Publications

photo

Peer-reviewed publications

Generated using php-bibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.

  • 2014:
    1. A formal verification framework for SysML activity diagrams. S. Ouchani, O.Aït. Mohamed and M. Debbabi. Expert Systems with Applications, 41(6):2713–2728, 2014. bib ]
    2. A property-based abstraction framework for SysML activity diagrams. S. Ouchani, O. Aït Mohamed and M. Debbabi. Knowledge-Based Systems, 56:328–343, 2014. bib ]
    3. Attacks Generation by Detecting Attack Surfaces. S. Ouchani and G. Lenzini. Procedia Computer Science, 32:529–536, 2014. bib ]
  • 2013:
    1. Symmetry Reduction of Time-Triggered Ethernet Protocol. M. Ammar, S. Ouchani and O.Aït. Mohamed. Procedia Computer Science, 19:273–280, 2013. bib ]
    2. A Security Risk Assessment Framework for SysML Activity Diagrams. S. Ouchani, O.Aït. Mohamed and M. Debbabi. In Software Security and Reliability (SERE), 2013 IEEE 7th International Conference on, pp. 227–236, 2013. bib ]
    3. A formal verification framework for Bluespec System Verilog. S. Ouchani, O. Mohamed and M. Debbabi. In Specification & Design Languages (FDL), 2013 Forum on, pp. 1–7, 2013. bib ]
  • 2012:
    1. Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols. S. Ouchani, Y. Jarraya, O. Mohamed and M. Debbabi. Journal of Software, 7(7):1488–1495, 2012. bib ]
    2. A non-convex classifier support for abstraction-refinement framework. S. Ouchani, O. Ait’Mohamed and M. Debbabi. In Microelectronics (ICM), 2012 24th International Conference on, pp. 1–4, 2012. bib ]
    3. A Probabilistic Verification Framework for SysML Activity Diagrams. S. OUCHANI. New Trends in Software Methodologies, Tools and Techniques: Proceedings of the Eleventh SoMeT\_12, 246:108, 2012. bib ]
    4. Efficient probabilistic abstraction for SysML activity diagrams. S. Ouchani, O. Mohamed and M. Debbabi. In Software Engineering and Formal Methods, Springer, pp. 263–277, 2012. bib ]
  • 2011:
    1. Security Estimation in Streaming Protocols. S. Ouchani, Y. Jarraya, O. Mohamed and M. Debbabi. In Innovations in Information Technology (IIT), 2011 International Conference on, pp. 427–432, 2011. bib ]
    2. Model-based systems security quantification. S. Ouchani, Y. Jarraya and O.Aït. Mohamed. In Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on, pp. 142–149, 2011. bib ]
  • 2010:
    1. Verification of the Correctness in Composed UML Behavioural Diagrams. S. Ouchani, O. Mohamed, M. Debbabi and M. Pourzandi. In Software Engineering Research, Management and Applications 2010, Springer, pp. 163–177, 2010. bib ]
  • 2009:
    1. A survey of model-driven testing techniques. M. Mussa, S. Ouchani, W. Al Sammane and A. Hamou-Lhadj. In Quality Software, 2009. QSIC’09. 9th International Conference on, pp. 167–172, 2009. bib ]