A survey of model-driven testing techniques M Mussa, S Ouchani, W Al Sammane, A Hamou-Lhadj 2009 Ninth International Conference on Quality Software, 167-172, 2009 | 76 | 2009 |
Gene selection for cancer classification using DCA HA Le Thi, VV Nguyen, S Ouchani Advanced Data Mining and Applications: 4th International Conference, ADMA …, 2008 | 66 | 2008 |
A formal verification framework for SysML activity diagrams S Ouchani, OA Mohamed, M Debbabi Expert Systems with Applications 41 (6), 2713-2728, 2014 | 58 | 2014 |
Recommendations-based on semantic analysis of social networks in learning environments A Khaled, S Ouchani, C Chohra Computers in Human Behavior 101, 435-449, 2019 | 45 | 2019 |
Ensuring the functional correctness of IoT through formal modeling and verification S Ouchani Model and Data Engineering: 8th International Conference, MEDI 2018 …, 2018 | 38 | 2018 |
Security analysis of socio-technical physical systems G Lenzini, S Mauw, S Ouchani Computers & electrical engineering 47, 258-274, 2015 | 32 | 2015 |
Specification, verification, and quantification of security in model-based systems S Ouchani, M Debbabi Computing 97, 691-711, 2015 | 30 | 2015 |
Assessing the severity of smart attacks in industrial cyber-physical systems A Khaled, S Ouchani, Z Tari, K Drira ACM Transactions on Cyber-Physical Systems 5 (1), 1-28, 2020 | 25 | 2020 |
Attacks generation by detecting attack surfaces S Ouchani, G Lenzini Procedia Computer Science 32, 529-536, 2014 | 25 | 2014 |
Safety analysis of train control system based on model-driven design methodology A Baouya, OA Mohamed, D Bennouar, S Ouchani Computers in Industry 105, 1-16, 2019 | 22 | 2019 |
A probabilistic and timed verification approach of SysML state machine diagram A Baouya, D Bennouar, OA Mohamed, S Ouchani 2015 12th International Symposium on Programming and Systems (ISPS), 1-9, 2015 | 21 | 2015 |
PUF-based mutual authentication and session key establishment protocol for IoT devices F Zerrouki, S Ouchani, H Bouarfa Journal of Ambient Intelligence and Humanized Computing 14 (9), 12575-12593, 2023 | 20 | 2023 |
A systematic review of federated learning: Challenges, aggregation methods, and development tools BS Guendouzi, S Ouchani, HEL Assaad, MEL Zaher Journal of Network and Computer Applications, 103714, 2023 | 20 | 2023 |
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals G Lenzini, S Ouchani, P Roenne, PYA Ryan, Y Geng, J Lagerwall, ... 2017 IEEE workshop on information forensics and security (WIFS), 1-6, 2017 | 20 | 2017 |
A security risk assessment framework for SysML activity diagrams S Ouchani, OA Mohamed, M Debbabi 2013 IEEE 7th International Conference on Software Security and Reliability …, 2013 | 20 | 2013 |
A Probabilistic Verification Framework for SysML Activity Diagrams S OUCHANI New Trends in Software Methodologies, Tools and Techniques: Proceedings of …, 2012 | 20 | 2012 |
Model-based systems security quantification S Ouchani, Y Jarraya, OA Mohamed 2011 Ninth Annual International Conference on Privacy, Security and Trust …, 2011 | 20 | 2011 |
Predictive maintenance for smart industrial systems: a roadmap H Meriem, H Nora, O Samir Procedia Computer Science 220, 645-650, 2023 | 19 | 2023 |
A survey on silicon PUFs F Zerrouki, S Ouchani, H Bouarfa Journal of Systems Architecture 127, 102514, 2022 | 19 | 2022 |
Efficient probabilistic abstraction for SysML activity diagrams S Ouchani, O Ait Mohamed, M Debbabi Software Engineering and Formal Methods: 10th International Conference, SEFM …, 2012 | 19 | 2012 |