Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ridha Khédri
@article{DBLP:journals/cacie/CosteLK24, author = {Michael De Coste and Zhong Li and Ridha Kh{\'{e}}dri}, title = {A hybrid ontology-based semantic and machine learning model for the prediction of spring breakup}, journal = {Comput. Aided Civ. Infrastructure Eng.}, volume = {39}, number = {2}, pages = {264--280}, year = {2024}, url = {https://doi.org/10.1111/mice.13074}, doi = {10.1111/MICE.13074}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacie/CosteLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AlabbadMK24, author = {Mohammed Alabbad and Neerja Mhaskar and Ridha Kh{\'{e}}dri}, title = {Two formal design solutions for the generalization of network segmentation}, journal = {J. Netw. Comput. Appl.}, volume = {222}, pages = {103763}, year = {2024}, url = {https://doi.org/10.1016/j.jnca.2023.103763}, doi = {10.1016/J.JNCA.2023.103763}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AlabbadMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AlabbadMK24a, author = {Mohammed Alabbad and Neerja Mhaskar and Ridha Kh{\'{e}}dri}, title = {Hardening of network segmentation using automated referential penetration testing}, journal = {J. Netw. Comput. Appl.}, volume = {224}, pages = {103851}, year = {2024}, url = {https://doi.org/10.1016/j.jnca.2024.103851}, doi = {10.1016/J.JNCA.2024.103851}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AlabbadMK24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/envsoft/CosteLK23, author = {Michael De Coste and Zhong Li and Ridha Kh{\'{e}}dri}, title = {The prediction of mid-winter and spring breakups of ice cover on Canadian rivers using a hybrid ontology-based and machine learning model}, journal = {Environ. Model. Softw.}, volume = {160}, pages = {105577}, year = {2023}, url = {https://doi.org/10.1016/j.envsoft.2022.105577}, doi = {10.1016/J.ENVSOFT.2022.105577}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/envsoft/CosteLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/LeClairMGMK23, author = {Andrew LeClair and Alicia Marinache and Haya El Ghalayini and Wendy MacCaull and Ridha Kh{\'{e}}dri}, title = {A Review on Ontology Modularization Techniques - {A} Multi-Dimensional Perspective}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {5}, pages = {4376--4394}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2022.3152928}, doi = {10.1109/TKDE.2022.3152928}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/LeClairMGMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/enase/MeriahRK23, author = {Ines Meriah and Latifa Ben Arfa Rabai and Ridha Kh{\'{e}}dri}, editor = {Hermann Kaindl and Mike Mannion and Leszek A. Maciaszek}, title = {An {OWL} Multi-Dimensional Information Security Ontology}, booktitle = {Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, {ENASE} 2023, Prague, Czech Republic, April 24-25, 2023}, pages = {372--380}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011841300003464}, doi = {10.5220/0011841300003464}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/enase/MeriahRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/LeClairJMK22, author = {Andrew LeClair and Jason Jaskolka and Wendy MacCaull and Ridha Kh{\'{e}}dri}, title = {Architecture for ontology-supported multi-context reasoning systems}, journal = {Data Knowl. Eng.}, volume = {140}, pages = {102044}, year = {2022}, url = {https://doi.org/10.1016/j.datak.2022.102044}, doi = {10.1016/J.DATAK.2022.102044}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/LeClairJMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/juspn/AlabbadK22, author = {Mohammed Alabbad and Ridha Kh{\'{e}}dri}, title = {Dynamic Segmentation, Configuration, and Governance of {SDN}}, journal = {J. Ubiquitous Syst. Pervasive Networks}, volume = {16}, number = {1}, pages = {7--22}, year = {2022}, url = {https://doi.org/10.5383/juspn.16.01.002}, doi = {10.5383/JUSPN.16.01.002}, timestamp = {Tue, 11 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/juspn/AlabbadK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ksem/WangCAK22, author = {Yijie Wang and Yihai Chen and Deemah Alomair and Ridha Kh{\'{e}}dri}, editor = {G{\'{e}}rard Memmi and Baijian Yang and Linghe Kong and Tianwei Zhang and Meikang Qiu}, title = {{DISEL:} {A} Language for Specifying DIS-Based Ontologies}, booktitle = {Knowledge Science, Engineering and Management - 15th International Conference, {KSEM} 2022, Singapore, August 6-8, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13369}, pages = {155--171}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10986-7\_13}, doi = {10.1007/978-3-031-10986-7\_13}, timestamp = {Wed, 09 Nov 2022 07:57:25 +0100}, biburl = {https://dblp.org/rec/conf/ksem/WangCAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MhaskarAK21, author = {Neerja Mhaskar and Mohammed Alabbad and Ridha Kh{\'{e}}dri}, title = {A Formal Approach to Network Segmentation}, journal = {Comput. Secur.}, volume = {103}, pages = {102162}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102162}, doi = {10.1016/J.COSE.2020.102162}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MhaskarAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/JouiniRK21, author = {Mouna Jouini and Latifa Ben Arfa Rabai and Ridha Kh{\'{e}}dri}, title = {A quantitative assessment of security risks based on a multifaceted classification approach}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {4}, pages = {493--510}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00515-6}, doi = {10.1007/S10207-020-00515-6}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/JouiniRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/AlabbadK21, author = {Mohammed Alabbad and Ridha Kh{\'{e}}dri}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {Configuration and Governance of Dynamic Secure {SDN}}, booktitle = {The 12th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2021) / The 4th International Conference on Emerging Data and Industry 4.0 {(EDI40} 2021) / Affiliated Workshops, March 23-26, 2021, Warsaw, Poland}, series = {Procedia Computer Science}, volume = {184}, pages = {131--139}, publisher = {Elsevier}, year = {2021}, url = {https://doi.org/10.1016/j.procs.2021.03.024}, doi = {10.1016/J.PROCS.2021.03.024}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ant/AlabbadK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/WangKM21, author = {Xi Wang and Ridha Kh{\'{e}}dri and Weikai Miao}, title = {A Formal Engineering Approach to Product Family Modeling}, booktitle = {International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2021, Shanghai, China, August 25-27, 2021}, pages = {87--94}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TASE52547.2021.00015}, doi = {10.1109/TASE52547.2021.00015}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tase/WangKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3k/LeClairKM19, author = {Andrew LeClair and Ridha Kh{\'{e}}dri and Alicia Marinache}, editor = {Jan L. G. Dietz and David Aveiro and Joaquim Filipe}, title = {Toward Measuring Knowledge Loss due to Ontology Modularization}, booktitle = {Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, {IC3K} 2019, Volume 2: KEOD, Vienna, Austria, September 17-19, 2019}, pages = {174--184}, publisher = {ScitePress}, year = {2019}, url = {https://doi.org/10.5220/0008169301740184}, doi = {10.5220/0008169301740184}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/ic3k/LeClairKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3k/LeClairKM19a, author = {Andrew LeClair and Ridha Kh{\'{e}}dri and Alicia Marinache}, editor = {Ana L. N. Fred and Ana Salgado and David Aveiro and Jan L. G. Dietz and Jorge Bernardino and Joaquim Filipe}, title = {Formalizing Graphical Modularization Approaches for Ontologies and the Knowledge Loss}, booktitle = {Knowledge Discovery, Knowledge Engineering and Knowledge Management - 11th International Joint Conference, {IC3K} 2019, Vienna, Austria, September 17-19, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1297}, pages = {388--412}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-66196-0\_18}, doi = {10.1007/978-3-030-66196-0\_18}, timestamp = {Sat, 09 Apr 2022 12:47:31 +0200}, biburl = {https://dblp.org/rec/conf/ic3k/LeClairKM19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/JouiniRK18, author = {Mouna Jouini and Latifa Ben Arfa Rabai and Ridha Kh{\'{e}}dri}, editor = {Jong Hyuk Park and Hong Shen and Yunsick Sung and Hui Tian}, title = {Software Requirements for an Ultra Large Scale System to Compute Multi Dimension Mean Failure Cost}, booktitle = {Parallel and Distributed Computing, Applications and Technologies, 19th International Conference, {PDCAT} 2018, Jeju Island, South Korea, August 20-22, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {931}, pages = {361--370}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-5907-1\_39}, doi = {10.1007/978-981-13-5907-1\_39}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdcat/JouiniRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/ChenZKM17, author = {Yihai Chen and Bofang Zhang and Ridha Kh{\'{e}}dri and Huaikou Miao}, editor = {Zhenhua Duan and Luke Ong}, title = {A Framework for Multi-view Reconciliation and for Medical Devices Personalization}, booktitle = {Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi'an, China, November 13-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10610}, pages = {71--87}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68690-5\_5}, doi = {10.1007/978-3-319-68690-5\_5}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/icfem/ChenZKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/KhedriJA17, author = {Ridha Kh{\'{e}}dri and Owain Jones and Mohammed Alabbad}, editor = {Matteo Maffei and Mark Ryan}, title = {Defense in Depth Formulation and Usage in Dynamic Access Control}, booktitle = {Principles of Security and Trust - 6th International Conference, {POST} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10204}, pages = {253--274}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54455-6\_12}, doi = {10.1007/978-3-662-54455-6\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/KhedriJA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/ZhangK16, author = {Qinglei Zhang and Ridha Kh{\'{e}}dri}, title = {On the weaving process of aspect-oriented product family algebra}, journal = {J. Log. Algebraic Methods Program.}, volume = {85}, number = {1}, pages = {146--172}, year = {2016}, url = {https://doi.org/10.1016/j.jlamp.2015.08.004}, doi = {10.1016/J.JLAMP.2015.08.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlp/ZhangK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/JaskolkaK16, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri}, title = {Mitigating covert channels based on analysis of the potential for communication}, journal = {Theor. Comput. Sci.}, volume = {643}, pages = {1--37}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2016.06.022}, doi = {10.1016/J.TCS.2016.06.022}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/JaskolkaK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/LeClairK16, author = {Andrew LeClair and Ridha Kh{\'{e}}dri}, editor = {Elhadi M. Shakshuki}, title = {Conto: {A} Prot{\'{e}}g{\'{e}} Plugin for Configuring Ontologies}, booktitle = {The 7th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2016) / The 6th International Conference on Sustainable Energy Information Technology {(SEIT-2016)} / Affiliated Workshops, May 23-26, 2016, Madrid, Spain}, series = {Procedia Computer Science}, volume = {83}, pages = {179--186}, publisher = {Elsevier}, year = {2016}, url = {https://doi.org/10.1016/j.procs.2016.04.114}, doi = {10.1016/J.PROCS.2016.04.114}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/ant/LeClairK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/JaskolkaKS15, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri and Khair Eddin Sabri}, title = {Investigative support for information confidentiality}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {6}, number = {4}, pages = {425--451}, year = {2015}, url = {https://doi.org/10.1007/s12652-015-0289-4}, doi = {10.1007/S12652-015-0289-4}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/JaskolkaKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/JaskolkaK15, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri}, editor = {Elhadi M. Shakshuki}, title = {Towards the Certification of Covert Channel Freeness in Cloud-based Systems}, booktitle = {Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015), London, UK, June 2-5, 2015}, series = {Procedia Computer Science}, volume = {52}, pages = {318--325}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/j.procs.2015.05.100}, doi = {10.1016/J.PROCS.2015.05.100}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ant/JaskolkaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/JouiniRK15, author = {Mouna Jouini and Latifa Ben Arfa Rabai and Ridha Kh{\'{e}}dri}, editor = {Elhadi M. Shakshuki}, title = {A Multidimensional Approach towards a Quantitative Assessment of Security Threats}, booktitle = {Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015), London, UK, June 2-5, 2015}, series = {Procedia Computer Science}, volume = {52}, pages = {507--514}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/j.procs.2015.05.024}, doi = {10.1016/J.PROCS.2015.05.024}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ant/JouiniRK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofl/HuangCKM15, author = {Mao Huang and Yihai Chen and Ridha Kh{\'{e}}dri and Huaikou Miao}, editor = {Shaoying Liu and Zhenhua Duan}, title = {The Interchange Format of Tabular Expressions Using {XML}}, booktitle = {Structured Object-Oriented Formal Language and Method - 5th International Workshop, {SOFL+MSVL} 2015, Paris, France, November 6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9559}, pages = {29--43}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31220-0\_3}, doi = {10.1007/978-3-319-31220-0\_3}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/sofl/HuangCKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/ZhangKJ14, author = {Qinglei Zhang and Ridha Kh{\'{e}}dri and Jason Jaskolka}, title = {An aspect-oriented language for feature-modeling}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {5}, number = {3}, pages = {343--356}, year = {2014}, url = {https://doi.org/10.1007/s12652-013-0201-z}, doi = {10.1007/S12652-013-0201-Z}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/ZhangKJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/RelMiCS/JaskolkaKZ14, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri and Qinglei Zhang}, editor = {Peter H{\"{o}}fner and Peter Jipsen and Wolfram Kahl and Martin Eric M{\"{u}}ller}, title = {Endowing Concurrent Kleene Algebra with Communication Actions}, booktitle = {Relational and Algebraic Methods in Computer Science - 14th International Conference, RAMiCS 2014, Marienstatt, Germany, April 28-May 1, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8428}, pages = {19--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06251-8\_2}, doi = {10.1007/978-3-319-06251-8\_2}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/RelMiCS/JaskolkaKZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/JaskolkaKS14, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri and Khair Eddin Sabri}, title = {Investigative Support for Information Confidentiality Part {II:} Applications in Cryptanalysis and Digital Forensics}, booktitle = {The 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, August 17-20, 2014, Niagara Falls, Canada}, series = {Procedia Computer Science}, volume = {34}, pages = {266--275}, publisher = {Elsevier}, year = {2014}, url = {https://doi.org/10.1016/j.procs.2014.07.022}, doi = {10.1016/J.PROCS.2014.07.022}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/fnc/JaskolkaKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/JaskolkaKS14a, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri and Khair Eddin Sabri}, title = {Investigative Support for Information Confidentiality Part {I:} Detecting Confidential Information Leakage via Protocol-based Covert Channels}, booktitle = {The 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, August 17-20, 2014, Niagara Falls, Canada}, series = {Procedia Computer Science}, volume = {34}, pages = {276--285}, publisher = {Elsevier}, year = {2014}, url = {https://doi.org/10.1016/j.procs.2014.07.023}, doi = {10.1016/J.PROCS.2014.07.023}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fnc/JaskolkaKS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/profes/WangCKW14, author = {Hao Wang and Yihai Chen and Ridha Kh{\'{e}}dri and Alan Wassyng}, editor = {Andreas Jedlitschka and Pasi Kuvaja and Marco Kuhrmann and Tomi M{\"{a}}nnist{\"{o}} and J{\"{u}}rgen M{\"{u}}nch and Mikko Raatikainen}, title = {Envisioning a Requirements Specification Template for Medical Device Software}, booktitle = {Product-Focused Software Process Improvement - 15th International Conference, {PROFES} 2014, Helsinki, Finland, December 10-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8892}, pages = {209--223}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13835-0\_15}, doi = {10.1007/978-3-319-13835-0\_15}, timestamp = {Mon, 03 Jan 2022 22:29:18 +0100}, biburl = {https://dblp.org/rec/conf/profes/WangCKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/JaskolkaK14, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri}, editor = {Adriano Peron and Carla Piazza}, title = {A Formulation of the Potential for Communication Condition using {C2KA}}, booktitle = {Proceedings Fifth International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2014, Verona, Italy, September 10-12, 2014}, series = {{EPTCS}}, volume = {161}, pages = {161--174}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.161.15}, doi = {10.4204/EPTCS.161.15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/JaskolkaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euspn/KhedriD13, author = {Ridha Kh{\'{e}}dri and Karim Djouani}, editor = {Elhadi M. Shakshuki}, title = {Preface}, booktitle = {The 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks {(EUSPN-2013)} and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), Niagara Falls, Ontario, Canada, October 21-24, 2013}, series = {Procedia Computer Science}, volume = {21}, pages = {7--8}, publisher = {Elsevier}, year = {2013}, url = {https://doi.org/10.1016/j.procs.2013.09.003}, doi = {10.1016/J.PROCS.2013.09.003}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/euspn/KhedriD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euspn/KhedriCS13, author = {Ridha Kh{\'{e}}dri and Fei Chiang and Khair Eddin Sabri}, editor = {Elhadi M. Shakshuki}, title = {An Algebraic Approach Towards Data Cleaning}, booktitle = {The 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks {(EUSPN-2013)} and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), Niagara Falls, Ontario, Canada, October 21-24, 2013}, series = {Procedia Computer Science}, volume = {21}, pages = {50--59}, publisher = {Elsevier}, year = {2013}, url = {https://doi.org/10.1016/j.procs.2013.09.009}, doi = {10.1016/J.PROCS.2013.09.009}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euspn/KhedriCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/SabriK12, author = {Khair Eddin Sabri and Ridha Kh{\'{e}}dri}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ali Miri and Nadia Tawbi}, title = {A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes}, booktitle = {Foundations and Practice of Security - 5th International Symposium, {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7743}, pages = {62--77}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37119-6\_5}, doi = {10.1007/978-3-642-37119-6\_5}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/SabriK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/ZhangKJ12, author = {Qinglei Zhang and Ridha Kh{\'{e}}dri and Jason Jaskolka}, editor = {George Eleftherakis and Mike Hinchey and Mike Holcombe}, title = {Verification of Aspectual Composition in Feature-Modeling}, booktitle = {Software Engineering and Formal Methods - 10th International Conference, {SEFM} 2012, Thessaloniki, Greece, October 1-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7504}, pages = {109--125}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33826-7\_8}, doi = {10.1007/978-3-642-33826-7\_8}, timestamp = {Sat, 05 Sep 2020 18:01:22 +0200}, biburl = {https://dblp.org/rec/conf/sefm/ZhangKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/procedia/JaskolkaKZ12, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri and Qinglei Zhang}, editor = {Elhadi M. Shakshuki and Muhammad Younas}, title = {On the Necessary Conditions for Covert Channel Existence: {A} State-of-the-Art Survey}, booktitle = {Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies {(ANT} 2012), the 9th International Conference on Mobile Web Information Systems (MobiWIS-2012), Niagara Falls, Ontario, Canada, August 27-29, 2012}, series = {Procedia Computer Science}, volume = {10}, pages = {458--465}, publisher = {Elsevier}, year = {2012}, url = {https://doi.org/10.1016/j.procs.2012.06.059}, doi = {10.1016/J.PROCS.2012.06.059}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/journals/procedia/JaskolkaKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/procedia/ZhangKJ12, author = {Qinglei Zhang and Ridha Kh{\'{e}}dri and Jason Jaskolka}, editor = {Elhadi M. Shakshuki and Muhammad Younas}, title = {An Aspect-Oriented Language for Product Family Specification}, booktitle = {Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies {(ANT} 2012), the 9th International Conference on Mobile Web Information Systems (MobiWIS-2012), Niagara Falls, Ontario, Canada, August 27-29, 2012}, series = {Procedia Computer Science}, volume = {10}, pages = {482--489}, publisher = {Elsevier}, year = {2012}, url = {https://doi.org/10.1016/j.procs.2012.06.062}, doi = {10.1016/J.PROCS.2012.06.062}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/procedia/ZhangKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/SabriK11, author = {Khair Eddin Sabri and Ridha Kh{\'{e}}dri}, title = {Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution}, journal = {Fundam. Informaticae}, volume = {112}, number = {4}, pages = {305--335}, year = {2011}, url = {https://doi.org/10.3233/FI-2011-592}, doi = {10.3233/FI-2011-592}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/SabriK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsi/HofnerKM11, author = {Peter H{\"{o}}fner and Ridha Kh{\'{e}}dri and Bernhard M{\"{o}}ller}, title = {Supplementing Product Families with Behaviour}, journal = {Int. J. Softw. Informatics}, volume = {5}, number = {1-2}, pages = {245--266}, year = {2011}, url = {http://www.ijsi.org/ch/reader/view\_abstract.aspx?file\_no=i83}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsi/HofnerKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/HofnerKM11, author = {Peter H{\"{o}}fner and Ridha Kh{\'{e}}dri and Bernhard M{\"{o}}ller}, title = {An algebra of product families}, journal = {Softw. Syst. Model.}, volume = {10}, number = {2}, pages = {161--182}, year = {2011}, url = {https://doi.org/10.1007/s10270-009-0127-2}, doi = {10.1007/S10270-009-0127-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/HofnerKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/JaskolkaKS11, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri and Khair Eddin Sabri}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A formal test for detecting information leakage via covert channels}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {41}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179343}, doi = {10.1145/2179298.2179343}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/JaskolkaKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/JaskolkaK11, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri}, title = {Exploring Covert Channels}, booktitle = {44th Hawaii International International Conference on Systems Science {(HICSS-44} 2011), Proceedings, 4-7 January 2011, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HICSS.2011.201}, doi = {10.1109/HICSS.2011.201}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/JaskolkaK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wer/AlturkiK10, author = {Fadil Alturki and Ridha Kh{\'{e}}dri}, editor = {Graciela D. S. Hadad and Oscar Dieste and Juan Pablo Carvallo}, title = {A Tool for Formal Feature Modeling Based on BDDs and Product Families Algebra}, booktitle = {Anais do {WER10} - Workshop em Engenharia de Requisitos, Cuenca, Ecuador, April 12-13, 2010}, year = {2010}, url = {http://wer.inf.puc-rio.br/WERpapers/artigos/artigos\_WER10/alturki.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wer/AlturkiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcetech/SabriKJ09, author = {Khair Eddin Sabri and Ridha Kh{\'{e}}dri and Jason Jaskolka}, editor = {Gilbert Babin and Peter G. Kropf and Michael Weiss}, title = {Verification of Information Flow in Agent-Based Systems}, booktitle = {E-Technologies: Innovation in an Open World, 4th International Conference, {MCETECH} 2009, Ottawa, Canada, May 4-6, 2009. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {26}, pages = {252--266}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01187-0\_22}, doi = {10.1007/978-3-642-01187-0\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mcetech/SabriKJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/HofnerKM08, author = {Peter H{\"{o}}fner and Ridha Kh{\'{e}}dri and Bernhard M{\"{o}}ller}, editor = {Antonio Cerone and Stefan Gruner}, title = {Algebraic View Reconciliation}, booktitle = {Sixth {IEEE} International Conference on Software Engineering and Formal Methods, {SEFM} 2008, Cape Town, South Africa, 10-14 November 2008}, pages = {85--94}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SEFM.2008.36}, doi = {10.1109/SEFM.2008.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sefm/HofnerKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rc/SmithLK07, author = {Spencer Smith and Lei Lai and Ridha Kh{\'{e}}dri}, title = {Requirements Analysis for Engineering Computation: {A} Systematic Approach for Improving Reliability}, journal = {Reliab. Comput.}, volume = {13}, number = {1}, pages = {83--107}, year = {2007}, url = {https://doi.org/10.1007/s11155-006-9020-7}, doi = {10.1007/S11155-006-9020-7}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/rc/SmithLK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mompes/2007, editor = {Jo{\~{a}}o M. Fernandes and Ricardo Jorge Machado and Ridha Kh{\'{e}}dri and Siobh{\'{a}}n Clarke}, title = {Model-based Methodologies for Pervasive and Embedded Software, 4th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, {MOMPES} 2007, Braga, Portugal, March 31, 2007, Proceedings}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4149155/proceeding}, isbn = {0-7695-2769-8}, timestamp = {Wed, 09 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mompes/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/HofnerKM06, author = {Peter H{\"{o}}fner and Ridha Kh{\'{e}}dri and Bernhard M{\"{o}}ller}, editor = {Jayadev Misra and Tobias Nipkow and Emil Sekerinski}, title = {Feature Algebra}, booktitle = {{FM} 2006: Formal Methods, 14th International Symposium on Formal Methods, Hamilton, Canada, August 21-27, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4085}, pages = {300--315}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11813040\_21}, doi = {10.1007/11813040\_21}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/HofnerKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/njc/Al-AzzoniDK05, author = {Issam Al{-}Azzoni and Douglas G. Down and Ridha Kh{\'{e}}dri}, title = {Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and \emph{Design/CPN}}, journal = {Nord. J. Comput.}, volume = {12}, number = {3}, pages = {200--228}, year = {2005}, timestamp = {Wed, 03 May 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/njc/Al-AzzoniDK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/KhedriB04, author = {Ridha Kh{\'{e}}dri and Imen Bourguiba}, title = {Formal Derivation of Functional Architectural Design}, booktitle = {2nd International Conference on Software Engineering and Formal Methods {(SEFM} 2004), 28-30 September 2004, Beijing, China}, pages = {356--265}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/SEFM.2004.18}, doi = {10.1109/SEFM.2004.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sefm/KhedriB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/KhedriB04, author = {Ridha Kh{\'{e}}dri and Imen Bourguiba}, editor = {Frank Maurer and G{\"{u}}nther Ruhe}, title = {Requirements Scenarios Based System-Testing}, booktitle = {Proceedings of the Sixteenth International Conference on Software Engineering {\&} Knowledge Engineering (SEKE'2004), Banff, Alberta, Canada, June 20-24, 2004}, pages = {252--257}, year = {2004}, timestamp = {Thu, 12 Mar 2020 11:30:50 +0100}, biburl = {https://dblp.org/rec/conf/seke/KhedriB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/JanickiK01, author = {Ryszard Janicki and Ridha Kh{\'{e}}dri}, title = {On a formal semantics of tabular expressions}, journal = {Sci. Comput. Program.}, volume = {39}, number = {2-3}, pages = {189--213}, year = {2001}, url = {https://doi.org/10.1016/S0167-6423(00)00004-6}, doi = {10.1016/S0167-6423(00)00004-6}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/JanickiK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Khedri01, author = {Ridha Kh{\'{e}}dri}, editor = {Wolfram Kahl and David Lorge Parnas and Gunther Schmidt}, title = {Requirements Scenarios Formalization Technique: {N} Versions Towards One Good Version}, booktitle = {First International Workshop on Relational Methods in Software, RelMiS 2001, a Satellite Event of {ETAPS} 2001, Genova, Italy, April 7-8, 2001}, series = {Electronic Notes in Theoretical Computer Science}, volume = {44}, number = {3}, pages = {112--135}, publisher = {Elsevier}, year = {2001}, url = {https://doi.org/10.1016/S1571-0661(04)80934-4}, doi = {10.1016/S1571-0661(04)80934-4}, timestamp = {Thu, 01 Dec 2022 11:11:50 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Khedri01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/RelMiCS/JanickiK00, author = {Ryszard Janicki and Ridha Kh{\'{e}}dri}, editor = {Jules Desharnais}, title = {Remarks on Mereology of Relations}, booktitle = {Participants Copies of Fifth International Seminar on Relational Methods in Computer Science,January 9-14, 2000, Valcartier (Quebec), Canada}, pages = {133--140}, year = {2000}, timestamp = {Thu, 03 Jan 2002 12:07:55 +0100}, biburl = {https://dblp.org/rec/conf/RelMiCS/JanickiK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/DesharnaisFKM98, author = {Jules Desharnais and Marc Frappier and Ridha Kh{\'{e}}dri and Ali Mili}, title = {Integration of Sequential Scenarios}, journal = {{IEEE} Trans. Software Eng.}, volume = {24}, number = {9}, pages = {695--708}, year = {1998}, url = {https://doi.org/10.1109/32.713325}, doi = {10.1109/32.713325}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/DesharnaisFKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/RelMiCS/DesharnaisKM98, author = {Jules Desharnais and Ridha Kh{\'{e}}dri and Ali Mili}, editor = {Ewa Orlowska and Andrzej Szalas}, title = {Towards a uniform relational semantics for tabular expressions}, booktitle = {Participants Copies for Relational Methods in Logic, Algebra and Computer Science, 4th International Seminar RelMiCS, Warsaw, Poland, Septermber 14-20, 1998}, pages = {53--57}, year = {1998}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/RelMiCS/DesharnaisKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esec/DesharnaisFKM98, author = {Jules Desharnais and Marc Frappier and Ridha Kh{\'{e}}dri and Ali Mili}, editor = {Mehdi Jazayeri and Helmut Schauer}, title = {Integration of Sequential Scenarios}, booktitle = {Software Engineering - {ESEC/FSE} '97, 6th European Software Engineering Conference Held Jointly with the 5th {ACM} {SIGSOFT} Symposium on Foundations of Software Engineering, Zurich, Switzerland, September 22-25, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1301}, pages = {310--326}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63531-9\_22}, doi = {10.1007/3-540-63531-9\_22}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esec/DesharnaisFKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.