Search

Your search keyword '"Idani, Akram"' showing total 132 results

Search Constraints

Start Over You searched for: Author "Idani, Akram" Remove constraint Author: "Idani, Akram"
132 results on '"Idani, Akram"'

Search Results

1. An Iterative Formal Model-Driven Approach to Railway Systems Validation

2. Transpilation of Petri-nets into B : Shallow and Deep Embeddings

3. A Process-Centric Approach to Insider Threats Identification in Information Systems

4. A Formal MDE Framework for Inter-DSL Collaboration

6. Revisiting Ontology Evolution Patterns : A Formal xDSL Approach

8. Merging Railway Standard Notations in a Formal DSL-Based Framework

9. Dependability of Model-Driven Executable DSLs : Critical Review and Solutions

10. Meeduse: A Tool to Build and Run Proved DSLs

13. Incremental Development of a Safety Critical System Combining formal Methods and DSMLs : − Application to a Railway System −

14. A Separation of Concerns Approach for the Verified Modelling of Railway Signalling Rules

15. Towards a Tool-Based Domain Specific Approach for Railway Systems Modeling and Validation

17. Formalizing Railway Signaling System ERTMS/ETCS Using UML/Event-B

18. When a Formal Model Rhymes with a Graphical Notation

22. Symbolic Search of Insider Attack Scenarios from a Formal Information System Modeling

23. B for Modeling Secure Information Systems : The B4MSecure Platform

24. B Formal Validation of ERTMS/ETCS Railway Operating Rules

26. A Rigorous Reasoning about Model Transformations Using the B Method

28. Validation of Security-Design Models Using Z

29. UML Models Engineering from Static and Dynamic Aspects of Formal Specifications

30. Derivation of UML Class Diagrams as Static Views of Formal B Developments

37. Dependability of Model-Driven Executable DSLs

46. Incremental Development of a Safety Critical System Combining formal Methods and DSMLs

47. Mise en œuvre d’une approche formelle en ingénierie des modèles

48. Model driven secure web applications: The SeWAT platform

49. GenISIS : un outil de recherche d’attaques d’initié en Systèmes d’Information (Article court)

50. Extensions du diagramme d'activité pour la spécification de politiques RBAC

Catalog

Books, media, physical & digital resources