| Security attacks and solutions in vehicular ad hoc networks: a survey VH La, AR Cavalli International journal on AdHoc networking systems (IJANS) 4 (2), 1-20, 2014 | 266 | 2014 |
| FSM-based conformance testing methods: a survey annotated with experimental evaluation R Dorofeeva, K El-Fakih, S Maag, AR Cavalli, N Yevtushenko Information and software technology 52 (12), 1286-1297, 2010 | 227 | 2010 |
| A passive testing approach based on invariants: application to the WAP E Bayse, A Cavalli, M Nunez, F Zaidi Computer networks 48 (2), 247-266, 2005 | 169 | 2005 |
| Generating test cases for a timed I/O automaton model T Higashino, A Nakata, K Taniguchi, AR Cavalli Testing of Communicating Systems: Methods and Applications, 197-214, 1999 | 146 | 1999 |
| New approaches for passive testing using an extended finite state machine specification A Cavalli, C Gervy, S Prokopenko Information and Software Technology 45 (12), 837-852, 2003 | 128 | 2003 |
| Hit-or-Jump: An algorithm for embedded testing with applications to IN services A Cavalli, D Lee, C Rinderknecht, F Zaïdi International Conference on Protocol Specification, Testing and Verification …, 1999 | 115 | 1999 |
| Estimation of QoE of video traffic using a fuzzy expert system J Pokhrel, B Wehbi, A Morais, A Cavalli, E Allilaire 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), 224-229, 2013 | 80 | 2013 |
| Automatic timed test case generation for web services composition M Lallali, F Zaidi, A Cavalli, I Hwang 2008 Sixth European Conference on Web Services, 53-62, 2008 | 73 | 2008 |
| An EFSM-based intrusion detection system for ad hoc networks JM Orset, B Alcalde, A Cavalli International Symposium on Automated Technology for Verification and …, 2005 | 72 | 2005 |
| An overview of the Eucalyptus toolbox H Garavel Proceedings of the COST 247, 76-88, 1996 | 71 | 1996 |
| Maintainability prediction: A regression analysis of measures of evolving systems JH Hayes, L Zhao 21st IEEE International Conference on Software Maintenance (ICSM'05), 601-604, 2005 | 70 | 2005 |
| 5greplay: A 5g network traffic fuzzer-application to attack injection Z Salazar, HN Nguyen, W Mallouli, AR Cavalli, E Montes de Oca Proceedings of the 16th International Conference on Availability …, 2021 | 67 | 2021 |
| Security in ad hoc networks R Molva, P Michiardi IFIP International Conference on Personal Wireless Communications, 756-775, 2003 | 67 | 2003 |
| A decision method for linear temporal logic AR Cavalli, LFÑD Cerro International Conference on Automated Deduction, 113-127, 1984 | 65 | 1984 |
| FSM-based test derivation strategies for systems with time-outs M Zhigulin, N Yevtushenko, S Maag, A Cavalli 2011 11th International Conference on Quality Software, 141-149, 2011 | 64 | 2011 |
| A formal approach for testing security rules W Mallouli, JM Orset, A Cavalli, N Cuppens, F Cuppens Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 64 | 2007 |
| Network protocol system passive testing for fault management: A backward checking approach B Alcalde, A Cavalli, D Chen, D Khuu, D Lee International Conference on Formal Techniques for Networked and Distributed …, 2004 | 64 | 2004 |
| Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications G Amponis, P Radoglou-Grammatikis, T Lagkas, W Mallouli, A Cavalli, ... EURASIP Journal on Wireless Communications and Networking 2022 (1), 124, 2022 | 62 | 2022 |
| A survey on formal active and passive testing with applications to the cloud AR Cavalli, T Higashino, M Núñez annals of telecommunications-annales des télécommunications 70 (3), 85-93, 2015 | 58 | 2015 |
| Software vulnerabilities, prevention and detection methods: A review1 W Jimenez, A Mammar, A Cavalli Security in model-driven architecture 215995, 215995, 2009 | 58 | 2009 |