An approach for the verification of UML models using B NT Truong, J Souquières Proceedings. 11th IEEE International Conference and Workshop on the …, 2004 | 18 | 2004 |
Analyzing RBAC security policy of implementation using AST TH Pham, NT Truong, VH Nguyen 2009 International Conference on Knowledge and Systems Engineering, 215-219, 2009 | 15 | 2009 |
Modeling and verifying ws-cdl using event-b HA Le, NT Truong Context-Aware Systems and Applications: First International Conference …, 2013 | 12 | 2013 |
Verification of behavioural elements of UML models using B NT Truong, J Souquieres Proceedings of the 2005 ACM symposium on Applied computing, 1546-1552, 2005 | 12 | 2005 |
A fast algorithm to compute heap memory bounds of Java Card applets TH Pham, AH Truong, NT Truong, WN Chin 2008 Sixth IEEE International Conference on Software Engineering and Formal …, 2008 | 11 | 2008 |
An approach to modeling and estimating power consumption of mobile applications HA Le, AT Bui, NT Truong Mobile networks and Applications 24, 124-133, 2019 | 10 | 2019 |
Verification of UML model elements using B NT Truong, J Souquieres Journal of information science and engineering 22, 357-373, 2006 | 9 | 2006 |
A formal approach to checking consistency in software refactoring HA Le, TH Dao, NT Truong Mobile networks and Applications 22, 356-366, 2017 | 7 | 2017 |
Validation des propriétés d'un scénario UML/OCL à partir de sa dérivation en B NT Truong, J Souquières Approches Formelles dans l'Assitance au Développement de Logiciels-AFADL …, 2004 | 7 | 2004 |
Coordinated consensus analysis of multi-agent systems using Event-B NT Truong, TB Trinh, VH Nguyen 2009 Seventh IEEE International Conference on Software Engineering and …, 2009 | 6 | 2009 |
Utilisation de B pour la vérification de spécifications UML et le développement formel orienté objet NT Truong Université Nancy II, 2006 | 6 | 2006 |
Modeling and verifying imprecise requirements of systems using Event-B HA Le, LD Thi, NT Truong Knowledge and Systems Engineering: Proceedings of the Fifth International …, 2014 | 5 | 2014 |
Checking the compliance of timing constraints in software applications TB Trinh, TA Do, NT Truong, VH Nguyen 2009 International Conference on Knowledge and Systems Engineering, 220-225, 2009 | 5 | 2009 |
Using b to verify the weaving of aspects TN Thuan, NV Ha 14th Asia-Pacific Software Engineering Conference (APSEC'07), 199-205, 2007 | 5 | 2007 |
Validation of UML static diagrams using B NT Truong, J Souquières International conference on Software Engineering Research and Practice (SERP), 7, 2005 | 5 | 2005 |
Generating Test Paths to Detect XSS Vulnerabilities of Web Applications HP Nguyen, TN Luong, NT Truong 2022 9th NAFOSTED Conference on Information and Computer Science (NICS), 287-293, 2022 | 4 | 2022 |
Formal Analysis of Database Trigger Systems Using Event-B AH Le, T Van Khanh, TN Thuan International Journal of Software Innovation (IJSI) 9 (4), 158-173, 2021 | 4 | 2021 |
An approach to analyze software security requirements in ABAC model TN Luong, DH Vo, NT Truong 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), 184-189, 2019 | 4 | 2019 |
Verifying eventuality properties of imprecise system requirements using Event-B HA Le, NT Truong, S Nakajima Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1651-1653, 2015 | 4 | 2015 |
Formal modeling and verification of context-aware systems using event-b HA Le, NT Truong Context-Aware Systems and Applications: Second International Conference …, 2014 | 4 | 2014 |