Arcelli, F., Walter, B., Ampatzoglou, A., Palomba, F., Perrouin, G., Acher, M., Cordy, M., & Devroey, X. (Eds.). (2019). Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation. ACM.
Papadakis, M., Kintis, M., Zhang, J., Jia, Y., Le Traon, Y., & Harman, M. (2019). Mutation Testing Advances: An Analysis and Survey. Advances in Computers. Elsevier.
Peer reviewed
Derigent, W., Voisin, A., Thomas, A., Kubler, S., & Robert, J. (2017). Application of Measurement-Based AHP to Product-Driven System Control. In T., Borangiu, Service Orientation in Holonic and Multi-Agent Manufacturing (Studies in Computational Intelligence, pp. 249-258). Springer.
Peer reviewed
This paper presents an application of the measurements-based AHP to define a two-stage algorithm for product-driven systems control, in case of an unexpected event. This algorithm is made of two stages: the ...
Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2016). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In J., Altmann, G. C., Silaghi, & O. F., Rana (Eds.), Economics of Grids, Clouds, Systems, and Services (pp. 281-295). Cham, Switzerland: Springer International Publishing.
Peer reviewed
A major part of the commercial Internet is moving towards a cloud paradigm. This phenomenon has a drastic impact on the organizational structures of enterprises and introduces new challenges that must be ...
Mouelhi, T., El Kateb, D., & Le Traon, Y. (2015). Inroads in Testing Access Control. Advances in Computers. ELSEVIER.
Peer reviewed
Lucio, L., Zhang, Q., Nguyen, P. H., Amrani, M., Klein, J., Vangheluwe, H., & Le Traon, Y. (2014). Advances in Model-Driven Security. In A., Memon (Ed.), Advances in Computers. Elsevier.
Peer reviewed
Sound methodologies for constructing security-critical systems are extremely important in order to confront the increasingly varied security threats. As a response to this need, Model-Driven Security has ...
Olivares Mendez, M. A., Bissyandé, T., Somasundar, K., Klein, J., Voos, H., & Le Traon, Y. (2014). The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs. In T. F., Bissyandé & G., van Stam (Eds.), e-Infrastructure and e-Services for Developing Countries (pp. 198-208). Springer International Publishing.
Peer reviewed
Organized crime now targets one of the most precious wealth in Africa, the wild life. The most affected by the poaching are the Big 5, whose survival requires attention and efforts from everyone, in accordance ...
Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2011). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android (Tech Report) (pp. 1-11). Tech Report.
Android based devices are becoming widespread. As a result and since those devices contain personal and confidential data, the security model of the android software stack has been analyzed extensively. One ...