A runtime verification framework for dynamically adaptive multi-agent systems
Dynamically adaptive multi-agent systems (DAMS) consist of multiple agents that adapt to
changing system and environmental conditions in order to achieve collaborative goals. As …
changing system and environmental conditions in order to achieve collaborative goals. As …
Intrusion detection and attack tolerance for cloud environments: The clarus approach
The cloud has become an established and widespread paradigm. This success is due to the
gain of flexibility and savings provided by this technology. However, the main obstacle to full …
gain of flexibility and savings provided by this technology. However, the main obstacle to full …
A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks
VH La, R Fuentes, AR Cavalli - 2016 22nd Asia-Pacific …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT) has emerged these last years as one of the most attractive subjects in
both the research community and the public. As a sub-domain, Wireless Sensor Networks …
both the research community and the public. As a sub-domain, Wireless Sensor Networks …
A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks
VH La, AR Cavalli - 2016 IEEE 36th International Conference …, 2016 - ieeexplore.ieee.org
In the current era, Wireless Sensor Networks (WSNs) and Internet of Things (IoT) have been
considered as two very attractive subjects in both industry and research community. The …
considered as two very attractive subjects in both industry and research community. The …
An approach for deploying and monitoring dynamic security policies
Security policies are enforced through the deployment of certain security functionalities
within the applications. When the security policies dynamically change, the associated …
within the applications. When the security policies dynamically change, the associated …
How web services can be tolerant to intruders through diversification
G Ouffoué, F Zaidi, AR Cavalli… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
The efforts and findings of the last decades of research on the formalization and the
verification of Web services have given a certain level of assurance on Web services …
verification of Web services have given a certain level of assurance on Web services …
Model-based attack tolerance
Software-based systems are nowadays complex and highly distributed. In contrast, existing
intrusion detection mechanisms are not always suitable for protecting these systems against …
intrusion detection mechanisms are not always suitable for protecting these systems against …
An effective attack detection approach in wireless mesh networks
Wireless mesh network (WMN) is a recent technology that is gaining significant importance
among traditional wireless networks. It is considered a suitable solution for providing internet …
among traditional wireless networks. It is considered a suitable solution for providing internet …
5G SUCI Catcher: Attack and Detection
L Barraud, F Caccavale, JB Peyrat… - … on Cloud Computing …, 2023 - ieeexplore.ieee.org
The deployment of 5G networks opens up new possibilities for communication and
connectivity. However, it also introduces new security threats. This paper explores one cyber …
connectivity. However, it also introduces new security threats. This paper explores one cyber …
An attack-tolerant framework for web services
GLA Ouffoué, F Zaïdi, AR Cavalli… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Web services which allow the interoperability and communication of heterogeneous systems
in the Web through Internet protocols, are also subject to attacks a well as destructive as …
in the Web through Internet protocols, are also subject to attacks a well as destructive as …