Formal and joint verification of control programs and supervision interfaces for socio-technical systems components S Mesli-Kesraoui, A Toguyeni, A Bignon, F Oquendo, D Kesraoui, ... IFAC-PapersOnLine 49 (19), 426-431, 2016 | 13 | 2016 |
Formal verification of software-intensive systems architectures described with piping and instrumentation diagrams S Mesli-Kesraoui, D Kesraoui, F Oquendo, A Bignon, A Toguyeni, ... Software Architecture: 10th European Conference, ECSA 2016, Copenhagen …, 2016 | 7 | 2016 |
Vérification formelle de chaines de contrôle-commande d'éléments de conception standardisés S Mesli, A Bignon, D Kesraoui, A Toguyeni, F Oquendo, P Berruet Proceedings of the 11th International Conference on Modeling, Optimization …, 2016 | 6 | 2016 |
Intégration des techniques de vérification formelle dans une approche de conception des systèmes de contrôle-commande: application aux architectures SCADA SM Kesraoui Université de Bretagne Sud, 2017 | 4* | 2017 |
Identifying metamodel inaccurate structures during metamodel/constraint co-evolution E Cherfa, S Mesli-Kesraoui, C Tibermacine, S Sadou, R Fleurquin 2021 ACM/IEEE 24th International Conference on Model Driven Engineering …, 2021 | 3 | 2021 |
Formal verification of the race condition vulnerability in ladder programs S Mesli-Kesraoui, O Goubali, D Kesraoui, I Eloumami, F Oquendo 2020 IEEE Conference on Control Technology and Applications (CCTA), 892-897, 2020 | 3 | 2020 |
On investigating metamodel inaccurate structures E Cherfa, S Kesraoui, C Tibermacine, R Fleurquin, S Sadou Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1642-1649, 2020 | 3 | 2020 |
Resource constraint scheduling on two dedicated machines: application to avionics O Mesli-Kesraoui, L Ledreck, E Grolleau, S Kesraoui, P Berruet, ... EURO Journal on Computational Optimization, 100093, 2024 | | 2024 |
A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog A Elmarkez, S Mesli-Kesraoui, F Oquendo, P Berruet, D Kesraoui IFIP International Conference on Information Security Theory and Practice, 64-79, 2024 | | 2024 |
Verification of Control-Command Programs: Counterexample Explanation by Simulation S Mesli-Kesraoui, D Kesraoui, P Berruet, F Oquendo | | 2023 |
Génération automatique des applicatifs de contrôle-commande pour des logiciels chiffrés S Mesli-Kesraoui, D Kesraoui | | 2023 |
End User Designing of Complex Task Models for Complex Control-Command Systems O Goubali, P Girard, L Guittet, A Bignon, D Kesraoui, S Kesraoui-Mesli, ... Human-Computer Interaction. Perspectives on Design: Thematic Area, HCI 2019 …, 2019 | | 2019 |
Adaptation des contraintes à l'évolution de leur méta-modèle S Mesli < bound method Organization. get_name_with_acronym of< Organization: DUMAS …, 2013 | | 2013 |