Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Testing Methodology for an Open Software E-learning Platform., , , , and . EDUTECH, volume 151 of IFIP, page 165-174. Kluwer/Springer, (2004)Parameterized Model Checking Modulo Explicit Weak Memory Models., , and . IMPEX/FM&MDD, volume 271 of EPTCS, page 48-63. (2017)Une plate-forme de validation multi-protocoles et multi-services - résultats d'expérimentation., , , , , , , and . Ann. des Télécommunications, 60 (5-6): 588-609 (2005)A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic., , , , , and . ICSOFT, page 234-241. SCITEPRESS, (2022)Verification of Interoperability Security Policies by Model Checking., , , and . HASE, page 376-381. IEEE Computer Society, (2011)How Web Services Can Be Tolerant to Intruders through Diversification., , , and . ICWS, page 436-443. IEEE, (2017)Supple: a flexible probabilistic data dissemination protocol for wireless sensor networks., , , , and . MSWiM, page 385-392. ACM, (2010)A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks., , , , , and . IEEE Access, (2023)Automated Generation of Interoperability Tests., , , and . TestCom, volume 210 of IFIP Conference Proceedings, page 169-. Kluwer, (2002)A Formal Passive Testing Approach to test a MANET Routing Protocol., , , and . PerCom Workshops, page 1-6. IEEE Computer Society, (2009)978-1-4244-3304-9.