Analysis of distributed intrusion detection systems using Bayesian methods

DJ Burroughs, LF Wilson… - … Proceedings of the IEEE …, 2002 - ieeexplore.ieee.org
In computer and network security, standard approaches to intrusion detection and response
attempt to detect and prevent individual attacks. However, it is not the attack but rather the …

On the verification of opacity in web services and their composition

A Bourouis, K Klai, NB Hadj-Alouane… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Web service (WS) providers need to restrain access to private information when cooperating
with business partners. This need is translated in practice by an abstraction phase where …

Correctness checking for BPMN collaborations with sub-processes

F Corradini, A Morichetta, A Polini, B Re, L Rossi… - Journal of Systems and …, 2020 - Elsevier
BPMN collaboration models are commonly used to describe the behaviour and interactions
of processes in an inter-organisational context. An important role in this kind of models is …

A simple layered RGB BRDF model

X Granier, W Heidrich - Graphical Models, 2003 - Elsevier
Many natural objects, and in particular layered materials, have non-linear reflection behavior
along the wavelengths. An accurate representation of phenomena such as interference and …

Trustworthy cross-organizational collaborations with hybrid on/off-chain declarative choreographies

T Henry, A Brahem, N Laga, J Hatin, W Gaaloul… - … , ICSOC 2021, Virtual …, 2021 - Springer
Abstract Business Process Management communities increasingly adopt the blockchain
technology to support trustworthy decentralized execution of processes. In this context, the …

Model checking of composite cloud services

K Klai, H Ochi - 2016 IEEE International Conference on Web …, 2016 - ieeexplore.ieee.org
Composition of Cloud services is necessary when a single component is unable to satisfy all
the user's requirements. It is a complex task for Cloud managers which involves several …

Formal model and method to decompose process-aware IoT applications

S Tata, K Klai, R Jain - On the Move to Meaningful Internet Systems. OTM …, 2017 - Springer
Abstract The Internet of Things (IoT) integrates a large number of pervasive things that
continuously generate data about the physical world. While such generated data can be …

Symbolic abstraction and deadlock-freeness verification of inter-enterprise processes

K Klai, S Tata, J Desel - Data & Knowledge Engineering, 2011 - Elsevier
The design of complex inter-enterprise business processes (IEBP) is generally performed in
a modular way. Each process is designed separately and then the whole IEBP is obtained …

Formal abstraction and compatibility checking of web services

K Klai, H Ochi, S Tata - 2013 IEEE 20th International …, 2013 - ieeexplore.ieee.org
For automatically composing Web services in a correct manner, information about their
behaviors (an abstract model) has to be published in a repository. This abstract model must …

[PDF][PDF] A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems.

H Ouni, K Klai, CA Abid, B Zouari - SCSS, 2017 - easychair.org
Abstract Model checking is a powerful and widespread technique for the verification of finite
distributed systems. It takes as input a formal model of a system and a formal specification …