Profil

OUCHANI Samir

Main Referenced Co-authors
Baouya, Abdelhakim (3)
Bennouar, Djamal (3)
LENZINI, Gabriele  (3)
Mohamed, Otmane Ait (3)
MAUW, Sjouke  (2)
Main Referenced Keywords
Attack patterns (1); Attack surfaces (1); Modelling Security and Policies (1); Probabilistic verification (1); Security (1);
Main Referenced Disciplines
Computer science (8)

Publications (total 8)

The most downloaded
836 downloads
Ouchani, S., & Debbabi, M. (2015). Specification, verification, and quantification of security in model-based systems. Computing, 97, 691-711. doi:10.1007/s00607-015-0445-x https://hdl.handle.net/10993/21774

The most cited

22 citations (Scopus®)

Ouchani, S., & Debbabi, M. (2015). Specification, verification, and quantification of security in model-based systems. Computing, 97, 691-711. doi:10.1007/s00607-015-0445-x https://hdl.handle.net/10993/21774

Lenzini, G., Mauw, S., & Ouchani, S. (2016). Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. In G. Barthe & E. Markatos (Eds.), Security and Trust Management - STM 2016. Springer-Verlag. doi:10.1007/978-3-319-46598-2_12
Peer reviewed

Lenzini, G., Mauw, S., & Ouchani, S. (2015). Security analysis of socio-technical physical systems. Computers electrical engineering. doi:10.1016/j.compeleceng.2015.02.019
Peer reviewed

Baouya, A., Bennouar, D., Mohamed, O. A., & Ouchani, S. (2015). A Quantitative Verification Framework of SysML Activity Diagrams under Time Constraints. Expert Systems with Applications. doi:10.1016/j.eswa.2015.05.049
Peer reviewed

Baouya, A., Bennouar, D., Mohamed, O. A., & Ouchani, S. (2015). On the Probabilistic Verification of Time Constrained SysML State Machines. In Intelligent Software Methodologies, Tools and Techniques (pp. 425--441). Springer International Publishing.
Peer reviewed

Baouya, A., Bennouar, D., Mohamed, O. A., & Ouchani, S. (2015). A probabilistic and timed verification approach of SysML state machine diagram. In A probabilistic and timed verification approach of SysML state machine diagram.
Peer reviewed

Ouchani, S., & Lenzini, G. (2015). Generating attacks in SysML activity diagrams by detecting attack surfaces. Journal of Ambient Intelligence and Humanized Computing, 6 (3), 361-373. doi:10.1007/s12652-015-0269-8
Peer reviewed

Ouchani, S., & Debbabi, M. (2015). Specification, verification, and quantification of security in model-based systems. Computing, 97, 691-711. doi:10.1007/s00607-015-0445-x
Peer Reviewed verified by ORBi

Ouchani, S., & Lenzini, G. (2014). Attacks Generation by Detecting Attack Surfaces [Paper presentation]. The 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014).

Contact ORBilu