scispace - formally typeset
W

Wissam Mallouli

Researcher at Centre national de la recherche scientifique

Publications -  68
Citations -  581

Wissam Mallouli is an academic researcher from Centre national de la recherche scientifique. The author has contributed to research in topics: Computer science & Formal specification. The author has an hindex of 12, co-authored 58 publications receiving 474 citations. Previous affiliations of Wissam Mallouli include Telecom SudParis.

Papers
More filters
Proceedings ArticleDOI

A formal approach for testing security rules

TL;DR: This work proposes a framework to specify security policies and test their implementation on a system, and makes it possible to generate in an automatic manner, test sequences, in order to validate the conformance of a security policy.
Proceedings ArticleDOI

Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints

TL;DR: Two different tools to test systems with time constraints are presented, the first allows to automatically generate test cases based on model-based active testing techniques and the second is based on passive testing approach to check that the collected system traces respect a set of formal properties called Invariants.
Proceedings ArticleDOI

Timed Extended Invariants for the Passive Testing of Web Services

TL;DR: A non-intrusive approach based on monitoring is chosen to propose a conformance passive testing methodology to check that a composed Web service respects its functional requirements.
Journal ArticleDOI

Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking

TL;DR: It is demonstrated in this paper through experimental assessments that there are still some ways to mount such an attack, and especially in the context of coupling NDN with IP, which can hardly be addressed by current solutions.
Journal ArticleDOI

Service level agreement-based GDPR compliance and security assurance in(multi)Cloud-based systems

TL;DR: A novel DevOps framework aimed at supporting Cloud consumers in designing, deploying and operating (multi)Cloud systems that include the necessary privacy and security controls for ensuring transparency to end-users, third parties in service provision (if any) and law enforcement authorities is presented.