A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees.
R. Jhawar, K. Lounis and S. Mauw.
In Security and Trust Management,
Springer International Publishing, pp. 138–153, 2016.
[ bib ]
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua.
In International Conference on Quantitative Evaluation of Systems,
pp. 159–162, 2016.
[ bib ]
Fast authentication in wireless sensor networks.
C. Benzaid, K. Lounis, A. Al-Nemrat, N. Badache and M. Alazab.
Future Generation Computer Systems,
55:362–375, 2016.
[ bib ]
2011:
Installation et configuration d’une solution de détection d’intrusions sans fil (Kismet).
K. Lounis, N. Nouali, Taboudjemat and A. Babakhouya.
2011.
[ bib ]
Installation et configuration des Firmwares DD-WRT et Open WRT sur les routeurs Linksys WRT54GL.
K. Lounis, N. Nouali-Taboudjemat and A. Babakhouya.
Technical report, CERIST, 2011.
[ bib ]