Experimenting with quantitative evaluation tools for monitoring operational security R Ortalo, Y Deswarte, M Kaâniche IEEE Transactions on Software Engineering 25 (5), 633-650, 1999 | 609 | 1999 |
Survey on security threats and protection mechanisms in embedded automotive networks I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013 | 263 | 2013 |
Modelling interdependencies between the electricity and information infrastructures JC Laprie, M Kanoun, K, Kaaniche SAFECOMP 2007, 2007 | 219 | 2007 |
Lessons learned from the deployment of a high-interaction honeypot E Alata, V Nicomette, M Kaaniche, M Dacier, M Herrb arXiv preprint arXiv:0704.0858, 2007 | 180 | 2007 |
Quantitative assessment of operational security: Models and tools M Dacier, Y Deswarte, M Kaâniche Information Systems Security, ed. by SK Katsikas and D. Gritzalis, London …, 1996 | 175 | 1996 |
A system dependability modeling framework using AADL and GSPNs AE Rugina, K Kanoun, M Kaâniche Architecting dependable systems IV, 14-38, 2007 | 153 | 2007 |
A language-based intrusion detection approach for automotive embedded networks I Studnia, E Alata, V Nicomette, M Kaâniche, Y Laarouchi International Journal of Embedded Systems 10 (1), 1-12, 2018 | 113 | 2018 |
Models and tools for quantitative assessment of operational security M Dacier, Y Deswarte, M Kaaniche Proc. 12th International Information Security Conference (IFIP SEC'96 …, 1996 | 112 | 1996 |
The KAT (Knowledge-Action-Transformation) approach to the modeling and evaluation of reliability and availability growth JC Laprie, K Kanoun, C Béounes, M Kaâniche IEEE Transactions on Software Engineering 17 (4), 370, 1991 | 104 | 1991 |
Anomaly detection and root cause localization in virtual network functions C Sauvanaud, K Lazri, M Kaâniche, K Kanoun 2016 IEEE 27th International Symposium on Software Reliability Engineering …, 2016 | 102 | 2016 |
The ADAPT tool: From AADL architectural models to stochastic petri nets through model transformation AE Rugina, K Kanoun, M Kaâniche 2008 Seventh European Dependable Computing Conference, 85-90, 2008 | 87 | 2008 |
State of the art of network protocol reverse engineering tools J Duchêne, C Le Guernic, E Alata, V Nicomette, M Kaâniche Journal of Computer Virology and Hacking Techniques 14, 53-68, 2018 | 81 | 2018 |
A framework for dependability engineering of critical computing systems M Kaâniche, JC Laprie, JP Blanquart Safety Science 40 (9), 731-752, 2002 | 76* | 2002 |
Empirical analysis and statistical modeling of attack processes based on honeypots M Kaaniche, Y Deswarte, E Alata, M Dacier, V Nicomette arXiv preprint arXiv:0704.0861, 2007 | 74 | 2007 |
Qualitative and quantitative reliability assessment K Kanoun, M Kaâniche, JP Laprie IEEE Software 14 (2), 77-87, 1997 | 74 | 1997 |
Guide de la sûreté de fonctionnement JC Laprie, J Arlat, A Blanquart, Jean-Paul, Costes, Y Crouzet, Y Deswarte, ... Cépaduès Éditions, 1995 | 74* | 1995 |
Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned C Sauvanaud, M Kaâniche, K Kanoun, K Lazri, GDS Silvestre Journal of Systems and Software 139, 84-106, 2018 | 70 | 2018 |
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned V Nicomette, M Kaâniche, E Alata, M Herrb Journal in computer virology 7, 143-157, 2011 | 69 | 2011 |
A user—perceived availability evaluation of a web based travel agency M Kaâniche, K Kanoun, M Martinello Proceedding of the 2003 International Symposium on Dependable Systems and …, 2003 | 69 | 2003 |
PolyOrBAC: a security framework for critical infrastructures A Abou El Kalam, Y Deswarte, A Baïna, M Kaâniche International Journal of Critical Infrastructure Protection 2 (4), 154-169, 2009 | 68 | 2009 |