132 results on '"Idani, Akram"'
Search Results
2. Transpilation of Petri-nets into B : Shallow and Deep Embeddings
3. A Process-Centric Approach to Insider Threats Identification in Information Systems
4. A Formal MDE Framework for Inter-DSL Collaboration
5. Formal model-driven executable DSLs: Application to Petri-nets
6. Revisiting Ontology Evolution Patterns : A Formal xDSL Approach
7. The B Method Meets MDE: Review, Progress and Future : Review, Progress and Future
8. Merging Railway Standard Notations in a Formal DSL-Based Framework
9. Dependability of Model-Driven Executable DSLs : Critical Review and Solutions
10. Meeduse: A Tool to Build and Run Proved DSLs
11. The B Method Meets MDE: Review, Progress and Future
12. Revisiting Ontology Evolution Patterns
13. Incremental Development of a Safety Critical System Combining formal Methods and DSMLs : − Application to a Railway System −
14. A Separation of Concerns Approach for the Verified Modelling of Railway Signalling Rules
15. Towards a Tool-Based Domain Specific Approach for Railway Systems Modeling and Validation
16. Alliance of model-driven engineering with a proof-based formal approach
17. Formalizing Railway Signaling System ERTMS/ETCS Using UML/Event-B
18. When a Formal Model Rhymes with a Graphical Notation
19. Incremental Development of a Safety Critical System Combining formal Methods and DSMLs
20. A Separation of Concerns Approach for the Verified Modelling of Railway Signalling Rules
21. Towards a Tool-Based Domain Specific Approach for Railway Systems Modeling and Validation
22. Symbolic Search of Insider Attack Scenarios from a Formal Information System Modeling
23. B for Modeling Secure Information Systems : The B4MSecure Platform
24. B Formal Validation of ERTMS/ETCS Railway Operating Rules
25. Formalizing Railway Signaling System ERTMS/ETCS Using UML/Event-B
26. A Rigorous Reasoning about Model Transformations Using the B Method
27. Taking into Account Functional Models in the Validation of IS Security Policies
28. Validation of Security-Design Models Using Z
29. UML Models Engineering from Static and Dynamic Aspects of Formal Specifications
30. Derivation of UML Class Diagrams as Static Views of Formal B Developments
31. B for Modeling Secure Information Systems
32. When a Formal Model Rhymes with a Graphical Notation
33. Symbolic Search of Insider Attack Scenarios from a Formal Information System Modeling
34. A Lightweight Development of Outbreak Prevention Strategies Built on Formal Methods and xDSLs
35. Formal model-driven executable DSLs
36. Object oriented concepts identification from formal B specifications
37. Dependability of Model-Driven Executable DSLs
38. A Rigorous Reasoning about Model Transformations Using the B Method
39. Taking into Account Functional Models in the Validation of IS Security Policies
40. Validation of Security-Design Models Using Z
41. Dynamic graphical UML views from formal B specifications
42. UML Models Engineering from Static and Dynamic Aspects of Formal Specifications
43. Towards a model driven formal approach for merging data, access control and business processes
44. Object Oriented Concepts Identification from Formal B Specifications
45. Derivation of UML Class Diagrams as Static Views of Formal B Developments
46. Incremental Development of a Safety Critical System Combining formal Methods and DSMLs
47. Mise en œuvre d’une approche formelle en ingénierie des modèles
48. Model driven secure web applications: The SeWAT platform
49. GenISIS : un outil de recherche d’attaques d’initié en Systèmes d’Information (Article court)
50. Extensions du diagramme d'activité pour la spécification de politiques RBAC
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.