default search action
Mohamed Kaâniche
Person information
- affiliation: LAAS, Toulouse, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c76]Romain Cayre, Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche, Aurélien Francillon:
OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers. AsiaCCS 2024 - [c75]Florent Galtier, Guillaume Auriol, Vincent Nicomette, Paul L. R. Olivier, Romain Cayre, Mohamed Kaâniche:
Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit. DIMVA 2024: 525-544 - 2022
- [j30]Remi Adelin, Cyrius Nugier, Eric Alata, Vincent Nicomette, Vincent Migliore, Mohamed Kaâniche:
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol. J. Comput. Virol. Hacking Tech. 18(4): 425-452 (2022) - 2021
- [j29]Pierre-François Gimenez, Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment. ACM Trans. Cyber Phys. Syst. 5(3): 24:1 (2021) - [c74]Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips. DSN 2021: 376-387 - [c73]Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections. DSN 2021: 388-399 - [c72]Romain Cayre, Géraldine Vache Marconato, Florent Galtier, Mohamed Kaâniche, Vincent Nicomette, Guillaume Auriol:
Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller. WISEC 2021: 386-388 - 2020
- [c71]Aliénor Damien, Pierre-François Gimenez, Nathalie Feyt, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications. ISSRE 2020: 358-368 - [c70]Malcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, Youssef Laarouchi:
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices. NCA 2020: 1-8 - [c69]Florent Galtier, Romain Cayre, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:
A PSD-based fingerprinting approach to detect IoT device spoofing. PRDC 2020: 40-49
2010 – 2019
- 2019
- [j28]Yann Bachy, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
Smart-TV security: risk analysis and experiments on Smart-TV communication channels. J. Comput. Virol. Hacking Tech. 15(1): 61-76 (2019) - [c68]Romain Cayre, Vincent Nicomette, Guillaume Auriol, Eric Alata, Mohamed Kaâniche, Géraldine Vache Marconato:
Mirage: Towards a Metasploit-Like Framework for IoT. ISSRE 2019: 261-270 - [c67]Aliénor Damien, Michael Marcourt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche:
Implementation of a Host-Based Intrusion Detection System for Avionic Applications. PRDC 2019: 178-187 - [e4]Pierre Ganty, Mohamed Kaâniche:
Verification and Evaluation of Computer and Communication Systems - 13th International Conference, VECoS 2019, Porto, Portugal, October 9, 2019, Proceedings. Lecture Notes in Computer Science 11847, Springer 2019, ISBN 978-3-030-35091-8 [contents] - 2018
- [j27]Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi:
A language-based intrusion detection approach for automotive embedded networks. Int. J. Embed. Syst. 10(1): 1-12 (2018) - [j26]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
IOMMU protection against I/O attacks: a vulnerability and a proof of concept. J. Braz. Comput. Soc. 24(1): 2:1-2:11 (2018) - [j25]Carla Sauvanaud, Mohamed Kaâniche, Karama Kanoun, Kahina Lazri, Guthemberg Silvestre:
Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned. J. Syst. Softw. 139: 84-106 (2018) - [j24]Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
State of the art of network protocol reverse engineering tools. J. Comput. Virol. Hacking Tech. 14(1): 53-68 (2018) - [c66]Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic:
Specification-Based Protocol Obfuscation. DSN 2018: 478-489 - [c65]Guillaume Averlant, Eric Alata, Mohamad Kaâniche, Vincent Nicomette, Yuxiao Mao:
SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture. NCA 2018: 1-5 - [c64]Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. NCA 2018: 1-8 - [i14]Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic:
Specification-Based Protocol Obfuscation. CoRR abs/1807.09464 (2018) - [i13]Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. CoRR abs/1811.03934 (2018) - 2017
- [c63]Jonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche:
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling. EDCC 2017: 147-150 - [c62]Guillaume Averlant, Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms. PRDC 2017: 245-254 - 2016
- [j23]Eric Alata, Vincent Nicomette, Julien Duchêne, Colas Le Guernic, Mohamed Kaâniche:
Outils pour la rétro-conception de protocoles. Analyse et classification. Tech. Sci. Informatiques 35(6): 609-640 (2016) - [c61]Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
Protocol Reverse Engineering: Challenges and Obfuscation. CRiSIS 2016: 139-144 - [c60]Carla Sauvanaud, Kahina Lazri, Mohamed Kaâniche, Karama Kanoun:
Towards Black-Box Anomaly Detection in Virtual Network Functions. DSN Workshops 2016: 254-257 - [c59]Carla Sauvanaud, Kahina Lazri, Mohamed Kaâniche, Karama Kanoun:
Anomaly Detection and Root Cause Localization in Virtual Network Functions. ISSRE 2016: 196-206 - [c58]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
Bypassing IOMMU Protection against I/O Attacks. LADC 2016: 145-150 - 2015
- [c57]Yann Bachy, Frederic Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, Pierre Lukjanenko:
Smart-TV Security Analysis: Practical Experiments. DSN 2015: 497-504 - [c56]Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds. EDCC 2015: 49-60 - [c55]Carla Sauvanaud, Guthemberg Silvestre, Mohamed Kaâniche, Karama Kanoun:
Data Stream Clustering for Online Anomaly Detection in Cloud Applications. EDCC 2015: 120-131 - [c54]Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège:
Security of ISP Access Networks: Practical Experiments. EDCC 2015: 205-212 - [c53]Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Guillaume Averlant:
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring. PRDC 2015: 189-198 - [c52]Jérémie Guiochet, Quynh Anh Do Hoang, Mohamed Kaâniche:
A Model for Safety Case Confidence Assessment. SAFECOMP 2015: 313-327 - [c51]Guthemberg Silvestre, Carla Sauvanaud, Mohamed Kaâniche, Karama Kanoun:
Tejo: A Supervised Anomaly Detection Scheme for NewSQL Databases. SERENE 2015: 114-127 - [c50]Mohamed Kaâniche:
Resilience Assessment: Accidental and Malicious Threats. VECoS 2015: 9 - [i12]Jérémie Guiochet, Quynh Anh Do Hoang, Mohamed Kaâniche:
A Model for Safety Case Confidence Assessment. CoRR abs/1512.04467 (2015) - 2014
- [j22]Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications. Int. J. Secur. Softw. Eng. 5(1): 19-38 (2014) - [j21]Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège:
La sécurité des box ADSL. Analyse de risques et expérimentations. Ingénierie des Systèmes d Inf. 19(6): 63-88 (2014) - [j20]Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
An automated black box approach for web vulnerability identification and attack scenario generation. J. Braz. Comput. Soc. 20(1): 4:1-4:16 (2014) - [j19]Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos:
Fiabilité de mission d'un avion. Évaluation stochastique en opération. Tech. Sci. Informatiques 33(9-10): 777-807 (2014) - [j18]Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
Identification de vulnérabilités web et génération de scénarios d'attaque. Tech. Sci. Informatiques 33(9-10): 809-840 (2014) - [c49]Jean Arlat, Michel Diaz, Mohamed Kaâniche:
Towards resilient cyber-physical systems: The ADREAM project. DTIS 2014: 1-5 - [c48]Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. NSS 2014: 1-14 - [c47]Guthemberg Silvestre, Carla Sauvanaud, Mohamed Kaâniche, Karama Kanoun:
An Anomaly Detection Approach for Scale-Out Storage Systems. SBAC-PAD 2014: 294-301 - 2013
- [j17]Géraldine Vache Marconato, Mohamed Kaâniche, Vincent Nicomette:
A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach. Comput. J. 56(4): 422-439 (2013) - [j16]Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos:
Aircraft operational reliability - A model-based approach and a case study. Reliab. Eng. Syst. Saf. 120: 163-176 (2013) - [j15]Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche:
Évaluation quantitative de la sécurité. Approche basée sur les vulnérabilités. Tech. Sci. Informatiques 32(1): 41-75 (2013) - [c46]Mohamed Kaâniche, Michael D. Harrison, Hermann Kopetz, Daniel P. Siewiorek:
2nd workshop on open resilient human-aware cyber-physical systems. DSN Workshops 2013: 1-2 - [c45]Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi:
Survey on security threats and protection mechanisms in embedded automotive networks. DSN Workshops 2013: 1-12 - [c44]Jérémie Guiochet, Quynh Anh Do Hoang, Mohamed Kaâniche, David Powell:
Model-based safety analysis of human-robot interactions: The MIRAS walking assistance robot. ICORR 2013: 1-7 - [c43]Eric Alata, Mohamed Kaâniche, Vincent Nicomette, Rim Akrout:
An Automated Approach to Generate Web Applications Attack Scenarios. LADC 2013: 78-85 - [c42]Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi:
Security of embedded automotive networks: state of the art and a research proposal. CARS@SAFECOMP 2013 - [e3]Friedemann Bitsch, Jérémie Guiochet, Mohamed Kaâniche:
Computer Safety, Reliability, and Security - 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings. Lecture Notes in Computer Science 8153, Springer 2013, ISBN 978-3-642-40792-5 [contents] - [i11]Maritta Heisel, Mohamed Kaâniche, Alexander B. Romanovsky, Elena Troubitsyna:
Engineering Resilient Systems: Models, Methods and Tools (Dagstuhl Seminar 13022). Dagstuhl Reports 3(1): 30-46 (2013) - 2012
- [j14]Luiz Eduardo Buzato, Elias P. Duarte Jr., Mohamed Kaâniche:
Message from the special issue editors. J. Braz. Comput. Soc. 18(1): 1-2 (2012) - [c41]Romaric Ludinard, Eric Totel, Frederic Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
Detecting attacks against data in web applications. CRiSIS 2012: 1-8 - [c40]Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche:
Security-related vulnerability life cycle analysis. CRiSIS 2012: 1-8 - [c39]Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
A distributed platform of high interaction honeypots and experimental results. PST 2012: 229-230 - [c38]Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos:
Impact of Operational Reliability Re-assessment during Aircraft Missions. SRDS 2012: 219-224 - [i10]Giovanna Dondossola, Geert Deconinck, Felicita Di Giandomenico, Susanna Donatelli, Mohamed Kaâniche, Paulo Veríssimo:
Critical Utility Infrastructural Resilience. CoRR abs/1211.5736 (2012) - [i9]Mohamed Kaâniche, Paolo Lollini, Andrea Bondavalli, Karama Kanoun:
Modeling the resilience of large and evolving systems. CoRR abs/1211.5738 (2012) - 2011
- [j13]Mohamed Kaâniche, Aad P. A. van Moorsel:
It All Depends, and Increasingly So. IEEE Secur. Priv. 9(6): 56-57 (2011) - [j12]Andrea Bondavalli, Ossama Hamouda, Mohamed Kaâniche, Paolo Lollini, István Majzik, Hans-Peter Schwefel:
The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems. IEEE Trans. Mob. Comput. 10(6): 783-796 (2011) - [j11]Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb:
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. J. Comput. Virol. 7(2): 143-157 (2011) - [c37]Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos:
Operational reliability of an aircraft with adaptive missions. EWDC 2011: 9-14 - [c36]Anthony Dessiatnikoff, Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
A Clustering Approach for Web Vulnerabilities Detection. PRDC 2011: 194-203 - [c35]Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos:
Modeling Aircraft Operational Reliability. SAFECOMP 2011: 157-170 - 2010
- [j10]Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb:
Une analyse empirique du comportement d'attaquants. Expérimentations et résultats. Tech. Sci. Informatiques 29(6): 691-720 (2010) - [c34]Ossama Hamouda, Mohamed Kaâniche, Karama Kanoun:
Availability modelling of a virtual black box for automotive systems. SERENE 2010: 52-60
2000 – 2009
- 2009
- [j9]Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
PolyOrBAC: A security framework for Critical Infrastructures. Int. J. Crit. Infrastructure Prot. 2(4): 154-169 (2009) - [j8]Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
Modélisation de la sreté de fonctionnement basée sur le langage AADL et les RdPSG. Tech. Sci. Informatiques 28(1): 7-37 (2009) - [c33]Ossama Hamouda, Mohamed Kaâniche, Karama Kanoun:
Safety modeling and evaluation of Automated Highway Systems. DSN 2009: 73-82 - 2008
- [j7]Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche:
Internet attacks monitoring with dynamic connection redirection mechanisms. J. Comput. Virol. 4(2): 127-136 (2008) - [c32]Amine Baïna, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaâniche:
Access control for cooperative systems: A comparative analysis. CRiSIS 2008: 19-26 - [c31]Marco Beccuti, Giuliana Franceschinis, Mohamed Kaâniche, Karama Kanoun:
Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures. CRITIS 2008: 48-59 - [c30]Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation. EDCC 2008: 85-90 - [c29]Amine Baïna, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaâniche:
Collaborative Access Control For Critical Infrastructures. Critical Infrastructure Protection 2008: 189-201 - [c28]Erling Vestergaard Matthiesen, Ossama Hamouda, Mohamed Kaâniche, Hans-Peter Schwefel:
Dependability Evaluation of a Replication Service for Mobile Applications in Dynamic Ad-Hoc Networks. ISAS 2008: 171-186 - [i8]Jean-Claude Laprie, Karama Kanoun, Mohamed Kaâniche:
Modelling interdependencies between the electricity and information infrastructures. CoRR abs/0809.4107 (2008) - [i7]Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation. CoRR abs/0809.4108 (2008) - [i6]Ana-Elena Rugina, Peter H. Feiler, Karama Kanoun, Mohamed Kaâniche:
Software dependability modeling using an industry-standard architecture description language. CoRR abs/0809.4109 (2008) - 2007
- [c27]Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
Access Control for Collaborative Systems: A Web Services Based Approach. ICWS 2007: 1064-1071 - [c26]Ludovic Courtès, Ossama Hamouda, Mohamed Kaâniche, Marc-Olivier Killijian, David Powell:
Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices. PRDC 2007: 139-146 - [c25]Jean-Claude Laprie, Karama Kanoun, Mohamed Kaâniche:
Modelling Interdependencies Between the Electricity and Information Infrastructures. SAFECOMP 2007: 54-67 - [i5]Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb:
Lessons Learned from the deployment of a high-interaction honeypot. CoRR abs/0704.0858 (2007) - [i4]Cristina Simache, Mohamed Kaâniche:
Availability assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx logfiles : a case study. CoRR abs/0704.0860 (2007) - [i3]Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette:
Empirical analysis and statistical modeling of attack processes based on honeypots. CoRR abs/0704.0861 (2007) - [i2]Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
An architecture-based dependability modeling framework using AADL. CoRR abs/0704.0865 (2007) - [i1]Mohamed Kaâniche, Luigi Romano, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Richard M. Karcich:
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture. CoRR abs/0704.0879 (2007) - 2006
- [c24]Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb:
Lessons learned from the deployment of a high-interaction honeypot. EDCC 2006: 39-46 - [c23]Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
A System Dependability Modeling Framework Using AADL and GSPNs. WADS 2006: 14-38 - [c22]Magnos Martinello, Mohamed Kaâniche, Karama Kanoun, Carlos Aguilar Melchor:
Modeling user perceived unavailability due to long response times. IPDPS 2006 - 2005
- [j6]Magnos Martinello, Mohamed Kaâniche, Karama Kanoun:
Web service availability - impact of error recovery and traffic model. Reliab. Eng. Syst. Saf. 89(1): 6-16 (2005) - [c21]Cristina Simache, Mohamed Kaâniche:
Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx log files: A case study. PRDC 2005: 49-56 - [e2]Mario Dal Cin, Mohamed Kaâniche, András Pataricza:
Dependable Computing - EDCC-5, 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005, Proceedings. Lecture Notes in Computer Science 3463, Springer 2005, ISBN 3-540-25723-3 [contents] - 2004
- [e1]Mohamed Kaâniche:
Student Forum, IFIP 18th World Computer Congress - Student Forum, 22-27 August 2004, Toulouse, France. Kluwer 2004 [contents] - 2003
- [j5]Mohamed Kaâniche, Karama Kanoun, Mourad Rabah:
Multi-level modeling approach for the availability assessment of e-business applications. Softw. Pract. Exp. 33(14): 1323-1341 (2003) - [c20]Mohamed Kaâniche, Karama Kanoun, Magnos Martinello:
A User-Perceived Availability Evaluation of a Web Based Travel Agency. DSN 2003: 709-718 - [c19]Magnos Martinello, Mohamed Kaâniche, Karama Kanoun:
Web Service Availability - Impact of Error Recovery. SAFECOMP 2003: 165-178 - 2002
- [c18]Cristina Simache, Mohamed Kaâniche, Ayda Saïdane:
Event Log based Dependability Analysis of Windows NT and 2K Systems. PRDC 2002: 311-315 - 2001
- [c17]Mohamed Kaâniche, Karama Kanoun, Mourad Rabah:
A framework for modeling availability of E-business systems. ICCCN 2001: 40-45 - [c16]Cristina Simache, Mohamed Kaâniche:
Measurement-Based Availability of Unix Systems in a Distributed Environment. ISSRE 2001: 346-355 - [c15]Mohamed Kaâniche, Yannick Le Guédart, Jean Arlat, Thierry Boyer:
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models. SAFECOMP 2001: 130-144 - 2000
- [c14]Mohamed Kaâniche, Jean-Claude Laprie, Jean-Paul Blanquart:
Dependability Engineering of Complex Computing Systems. ICECCS 2000: 36- - [c13]Mohamed Kaâniche, Jean-Claude Laprie, Jean-Paul Blanquart:
A Dependability-Explicit Model for the Development of Computing Systems. SAFECOMP 2000: 107-116
1990 – 1999
- 1999
- [b2]Mohamed Kaâniche:
Evaluation de la sûreté de fonctionnement informatique. Fautes physiques, fautes de conception, malveillances. National Polytechnic Institute of Toulouse, France, 1999 - [j4]Nicolae Fota, Mohamed Kaâniche, Karama Kanoun:
Dependability Evaluation of an Air Traffic Control Computing System. Perform. Evaluation 35(3-4): 253-273 (1999) - [j3]Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche:
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Trans. Software Eng. 25(5): 633-650 (1999) - [c12]Yves Deswarte, Mohamed Kaâniche, Pierre Corneillie, John Goodson:
SQUALE Dependability Assessment Criteria. SAFECOMP 1999: 27-38 - 1998
- [c11]Mohamed Kaâniche, Luigi Romano, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Richard M. Karcich:
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture. FTCS 1998: 6-15 - 1997
- [j2]Karama Kanoun, Mohamed Kaâniche, Jean-Claude Laprie:
Qualitative and Quantitative Reliability Assessment. IEEE Softw. 14(2): 77-87 (1997) - 1996
- [c10]Mohamed Kaâniche, Karama Kanoun:
Reliability of a commercial telecommunications system. ISSRE 1996: 207-212 - [c9]Nicolae Fota, Mohamed Kaâniche, Karama Kanoun, Alain Peytavin:
Safety Analysis and Evaluation of an Air Traffic Control Computing System. SAFECOMP 1996: 219-229 - [c8]Marc Dacier, Yves Deswarte, Mohamed Kaâniche:
Models and tools for quantitative assessment of operational security. SEC 1996: 177-186 - 1995
- [c7]Jean-Claude Laprie, Mohamed Kaâniche, Karama Kanoun:
Modeling computer systems evolutions: non-stationary processes and stochastic Petri nets-application to dependability growth. PNPM 1995: 221-230 - 1994
- [c6]Mohamed Kaâniche, Karama Kanoun, Michel Cukier, Marta Rettelbusch de Bastos Martini:
Software Reliability Analysis of Three Successive Generations of a Switching System. EDCC 1994: 473-490 - 1993
- [c5]Karama Kanoun, Mohamed Kaâniche, Jean-Claude Laprie, Sylvain Metge:
SoRel: A Tool for Reliability Growth Analysis and Prediction From Statistical Failure Data. FTCS 1993: 654-659 - [c4]Karama Kanoun, Mohamed Kaâniche, Jean-Claude Laprie:
Experience in software reliability: From data collection to quantitative evaluation. ISSRE 1993: 234-245 - [c3]Mohamed Kaâniche, Karama Kanoun:
Software Failure Data Analysis of two Successive Generations of a Switching System. SAFECOMP 1993: 230-239 - 1992
- [b1]Mohamed Kaâniche:
Modèle hyperexponentiel en temps continu et en temps discret pour l'évaluation de la croissance de la sûreté de fonctionnement. National Polytechnic Institute of Toulouse, France, 1992 - [c2]Mohamed Kaâniche, Karama Kanoun:
The discrete time hyperexponential model for software reliability growth evaluation. ISSRE 1992: 64-75 - 1991
- [j1]Jean-Claude Laprie, Karama Kanoun, Christian Béounes, Mohamed Kaâniche:
The KAT (Knowledge-Action-Transformation) Approach to the Modeling and Evaluation of Reliability and Availability Growth. IEEE Trans. Software Eng. 17(4): 370-382 (1991) - 1990
- [c1]Jean-Claude Laprie, Christian Béounes, Mohamed Kaâniche, Karama Kanoun:
The transformation approach to the modeling and evaluation of the reliability and availability growth. FTCS 1990: 364-371
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint