default search action
Fatiha Zaïdi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Valeria Valdés Ríos, Fatiha Zaïdi, Ana Rosa Cavalli, Angel Rego:
Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment. ARES 2024: 166:1-166:9 - 2023
- [j7]Zujany Salazar, Fatiha Zaïdi, Huu Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access 11: 43925-43944 (2023) - [c44]Valeria Valdés, Ana Rosa Cavalli, Fatiha Zaïdi, Wissam Mallouli:
Testing techniques to assess impact and cascading effects. CloudCom 2023: 269-272 - [c43]Valeria Valdés, Fatiha Zaïdi, Ana Rosa Cavalli, Wissam Mallouli:
A Resilience Component for a Digital Twin. FPS (2) 2023: 93-104 - 2022
- [c42]Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Rosa Cavalli, Huu Nghia Nguyen, Edgardo Montes de Oca:
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. ICSOFT 2022: 234-241 - [c41]Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, Monika Ewa Rakoczy:
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System. ICST Workshops 2022: 40-48 - 2021
- [j6]Jose Alfredo Alvarez Aldana, Stephane Maag, Fatiha Zaïdi:
A formal consensus-based distributed monitoring approach for mobile IoT networks. Internet Things 13: 100352 (2021) - 2020
- [j5]Sylvain Conchon, David Declerck, Fatiha Zaïdi:
Parameterized Model Checking on the TSO Weak Memory Model. J. Autom. Reason. 64(7): 1307-1330 (2020) - [c40]Wenbo Zhou, Philippe Dague, Lei Liu, Lina Ye, Fatiha Zaïdi:
A Coloured Petri Nets Based Attack Tolerance Framework. APSEC 2020: 159-168
2010 – 2019
- 2019
- [c39]Sylvain Conchon, Alexandrina Korneva, Fatiha Zaïdi:
Verifying Smart Contracts with Cubicle. FM Workshops (1) 2019: 312-324 - [c38]Georges Ouffoué, Fatiha Zaïdi, Ana R. Cavalli:
Attack Tolerance for Services-Based Applications in the Cloud. ICTSS 2019: 242-258 - 2018
- [c37]Jose Alfredo Alvarez Aldana, Stephane Maag, Fatiha Zaïdi:
MANETs Interoperability: Current Trends and Open Research. AINA Workshops 2018: 481-487 - [c36]Sylvain Conchon, David Declerck, Fatiha Zaïdi:
Cubicle- W : Parameterized Model Checking on Weak Memory. IJCAR 2018: 152-160 - [c35]Ana R. Cavalli, Antonio M. Ortiz, Georges Ouffoué, Cesar A. Sanchez, Fatiha Zaïdi:
Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection. ICWS 2018: 472-486 - [i3]Jose Alvarez, Stéphane Maag, Fatiha Zaïdi:
MANETs monitoring with a distributed hybrid architecture. CoRR abs/1805.02717 (2018) - [i2]Jose Alvarez, Stephane Maag, Fatiha Zaïdi:
Monitoring Dynamic Mobile Ad-Hoc Networks: A Fully Distributed Hybrid Architecture. CoRR abs/1805.03513 (2018) - 2017
- [c34]Georges L. A. Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali:
An Attack-Tolerant Framework for Web Services. SCC 2017: 503-506 - [c33]Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali:
Model-Based Attack Tolerance. AINA Workshops 2017: 68-73 - [c32]Jose Alvarez, Stephane Maag, Fatiha Zaïdi:
Monitoring Dynamic Mobile Ad-Hoc Networks: A Fully Distributed Hybrid Architecture. AINA 2017: 407-414 - [c31]Sylvain Conchon, David Declerck, Fatiha Zaïdi:
Compiling Parameterized X86-TSO Concurrent Programs to Cubicle- W. ICFEM 2017: 88-104 - [c30]Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali:
How Web Services Can Be Tolerant to Intruders through Diversification. ICWS 2017: 436-443 - [c29]Sylvain Conchon, David Declerck, Fatiha Zaïdi:
Parameterized Model Checking Modulo Explicit Weak Memory Models. IMPEX/FM&MDD 2017: 48-63 - [i1]Jose Alvarez, Stephane Maag, Fatiha Zaïdi:
DHYMON: a Continuous Decentralized Hybrid Monitoring Architecture for MANETs. CoRR abs/1712.01676 (2017) - 2016
- [c28]Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sánchez, Fatiha Zaïdi:
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. ICDCS Workshops 2016: 61-66 - [c27]Jose Alvarez, Stéphane Maag, Fatiha Zaïdi:
MANETs monitoring with a distributed hybrid architecture. NCA 2016: 388-391 - [c26]Huu Nghia Nguyen, Fatiha Zaïdi, Ana R. Cavalli:
Effectively Testing of Timed Composite Systems using Test Case Prioritization. SEKE 2016: 408-413 - 2015
- [c25]Sylvain Conchon, Alain Mebsout, Fatiha Zaïdi:
Certificates for Parameterized Model Checking. FM 2015: 126-142 - [c24]Xiaoping Che, Stephane Maag, Huu Nghia Nguyen, Fatiha Zaïdi:
Guiding Testers' Hands in Monitoring Tools: Application of Testing Approaches on SIP. ICTSS 2015: 105-123 - [e2]Michael J. Butler, Sylvain Conchon, Fatiha Zaïdi:
Formal Methods and Software Engineering - 17th International Conference on Formal Engineering Methods, ICFEM 2015, Paris, France, November 3-5, 2015, Proceedings. Lecture Notes in Computer Science 9407, Springer 2015, ISBN 978-3-319-25422-7 [contents] - 2014
- [c23]Huu Nghia Nguyen, Fatiha Zaïdi, Ana R. Cavalli:
A Framework for Distributed Testing of Timed Composite Systems. APSEC (1) 2014: 47-54 - 2013
- [c22]Sylvain Conchon, Amit Goel, Sava Krstic, Alain Mebsout, Fatiha Zaïdi:
Invariants for finite instances and beyond. FMCAD 2013: 61-68 - [c21]Huu Nghia Nguyen, Pascal Poizat, Fatiha Zaïdi:
Automatic skeleton generation for data-aware service choreographies. ISSRE 2013: 320-329 - 2012
- [c20]Sylvain Conchon, Amit Goel, Sava Krstic, Alain Mebsout, Fatiha Zaïdi:
Cubicle: A Parallel SMT-Based Model Checker for Parameterized Systems - Tool Paper. CAV 2012: 718-724 - [c19]Huu Nghia Nguyen, Pascal Poizat, Fatiha Zaïdi:
Online Verification of Value-Passing Choreographies through Property-Oriented Passive Testing. HASE 2012: 106-113 - [c18]Huu Nghia Nguyen, Pascal Poizat, Fatiha Zaïdi:
A Symbolic Framework for the Conformance Checking of Value-Passing Choreographies. ICSOC 2012: 525-532 - [c17]Huu Nghia Nguyen, Pascal Poizat, Fatiha Zaïdi:
Passive conformance testing of service choreographies. SAC 2012: 1528-1535 - 2011
- [j4]Aline Carneiro Viana, Stephane Maag, Fatiha Zaïdi:
One step forward: Linking wireless self-organizing network validation techniques with formal testing approaches. ACM Comput. Surv. 43(2): 7:1-7:36 (2011) - [c16]Mazen El Maarabani, Ana R. Cavalli, Iksoon Hwang, Fatiha Zaïdi:
Verification of Interoperability Security Policies by Model Checking. HASE 2011: 376-381 - [c15]Lina Bentakouk, Pascal Poizat, Fatiha Zaïdi:
Checking the Behavioral Conformance of Web Services with Symbolic Testing and an SMT Solver. TAP@TOOLS 2011: 33-50 - [e1]Burkhart Wolff, Fatiha Zaïdi:
Testing Software and Systems - 23rd IFIP WG 6.1 International Conference, ICTSS 2011, Paris, France, November 7-10, 2011. Proceedings. Lecture Notes in Computer Science 7019, Springer 2011, ISBN 978-3-642-24579-4 [contents] - 2010
- [c14]Fatiha Zaïdi, Mounir Lallali, Stéphane Maag:
A component based testing technique for a MANET routing protocol. AICCSA 2010: 1-7 - [c13]Ana R. Cavalli, Tien-Dung Cao, Wissam Mallouli, Eliane Martins, Andrey Sadovykh, Sébastien Salva, Fatiha Zaïdi:
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition. ICWS 2010: 377-384 - [c12]Aline Carneiro Viana, Thomas Hérault, Thomas Largillier, Sylvain Peyronnet, Fatiha Zaïdi:
Supple: a flexible probabilistic data dissemination protocol for wireless sensor networks. MSWiM 2010: 385-392
2000 – 2009
- 2009
- [c11]Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca, Fatiha Zaïdi:
A Formal Passive Testing Approach to test a MANET Routing Protocol. PerCom Workshops 2009: 1-6 - [c10]Lina Bentakouk, Pascal Poizat, Fatiha Zaïdi:
A Formal Framework for Service Orchestration Testing Based on Symbolic Transition Systems. TestCom/FATES 2009: 16-32 - [c9]Fatiha Zaïdi, Emmanuel Bayse, Ana R. Cavalli:
Network protocol interoperability testing based on contextual signatures and passive testing. SAC 2009: 2-7 - 2008
- [c8]Mounir Lallali, Fatiha Zaïdi, Ana R. Cavalli, Iksoon Hwang:
Automatic Timed Test Case Generation for Web Services Composition. ECOWS 2008: 53-62 - 2007
- [c7]Mounir Lallali, Fatiha Zaïdi, Ana R. Cavalli:
Timed Modeling of Web Services Composition for Automatic Testing. SITIS 2007: 417-426 - 2006
- [c6]Stéphane Maag, Fatiha Zaïdi:
Testing methodology for an ad hoc routing protocol. PM2HW2N 2006: 48-55 - 2005
- [j3]Pierre Combes, Wei Monin, Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi, Richard Castanet, Marcien MacKaya, Patrice Laurençot:
Une plate-forme de validation multi-protocoles et multi-services - résultats d'expérimentation. Ann. des Télécommunications 60(5-6): 588-609 (2005) - [j2]Emmanuel Bayse, Ana R. Cavalli, Manuel Núñez, Fatiha Zaïdi:
A passive testing approach based on invariants: application to the WAP. Comput. Networks 48(2): 235-245 (2005) - 2004
- [j1]Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi:
Application of a Formal Testing Methodology to Wireless Telephony Networks. J. Braz. Comput. Soc. 10(2): 56-72 (2004) - [c5]Ana R. Cavalli, Stéphane Maag, Sofia Papagiannaki, Georgios Verigakis, Fatiha Zaïdi:
A Testing Methodology for an Open Software E-learning Platform. EDUTECH 2004: 165-174 - [c4]Ana R. Cavalli, Amel Mederreg, Fatiha Zaïdi, Pierre Combes, Wei Monin, Richard Castanet, Marcien MacKaya, Patrice Laurençot:
A Multi-service and Multi-protocol Validation Platform-Experimentation Results. TestCom 2004: 17-32 - 2002
- [c3]Cédric Besse, Ana R. Cavalli, Myungchul Kim, Fatiha Zaïdi:
Automated Generation of Interoperability Tests. TestCom 2002: 169- - 2001
- [c2]Ana R. Cavalli, Bruno Defude, Christian Rinderknecht, Fatiha Zaïdi:
A Service-Component Testing Method and a Suitable CORBA Architecture. ISCC 2001: 655-660
1990 – 1999
- 1999
- [c1]Ana R. Cavalli, David Lee, Christian Rinderknecht, Fatiha Zaïdi:
Hit-or-Jump: An algorithm for embedded testing with applications to IN services. FORTE 1999: 41-56
Coauthor Index
aka: Ana Rosa Cavalli
aka: Stephane Maag
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint