Publications

Peer-reviewed publications

Generated using php-bibHTML based on the BiblioPhile PHP BibTex parser.

  • 2016:
    1. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. R. Jhawar, K. Lounis and S. Mauw. In Security and Trust Management, Springer International Publishing, pp. 138–153, 2016. bib ]
    2. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua. In International Conference on Quantitative Evaluation of Systems, pp. 159–162, 2016. bib ]
    3. Fast authentication in wireless sensor networks. C. Benzaid, K. Lounis, A. Al-Nemrat, N. Badache and M. Alazab. Future Generation Computer Systems, 55:362–375, 2016. bib ]
  • 2011:
    1. Installation et configuration d’une solution de détection d’intrusions sans fil (Kismet). K. Lounis, N. Nouali, Taboudjemat and A. Babakhouya. 2011. bib ]
    2. Installation et configuration des Firmwares DD-WRT et Open WRT sur les routeurs Linksys WRT54GL. K. Lounis, N. Nouali-Taboudjemat and A. Babakhouya. Technical report, CERIST, 2011. bib ]