Cavalli, Ana
505  results:
Search for persons X
?
2

HTTP/2 Attacks Generation using 5Greplay:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
3

Towards Smarter Security Orchestration and Automatic Respon..:

, In: 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom),
Nguyen, Phu ; Dautov, Rustem ; Song, Hui... - p. 298-302 , 2023
 
?
4

Threatening the 5G core via PFCP DoS attacks: the case of b..:

Amponis, George ; Radoglou-Grammatikis, Panagiotis ; Lagkas, Thomas...
EURASIP Journal on Wireless Communications and Networking.  2022 (2022)  1 - p. , 2022
 
?
5

SANCUS: Multi-layers Vulnerability Management Framework for..:

, In: Proceedings of the 16th International Conference on Availability, Reliability and Security,
 
?
6

From Formal Test Objectives to TTCN-3 for Verifying ETCS Co..:

, In: Communications in Computer and Information Science; Software Technologies,
 
?
7

Smart Measurements and Analysis for Software Quality Enhanc..:

, In: Communications in Computer and Information Science; Software Technologies,
Dahab, Sarah ; Maag, Stephane ; Mallouli, Wissam. - p. 194-219 , 2019
 
?
8

Validation of a Trust Approach in Multi-Organization Enviro..:

Toumi, Khalifa ; Cavalli, Ana ; Andrés, César
International Journal of Secure Software Engineering.  5 (2014)  1 - p. 1-18 , 2014
 
?
10

ICST 2010 Special Issue:

Cavalli, Ana ; Ghosh, Sudipto
Software Testing, Verification and Reliability.  23 (2013)  5 - p. 351-351 , 2013
 
?
11

A Distributed and Collaborative Intrusion Detection Archite..:

Morais, Anderson ; Cavalli, Ana
Mobile Networks and Applications.  19 (2013)  1 - p. 101-120 , 2013
 
?
12

A systematic approach to integrate common timed security ru..:

Mammar, Amel ; Mallouli, Wissam ; Cavalli, Ana
Information and Software Technology.  54 (2012)  1 - p. 87-98 , 2012
 
?
13

An advanced approach for modeling and detecting software vu..:

Shahmehri, Nahid ; Mammar, Amel ; Montes de Oca, Edgardo...
Information and Software Technology.  54 (2012)  9 - p. 997-1013 , 2012
 
?
14

A distributed intrusion detection scheme for wireless ad ho..:

, In: Proceedings of the 27th Annual ACM Symposium on Applied Computing,
Morais, Anderson ; Cavalli, Ana - p. 556-562 , 2012
 
?
 
1-15