Arcelli, F., Walter, B., Ampatzoglou, A., Palomba, F., Perrouin, G., Acher, M., CORDY, M., & Devroey, X. (Eds.). (2019). Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation. ACM.
PAPADAKIS, M., KINTIS, M., ZHANG, J., Jia, Y., LE TRAON, Y., & Harman, M. (2019). Mutation Testing Advances: An Analysis and Survey. In Advances in Computers. Elsevier. doi:10.1016/bs.adcom.2018.03.015
Peer reviewed
Derigent, W., Voisin, A., Thomas, A., KUBLER, S., & ROBERT, J. (2017). Application of Measurement-Based AHP to Product-Driven System Control. In T. Borangiu, Service Orientation in Holonic and Multi-Agent Manufacturing (Studies in Computational Intelligence, pp. 249-258). Springer. doi:10.1007/978-3-319-51100-9_22
This paper presents an application of the measurements-based AHP to define a two-stage algorithm ...
Peer reviewed
BARTOLINI, C., EL KATEB, D., LE TRAON, Y., & Hagen, D. (2016). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In J. Altmann, G. C. Silaghi, ... O. F. Rana (Eds.), Economics of Grids, Clouds, Systems, and Services (pp. 281-295). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-319-43177-2
A major part of the commercial Internet is moving towards a cloud paradigm. This phenomenon has a...
Peer reviewed
KUBLER, S., Främling, K., & Zaslavsky, A. (2016). IoT Platforms Initiative. In O. Vermesan & P. Friess (Eds.), Digitising the Industry Internet of Things Connecting the Physical, Digital and Virtual Worlds (River Publishers Series in Communications, pp. 265-292). Gistrup, Denmark: River Publishers.
The Internet of Things (IoT) is considered to be one of the enablers of the next industrial revol...
MOUELHI, T., EL KATEB, D., & LE TRAON, Y. (2015). Inroads in Testing Access Control. In Advances in Computers. ELSEVIER.
Peer reviewed
Lucio, L., ZHANG, Q., NGUYEN, P. H., AMRANI, M., KLEIN, J., Vangheluwe, H., & LE TRAON, Y. (2014). Advances in Model-Driven Security. In A. Memon (Ed.), Advances in Computers. Elsevier. doi:10.1016/B978-0-12-800162-2.00003-8
Sound methodologies for constructing security-critical systems are extremely important in order t...
Peer reviewed
OLIVARES MENDEZ, M. A., Bissyandé, T., Somasundar, K., KLEIN, J., VOOS, H., & LE TRAON, Y. (2014). The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs. In T. F. Bissyandé & G. van Stam (Eds.), e-Infrastructure and e-Services for Developing Countries (pp. 198-208). Springer International Publishing. doi:10.1007/978-3-319-08368-1_24
Organized crime now targets one of the most precious wealth in Africa, the wild life. The most af...
Peer reviewed
BARTEL, A., KLEIN, J., Monperrus, M., & LE TRAON, Y. (2011). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android (Tech Report) (pp. 1-11). Tech Report.
Android based devices are becoming widespread. As a result and since those devices contain person...