Christophe Feltus

Orcid: 0000-0002-7182-8185

According to our database1, Christophe Feltus authored at least 64 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Towards a Multidimensional Ontology Model for DIH-Based Organisations.
Int. J. Knowl. Syst. Sci., 2023

Development of Build-MaaS Architecture, a Mobility-as-a-Service platform for the Construction Sector.
Proceedings of the 6th International Conference on Information and Computer Technologies, 2023

Towards Enhancing Open Innovation Efficiency: A Method for Ontological Integration of BPMN and EMMO.
Proceedings of the 18th Conference on Computer Science and Intelligence Systems, 2023

2022
Cluster-Based Vehicle Routing on Road Segments in Dematerialised Traffic Infrastructures.
J. Inf. Technol. Res., 2022

Towards a Lightweight Model-driven Smart-city Digital Twin.
Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, 2022

A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks.
Proceedings of the Information Security Practice and Experience, 2022

2021
AI'S Contribution to Ubiquitous Systems and Pervasive Networks Security - Reinforcement Learning vs Recurrent Networks.
J. Ubiquitous Syst. Pervasive Networks, 2021

Towards AI Assisted Domain Modeling.
Proceedings of the Advances in Conceptual Modeling, 2021

LogicGAN-based Data Augmentation Approach to Improve Adversarial Attack DNN Classifiers.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
Current and Future RL's Contribution to Emerging Network Security.
Proceedings of the 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) / The 10th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2020) / Affiliated Workshops, 2020

2019
An integrated conceptual model for information system security risk management supported by enterprise architecture management.
Softw. Syst. Model., 2019

Deriving Information System Security and Privacy From Value Cocreation Theory: Case Study in the Financial Sector.
Int. J. Serv. Sci. Manag. Eng. Technol., 2019

2018
A Risk Integration Framework for the Service-Oriented Enterprise.
Int. J. Inf. Syst. Serv. Sect., 2018

Coalition-OrBAC: An Agent-Based Access Control Model for Dynamic Coalitions.
Proceedings of the Trends and Advances in Information Systems and Technologies, 2018

On the Development of a Modelling Framework for Value Co-creation.
Proceedings of the 12th International Workshop on Value Modeling and Business Ontologies, 2018

Solving the trust issues in the process of transportation of dangerous goods by using blockchain technology.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Towards a Language to Support Value Cocreation: An Extension to the ArchiMate Modeling Framework.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

Value CoCreation (VCC) Language Design in the Frame of a Smart Airport Network Case Study.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Capability-Driven Design of Business Service Ecosystem to Support Risk Governance in Regulatory Ecosystems.
Complex Syst. Informatics Model. Q., 2017

An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF.
CoRR, 2017

Model-driven Approach for Privacy Management in Business Ecosystem.
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017

Towards a security and privacy co-creation method.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Conceptualization of an Abstract Language to Support Value Co-Creation.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

Conceptualization of a Value Cocreation Language for Knowledge-Intensive Business Services.
Proceedings of the Information Technology for Management. Ongoing Research and Development, 2017

Evaluation of the risk and security overlay of archimate to model information system security risks.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Workshop, 2017

Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
Designing security policies for complex SCADA systems management and protection.
Int. J. Inf. Technol. Manag., 2016

An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF.
Proceedings of the Practice of Enterprise Modeling, 2016

Framework for Engineering Complex Security Requirements Patterns.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Towards a Systemic Approach for Information Security Risk Management.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Adopting trust and assurance as indicators for the reassignment of responsibilities in multi-agent systems.
Knowl. Eng. Rev., 2015

Analysis of the impact of ethical issues on the management of the access rights.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Alignment of ReMMo with RBAC to manage access rights in the frame of enterprise architecture.
Proceedings of the 9th IEEE International Conference on Research Challenges in Information Science, 2015

Towards the ENTRI Framework: Security Risk Management Enhanced by the Use of Enterprise Architectures.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

Towards Systemic Risk Management in the Frame of Business Service Ecosystem.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
Aligning Access Rights to Governance Needs with the Responsability MetaModel (ReMMo) in the Frame of Enterprise Architecture
PhD thesis, 2014

Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Towards an Innovative Systemic Approach of Risk Management.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems.
Proceedings of the 1st International Conference on Information and Communication Technologies for Disaster Management, 2014

2013
Critical Infrastructures Governance Exploring SCADA Cybernetics through Architectured Policy Semantic.
Proceedings of the IEEE International Conference on Systems, 2013

Metamodel for reputation based agents system: case study for electrical distribution SCADA design.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

On designing automatic reaction strategy for critical infrastructure SCADA system.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Industry program panel.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Conceptual Integration of Enterprise Architecture Management and Security Risk Management.
Proceedings of the 17th IEEE International Enterprise Distributed Object Computing Conference Workshops, 2013

Organizational Security Architecture for Critical Infrastructure.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Service specification and service compliance: How to consider the responsibility dimension?
J. Serv. Sci. Res., 2012

Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Enterprise Architecture Enhanced with Responsibility to Manage Access Rights - Case Study in an EU Institution.
Proceedings of the Practice of Enterprise Modeling - 5th IFIP WG 8.1 Working Conference, 2012

2011
ReMoLa: Responsibility model language to align access rights with business process requirements.
Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, 2011

Reputation Based Dynamic Responsibility to Agent Assignement for Critical Infrastructure.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2011

Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Conceptualizing a responsibility based approach for elaborating and verifying RBAC policies conforming with CobiT framework requirements.
Proceedings of the Third International Workshop on Requirements Engineering and Law, 2010

Conceptual Trusted Incident Reaction Architecture.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

A multi-agent based decision mechanism for incident reaction in telecommunication network.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

A Security Decision-Reaction Architecture for Heterogeneous Distributed Network.
Proceedings of the ARES 2010, 2010

2009
Building a responsibility model using modal logic - towards Accountability, Aapability and Commitment concepts.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Building a Responsibility Model Including Accountability, Capability and Commitment.
Proceedings of the The Forth International Conference on Availability, 2009

Methodology to Align Business and IT Policies: Use Case from an IT Company.
Proceedings of the The Forth International Conference on Availability, 2009

2008
An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504.
Proceedings of the IEEE International Conference on Research Challenges in Information Science, 2008

If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network.
Proceedings of the CRiSIS '08, 2008

2007
An Ontology for Requirements Analysis of Managers' Policies in Financial Institutions.
Proceedings of the Enterprise Interoperability II, 2007

2006
Improving Operational Risk Management Systems by Formalizing the Basel II Regulation with Goal Models and the ISO/IEC 15504 Approach.
Proceedings of the CAISE*06 Workshop on Regulations Modelling and their Validation and Verification ReMo2V '06, 2006

2004
Méthode d'évaluation NOEMI. Une méthode d'évaluation de la qualité des processus informatiques en petites et moyennes entreprises.
Ingénierie des Systèmes d Inf., 2004


  Loading...