Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

29 results
Image document

Evaluating the complexity of deriving adaptive homing, synchronizing and distinguishing sequences for nondeterministic FSMs

Nina Yevtushenko , Victor Kuliamin , Natalia Kushik
ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.86-103, ⟨10.1007/978-3-030-31280-0_6⟩
Conference papers hal-02448916v1

Testing Software and Systems

Nina Yevtushenko , Ana Rosa Cavalli , Husnu Yenigun
Springer International Publishing, LNCS-10533, 2017, Lecture Notes in Computer Science, 978-3-319-67548-0. ⟨10.1007/978-3-319-67549-7⟩
Books hal-01678967v1

Testing Software and Systems

Franz Wotawa , Mihai Nica , Natalia Kushik
Springer International Publishing, LNCS-9976, pp.257, 2016, Lecture Notes in Computer Science, Lecture notes in computer science, 978-3-319-47442-7. ⟨10.1007/978-3-319-47443-4⟩
Books hal-01643721v1
Image document

Homing Sequence Derivation with Quantified Boolean Satisfiability

Hung-En Wang , Kuan-Hua Tu , Jie-Hong R. Jiang , Natalia Kushik
29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.230-242, ⟨10.1007/978-3-319-67549-7_14⟩
Conference papers hal-01678974v1
Image document

A model checking based approach for detecting SDN races

Evgenii Vinarskii , Jorge Lopez , Natalia Kushik , Nina Yevtushenko , Djamal Zeghlache
ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.194-211, ⟨10.1007/978-3-030-31280-0_12⟩
Conference papers hal-02448964v1
Image document

Boosting transactional memory with stricter serializability

Pierre Sutra , Patrick Marlier , Valerio Schiavoni , François Trahay
20th International Conference on Coordination Languages and Models (COORDINATION), Jun 2018, Madrid, Spain. pp.231-251, ⟨10.1007/978-3-319-92408-3_11⟩
Conference papers hal-01821500v1
Image document

CSI based indoor localization using Ensemble Neural Networks

Abdallah Sobehy , Eric Renault , Paul Mühlethaler
MLN 2019 : 2nd IFIP International Conference on Machine Learning for Networking, Dec 2019, Paris, France. pp.367-378, ⟨10.1007/978-3-030-45778-5_25⟩
Conference papers hal-02334588v1
Image document

Space-time pattern extraction in alarm logs for network diagnosis

Achille Salaün , Anne Bouillard , Marc-Olivier Buob
MLN 2019: 2nd IFIP International Conference on Machine Learning for Networking, Dec 2019, Paris, France. pp.134-153, ⟨10.1007/978-3-030-45778-5_10⟩
Conference papers hal-02484330v2
Image document

Document Provenance in the Cloud: Constraints and Challenges

Mohamed Amin Sakka , Bruno Defude , Jorge Tellez
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.107-117, ⟨10.1007/978-3-642-13971-0_11⟩
Conference papers hal-01056506v1
Image document

Industrial IoT security monitoring and test on Fed4Fire+ platforms

Diego Rivera , Edgardo Montes de Oca , Wissam Mallouli , Ana R Cavalli , Brecht Vermeulen , et al.
ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.270-278, ⟨10.1007/978-3-030-31280-0_17⟩
Conference papers hal-02526342v1
Image document

Attack tolerance for services-based applications in the cloud

Georges Ouffoué , Fatiha Zaïdi , Ana R Cavalli
ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.242-258, ⟨10.1007/978-3-030-31280-0_15⟩
Conference papers hal-02526356v1
Image document

Novel lightweight signcryption-based key distribution mechanisms for MIKEY

Kim Thuat Nguyen , Nouha Ouahla , Maryline Laurent
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩
Conference papers hal-01391308v1
Image document

A quality of experience based approach for wireless mesh networks

Anderson Morais , Ana Rosa Cavalli
9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova I La Geltrú, Spain. pp.162-173, ⟨10.1007/978-3-642-21560-5_14⟩
Conference papers hal-01301638v1
Image document

Using testing techniques for vulnerability detection in C programs

Amel Mammar , Ana Rosa Cavalli , Willy Ronald Jimenez Freitez , Wissam Mallouli , Edgardo Montes de Oca
23th International Conference on Testing Software and Systems (ICTSS), Nov 2011, Paris, France. pp.80-96, ⟨10.1007/978-3-642-24580-0_7⟩
Conference papers hal-01303013v1
Image document

Quality Estimation of Virtual Machine Placement in Cloud Infrastructures

Jorge Lopez , Natalia Kushik , Djamal Zeghlache
29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.213-229, ⟨10.1007/978-3-319-67549-7_13⟩
Conference papers hal-01678958v1
Image document

Information Security Theory and Practice

Maryline Laurent , Thanassis Giannetsos
Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books hal-03173895v1
Image document

Heuristics for deriving adaptive homing and distinguishing sequences for nondeterministic finite state machines

Natalia Kushik , Husnu Yenigun
27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah And Dubai, United Arab Emirates. pp.243-248, ⟨10.1007/978-3-319-25945-1_15⟩
Conference papers hal-01262740v1
Image document

Checking Compatibility of Web Services Behaviorally

Kais Klai , Hanen Ochi
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.267-282, ⟨10.1007/978-3-642-40213-5_17⟩
Conference papers hal-01514668v1
Image document

Privacy in digital identity systems: models, assessment and user adoption

Armen Khatchatourov , Maryline Laurent , Claire Levallois-Barth
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩
Conference papers hal-01283997v1
Image document

Applying a Dependency Mechanism for Voting Protocol Models Using Event-B

Paul J. Gibson , Souad Kherroubi , Dominique Méry
37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2017), Jun 2017, Neuchâtel, Switzerland. pp.124-138, ⟨10.1007/978-3-319-60225-7_9⟩
Conference papers hal-01658423v1
Image document

Analysis of QUIC session establishment and its implementations

Eva Gagliardi , Olivier Levillain
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩
Conference papers hal-02468596v1
Image document

A Survey on Wireless Sensors Networks Security Based on a Layered Approach

Raul A. Fuentes-Samaniego , Ana Rosa Cavalli , Juan A. Nolazco-Flores , Javier Baliosian
13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.77-93, ⟨10.1007/978-3-319-22572-2_6⟩
Conference papers hal-01728805v1
Image document

Guiding testers' hands in monitoring tools : application of testing approaches on SIP

Xiaoping Che , Huu Nghia Nguyen , Stephane Maag , Fatiha Zaidi
27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.105-123, ⟨10.1007/978-3-319-25945-1_7⟩
Conference papers hal-01263247v1
Image document

Towards QoC-aware location-based services

Sophie Chabridon , Cao Cuong Ngo , Zied Abid , Denis Conan , Chantal Taconet , et al.
11th Distributed Applications and Interoperable Systems (DAIS), Jun 2011, Reykjavik, Iceland. pp.71 - 76, ⟨10.1007/978-3-642-21387-8_6⟩
Conference papers hal-01303054v1
Image document

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

Imen Brahmi , Hanen Brahmi , Sadok Ben Yahia
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.381-393, ⟨10.1007/978-3-319-19578-0_31⟩
Conference papers hal-01789978v1
Image document

On traffic domination in communication networks

Walid Ben-Ameur , Pablo Pavón Mariño , Michal Pioro
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienne, Austria. pp.191-202, ⟨10.1007/978-3-642-25575-5_16⟩
Conference papers hal-01301879v1
Image document

Improving clustering techniques in wireless sensor networks using thinning process

Monique Becker , Ashish Gupta , Michel Marot , Harmeet Singh
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienne, Austria. pp.203-214, ⟨10.1007/978-3-642-25575-5_17⟩
Conference papers hal-01347786v1
Image document

Remote Collaboration, Decision Support, and On-Demand Medical Image Analysis for Acute Stroke Care

Renan Sales Barros , Jordi Borst , Steven Kleynenberg , Céline Badr , Rama Rao Ganji , et al.
4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.214-225
Conference papers hal-01757577v1
Image document

Estimating File-Spread in Delay Tolerant Networks under Two-Hop Routing

Arshad Ali , Eitan Altman , Tijani Chahed , Dieter Fiems , Manoj Kumar Panda , et al.
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.277-290, ⟨10.1007/978-3-642-30054-7_22⟩
Conference papers hal-00726802v1