Search results

  • 2014

    Parallel bounded verification of alloy models by tranScoping

    Rosner, N., Pombo, C. G. L., Aguirre, N., Jaoua, A., Mili, A. & Frias, M. F., 2014, Verified Software: Theories, Tools, Experiments - 5th International Conference, VSTTE 2013, Revised Selected Papers. Cohen, E., Rybalchenko, A. & Rybalchenko, A. (eds.). Springer Verlag, p. 88-107 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8164).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Quantifying availability in SCADA environments using the cyber security metric MFC

    Aissa, A. B., Rabai, L. B. A., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2014, Proceedings of 2014 9th Annual Cyber and Information Security Research Conference, CISRC 2014. Association for Computing Machinery, p. 81-84 4 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Quantifying the impact of unavailability in cyber-physical environments

    Ben Aissa, A., Abercrombie, R. K., Sheldon, F. T. & Mili, A., Jan 16 2014, IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence - CICS 2014: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, Proceedings. Institute of Electrical and Electronics Engineers Inc., 7013364. (IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence - CICS 2014: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Semantic metrics for software products

    Mili, A., Jaoua, A., Frias, M. & Helali, R. G. M., Sep 2014, In: Innovations in Systems and Software Engineering. 10, 3, p. 203-217 15 p.

    Research output: Contribution to journalArticlepeer-review

    12 Scopus citations
  • Verifying while loops with invariant relations

    Louhichi, A., Ghardallou, W., Bsaies, K., Jilani, L. L., Mraihi, O. & Mili, A., 2014, In: International Journal of Critical Computer-Based Systems. 5, 1-2, p. 78-102 25 p.

    Research output: Contribution to journalArticlepeer-review

    7 Scopus citations
  • 2013

    ACME+: An ADL for Quantitative Analysis of Quality Attributes

    Derbel, I., Jilani, L. L. & Mili, A., 2013, Evaluation of Novel Approaches to Software Engineering - 8th International Conference, ENASE 2013, Revised Selected Papers. Springer Verlag, p. 16-32 17 p. (Communications in Computer and Information Science; vol. 417 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • ACME+ for software architecture analysis

    Derbel, I., Jilani, L. L. & Mili, A., 2013, ICSOFT 2013 - Proceedings of the 8th International Joint Conference on Software Technologies. p. 429-437 9 p. (ICSOFT 2013 - Proceedings of the 8th International Joint Conference on Software Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Architecture level prediction of software quality attributes

    Derbel, I., Jilani, L. L. & Mili, A., 2013, ENASE 2013 - Proceedings of the 8th International Conference on Evaluation of Novel Approaches to Software Engineering. p. 15-24 10 p. (ENASE 2013 - Proceedings of the 8th International Conference on Evaluation of Novel Approaches to Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)

    Abercrombie, R. K., Sheldon, F. T., Hauser, K. R., Lantz, M. W. & Mili, A., 2013, 8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, CSIIRW 2013. 19. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Scopus citations
  • Invariant assertions, invariant relations, and invariant functions

    Mraihi, O., Louhichi, A., Jilani, L. L., Desharnais, J. & Mili, A., Sep 1 2013, In: Science of Computer Programming. 78, 9, p. 1212-1239 28 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    15 Scopus citations
  • Invariant functions and invariant relations: An alternative to invariant assertions

    Jilani, L. L., Mraihi, O., Louhichi, A., Ghardallou, W., Bsaies, K. & Mili, A., Jan 2013, In: Journal of Symbolic Computation. 48, p. 1-36 36 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    7 Scopus citations
  • 2012

    An economic model of security threats for cloud computing systems

    Rabai, L. B. A., Jouini, M., Nafati, M., Aissa, A. B. & Mili, A., 2012, Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012. p. 100-105 6 p. 6246112. (Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • A versatile concept for the analysis of loops

    Ghardallou, W., Mraihi, O., Louhichi, A., Jilani, L. L., Bsaies, K. & Mili, A., Jul 2012, In: Journal of Logic and Algebraic Programming. 81, 5, p. 606-622 17 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    7 Scopus citations
  • Defining and computing a value based cyber-security measure

    Aissa, A. B., Abercrombie, R. K., Sheldon, F. T. & Mili, A., Dec 2012, In: Information Systems and e-Business Management. 10, 4, p. 433-453 21 p.

    Research output: Contribution to journalArticlepeer-review

    17 Scopus citations
  • Invariant relations, invariant functions, and loop functions

    Labed Jilani, L., Louhichi, A., Mraihi, O. & Mili, A., Sep 2012, In: Innovations in Systems and Software Engineering. 8, 3, p. 195-212 18 p.

    Research output: Contribution to journalArticlepeer-review

    6 Scopus citations
  • 2011

    A quantitative model for software engineering trends

    Arfa Rabai, L. B., Bai, Y. Z. & Mili, A., Nov 15 2011, In: Information sciences. 181, 22, p. 4993-5009 17 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Computing preconditions and postconditions of while loops

    Mraihi, O., Ghardallou, W., Louhichi, A., Labed Jilani, L., Bsaies, K. & Mili, A., 2011, Theoretical Aspects of Computing, ICTAC 2011 - 8th International Colloquium, Proceedings. p. 173-193 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6916 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Defining and computing a value based cyber-security measure

    Aissa, A. B., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2011, Proceedings of the 2nd Kuwait Conference on e-Services and e-Systems, KCESS'11. 5. (Proceedings of the 2nd Kuwait Conference on e-Services and e-Systems, KCESS'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reasoning about quantitative Architectural attributes

    Jilani, L. L., Derbel, I., Bsaies, K., Nasreddine, H. & Mili, A., Apr 2011, In: Journal of Software. 6, 4, p. 574-583 10 p.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Validating cyber security requirements: A case study

    Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2011, Proceedings of the 44th Annual Hawaii International Conference on System Sciences, HICSS-44 2010. 5718517. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    A model for analyzing architectural attributes

    Derbel, I., Jilani, L. L. & Mili, A., 2010, 2010 ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010. IEEE Computer Society, 5586933. (2010 ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling stakeholder/value dependency through mean failure cost

    Aissa, A. B., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2010, 6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10. 1852727. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Quantifying security threats and their potential impacts: A case study

    Ben Aissa, A., Abercrombie, R. K., Sheldon, F. T. & Mili, A., Dec 2010, In: Innovations in Systems and Software Engineering. 6, 4, p. 269-281 13 p.

    Research output: Contribution to journalArticlepeer-review

    44 Scopus citations
  • Reflexive transitive invariant relations: A basis for computing loop functions

    Mili, A., Aharon, S., Nadkarni, C., Jilani, L. L., Louhichi, A. & Mraihi, O., Nov 2010, In: Journal of Symbolic Computation. 45, 11, p. 1114-1143 30 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    4 Scopus citations
  • Software requirements for a system to compute mean failure cost

    Aissa, A. B., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2010, 6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10. 1852750. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards an automated tool for computing loop functions

    Jilani, L. L., Mraihi, O., Louhichi, A. & Mili, A., 2010, 2010 ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010. IEEE Computer Society, 5586943. (2010 ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Using invariant functions and invariant relations to compute loop functions

    Labed Jilani, L., Mraihi, O., Louhichi, A., Ghardallou, W. & Mili, A., 2010, ICSE 2010 - Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering. p. 317-318 2 p. (Proceedings - International Conference on Software Engineering; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    Challenging the mean time to failure: Measuring dependability as a mean failure cost

    Mili, A. & Sheldon, F., 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755411. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    18 Scopus citations
  • Harnessing a Refinement Theory to Compute Loop Functions

    Mili, A., Ben Ayed, R., Aharon, S. & Nadkarni, C., Jul 28 2009, In: Electronic Notes in Theoretical Computer Science. 243, p. 139-155 17 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    1 Scopus citations
  • Managing complex IT security processes with value based measures

    Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings. IEEE Computer Society, p. 69-75 7 p. 4925092. (2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Mathematics for reasoning about loop functions

    Mili, A., Aharon, S. & Nadkarni, C., Nov 2009, In: Science of Computer Programming. 74, 11-12, p. 989-1020 32 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    16 Scopus citations
  • Methodology for evaluating security controls based on key performance indicators and stakeholder mission

    Sheldon, F. T., Abercrombie, R. K. & Mili, A., 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755410. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • Modeling the evolution of software engineering trends - A bottom up approach

    Rabai, L. B. A., Bai, Y. Z. & Mili, A., 2009, ICSOFT 2009 - 4th International Conference on Software and Data Technologies, Proceedings. p. 47-54 8 p. (ICSOFT 2009 - 4th International Conference on Software and Data Technologies, Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Quantifying security threats and their impact

    Aissa, A. B., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2009, CSIIRW09: Fifth Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies. 26. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Relational methods in the analysis of while loops: Observations of versatility

    Louhichi, A., Mraihi, O., Jilani, L. L., Bsaies, K. & Mili, A., 2009, Relations and Kleene Algebra in Computer Science - 11th Int. Conference on Relational Methods in Computer Science, RelMiCS 2009 and 6th Int. Conference on Applications of Kleene Algebra, AKA 2009, Proc.. p. 242-259 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5827 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    An algorithm for computing loop functions

    Mili, A., Aharon, S. & Nadkarni, C., 2008, 20th International Conference on Software Engineering and Knowledge Engineering, SEKE 2008. p. 448-453 6 p. (20th International Conference on Software Engineering and Knowledge Engineering, SEKE 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    A product line of software reuse cost models

    Korkmaz, M. & Mili, A., 2007, p. 264-269. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  • A refinement-based framework for computing loop behavior

    Mili, A., 2007, 31st Annual IEEE Software Engineering Workshop, SEW-31 2007 - Proceedings. p. 144-153 10 p. 4402773. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • A semantic recognizer infrastructure for computing loop behavior

    Mili, A., Daly, T., Pleszkoch, M. & Prowell, S., 2007, Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07. 4076943. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Measuring reliability as a mean failure cost

    Mili, A. & Sheldon, F., 2007, Proceedings - 10th IEEE International Symposium on High Assurance Systems Engineering, HASE 2007. p. 403-404 2 p. 4404775. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    11 Scopus citations
  • Modeling the evolution of operating systems: An empirical study

    Peng, Y., Li, F. & Mili, A., Jan 2007, In: Journal of Systems and Software. 80, 1, p. 1-15 15 p.

    Research output: Contribution to journalArticlepeer-review

    17 Scopus citations
  • Monitoring software technology evolution, one trend at a time

    Bai, Y. & Mili, A., 2007, 16th International Conference on Software Engineering and Data Engineering, SEDE 2007. p. 349-355 7 p. (16th International Conference on Software Engineering and Data Engineering, SEDE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Towards an engineering discipline of computational security

    Mili, A., Vinokurov, A., Jilani, L. L., Sheldon, F. T. & Ayed, R. B., 2007, Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07. IEEE Computer Society, p. 281-290 10 p. 4076952. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2006

    Modeling redundancy: Quantitative and qualitative models

    Mili, A., Wu, L., Sheldon, F. T., Shereshevsky, M. & Desharnais, J., 2006, IEEE International Conference on Computer Systems and Applications, 2006. IEEE Computer Society, p. 1-8 8 p. 1618325. (IEEE International Conference on Computer Systems and Applications, 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • Modeling security as a dependability attribute: A refinement-based approach

    Mili, A., Sheldon, F., Jilani, L. L., Vinokurov, A., Thomasian, A. & Ayed, R. B., Mar 2006, In: Innovations in Systems and Software Engineering. 2, 1, p. 39-48 10 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Using change propagation probabilities to assess quality attributes of software architectures

    Shaik, I., Abdelmoez, W., Gunnalan, R., Shereshevsky, M., Zeid, A., Ammar, H. H., Mili, A. & Fuhrman, C., 2006, IEEE International Conference on Computer Systems and Applications, 2006. p. 704-711 8 p. 1618432. (IEEE International Conference on Computer Systems and Applications, 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2005

    Change propagation for assessing design quality of software architectures

    Shaik, I., Abdelmoez, W., Gunnalan, R., Shereshevsky, M., Zeid, A., Ammar, H. H., Mili, A. & Fuhrman, C., 2005, Proceedings - 5th Working IEEE/IFIP Conference on Software Architecture, WICSA 2005. p. 205-208 4 p. 1620112. (Proceedings - 5th Working IEEE/IFIP Conference on Software Architecture, WICSA 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Recoverability preservation: A measure of last resort

    Mili, A., Sheldon, F., Mili, F. & Desharnais, J., Apr 2005, In: Innovations in Systems and Software Engineering. 1, 1, p. 54-62 9 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Relational characterizations of system fault tolerance

    Cortellessa, V., Del Gobbo, D., Shereshevsky, M., Desharnais, J. & Mili, A., May 2005, In: Science of Computer Programming. 56, 3, p. 343-361 19 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access