Ridha Khédri

Orcid: 0000-0003-2499-1040

According to our database1, Ridha Khédri authored at least 54 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Two formal design solutions for the generalization of network segmentation.
J. Netw. Comput. Appl., February, 2024

A hybrid ontology-based semantic and machine learning model for the prediction of spring breakup.
Comput. Aided Civ. Infrastructure Eng., January, 2024

2023
A Review on Ontology Modularization Techniques - A Multi-Dimensional Perspective.
IEEE Trans. Knowl. Data Eng., May, 2023

The prediction of mid-winter and spring breakups of ice cover on Canadian rivers using a hybrid ontology-based and machine learning model.
Environ. Model. Softw., February, 2023

An OWL Multi-Dimensional Information Security Ontology.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

2022
Dynamic Segmentation, Configuration, and Governance of SDN.
J. Ubiquitous Syst. Pervasive Networks, 2022

Architecture for ontology-supported multi-context reasoning systems.
Data Knowl. Eng., 2022

DISEL: A Language for Specifying DIS-Based Ontologies.
Proceedings of the Knowledge Science, Engineering and Management, 2022

2021
A quantitative assessment of security risks based on a multifaceted classification approach.
Int. J. Inf. Sec., 2021

A Formal Approach to Network Segmentation.
Comput. Secur., 2021

A Formal Engineering Approach to Product Family Modeling.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021

Configuration and Governance of Dynamic Secure SDN.
Proceedings of the 12th International Conference on Ambient Systems, 2021

2019
Formalizing Graphical Modularization Approaches for Ontologies and the Knowledge Loss.
Proceedings of the Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2019

Toward Measuring Knowledge Loss due to Ontology Modularization.
Proceedings of the 11th International Joint Conference on Knowledge Discovery, 2019

2018
Software Requirements for an Ultra Large Scale System to Compute Multi Dimension Mean Failure Cost.
Proceedings of the Parallel and Distributed Computing, 2018

2017
Defense in Depth Formulation and Usage in Dynamic Access Control.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

A Framework for Multi-view Reconciliation and for Medical Devices Personalization.
Proceedings of the Formal Methods and Software Engineering, 2017

2016
Mitigating covert channels based on analysis of the potential for communication.
Theor. Comput. Sci., 2016

On the weaving process of aspect-oriented product family algebra.
J. Log. Algebraic Methods Program., 2016

Conto: A Protégé Plugin for Configuring Ontologies.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Investigative support for information confidentiality.
J. Ambient Intell. Humaniz. Comput., 2015

The Interchange Format of Tabular Expressions Using XML.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2015

A Multidimensional Approach towards a Quantitative Assessment of Security Threats.
Proceedings of the 6th International Conference on Ambient Systems, 2015

Towards the Certification of Covert Channel Freeness in Cloud-based Systems.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
An aspect-oriented language for feature-modeling.
J. Ambient Intell. Humaniz. Comput., 2014

A Formulation of the Potential for Communication Condition using C2KA.
Proceedings of the Proceedings Fifth International Symposium on Games, 2014

Envisioning a Requirements Specification Template for Medical Device Software.
Proceedings of the Product-Focused Software Process Improvement, 2014

Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-based Covert Channels.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Endowing Concurrent Kleene Algebra with Communication Actions.
Proceedings of the Relational and Algebraic Methods in Computer Science, 2014

2013
Preface.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

An Algebraic Approach Towards Data Cleaning.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

2012
An Aspect-Oriented Language for Product Family Specification.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Verification of Aspectual Composition in Feature-Modeling.
Proceedings of the Software Engineering and Formal Methods - 10th International Conference, 2012

A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
An algebra of product families.
Softw. Syst. Model., 2011

Supplementing Product Families with Behaviour.
Int. J. Softw. Informatics, 2011

Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution.
Fundam. Informaticae, 2011

Exploring Covert Channels.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

A formal test for detecting information leakage via covert channels.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
A Tool for Formal Feature Modeling Based on BDDs and Product Families Algebra.
Proceedings of the Anais do WER10, 2010

2009
Verification of Information Flow in Agent-Based Systems.
Proceedings of the E-Technologies: Innovation in an Open World, 2009

2008
Algebraic View Reconciliation.
Proceedings of the Sixth IEEE International Conference on Software Engineering and Formal Methods, 2008

2007
Requirements Analysis for Engineering Computation: A Systematic Approach for Improving Reliability.
Reliab. Comput., 2007

2006
Feature Algebra.
Proceedings of the FM 2006: Formal Methods, 2006

2005
Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and <i>Design/CPN</i>.
Nord. J. Comput., 2005

2004
Requirements Scenarios Based System-Testing.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004

Formal Derivation of Functional Architectural Design.
Proceedings of the 2nd International Conference on Software Engineering and Formal Methods (SEFM 2004), 2004

2001
On a formal semantics of tabular expressions.
Sci. Comput. Program., 2001

Requirements Scenarios Formalization Technique: N Versions Towards One Good Version.
Proceedings of the First International Workshop on Relational Methods in Software, 2001

2000
Remarks on Mereology of Relations.
Proceedings of the Participants Copies of Fifth International Seminar on Relational Methods in Computer Science, 2000

1998
Integration of Sequential Scenarios.
IEEE Trans. Software Eng., 1998

Towards a uniform relational semantics for tabular expressions.
Proceedings of the Participants Copies for Relational Methods in Logic, 1998


  Loading...