Update paper

This commit is contained in:
2026-01-16 15:39:48 +01:00
parent ec9d19b818
commit bb9b907a0a

View File

@@ -297,6 +297,10 @@
<h3 class="mb-3 font-weight-bold dark-grey-text">
<strong data-i18n="publications.journal"></strong>
</h3>
<p class="mb-2">
<i class="fas fa-angle-right me-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <a class="text-primary" href="https://doi.org/10.1016/j.cose.2025.104749">A formal approach for security pattern enforcement in software architecture</a>.
Computers and Security, 2025.
</p>
<p class="mb-2">
<i class="fas fa-angle-right me-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.jss.2024.112219">A model-driven formal methods approach to software architectural security vulnerabilities specification and verification</a>.
Journal of Systems and Software (JSS), 2025.
@@ -323,15 +327,15 @@
<strong data-i18n="publications.conference"></strong>
</h3>
<p class="mb-2">
<i class="fas fa-angle-right me-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="#">Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy (accepted)</span>.
<i class="fas fa-angle-right me-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="https://doi.org/10.1007/978-3-031-87499-4_9">Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy (accepted)</span>.
17th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 2024.
</p>
<p class="mb-2">
<i class="fas fa-angle-right me-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="#">Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy (accepted)</span>.
<i class="fas fa-angle-right me-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="https://doi.org/10.1007/978-3-031-89350-6_5">Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy (accepted)</span>.
19th International Conference on Risks and Security of Internet and Systems (CRiSIS), Aix-En-Provence, France, 2024.
</p>
<p class="mb-2">
<i class="fas fa-angle-right me-2"></i>Luke Newton, Jason Jaskolka, <strong>Quentin Rouland</strong>, Brahim Hamid. <span class="text-primary" href="#">Data-Driven Approximation of Formal Implicit Interaction Analysis for Cyber-Physical System Designs</span>.
<i class="fas fa-angle-right me-2"></i>Luke Newton, Jason Jaskolka, <strong>Quentin Rouland</strong>, Brahim Hamid. <span class="text-primary" href="https://doi.org/10.1109/RWS62797.2024.10799344">Data-Driven Approximation of Formal Implicit Interaction Analysis for Cyber-Physical System Designs</span>.
Resilience Week (RWS), Austin, United States, 2024.
</p>
<p class="mb-2">
@@ -549,8 +553,6 @@
</div>
</div>
<!-- Content -->
</div>
<!--Projects container-->