A Cavalli, M Nunez, F Zaidi Computer networks 48 (2), 247-266, 2005 | 167 | 2005 |
Generating test cases for a timed I/O automaton model T Higashino, A Nakata, K Taniguchi, AR Cavalli Testing of Communicating Systems: Methods and Applications, 197-214, 1999 | 146 | 1999 |
New approaches for passive testing using an extended finite state machine specification A Cavalli, C Gervy, S Prokopenko Information and Software Technology 45 (12), 837-852, 2003 | 121 | 2003 |
Hit-or-Jump: An algorithm for embedded testing with applications to IN services A Cavalli, D Lee, C Rinderknecht, F Zaïdi International Conference on Protocol Specification, Testing and Verification …, 1999 | 116 | 1999 |
Estimation of QoE of video traffic using a fuzzy expert system J Pokhrel, B Wehbi, A Morais, A Cavalli, E Allilaire 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), 224-229, 2013 | 80 | 2013 |
Automatic timed test case generation for web services composition M Lallali, F Zaidi, A Cavalli, I Hwang 2008 Sixth European Conference on Web Services, 53-62, 2008 | 74 | 2008 |
An EFSM-based intrusion detection system for ad hoc networks JM Orset, B Alcalde, A Cavalli Automated Technology for Verification and Analysis: Third International …, 2005 | 73 | 2005 |
Maintainability prediction: A regression analysis of measures of evolving systems JH Hayes, L Zhao 21st IEEE International Conference on Software Maintenance (ICSM'05), 601-604, 2005 | 71 | 2005 |
Security in ad hoc networks R Molva, P Michiardi IFIP International Conference on Personal Wireless Communications, 756-775, 2003 | 69 | 2003 |
An overview of the Eucalyptus toolbox H Garavel Proceedings of the COST 247, 76-88, 1996 | 68 | 1996 |
Network protocol system passive testing for fault management: A backward checking approach B Alcalde, A Cavalli, D Chen, D Khuu, D Lee Formal Techniques for Networked and Distributed Systems–FORTE 2004: 24th …, 2004 | 64 | 2004 |
A decision method for linear temporal logic AR Cavalli, LFÑD Cerro 7th International Conference on Automated Deduction: Napa, California, USA …, 1984 | 64 | 1984 |
A formal approach for testing security rules W Mallouli, JM Orset, A Cavalli, N Cuppens, F Cuppens Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 61 | 2007 |
FSM-based test derivation strategies for systems with time-outs M Zhigulin, N Yevtushenko, S Maag, A Cavalli 2011 11th International Conference on Quality Software, 141-149, 2011 | 59 | 2011 |
Software vulnerabilities, prevention and detection methods: A review1 W Jimenez, A Mammar, A Cavalli Security in model-driven architecture 215995, 215995, 2009 | 57 | 2009 |
Two complementary tools for the formal testing of distributed systems with time constraints AR Cavalli, EM De Oca, W Mallouli, M Lallali 2008 12th IEEE/ACM International Symposium on Distributed Simulation and …, 2008 | 56 | 2008 |
A pragmatic approach to generating test sequences for embedded systems LP Lima, AR Cavalli Testing of Communicating Systems: IFIP TC6 10th International Workshop on …, 1997 | 56 | 1997 |
Timed extended invariants for the passive testing of web services G Morales, S Maag, A Cavalli, W Mallouli, EM De Oca, B Wehbi 2010 IEEE International Conference on Web Services, 592-599, 2010 | 55 | 2010 |