LENZINI, G., MAUW, S., & OUCHANI, S. (2016). Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. In G. Barthe & E. Markatos (Eds.), Security and Trust Management - STM 2016. Springer-Verlag. doi:10.1007/978-3-319-46598-2_12 Peer reviewed |
LENZINI, G., MAUW, S., & OUCHANI, S. (2015). Security analysis of socio-technical physical systems. Computers electrical engineering. doi:10.1016/j.compeleceng.2015.02.019 Peer reviewed |
Baouya, A., Bennouar, D., Mohamed, O. A., & OUCHANI, S. (2015). On the Probabilistic Verification of Time Constrained SysML State Machines. In Intelligent Software Methodologies, Tools and Techniques (pp. 425--441). Springer International Publishing. Peer reviewed |
Baouya, A., Bennouar, D., Mohamed, O. A., & OUCHANI, S. (2015). A probabilistic and timed verification approach of SysML state machine diagram. In A probabilistic and timed verification approach of SysML state machine diagram. Peer reviewed |
OUCHANI, S., & LENZINI, G. (2015). Generating attacks in SysML activity diagrams by detecting attack surfaces. Journal of Ambient Intelligence and Humanized Computing, 6 (3), 361-373. doi:10.1007/s12652-015-0269-8 Peer reviewed |
Baouya, A., Bennouar, D., Mohamed, O. A., & OUCHANI, S. (2015). A Quantitative Verification Framework of SysML Activity Diagrams under Time Constraints. Expert Systems with Applications. doi:10.1016/j.eswa.2015.05.049 Peer reviewed |
OUCHANI, S., & Debbabi, M. (2015). Specification, verification, and quantification of security in model-based systems. Computing, 97, 691-711. doi:10.1007/s00607-015-0445-x Peer Reviewed verified by ORBi |
OUCHANI, S., & Lenzini, G. (2014). Attacks Generation by Detecting Attack Surfaces [Paper presentation]. The 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014). |