, Anatomy of an Attack, MEDJACK (Medical Device Attack), 2015.
Understanding the mirai botnet, USENIX Security Symposium, 2017. ,
Modeling Heterogeneous Real-time Components in BIP, Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006, pp.11-15, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00375298
A Language for Analyzing Security of IOT Systems ,
URL : https://hal.archives-ouvertes.fr/hal-01960860
A Modeling Language for Security Threats of IoT Systems". In: Formal Methods for Industrial Critical Systems, pp.258-268, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01962080
Statistical Model Checking Qos Properties of Systems with SBIP, Proceedings of the 5th International Conference on Leveraging Applications of Formal Methods, Verification and Validation: Technologies for Mastering Change-Volume Part I, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00847827
PLASMA-lab: A Flexible, Distributable Statistical Model Checking Library, Quantitative Evaluation of Systems, pp.978-981 ,
URL : https://hal.archives-ouvertes.fr/hal-01088411
Hospitals, Security and Resilience for Smart Health Service and Infrastructures, 2016. ,
Runtime Verification of Component-Based Systems, Software Engineering and Formal Methods, pp.204-220, 2011. ,
Building Distributed Controllers for Systems with Priorities, J. Log. Algebr. Program, vol.80, pp.194-218, 2011. ,
P 2 CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language, IEEE Transactions on Dependable and Secure Computing, vol.12, pp.1545-5971, 2015. ,
DOI : 10.1109/tdsc.2014.2382574
Importance Splitting for Statistical Model Checking Rare Properties, Computer Aided Verification. Ed. by Natasha Sharygina and Helmut Veith, pp.978-981, 2013. ,
DOI : 10.1007/978-3-642-39799-8_38
URL : https://hal.archives-ouvertes.fr/hal-01087826
Structural Operational Semantics for Stochastic and Weighted Transition Systems, Inf. Comput, vol.227, pp.58-83, 2013. ,
DOI : 10.1016/j.ic.2013.04.001
URL : https://doi.org/10.1016/j.ic.2013.04.001
Computational Aspects of Attack-Defense Trees, Security and Intelligent Information Systems, pp.103-116, 2012. ,
Foundations of Attack Trees, Proceedings of the 8th International Conference on Information Security and Cryptology. ICISC'05, pp.186-198, 2006. ,
DOI : 10.1007/11734727_17
A Calculus of Communicating Systems, 1982. ,
Rare Event Simulation for Dynamic Fault Trees, Computer Safety, Reliability, and Security, pp.978-981, 2017. ,
DOI : 10.1007/978-3-319-66266-4_2
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures, IEEE Systems Journal, vol.7, issue.3, pp.1932-8184, 2013. ,
Reactive, Generative, and Stratified Models of Probabilistic Processes, Information and Computation, p.121, 1995. ,