BibTeX records: Mohamed Kaâniche

download as .bib file

@article{DBLP:journals/virology/AdelinNANMK22,
  author       = {Remi Adelin and
                  Cyrius Nugier and
                  Eric Alata and
                  Vincent Nicomette and
                  Vincent Migliore and
                  Mohamed Ka{\^{a}}niche},
  title        = {Facing emerging challenges in connected vehicles: a formally proven,
                  legislation compliant, and post-quantum ready security protocol},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {18},
  number       = {4},
  pages        = {425--452},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11416-022-00426-1},
  doi          = {10.1007/S11416-022-00426-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/AdelinNANMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/GimenezRAAKN21,
  author       = {Pierre{-}Fran{\c{c}}ois Gimenez and
                  Jonathan Roux and
                  Eric Alata and
                  Guillaume Auriol and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette},
  title        = {{RIDS:} Radio Intrusion Detection and Diagnosis System for Wireless
                  Communications in Smart Environment},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {24:1},
  year         = {2021},
  url          = {https://doi.org/10.1145/3441458},
  doi          = {10.1145/3441458},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/GimenezRAAKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/CayreGANKM21,
  author       = {Romain Cayre and
                  Florent Galtier and
                  Guillaume Auriol and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  G{\'{e}}raldine Vache Marconato},
  title        = {WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy
                  chips},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {376--387},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00049},
  doi          = {10.1109/DSN48987.2021.00049},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/CayreGANKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/CayreGANKM21a,
  author       = {Romain Cayre and
                  Florent Galtier and
                  Guillaume Auriol and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  G{\'{e}}raldine Vache Marconato},
  title        = {InjectaBLE: Injecting malicious traffic into established Bluetooth
                  Low Energy connections},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {388--399},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00050},
  doi          = {10.1109/DSN48987.2021.00050},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/CayreGANKM21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CayreMGKNA21,
  author       = {Romain Cayre and
                  G{\'{e}}raldine Vache Marconato and
                  Florent Galtier and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette and
                  Guillaume Auriol},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Cross-protocol attacks: weaponizing a smartphone by diverting its
                  bluetooth controller},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {386--388},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468258},
  doi          = {10.1145/3448300.3468258},
  timestamp    = {Mon, 28 Jun 2021 17:39:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CayreMGKNA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/DamienGFNKA20,
  author       = {Ali{\'{e}}nor Damien and
                  Pierre{-}Fran{\c{c}}ois Gimenez and
                  Nathalie Feyt and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Eric Alata},
  editor       = {Marco Vieira and
                  Henrique Madeira and
                  Nuno Antunes and
                  Zheng Zheng},
  title        = {On-board Diagnosis: {A} First Step from Detection to Prevention of
                  Intrusions on Avionics Applications},
  booktitle    = {31st {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2020, Coimbra, Portugal, October 12-15, 2020},
  pages        = {358--368},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISSRE5003.2020.00041},
  doi          = {10.1109/ISSRE5003.2020.00041},
  timestamp    = {Tue, 17 Nov 2020 13:34:50 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/DamienGFNKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/BourdonGAKMNL20,
  author       = {Malcolm Bourdon and
                  Pierre{-}Fran{\c{c}}ois Gimenez and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Migliore and
                  Vincent Nicomette and
                  Youssef Laarouchi},
  title        = {Hardware-Performance-Counters-based anomaly detection in massively
                  deployed smart industrial devices},
  booktitle    = {19th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2020, Cambridge, MA, USA, November 24-27, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/NCA51143.2020.9306726},
  doi          = {10.1109/NCA51143.2020.9306726},
  timestamp    = {Tue, 12 Jan 2021 15:26:07 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/BourdonGAKMNL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/GaltierCAKN20,
  author       = {Florent Galtier and
                  Romain Cayre and
                  Guillaume Auriol and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette},
  title        = {A PSD-based fingerprinting approach to detect IoT device spoofing},
  booktitle    = {25th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2020, Perth, Australia, December 1-4, 2020},
  pages        = {40--49},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/PRDC50213.2020.00015},
  doi          = {10.1109/PRDC50213.2020.00015},
  timestamp    = {Wed, 27 Jan 2021 14:35:01 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/GaltierCAKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BachyNKA19,
  author       = {Yann Bachy and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Eric Alata},
  title        = {Smart-TV security: risk analysis and experiments on Smart-TV communication
                  channels},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {15},
  number       = {1},
  pages        = {61--76},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11416-018-0320-3},
  doi          = {10.1007/S11416-018-0320-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BachyNKA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/CayreNAAKM19,
  author       = {Romain Cayre and
                  Vincent Nicomette and
                  Guillaume Auriol and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  G{\'{e}}raldine Vache Marconato},
  editor       = {Katinka Wolter and
                  Ina Schieferdecker and
                  Barbara Gallina and
                  Michel Cukier and
                  Roberto Natella and
                  Naghmeh Ramezani Ivaki and
                  Nuno Laranjeiro},
  title        = {Mirage: Towards a Metasploit-Like Framework for IoT},
  booktitle    = {30th {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2019, Berlin, Germany, October 28-31, 2019},
  pages        = {261--270},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISSRE.2019.00034},
  doi          = {10.1109/ISSRE.2019.00034},
  timestamp    = {Mon, 28 Dec 2020 11:31:03 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/CayreNAAKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/DamienMNAK19,
  author       = {Ali{\'{e}}nor Damien and
                  Michael Marcourt and
                  Vincent Nicomette and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche},
  title        = {Implementation of a Host-Based Intrusion Detection System for Avionic
                  Applications},
  booktitle    = {24th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2019, Kyoto, Japan, December 1-3, 2019},
  pages        = {178--187},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PRDC47002.2019.00048},
  doi          = {10.1109/PRDC47002.2019.00048},
  timestamp    = {Thu, 06 Feb 2020 16:12:03 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/DamienMNAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vecos/2019,
  editor       = {Pierre Ganty and
                  Mohamed Ka{\^{a}}niche},
  title        = {Verification and Evaluation of Computer and Communication Systems
                  - 13th International Conference, VECoS 2019, Porto, Portugal, October
                  9, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11847},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35092-5},
  doi          = {10.1007/978-3-030-35092-5},
  isbn         = {978-3-030-35091-8},
  timestamp    = {Wed, 13 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vecos/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/StudniaANKL18,
  author       = {Ivan Studnia and
                  Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Youssef Laarouchi},
  title        = {A language-based intrusion detection approach for automotive embedded
                  networks},
  journal      = {Int. J. Embed. Syst.},
  volume       = {10},
  number       = {1},
  pages        = {1--12},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJES.2018.10010488},
  doi          = {10.1504/IJES.2018.10010488},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/StudniaANKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbcs/MorganANK18,
  author       = {Beno{\^{\i}}t Morgan and
                  Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche},
  title        = {{IOMMU} protection against {I/O} attacks: a vulnerability and a proof
                  of concept},
  journal      = {J. Braz. Comput. Soc.},
  volume       = {24},
  number       = {1},
  pages        = {2:1--2:11},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13173-017-0066-7},
  doi          = {10.1186/S13173-017-0066-7},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbcs/MorganANK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/SauvanaudKKLS18,
  author       = {Carla Sauvanaud and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun and
                  Kahina Lazri and
                  Guthemberg Silvestre},
  title        = {Anomaly detection and diagnosis for cloud services: Practical experiments
                  and lessons learned},
  journal      = {J. Syst. Softw.},
  volume       = {139},
  pages        = {84--106},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jss.2018.01.039},
  doi          = {10.1016/J.JSS.2018.01.039},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/SauvanaudKKLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/DucheneGANK18,
  author       = {Julien Duch{\^{e}}ne and
                  Colas Le Guernic and
                  Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche},
  title        = {State of the art of network protocol reverse engineering tools},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {14},
  number       = {1},
  pages        = {53--68},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11416-016-0289-8},
  doi          = {10.1007/S11416-016-0289-8},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/DucheneGANK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/DucheneANKG18,
  author       = {Julien Duch{\^{e}}ne and
                  Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Colas Le Guernic},
  title        = {Specification-Based Protocol Obfuscation},
  booktitle    = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28,
                  2018},
  pages        = {478--489},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSN.2018.00056},
  doi          = {10.1109/DSN.2018.00056},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/DucheneANKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/AverlantAKNM18,
  author       = {Guillaume Averlant and
                  Eric Alata and
                  Mohamad Ka{\^{a}}niche and
                  Vincent Nicomette and
                  Yuxiao Mao},
  title        = {{SAAC:} Secure Android Application Context a Runtime Based Policy
                  and its Architecture},
  booktitle    = {17th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2018, Cambridge, MA, USA, November 1-3, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NCA.2018.8548343},
  doi          = {10.1109/NCA.2018.8548343},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/AverlantAKNM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/RouxAAKNC18,
  author       = {Jonathan Roux and
                  Eric Alata and
                  Guillaume Auriol and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette and
                  Romain Cayre},
  title        = {RadIoT: Radio Communications Intrusion Detection for IoT - {A} Protocol
                  Independent Approach},
  booktitle    = {17th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2018, Cambridge, MA, USA, November 1-3, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NCA.2018.8548286},
  doi          = {10.1109/NCA.2018.8548286},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/RouxAAKNC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-09464,
  author       = {Julien Duch{\^{e}}ne and
                  Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Colas Le Guernic},
  title        = {Specification-Based Protocol Obfuscation},
  journal      = {CoRR},
  volume       = {abs/1807.09464},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.09464},
  eprinttype    = {arXiv},
  eprint       = {1807.09464},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-09464.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-03934,
  author       = {Jonathan Roux and
                  Eric Alata and
                  Guillaume Auriol and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette and
                  Romain Cayre},
  title        = {RadIoT: Radio Communications Intrusion Detection for IoT - {A} Protocol
                  Independent Approach},
  journal      = {CoRR},
  volume       = {abs/1811.03934},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.03934},
  eprinttype    = {arXiv},
  eprint       = {1811.03934},
  timestamp    = {Fri, 23 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-03934.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/RouxAANK17,
  author       = {Jonathan Roux and
                  Eric Alata and
                  Guillaume Auriol and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche},
  title        = {Toward an Intrusion Detection Approach for IoT Based on Radio Communications
                  Profiling},
  booktitle    = {13th European Dependable Computing Conference, {EDCC} 2017, Geneva,
                  Switzerland, September 4-8, 2017},
  pages        = {147--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EDCC.2017.11},
  doi          = {10.1109/EDCC.2017.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/RouxAANK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/AverlantMANK17,
  author       = {Guillaume Averlant and
                  Beno{\^{\i}}t Morgan and
                  Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Dong Seong Kim and
                  Masato Kitakami and
                  Vijay Varadharajan},
  title        = {An Abstraction Model and a Comparative Analysis of Intel and {ARM}
                  Hardware Isolation Mechanisms},
  booktitle    = {22nd {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2017, Christchurch, New Zealand, January 22-25, 2017},
  pages        = {245--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PRDC.2017.48},
  doi          = {10.1109/PRDC.2017.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/AverlantMANK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/AlataNDGK16,
  author       = {Eric Alata and
                  Vincent Nicomette and
                  Julien Duch{\^{e}}ne and
                  Colas Le Guernic and
                  Mohamed Ka{\^{a}}niche},
  title        = {Outils pour la r{\'{e}}tro-conception de protocoles. Analyse
                  et classification},
  journal      = {Tech. Sci. Informatiques},
  volume       = {35},
  number       = {6},
  pages        = {609--640},
  year         = {2016},
  url          = {https://doi.org/10.3166/tsi.35.609-640},
  doi          = {10.3166/TSI.35.609-640},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/AlataNDGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/DucheneGANK16,
  author       = {Julien Duch{\^{e}}ne and
                  Colas Le Guernic and
                  Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Jean{-}Louis Lanet and
                  Axel Legay},
  title        = {Protocol Reverse Engineering: Challenges and Obfuscation},
  booktitle    = {Risks and Security of Internet and Systems - 11th International Conference,
                  CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10158},
  pages        = {139--144},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54876-0\_11},
  doi          = {10.1007/978-3-319-54876-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/DucheneGANK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SauvanaudLKK16,
  author       = {Carla Sauvanaud and
                  Kahina Lazri and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {Towards Black-Box Anomaly Detection in Virtual Network Functions},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks Workshops, {DSN} Workshops 2016, Toulouse, France, June
                  28 - July 1, 2016},
  pages        = {254--257},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN-W.2016.17},
  doi          = {10.1109/DSN-W.2016.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/SauvanaudLKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/SauvanaudLKK16,
  author       = {Carla Sauvanaud and
                  Kahina Lazri and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {Anomaly Detection and Root Cause Localization in Virtual Network Functions},
  booktitle    = {27th {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2016, Ottawa, ON, Canada, October 23-27, 2016},
  pages        = {196--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSRE.2016.32},
  doi          = {10.1109/ISSRE.2016.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/SauvanaudLKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ladc/MorganANK16,
  author       = {Beno{\^{\i}}t Morgan and
                  Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche},
  title        = {Bypassing {IOMMU} Protection against {I/O} Attacks},
  booktitle    = {2016 Seventh Latin-American Symposium on Dependable Computing, {LADC}
                  2016, Cali, Colombia, October 19-21, 2016},
  pages        = {145--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/LADC.2016.31},
  doi          = {10.1109/LADC.2016.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ladc/MorganANK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BachyBNAKCL15,
  author       = {Yann Bachy and
                  Frederic Basse and
                  Vincent Nicomette and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  Jean{-}Christophe Courr{\`{e}}ge and
                  Pierre Lukjanenko},
  title        = {Smart-TV Security Analysis: Practical Experiments},
  booktitle    = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015},
  pages        = {497--504},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSN.2015.41},
  doi          = {10.1109/DSN.2015.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/BachyBNAKCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/ProbstAKN15,
  author       = {Thibaut Probst and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette},
  title        = {Automated Evaluation of Network Intrusion Detection Systems in IaaS
                  Clouds},
  booktitle    = {11th European Dependable Computing Conference, {EDCC} 2015, Paris,
                  France, September 7-11, 2015},
  pages        = {49--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EDCC.2015.10},
  doi          = {10.1109/EDCC.2015.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/ProbstAKN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/SauvanaudSKK15,
  author       = {Carla Sauvanaud and
                  Guthemberg Silvestre and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {Data Stream Clustering for Online Anomaly Detection in Cloud Applications},
  booktitle    = {11th European Dependable Computing Conference, {EDCC} 2015, Paris,
                  France, September 7-11, 2015},
  pages        = {120--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EDCC.2015.22},
  doi          = {10.1109/EDCC.2015.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/SauvanaudSKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/BachyNAKC15,
  author       = {Yann Bachy and
                  Vincent Nicomette and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  Jean{-}Christophe Courr{\`{e}}ge},
  title        = {Security of {ISP} Access Networks: Practical Experiments},
  booktitle    = {11th European Dependable Computing Conference, {EDCC} 2015, Paris,
                  France, September 7-11, 2015},
  pages        = {205--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EDCC.2015.27},
  doi          = {10.1109/EDCC.2015.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/BachyNAKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/MorganANKA15,
  author       = {Beno{\^{\i}}t Morgan and
                  Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Guillaume Averlant},
  editor       = {Guojun Wang and
                  Tatsuhiro Tsuchiya and
                  Dong Xiang},
  title        = {Design and Implementation of a Hardware Assisted Security Architecture
                  for Software Integrity Monitoring},
  booktitle    = {21st {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2015, Zhangjiajie, China, November 18-20, 2015},
  pages        = {189--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PRDC.2015.46},
  doi          = {10.1109/PRDC.2015.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/MorganANKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/GuiochetHK15,
  author       = {J{\'{e}}r{\'{e}}mie Guiochet and
                  Quynh Anh Do Hoang and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Floor Koornneef and
                  Coen van Gulijk},
  title        = {A Model for Safety Case Confidence Assessment},
  booktitle    = {Computer Safety, Reliability, and Security - 34th International Conference,
                  {SAFECOMP} 2015 Delft, The Netherlands, September 23-25, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9337},
  pages        = {313--327},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24255-2\_23},
  doi          = {10.1007/978-3-319-24255-2\_23},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/GuiochetHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serene/SilvestreSKK15,
  author       = {Guthemberg Silvestre and
                  Carla Sauvanaud and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  editor       = {Alessandro Fantechi and
                  Patrizio Pelliccione},
  title        = {Tejo: {A} Supervised Anomaly Detection Scheme for NewSQL Databases},
  booktitle    = {Software Engineering for Resilient Systems - 7th International Workshop,
                  {SERENE} 2015, Paris, France, September 7-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9274},
  pages        = {114--127},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23129-7\_9},
  doi          = {10.1007/978-3-319-23129-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/serene/SilvestreSKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vecos/Kaaniche15,
  author       = {Mohamed Ka{\^{a}}niche},
  editor       = {Belgacem Ben Hedia and
                  Florin Popentiu Vladicescu},
  title        = {Resilience Assessment: Accidental and Malicious Threats},
  booktitle    = {Proceedings of the 9th Workshop on Verification and Evaluation of
                  Computer and Communication Systems, VECoS 2015, Bucharest, Romania,
                  September 10-11, 2015},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1431},
  pages        = {9},
  publisher    = {CEUR-WS.org},
  year         = {2015},
  url          = {https://ceur-ws.org/Vol-1431/paper1.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:15 +0100},
  biburl       = {https://dblp.org/rec/conf/vecos/Kaaniche15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GuiochetHK15,
  author       = {J{\'{e}}r{\'{e}}mie Guiochet and
                  Quynh Anh Do Hoang and
                  Mohamed Ka{\^{a}}niche},
  title        = {A Model for Safety Case Confidence Assessment},
  journal      = {CoRR},
  volume       = {abs/1512.04467},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.04467},
  eprinttype    = {arXiv},
  eprint       = {1512.04467},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GuiochetHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/LudinardTTNKAAB14,
  author       = {Romaric Ludinard and
                  Eric Totel and
                  Fr{\'{e}}d{\'{e}}ric Tronel and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Eric Alata and
                  Rim Akrout and
                  Yann Bachy},
  title        = {An Invariant-Based Approach for Detecting Attacks Against Data in
                  Web Applications},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {1},
  pages        = {19--38},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014010102},
  doi          = {10.4018/IJSSE.2014010102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/LudinardTTNKAAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isi/BachyNAKC14,
  author       = {Yann Bachy and
                  Vincent Nicomette and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  Jean{-}Christophe Courr{\`{e}}ge},
  title        = {La s{\'{e}}curit{\'{e}} des box {ADSL.} Analyse de risques
                  et exp{\'{e}}rimentations},
  journal      = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.},
  volume       = {19},
  number       = {6},
  pages        = {63--88},
  year         = {2014},
  url          = {https://doi.org/10.3166/isi.19.6.63-88},
  doi          = {10.3166/ISI.19.6.63-88},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isi/BachyNAKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbcs/AkroutAKN14,
  author       = {Rim Akrout and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette},
  title        = {An automated black box approach for web vulnerability identification
                  and attack scenario generation},
  journal      = {J. Braz. Comput. Soc.},
  volume       = {20},
  number       = {1},
  pages        = {4:1--4:16},
  year         = {2014},
  url          = {https://doi.org/10.1186/1678-4804-20-4},
  doi          = {10.1186/1678-4804-20-4},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbcs/AkroutAKN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/TiassouKKSP14,
  author       = {Kossi Tiassou and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche and
                  Christel Seguin and
                  Chris Papadopoulos},
  title        = {Fiabilit{\'{e}} de mission d'un avion. {\'{E}}valuation
                  stochastique en op{\'{e}}ration},
  journal      = {Tech. Sci. Informatiques},
  volume       = {33},
  number       = {9-10},
  pages        = {777--807},
  year         = {2014},
  url          = {https://doi.org/10.3166/tsi.33.777-807},
  doi          = {10.3166/TSI.33.777-807},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/TiassouKKSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/AkroutAKN14,
  author       = {Rim Akrout and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette},
  title        = {Identification de vuln{\'{e}}rabilit{\'{e}}s web et g{\'{e}}n{\'{e}}ration
                  de sc{\'{e}}narios d'attaque},
  journal      = {Tech. Sci. Informatiques},
  volume       = {33},
  number       = {9-10},
  pages        = {809--840},
  year         = {2014},
  url          = {https://doi.org/10.3166/tsi.33.809-840},
  doi          = {10.3166/TSI.33.809-840},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/AkroutAKN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dtis/ArlatDK14,
  author       = {Jean Arlat and
                  Michel Diaz and
                  Mohamed Ka{\^{a}}niche},
  title        = {Towards resilient cyber-physical systems: The {ADREAM} project},
  booktitle    = {Proceedings of the 9th International Conference on Design {\&}
                  Technology of Integrated Systems in Nanoscale Era, {DTIS} 2014, Santorini,
                  Greece, May 6-8, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/DTIS.2014.6850642},
  doi          = {10.1109/DTIS.2014.6850642},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/dtis/ArlatDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ProbstAKN14,
  author       = {Thibaut Probst and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {An Approach for the Automated Analysis of Network Access Controls
                  in Cloud Computing Infrastructures},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_1},
  doi          = {10.1007/978-3-319-11698-3\_1},
  timestamp    = {Thu, 14 Oct 2021 10:08:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ProbstAKN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sbac-pad/SilvestreSKK14,
  author       = {Guthemberg Silvestre and
                  Carla Sauvanaud and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {An Anomaly Detection Approach for Scale-Out Storage Systems},
  booktitle    = {26th {IEEE} International Symposium on Computer Architecture and High
                  Performance Computing, {SBAC-PAD} 2014, Paris, France, October 22-24,
                  2014},
  pages        = {294--301},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SBAC-PAD.2014.42},
  doi          = {10.1109/SBAC-PAD.2014.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sbac-pad/SilvestreSKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MarconatoKN13,
  author       = {G{\'{e}}raldine Vache Marconato and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette},
  title        = {A Vulnerability Life Cycle-Based Security Modeling and Evaluation
                  Approach},
  journal      = {Comput. J.},
  volume       = {56},
  number       = {4},
  pages        = {422--439},
  year         = {2013},
  url          = {https://doi.org/10.1093/comjnl/bxs112},
  doi          = {10.1093/COMJNL/BXS112},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/MarconatoKN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/TiassouKKSP13,
  author       = {Kossi Tiassou and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche and
                  Christel Seguin and
                  Chris Papadopoulos},
  title        = {Aircraft operational reliability - {A} model-based approach and a
                  case study},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {120},
  pages        = {163--176},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ress.2013.07.008},
  doi          = {10.1016/J.RESS.2013.07.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ress/TiassouKKSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/MarconatoNK13,
  author       = {G{\'{e}}raldine Vache Marconato and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche},
  title        = {{\'{E}}valuation quantitative de la s{\'{e}}curit{\'{e}}.
                  Approche bas{\'{e}}e sur les vuln{\'{e}}rabilit{\'{e}}s},
  journal      = {Tech. Sci. Informatiques},
  volume       = {32},
  number       = {1},
  pages        = {41--75},
  year         = {2013},
  url          = {https://doi.org/10.3166/tsi.32.41-75},
  doi          = {10.3166/TSI.32.41-75},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/MarconatoNK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KaanicheHKS13,
  author       = {Mohamed Ka{\^{a}}niche and
                  Michael D. Harrison and
                  Hermann Kopetz and
                  Daniel P. Siewiorek},
  title        = {2\({}^{\mbox{nd}}\) workshop on open resilient human-aware cyber-physical
                  systems},
  booktitle    = {43rd Annual {IEEE/IFIP} Conference on Dependable Systems and Networks
                  Workshop, {DSN} Workshops 2013, Budapest, Hungary, June 24-27, 2013},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSNW.2013.6615524},
  doi          = {10.1109/DSNW.2013.6615524},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/KaanicheHKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/StudniaNADKL13,
  author       = {Ivan Studnia and
                  Vincent Nicomette and
                  Eric Alata and
                  Yves Deswarte and
                  Mohamed Ka{\^{a}}niche and
                  Youssef Laarouchi},
  title        = {Survey on security threats and protection mechanisms in embedded automotive
                  networks},
  booktitle    = {43rd Annual {IEEE/IFIP} Conference on Dependable Systems and Networks
                  Workshop, {DSN} Workshops 2013, Budapest, Hungary, June 24-27, 2013},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSNW.2013.6615528},
  doi          = {10.1109/DSNW.2013.6615528},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/StudniaNADKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icorr/GuiochetHKP13,
  author       = {J{\'{e}}r{\'{e}}mie Guiochet and
                  Quynh Anh Do Hoang and
                  Mohamed Ka{\^{a}}niche and
                  David Powell},
  title        = {Model-based safety analysis of human-robot interactions: The {MIRAS}
                  walking assistance robot},
  booktitle    = {{IEEE} 13th International Conference on Rehabilitation Robotics, {ICORR}
                  2013, Seattle, WA, USA, June 24-26, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICORR.2013.6650433},
  doi          = {10.1109/ICORR.2013.6650433},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icorr/GuiochetHKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ladc/AlataKNA13,
  author       = {Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette and
                  Rim Akrout},
  title        = {An Automated Approach to Generate Web Applications Attack Scenarios},
  booktitle    = {Sixth Latin-American Symposium on Dependable Computing, {LADC} 2013,
                  Rio de Janeiro, Brazil, April 1-5, 2013},
  pages        = {78--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/LADC.2013.22},
  doi          = {10.1109/LADC.2013.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ladc/AlataKNA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/StudniaNADKL13,
  author       = {Ivan Studnia and
                  Vincent Nicomette and
                  Eric Alata and
                  Yves Deswarte and
                  Mohamed Ka{\^{a}}niche and
                  Youssef Laarouchi},
  editor       = {Jean{-}Charles Fabre and
                  Philippe Qu{\'{e}}r{\'{e}} and
                  Mario Trapp},
  title        = {Security of embedded automotive networks: state of the art and a research
                  proposal},
  booktitle    = {{SAFECOMP} 2013 - Workshop {CARS} (2nd Workshop on Critical Automotive
                  applications : Robustness {\&} Safety) of the 32nd International
                  Conference on Computer Safety, Reliability and Security, Toulouse,
                  France, 2013},
  publisher    = {{HAL}},
  year         = {2013},
  url          = {http://hal.archives-ouvertes.fr/SAFECOMP2013-CARS/hal-00848234},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/StudniaNADKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safecomp/2013,
  editor       = {Friedemann Bitsch and
                  J{\'{e}}r{\'{e}}mie Guiochet and
                  Mohamed Ka{\^{a}}niche},
  title        = {Computer Safety, Reliability, and Security - 32nd International Conference,
                  {SAFECOMP} 2013, Toulouse, France, September 24-27, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8153},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40793-2},
  doi          = {10.1007/978-3-642-40793-2},
  isbn         = {978-3-642-40792-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/HeiselKRT13,
  author       = {Maritta Heisel and
                  Mohamed Ka{\^{a}}niche and
                  Alexander B. Romanovsky and
                  Elena Troubitsyna},
  title        = {Engineering Resilient Systems: Models, Methods and Tools (Dagstuhl
                  Seminar 13022)},
  journal      = {Dagstuhl Reports},
  volume       = {3},
  number       = {1},
  pages        = {30--46},
  year         = {2013},
  url          = {https://doi.org/10.4230/DagRep.3.1.30},
  doi          = {10.4230/DAGREP.3.1.30},
  timestamp    = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/HeiselKRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbcs/BuzatoDK12,
  author       = {Luiz Eduardo Buzato and
                  Elias P. Duarte Jr. and
                  Mohamed Ka{\^{a}}niche},
  title        = {Message from the special issue editors},
  journal      = {J. Braz. Comput. Soc.},
  volume       = {18},
  number       = {1},
  pages        = {1--2},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13173-012-0056-8},
  doi          = {10.1007/S13173-012-0056-8},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jbcs/BuzatoDK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/LudinardTTNKAAB12,
  author       = {Romaric Ludinard and
                  Eric Totel and
                  Frederic Tronel and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Eric Alata and
                  Rim Akrout and
                  Yann Bachy},
  editor       = {Fabio Martinelli and
                  Jean{-}Louis Lanet and
                  William M. Fitzgerald and
                  Simon N. Foley},
  title        = {Detecting attacks against data in web applications},
  booktitle    = {7th International Conference on Risks and Security of Internet and
                  Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CRISIS.2012.6378943},
  doi          = {10.1109/CRISIS.2012.6378943},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/LudinardTTNKAAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/MarconatoNK12,
  author       = {G{\'{e}}raldine Vache Marconato and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Fabio Martinelli and
                  Jean{-}Louis Lanet and
                  William M. Fitzgerald and
                  Simon N. Foley},
  title        = {Security-related vulnerability life cycle analysis},
  booktitle    = {7th International Conference on Risks and Security of Internet and
                  Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CRISIS.2012.6378954},
  doi          = {10.1109/CRISIS.2012.6378954},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/MarconatoNK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/StudniaNKA12,
  author       = {Ivan Studnia and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Eric Alata},
  editor       = {Nora Cuppens{-}Boulahia and
                  Philip Fong and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Stephen Marsh and
                  Jan{-}Philipp Stegh{\"{o}}fer},
  title        = {A distributed platform of high interaction honeypots and experimental
                  results},
  booktitle    = {Tenth Annual International Conference on Privacy, Security and Trust,
                  {PST} 2012, Paris, France, July 16-18, 2012},
  pages        = {229--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PST.2012.6297946},
  doi          = {10.1109/PST.2012.6297946},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/StudniaNKA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/TiassouKKSP12,
  author       = {Kossi Tiassou and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche and
                  Christel Seguin and
                  Chris Papadopoulos},
  title        = {Impact of Operational Reliability Re-assessment during Aircraft Missions},
  booktitle    = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012,
                  Irvine, CA, USA, October 8-11, 2012},
  pages        = {219--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SRDS.2012.37},
  doi          = {10.1109/SRDS.2012.37},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/srds/TiassouKKSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-5736,
  author       = {Giovanna Dondossola and
                  Geert Deconinck and
                  Felicita Di Giandomenico and
                  Susanna Donatelli and
                  Mohamed Ka{\^{a}}niche and
                  Paulo Ver{\'{\i}}ssimo},
  title        = {Critical Utility Infrastructural Resilience},
  journal      = {CoRR},
  volume       = {abs/1211.5736},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.5736},
  eprinttype    = {arXiv},
  eprint       = {1211.5736},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-5736.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-5738,
  author       = {Mohamed Ka{\^{a}}niche and
                  Paolo Lollini and
                  Andrea Bondavalli and
                  Karama Kanoun},
  title        = {Modeling the resilience of large and evolving systems},
  journal      = {CoRR},
  volume       = {abs/1211.5738},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.5738},
  eprinttype    = {arXiv},
  eprint       = {1211.5738},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-5738.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KaanicheM11,
  author       = {Mohamed Ka{\^{a}}niche and
                  Aad P. A. van Moorsel},
  title        = {It All Depends, and Increasingly So},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {6},
  pages        = {56--57},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.165},
  doi          = {10.1109/MSP.2011.165},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KaanicheM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/BondavalliHKLMS11,
  author       = {Andrea Bondavalli and
                  Ossama Hamouda and
                  Mohamed Ka{\^{a}}niche and
                  Paolo Lollini and
                  Istv{\'{a}}n Majzik and
                  Hans{-}Peter Schwefel},
  title        = {The {HIDENETS} Holistic Approach for the Analysis of Large Critical
                  Mobile Systems},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {10},
  number       = {6},
  pages        = {783--796},
  year         = {2011},
  url          = {https://doi.org/10.1109/TMC.2010.222},
  doi          = {10.1109/TMC.2010.222},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/BondavalliHKLMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/NicometteKAH11,
  author       = {Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Eric Alata and
                  Matthieu Herrb},
  title        = {Set-up and deployment of a high-interaction honeypot: experiment and
                  lessons learned},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {2},
  pages        = {143--157},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0144-2},
  doi          = {10.1007/S11416-010-0144-2},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/NicometteKAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewdc/TiassouKKSP11,
  author       = {Kossi Tiassou and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche and
                  Christel Seguin and
                  Chris Papadopoulos},
  editor       = {Felicita Di Giandomenico},
  title        = {Operational reliability of an aircraft with adaptive missions},
  booktitle    = {Proceedings of the 13th European Workshop on Dependable Computing,
                  {EWDC} '11, Pisa, Italy, May 11-12, 2011},
  pages        = {9--14},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978582.1978585},
  doi          = {10.1145/1978582.1978585},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ewdc/TiassouKKSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/DessiatnikoffAAKN11,
  author       = {Anthony Dessiatnikoff and
                  Rim Akrout and
                  Eric Alata and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette},
  editor       = {Leon Alkalai and
                  Timothy Tsai and
                  Tomohiro Yoneda},
  title        = {A Clustering Approach for Web Vulnerabilities Detection},
  booktitle    = {17th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2011, Pasadena, CA, USA, December 12-14, 2011},
  pages        = {194--203},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PRDC.2011.31},
  doi          = {10.1109/PRDC.2011.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/DessiatnikoffAAKN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/TiassouKKSP11,
  author       = {Kossi Tiassou and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche and
                  Christel Seguin and
                  Chris Papadopoulos},
  editor       = {Francesco Flammini and
                  Sandro Bologna and
                  Valeria Vittorini},
  title        = {Modeling Aircraft Operational Reliability},
  booktitle    = {Computer Safety, Reliability, and Security - 30th International Conference,
                  {SAFECOMP} 2011, Naples, Italy, September 19-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6894},
  pages        = {157--170},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24270-0\_12},
  doi          = {10.1007/978-3-642-24270-0\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/TiassouKKSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/NicometteKAH10,
  author       = {Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Eric Alata and
                  Matthieu Herrb},
  title        = {Une analyse empirique du comportement d'attaquants. Exp{\'{e}}rimentations
                  et r{\'{e}}sultats},
  journal      = {Tech. Sci. Informatiques},
  volume       = {29},
  number       = {6},
  pages        = {691--720},
  year         = {2010},
  url          = {https://doi.org/10.3166/tsi.29.691-720},
  doi          = {10.3166/TSI.29.691-720},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/NicometteKAH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serene/HamoudaKK10,
  author       = {Ossama Hamouda and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  editor       = {Giovanna Di Marzo Serugendo and
                  John S. Fitzgerald},
  title        = {Availability modelling of a virtual black box for automotive systems},
  booktitle    = {Proceedings of the 2nd International Workshop on Software Engineering
                  for Resilient Systems, {SERENE} '10, London, United Kingdom, April
                  15-16, 2010},
  pages        = {52--60},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/2401736.2401742},
  doi          = {10.1145/2401736.2401742},
  timestamp    = {Mon, 22 Jul 2019 17:31:47 +0200},
  biburl       = {https://dblp.org/rec/conf/serene/HamoudaKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KalamDBK09,
  author       = {Anas Abou El Kalam and
                  Yves Deswarte and
                  Amine Ba{\"{\i}}na and
                  Mohamed Ka{\^{a}}niche},
  title        = {PolyOrBAC: {A} security framework for Critical Infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {4},
  pages        = {154--169},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.08.005},
  doi          = {10.1016/J.IJCIP.2009.08.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KalamDBK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/RuginaKK09,
  author       = {Ana{-}Elena Rugina and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche},
  title        = {Mod{\'{e}}lisation de la sret{\'{e}} de fonctionnement bas{\'{e}}e
                  sur le langage {AADL} et les RdPSG},
  journal      = {Tech. Sci. Informatiques},
  volume       = {28},
  number       = {1},
  pages        = {7--37},
  year         = {2009},
  url          = {https://doi.org/10.3166/tsi.28.7-37},
  doi          = {10.3166/TSI.28.7-37},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/RuginaKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HamoudaKK09,
  author       = {Ossama Hamouda and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {Safety modeling and evaluation of Automated Highway Systems},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {73--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270352},
  doi          = {10.1109/DSN.2009.5270352},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/HamoudaKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AlataANOK08,
  author       = {Eric Alata and
                  Ion Alberdi and
                  Vincent Nicomette and
                  Philippe Owezarski and
                  Mohamed Ka{\^{a}}niche},
  title        = {Internet attacks monitoring with dynamic connection redirection mechanisms},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {2},
  pages        = {127--136},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0067-8},
  doi          = {10.1007/S11416-007-0067-8},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/AlataANOK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/BainaDKK08,
  author       = {Amine Ba{\"{\i}}na and
                  Yves Deswarte and
                  Anas Abou El Kalam and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Mohamed Jmaiel and
                  Mohamed Mosbah},
  title        = {Access control for cooperative systems: {A} comparative analysis},
  booktitle    = {CRiSIS '08, Third International Conference on Risks and Security of
                  Internet and Systems, Tozeur, Tunisia, October 28-30, 2008},
  pages        = {19--26},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/CRISIS.2008.4757460},
  doi          = {10.1109/CRISIS.2008.4757460},
  timestamp    = {Tue, 11 Oct 2022 14:59:07 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/BainaDKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/BeccutiFKK08,
  author       = {Marco Beccuti and
                  Giuliana Franceschinis and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  editor       = {Roberto Setola and
                  Stefan Geretshuber},
  title        = {Multi-level Dependability Modeling of Interdependencies between the
                  Electricity and Information Infrastructures},
  booktitle    = {Critical Information Infrastructure Security, Third International
                  Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5508},
  pages        = {48--59},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03552-4\_5},
  doi          = {10.1007/978-3-642-03552-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/BeccutiFKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/RuginaKK08,
  author       = {Ana{-}Elena Rugina and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche},
  title        = {The {ADAPT} Tool: From {AADL} Architectural Models to Stochastic Petri
                  Nets through Model Transformation},
  booktitle    = {Seventh European Dependable Computing Conference, {EDCC-7} 2008, Kaunas,
                  Lithuania, 7-9 May 2008},
  pages        = {85--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EDCC-7.2008.14},
  doi          = {10.1109/EDCC-7.2008.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/RuginaKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/BainaKDK08,
  author       = {Amine Ba{\"{\i}}na and
                  Anas Abou El Kalam and
                  Yves Deswarte and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Collaborative Access Control For Critical Infrastructures},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {189--201},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_14},
  doi          = {10.1007/978-0-387-88523-0\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/BainaKDK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isas/MatthiesenHKS08,
  author       = {Erling Vestergaard Matthiesen and
                  Ossama Hamouda and
                  Mohamed Ka{\^{a}}niche and
                  Hans{-}Peter Schwefel},
  editor       = {Takashi Nanya and
                  Fumihiro Maruyama and
                  Andr{\'{a}}s Pataricza and
                  Miroslaw Malek},
  title        = {Dependability Evaluation of a Replication Service for Mobile Applications
                  in Dynamic Ad-Hoc Networks},
  booktitle    = {Service Availability, 5th International Service Availability Symposium,
                  {ISAS} 2008, Tokyo, Japan, May 19-21, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5017},
  pages        = {171--186},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68129-8\_14},
  doi          = {10.1007/978-3-540-68129-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/isas/MatthiesenHKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0809-4107,
  author       = {Jean{-}Claude Laprie and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche},
  title        = {Modelling interdependencies between the electricity and information
                  infrastructures},
  journal      = {CoRR},
  volume       = {abs/0809.4107},
  year         = {2008},
  url          = {http://arxiv.org/abs/0809.4107},
  eprinttype    = {arXiv},
  eprint       = {0809.4107},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0809-4107.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0809-4108,
  author       = {Ana{-}Elena Rugina and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche},
  title        = {The {ADAPT} Tool: From {AADL} Architectural Models to Stochastic Petri
                  Nets through Model Transformation},
  journal      = {CoRR},
  volume       = {abs/0809.4108},
  year         = {2008},
  url          = {http://arxiv.org/abs/0809.4108},
  eprinttype    = {arXiv},
  eprint       = {0809.4108},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0809-4108.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0809-4109,
  author       = {Ana{-}Elena Rugina and
                  Peter H. Feiler and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche},
  title        = {Software dependability modeling using an industry-standard architecture
                  description language},
  journal      = {CoRR},
  volume       = {abs/0809.4109},
  year         = {2008},
  url          = {http://arxiv.org/abs/0809.4109},
  eprinttype    = {arXiv},
  eprint       = {0809.4109},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0809-4109.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/KalamDBK07,
  author       = {Anas Abou El Kalam and
                  Yves Deswarte and
                  Amine Ba{\"{\i}}na and
                  Mohamed Ka{\^{a}}niche},
  title        = {Access Control for Collaborative Systems: {A} Web Services Based Approach},
  booktitle    = {2007 {IEEE} International Conference on Web Services {(ICWS} 2007),
                  July 9-13, 2007, Salt Lake City, Utah, {USA}},
  pages        = {1064--1071},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICWS.2007.30},
  doi          = {10.1109/ICWS.2007.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/KalamDBK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/CourtesHKKP07,
  author       = {Ludovic Court{\`{e}}s and
                  Ossama Hamouda and
                  Mohamed Ka{\^{a}}niche and
                  Marc{-}Olivier Killijian and
                  David Powell},
  title        = {Dependability Evaluation of Cooperative Backup Strategies for Mobile
                  Devices},
  booktitle    = {13th {IEEE} Pacific Rim International Symposium on Dependable Computing
                  {(PRDC} 2007), 17-19 December, 2007, Melbourne, Victoria, Australia},
  pages        = {139--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PRDC.2007.21},
  doi          = {10.1109/PRDC.2007.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/CourtesHKKP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/LaprieKK07,
  author       = {Jean{-}Claude Laprie and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Francesca Saglietti and
                  Norbert Oster},
  title        = {Modelling Interdependencies Between the Electricity and Information
                  Infrastructures},
  booktitle    = {Computer Safety, Reliability, and Security, 26th International Conference,
                  {SAFECOMP} 2007, Nuremberg, Germany, September 18-21, 2007},
  series       = {Lecture Notes in Computer Science},
  volume       = {4680},
  pages        = {54--67},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75101-4\_5},
  doi          = {10.1007/978-3-540-75101-4\_5},
  timestamp    = {Sat, 30 Sep 2023 09:55:40 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/LaprieKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0704-0858,
  author       = {Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Marc Dacier and
                  Matthieu Herrb},
  title        = {Lessons Learned from the deployment of a high-interaction honeypot},
  journal      = {CoRR},
  volume       = {abs/0704.0858},
  year         = {2007},
  url          = {http://arxiv.org/abs/0704.0858},
  eprinttype    = {arXiv},
  eprint       = {0704.0858},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0704-0858.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0704-0860,
  author       = {Cristina Simache and
                  Mohamed Ka{\^{a}}niche},
  title        = {Availability assessment of SunOS/Solaris Unix Systems based on Syslogd
                  and wtmpx logfiles : a case study},
  journal      = {CoRR},
  volume       = {abs/0704.0860},
  year         = {2007},
  url          = {http://arxiv.org/abs/0704.0860},
  eprinttype    = {arXiv},
  eprint       = {0704.0860},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0704-0860.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0704-0861,
  author       = {Mohamed Ka{\^{a}}niche and
                  Yves Deswarte and
                  Eric Alata and
                  Marc Dacier and
                  Vincent Nicomette},
  title        = {Empirical analysis and statistical modeling of attack processes based
                  on honeypots},
  journal      = {CoRR},
  volume       = {abs/0704.0861},
  year         = {2007},
  url          = {http://arxiv.org/abs/0704.0861},
  eprinttype    = {arXiv},
  eprint       = {0704.0861},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0704-0861.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0704-0865,
  author       = {Ana{-}Elena Rugina and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche},
  title        = {An architecture-based dependability modeling framework using {AADL}},
  journal      = {CoRR},
  volume       = {abs/0704.0865},
  year         = {2007},
  url          = {http://arxiv.org/abs/0704.0865},
  eprinttype    = {arXiv},
  eprint       = {0704.0865},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0704-0865.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0704-0879,
  author       = {Mohamed Ka{\^{a}}niche and
                  Luigi Romano and
                  Zbigniew Kalbarczyk and
                  Ravishankar K. Iyer and
                  Richard M. Karcich},
  title        = {A Hierarchical Approach for Dependability Analysis of a Commercial
                  Cache-Based {RAID} Storage Architecture},
  journal      = {CoRR},
  volume       = {abs/0704.0879},
  year         = {2007},
  url          = {http://arxiv.org/abs/0704.0879},
  eprinttype    = {arXiv},
  eprint       = {0704.0879},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0704-0879.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/AlataNKDH06,
  author       = {Eric Alata and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Marc Dacier and
                  Matthieu Herrb},
  title        = {Lessons learned from the deployment of a high-interaction honeypot},
  booktitle    = {Sixth European Dependable Computing Conference, {EDCC} 2006, Coimbra,
                  Portugal, 18-20 October 2006},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/EDCC.2006.17},
  doi          = {10.1109/EDCC.2006.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/AlataNKDH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/RuginaKK06,
  author       = {Ana{-}Elena Rugina and
                  Karama Kanoun and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Rog{\'{e}}rio de Lemos and
                  Cristina Gacek and
                  Alexander B. Romanovsky},
  title        = {A System Dependability Modeling Framework Using {AADL} and GSPNs},
  booktitle    = {Architecting Dependable Systems {IV} [the book is a result of {DSN}
                  2006 workshops, Philadelphia, PA, {USA]}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4615},
  pages        = {14--38},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74035-3\_2},
  doi          = {10.1007/978-3-540-74035-3\_2},
  timestamp    = {Mon, 26 Feb 2024 07:46:57 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/RuginaKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/MartinelloKKM06,
  author       = {Magnos Martinello and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun and
                  Carlos Aguilar Melchor},
  title        = {Modeling user perceived unavailability due to long response times},
  booktitle    = {20th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IPDPS.2006.1639671},
  doi          = {10.1109/IPDPS.2006.1639671},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/MartinelloKKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/MartinelloKK05,
  author       = {Magnos Martinello and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {Web service availability - impact of error recovery and traffic model},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {89},
  number       = {1},
  pages        = {6--16},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.ress.2004.08.003},
  doi          = {10.1016/J.RESS.2004.08.003},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/MartinelloKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/SimacheK05,
  author       = {Cristina Simache and
                  Mohamed Ka{\^{a}}niche},
  title        = {Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd
                  and wtmpx log files: {A} case study},
  booktitle    = {11th {IEEE} Pacific Rim International Symposium on Dependable Computing
                  {(PRDC} 2005), 12-14 December, 2005, Changsha, Hunan, China},
  pages        = {49--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PRDC.2005.20},
  doi          = {10.1109/PRDC.2005.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/SimacheK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/edcc/2005,
  editor       = {Mario Dal Cin and
                  Mohamed Ka{\^{a}}niche and
                  Andr{\'{a}}s Pataricza},
  title        = {Dependable Computing - EDCC-5, 5th European Dependable Computing Conference,
                  Budapest, Hungary, April 20-22, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3463},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b107276},
  doi          = {10.1007/B107276},
  isbn         = {3-540-25723-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edcc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip/2004sf,
  editor       = {Mohamed Ka{\^{a}}niche},
  title        = {Student Forum, {IFIP} 18th World Computer Congress - Student Forum,
                  22-27 August 2004, Toulouse, France},
  publisher    = {Kluwer},
  year         = {2004},
  timestamp    = {Mon, 28 Feb 2005 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip/2004sf.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/KaanicheKR03,
  author       = {Mohamed Ka{\^{a}}niche and
                  Karama Kanoun and
                  Mourad Rabah},
  title        = {Multi-level modeling approach for the availability assessment of e-business
                  applications},
  journal      = {Softw. Pract. Exp.},
  volume       = {33},
  number       = {14},
  pages        = {1323--1341},
  year         = {2003},
  url          = {https://doi.org/10.1002/spe.550},
  doi          = {10.1002/SPE.550},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spe/KaanicheKR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KaanicheKM03,
  author       = {Mohamed Ka{\^{a}}niche and
                  Karama Kanoun and
                  Magnos Martinello},
  title        = {A User-Perceived Availability Evaluation of a Web Based Travel Agency},
  booktitle    = {2003 International Conference on Dependable Systems and Networks {(DSN}
                  2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings},
  pages        = {709--718},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DSN.2003.1209986},
  doi          = {10.1109/DSN.2003.1209986},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/KaanicheKM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/MartinelloKK03,
  author       = {Magnos Martinello and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  editor       = {Stuart Anderson and
                  Massimo Felici and
                  Bev Littlewood},
  title        = {Web Service Availability - Impact of Error Recovery},
  booktitle    = {Computer Safety, Reliability, and Security, 22nd International Conference,
                  {SAFECOMP} 2003, Edinburgh, UK, September 23-26, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2788},
  pages        = {165--178},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39878-3\_14},
  doi          = {10.1007/978-3-540-39878-3\_14},
  timestamp    = {Sun, 02 Jun 2019 21:26:43 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/MartinelloKK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/SimacheKS02,
  author       = {Cristina Simache and
                  Mohamed Ka{\^{a}}niche and
                  Ayda Sa{\"{\i}}dane},
  title        = {Event Log based Dependability Analysis of Windows {NT} and 2K Systems},
  booktitle    = {9th Pacific Rim International Symposium on Dependable Computing {(PRDC}
                  2002), 16-18 December 2002, Tsukuba-City, Ibarski, Japan},
  pages        = {311--315},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/PRDC.2002.1185651},
  doi          = {10.1109/PRDC.2002.1185651},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/SimacheKS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/KaanicheKR01,
  author       = {Mohamed Ka{\^{a}}niche and
                  Karama Kanoun and
                  Mourad Rabah},
  editor       = {J. Jenny Li and
                  Ronald P. Luijten and
                  E. K. Park},
  title        = {A framework for modeling availability of E-business systems},
  booktitle    = {Proceedings of the 10th International Conference on Computer Communications
                  and Networks, {ICCCN} 2001, 15-17 October, 2001, Scottsdale, Arizona,
                  {USA}},
  pages        = {40--45},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICCCN.2001.956217},
  doi          = {10.1109/ICCCN.2001.956217},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/KaanicheKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/SimacheK01,
  author       = {Cristina Simache and
                  Mohamed Ka{\^{a}}niche},
  title        = {Measurement-Based Availability of Unix Systems in a Distributed Environment},
  booktitle    = {12th International Symposium on Software Reliability Engineering {(ISSRE}
                  2001), 27-30 November 2001, Hong Kong, China},
  pages        = {346--355},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ISSRE.2001.989489},
  doi          = {10.1109/ISSRE.2001.989489},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/SimacheK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/KaanicheGAB01,
  author       = {Mohamed Ka{\^{a}}niche and
                  Yannick Le Gu{\'{e}}dart and
                  Jean Arlat and
                  Thierry Boyer},
  editor       = {Udo Voges},
  title        = {An Investigation on Mutation Strategies for Fault Injection into {RDD-100}
                  Models},
  booktitle    = {Computer Safety, Reliability and Security, 20th International Conference,
                  {SAFECOMP} 2001, Budapest, Hungary, September 26-28, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2187},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45416-0\_14},
  doi          = {10.1007/3-540-45416-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/KaanicheGAB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/KaanicheLB00,
  author       = {Mohamed Ka{\^{a}}niche and
                  Jean{-}Claude Laprie and
                  Jean{-}Paul Blanquart},
  title        = {Dependability Engineering of Complex Computing Systems},
  booktitle    = {6th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2000), 11-15 September 2000, Tokyo, Japan},
  pages        = {36},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICECCS.2000.873926},
  doi          = {10.1109/ICECCS.2000.873926},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/KaanicheLB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/KaanicheLB00,
  author       = {Mohamed Ka{\^{a}}niche and
                  Jean{-}Claude Laprie and
                  Jean{-}Paul Blanquart},
  editor       = {Floor Koornneef and
                  Meine van der Meulen},
  title        = {A Dependability-Explicit Model for the Development of Computing Systems},
  booktitle    = {Computer Safety, Reliability and Security, 19th International Conference,
                  {SAFECOMP} 2000, Rotterdam, The Netherlands, October 24-27, 2000,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1943},
  pages        = {107--116},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-40891-6\_10},
  doi          = {10.1007/3-540-40891-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/KaanicheLB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Kaaniche99,
  author       = {Mohamed Ka{\^{a}}niche},
  title        = {Evaluation de la s{\^{u}}ret{\'{e}} de fonctionnement informatique.
                  Fautes physiques, fautes de conception, malveillances},
  year         = {1999},
  url          = {https://tel.archives-ouvertes.fr/tel-00142168},
  timestamp    = {Thu, 28 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Kaaniche99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pe/FotaKK99,
  author       = {Nicolae Fota and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {Dependability Evaluation of an Air Traffic Control Computing System},
  journal      = {Perform. Evaluation},
  volume       = {35},
  number       = {3-4},
  pages        = {253--273},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0166-5316(99)00011-5},
  doi          = {10.1016/S0166-5316(99)00011-5},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pe/FotaKK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/OrtaloDK99,
  author       = {Rodolphe Ortalo and
                  Yves Deswarte and
                  Mohamed Ka{\^{a}}niche},
  title        = {Experimenting with Quantitative Evaluation Tools for Monitoring Operational
                  Security},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {25},
  number       = {5},
  pages        = {633--650},
  year         = {1999},
  url          = {https://doi.org/10.1109/32.815323},
  doi          = {10.1109/32.815323},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/OrtaloDK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/DeswarteKCG99,
  author       = {Yves Deswarte and
                  Mohamed Ka{\^{a}}niche and
                  Pierre Corneillie and
                  John Goodson},
  editor       = {Massimo Felici and
                  Karama Kanoun and
                  Alberto Pasquini},
  title        = {{SQUALE} Dependability Assessment Criteria},
  booktitle    = {Computer Safety, Reliability and Security, 18th International Conference,
                  SAFECOMP'99, Toulouse, France, September, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1698},
  pages        = {27--38},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48249-0\_3},
  doi          = {10.1007/3-540-48249-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/DeswarteKCG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftcs/KaanicheRKIK98,
  author       = {Mohamed Ka{\^{a}}niche and
                  Luigi Romano and
                  Zbigniew Kalbarczyk and
                  Ravishankar K. Iyer and
                  Richard M. Karcich},
  title        = {A Hierarchical Approach for Dependability Analysis of a Commercial
                  Cache-Based {RAID} Storage Architecture},
  booktitle    = {Digest of Papers: FTCS-28, The Twenty-Eigth Annual International Symposium
                  on Fault-Tolerant Computing, Munich, Germany, June 23-25, 1998},
  pages        = {6--15},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/FTCS.1998.689450},
  doi          = {10.1109/FTCS.1998.689450},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ftcs/KaanicheRKIK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/KanounKL97,
  author       = {Karama Kanoun and
                  Mohamed Ka{\^{a}}niche and
                  Jean{-}Claude Laprie},
  title        = {Qualitative and Quantitative Reliability Assessment},
  journal      = {{IEEE} Softw.},
  volume       = {14},
  number       = {2},
  pages        = {77--87},
  year         = {1997},
  url          = {https://doi.org/10.1109/52.582977},
  doi          = {10.1109/52.582977},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/KanounKL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/KaanicheK96,
  author       = {Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {Reliability of a commercial telecommunications system},
  booktitle    = {Seventh International Symposium on Software Reliability Engineering,
                  {ISSRE} 1996, White Plains, NY, USA, October 30, 1996-Nov. 2, 1996},
  pages        = {207--212},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/ISSRE.1996.558807},
  doi          = {10.1109/ISSRE.1996.558807},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/KaanicheK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/FotaKKP96,
  author       = {Nicolae Fota and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun and
                  Alain Peytavin},
  editor       = {Erwin Schoitsch},
  title        = {Safety Analysis and Evaluation of an Air Traffic Control Computing
                  System},
  booktitle    = {15th International Conference on Computer Safety, Reliability and
                  Security, Safe Comp 1996, Vienna, Austria, October 23-25 1996},
  pages        = {219--229},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/978-1-4471-0937-2\_19},
  doi          = {10.1007/978-1-4471-0937-2\_19},
  timestamp    = {Tue, 25 Jun 2019 15:55:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/FotaKKP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DacierDK96,
  author       = {Marc Dacier and
                  Yves Deswarte and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Sokratis K. Katsikas and
                  Dimitris Gritzalis},
  title        = {Models and tools for quantitative assessment of operational security},
  booktitle    = {Information Systems Security, Facing the information society of the
                  21st Century},
  series       = {{IFIP} Conference Proceedings},
  volume       = {54},
  pages        = {177--186},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Thu, 03 Jan 2002 12:08:24 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/DacierDK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pnpm/LaprieKK95,
  author       = {Jean{-}Claude Laprie and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {Modeling computer systems evolutions: non-stationary processes and
                  stochastic Petri nets-application to dependability growth},
  booktitle    = {Proceedings of the Sixth International Workshop on Petri Nets and
                  Performance Models, {PNPM} 1995, Durham, NC, USA, October 3-6, 1995},
  pages        = {221--230},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/PNPM.1995.524338},
  doi          = {10.1109/PNPM.1995.524338},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pnpm/LaprieKK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/KaanicheKCM94,
  author       = {Mohamed Ka{\^{a}}niche and
                  Karama Kanoun and
                  Michel Cukier and
                  Marta Rettelbusch de Bastos Martini},
  editor       = {Klaus Echtle and
                  Dieter K. Hammer and
                  David Powell},
  title        = {Software Reliability Analysis of Three Successive Generations of a
                  Switching System},
  booktitle    = {Dependable Computing - EDCC-1, First European Dependable Computing
                  Conference, Berlin, Germany, October 4-6, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {852},
  pages        = {473--490},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58426-9\_153},
  doi          = {10.1007/3-540-58426-9\_153},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/edcc/KaanicheKCM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftcs/KanounKLM93,
  author       = {Karama Kanoun and
                  Mohamed Ka{\^{a}}niche and
                  Jean{-}Claude Laprie and
                  Sylvain Metge},
  title        = {SoRel: {A} Tool for Reliability Growth Analysis and Prediction From
                  Statistical Failure Data},
  booktitle    = {Digest of Papers: FTCS-23, The Twenty-Third Annual International Symposium
                  on Fault-Tolerant Computing, Toulouse, France, June 22-24, 1993},
  pages        = {654--659},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/FTCS.1993.627370},
  doi          = {10.1109/FTCS.1993.627370},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ftcs/KanounKLM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/KanounKL93,
  author       = {Karama Kanoun and
                  Mohamed Ka{\^{a}}niche and
                  Jean{-}Claude Laprie},
  title        = {Experience in software reliability: From data collection to quantitative
                  evaluation},
  booktitle    = {Fourth International Symposium on Software Reliability Engineering,
                  {ISSRE} 1993, Denver, CO, USA, November 3-6, 1993},
  pages        = {234--245},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/ISSRE.1993.624293},
  doi          = {10.1109/ISSRE.1993.624293},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/KanounKL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/KaanicheK93,
  author       = {Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  editor       = {Janusz G{\'{o}}rski},
  title        = {Software Failure Data Analysis of two Successive Generations of a
                  Switching System},
  booktitle    = {The 12th International Conference on Computer Safety, Reliability
                  and Security, {SAFECOMP} 1993, Pozna{\'{n}}-Kiekrz, Poland, October
                  27-29, 1993},
  pages        = {230--239},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/978-1-4471-2061-2\_24},
  doi          = {10.1007/978-1-4471-2061-2\_24},
  timestamp    = {Mon, 24 Jun 2019 15:52:03 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/KaanicheK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Kaaniche92,
  author       = {Mohamed Ka{\^{a}}niche},
  title        = {Mod{\`{e}}le hyperexponentiel en temps continu et en temps discret
                  pour l'{\'{e}}valuation de la croissance de la s{\^{u}}ret{\'{e}}
                  de fonctionnement},
  school       = {National Polytechnic Institute of Toulouse, France},
  year         = {1992},
  url          = {https://tel.archives-ouvertes.fr/tel-00142181},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Kaaniche92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/KaanicheK92,
  author       = {Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {The discrete time hyperexponential model for software reliability
                  growth evaluation},
  booktitle    = {Third International Symposium on Software Reliability Engineering,
                  {ISSRE} 1992, Research Triangle Park, NC, USA, October 7-10, 1992},
  pages        = {64--75},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/ISSRE.1992.285857},
  doi          = {10.1109/ISSRE.1992.285857},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/KaanicheK92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/LaprieKBK91,
  author       = {Jean{-}Claude Laprie and
                  Karama Kanoun and
                  Christian B{\'{e}}ounes and
                  Mohamed Ka{\^{a}}niche},
  title        = {The {KAT} (Knowledge-Action-Transformation) Approach to the Modeling
                  and Evaluation of Reliability and Availability Growth},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {17},
  number       = {4},
  pages        = {370--382},
  year         = {1991},
  url          = {https://doi.org/10.1109/32.90436},
  doi          = {10.1109/32.90436},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/LaprieKBK91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftcs/LaprieBKK90,
  author       = {Jean{-}Claude Laprie and
                  Christian B{\'{e}}ounes and
                  Mohamed Ka{\^{a}}niche and
                  Karama Kanoun},
  title        = {The transformation approach to the modeling and evaluation of the
                  reliability and availability growth},
  booktitle    = {Proceedings of the 20th International Symposium on Fault-Tolerant
                  Computing, {FTCS} 1990, Newcastle Upon Tyne, UK, 26-28 June, 1990},
  pages        = {364--371},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/FTCS.1990.89390},
  doi          = {10.1109/FTCS.1990.89390},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ftcs/LaprieBKK90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics