


default search action
17th VECoS 2024: Djerba, Tunisia
- Belgacem Ben Hedia

, Mohamed Ghazel
, Bruno Monsuez:
Verification and Evaluation of Computer and Communication Systems - 17th International Conference, VECoS 2024, Djerba, Tunisia, October 16-18, 2024, Proceedings. Lecture Notes in Computer Science 15466, Springer 2025, ISBN 978-3-031-85355-5 - Elif Deniz, Adnan Rashid, Sofiène Tahar:

Formal Verification of Coupled Transmission Lines using Theorem Proving. 1-15 - Kais Klai

, Mohamed Taha Bennani
, Jaime Arias
, Hanen Ochi
, Hadhami Elouni
:
Optimizing Label Coverage Using Regular Expression-Based Linear Programming. 16-31 - Ikram Garfatta, Kaïs Klai, Walid Gaaloul:

Formal Verification of Declarative Specifications of BPs: DCR2CPN-Based Approach. 32-46 - Marzieh Derakhshannia, Julien Grange, Nihal Pekergin:

Toward Green Data Lake Management and Analysis Through a CTMC Model. 47-61 - Imene Ben Hafaiedh, Amira Chouchane, Amani Elaoud, Linda Lamouchi, Mohamed Ghazel:

A High Parallelization Method for Automated Formal Verification of Deep Neural Networks. 62-80 - Fateh Boudardara

, Abderraouf Boussif, Pierre-Jean Meyer, Mohamed Ghazel:
Monitoring of Neural Network Classifiers Using Neuron Activation Paths. 81-96 - Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, Jason Jaskolka:

Formal Security Analysis of Deep Neural Network Architecture. 97-112 - Ahmed Alaoui Mdaghri, Meriem Ouederni

, Lotfi Chaâri:
MDE in the Era of Generative AI. 113-127 - Nour Elhouda Oueslati, Hichem Mrabet, Abderrazak Jemai:

Intrusion Detection Using an Enhancement Bi-LSTM Recurrent Neural Network Model. 128-142 - Loïc Thierry, Brahim Hamid

, Jason Jaskolka
:
A Formal Approach for Verifying and Validating Security Objectives in Software Architecture. 143-158 - Jintao Jia, Gaiyun Liu, Zhiwu Li:

Supervisory Control of Cyber-Physical Systems Using Labeled Petri Nets Under Sensor and Actuator Attacks. 159-173 - Rim Saddem-Yagoubi

, Julie Beugin
, Mohamed Ghazel
:
ERTMS/ETCS L3: Usable Formal Models for the "Loss of Train Integrity" Operation Scenario. 174-188 - Yassmine Gara Hellal

, Lazhar Hamel
, Mohamed Graiet
:
Towards a Model for Energy-Efficient and Flexible IoT Systems. 189-204 - Perla Tannoury, Ahmed Hammad:

Integrating SysML and Timed Reo to Model and Verify Cyber-Physical Systems Interactions with Timing Constraints. 205-219 - Mohamed Aiche

, Samir Ouchani
, Hafida Bouarfa
:
A Reliable and Resource-Aware Federated Learning Solution by Decentralizing Client Selection for IoT Devices. 220-234 - Wiem Taktak, Mohamed Escheikh, Kamel Barkaoui:

DRL Based SFC Orchestration in SDN/NFV Environments Subject to Transient Unavailability. 235-247

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














