Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog

    By 2025, it is projected that cybercrimes will escalate to an alarming annual figure of 10.5 trillion USD. To counter this growing threat, cybersecurity repositories such as CVE, CWE, CAPEC, and Mitre Att &ck ...

    Ahmed Elmarkez, Soraya Mesli-Kesraoui in Information Security Theory and Practice (2024)

  2. Chapter and Conference Paper

    Service-Oriented Control-Command Components for Designing Complex Systems

    An important task in designing control-command systems is defining components for two essential parts of the system: command and monitoring. Instead of develo** a monolithic executable, designers use reusab...

    Olga Goubali, Abdenour Idir, Line Poinel in Human-Computer Interaction. Perspectives o… (2019)

  3. Chapter and Conference Paper

    End User Designing of Complex Task Models for Complex Control-Command Systems

    In the design of control-command systems, task models are useful for collecting requirements about the use of the systems. Indeed, task models describe actions the supervisor performs to start, to control and ...

    Olga Goubali, Patrick Girard in Human-Computer Interaction. Perspectives o… (2019)

  4. Chapter and Conference Paper

    Designing Functional Specifications for Complex Systems

    For designing complex and sociotechnical (System that strongly interact with humans (e.g., a ship is a large sociotechnical system).) systems, designers are in charge of the functional specification because th...

    Olga Goubali, Patrick Girard in Human-Computer Interaction. Theory, Design… (2016)

  5. No Access

    Chapter and Conference Paper

    Formal Verification of Software-Intensive Systems Architectures Described with Pi** and Instrumentation Diagrams

    Socio-technical systems are increasingly becoming software-intensive. The challenge now is to design the architecture of such software-intensive systems for guaranteeing not only its correctness, but also the ...

    Soraya Mesli-Kesraoui, Djamal Kesraoui, Flavio Oquendo in Software Architecture (2016)