default search action
Ridha Khédri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Michael De Coste, Zhong Li, Ridha Khédri:
A hybrid ontology-based semantic and machine learning model for the prediction of spring breakup. Comput. Aided Civ. Infrastructure Eng. 39(2): 264-280 (2024) - [j19]Mohammed Alabbad, Neerja Mhaskar, Ridha Khédri:
Two formal design solutions for the generalization of network segmentation. J. Netw. Comput. Appl. 222: 103763 (2024) - [j18]Mohammed Alabbad, Neerja Mhaskar, Ridha Khédri:
Hardening of network segmentation using automated referential penetration testing. J. Netw. Comput. Appl. 224: 103851 (2024) - 2023
- [j17]Michael De Coste, Zhong Li, Ridha Khédri:
The prediction of mid-winter and spring breakups of ice cover on Canadian rivers using a hybrid ontology-based and machine learning model. Environ. Model. Softw. 160: 105577 (2023) - [j16]Andrew LeClair, Alicia Marinache, Haya El Ghalayini, Wendy MacCaull, Ridha Khédri:
A Review on Ontology Modularization Techniques - A Multi-Dimensional Perspective. IEEE Trans. Knowl. Data Eng. 35(5): 4376-4394 (2023) - [c36]Ines Meriah, Latifa Ben Arfa Rabai, Ridha Khédri:
An OWL Multi-Dimensional Information Security Ontology. ENASE 2023: 372-380 - 2022
- [j15]Andrew LeClair, Jason Jaskolka, Wendy MacCaull, Ridha Khédri:
Architecture for ontology-supported multi-context reasoning systems. Data Knowl. Eng. 140: 102044 (2022) - [j14]Mohammed Alabbad, Ridha Khédri:
Dynamic Segmentation, Configuration, and Governance of SDN. J. Ubiquitous Syst. Pervasive Networks 16(1): 7-22 (2022) - [c35]Yijie Wang, Yihai Chen, Deemah Alomair, Ridha Khédri:
DISEL: A Language for Specifying DIS-Based Ontologies. KSEM (2) 2022: 155-171 - 2021
- [j13]Neerja Mhaskar, Mohammed Alabbad, Ridha Khédri:
A Formal Approach to Network Segmentation. Comput. Secur. 103: 102162 (2021) - [j12]Mouna Jouini, Latifa Ben Arfa Rabai, Ridha Khédri:
A quantitative assessment of security risks based on a multifaceted classification approach. Int. J. Inf. Sec. 20(4): 493-510 (2021) - [c34]Mohammed Alabbad, Ridha Khédri:
Configuration and Governance of Dynamic Secure SDN. ANT/EDI40 2021: 131-139 - [c33]Xi Wang, Ridha Khédri, Weikai Miao:
A Formal Engineering Approach to Product Family Modeling. TASE 2021: 87-94
2010 – 2019
- 2019
- [c32]Andrew LeClair, Ridha Khédri, Alicia Marinache:
Toward Measuring Knowledge Loss due to Ontology Modularization. KEOD 2019: 174-184 - [c31]Andrew LeClair, Ridha Khédri, Alicia Marinache:
Formalizing Graphical Modularization Approaches for Ontologies and the Knowledge Loss. IC3K 2019: 388-412 - 2018
- [c30]Mouna Jouini, Latifa Ben Arfa Rabai, Ridha Khédri:
Software Requirements for an Ultra Large Scale System to Compute Multi Dimension Mean Failure Cost. PDCAT 2018: 361-370 - 2017
- [c29]Yihai Chen, Bofang Zhang, Ridha Khédri, Huaikou Miao:
A Framework for Multi-view Reconciliation and for Medical Devices Personalization. ICFEM 2017: 71-87 - [c28]Ridha Khédri, Owain Jones, Mohammed Alabbad:
Defense in Depth Formulation and Usage in Dynamic Access Control. POST 2017: 253-274 - 2016
- [j11]Qinglei Zhang, Ridha Khédri:
On the weaving process of aspect-oriented product family algebra. J. Log. Algebraic Methods Program. 85(1): 146-172 (2016) - [j10]Jason Jaskolka, Ridha Khédri:
Mitigating covert channels based on analysis of the potential for communication. Theor. Comput. Sci. 643: 1-37 (2016) - [c27]Andrew LeClair, Ridha Khédri:
Conto: A Protégé Plugin for Configuring Ontologies. ANT/SEIT 2016: 179-186 - 2015
- [j9]Jason Jaskolka, Ridha Khédri, Khair Eddin Sabri:
Investigative support for information confidentiality. J. Ambient Intell. Humaniz. Comput. 6(4): 425-451 (2015) - [c26]Jason Jaskolka, Ridha Khédri:
Towards the Certification of Covert Channel Freeness in Cloud-based Systems. ANT/SEIT 2015: 318-325 - [c25]Mouna Jouini, Latifa Ben Arfa Rabai, Ridha Khédri:
A Multidimensional Approach towards a Quantitative Assessment of Security Threats. ANT/SEIT 2015: 507-514 - [c24]Mao Huang, Yihai Chen, Ridha Khédri, Huaikou Miao:
The Interchange Format of Tabular Expressions Using XML. SOFL+MSVL 2015: 29-43 - 2014
- [j8]Qinglei Zhang, Ridha Khédri, Jason Jaskolka:
An aspect-oriented language for feature-modeling. J. Ambient Intell. Humaniz. Comput. 5(3): 343-356 (2014) - [c23]Jason Jaskolka, Ridha Khédri, Qinglei Zhang:
Endowing Concurrent Kleene Algebra with Communication Actions. RAMiCS 2014: 19-36 - [c22]Jason Jaskolka, Ridha Khédri, Khair Eddin Sabri:
Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics. FNC/MobiSPC 2014: 266-275 - [c21]Jason Jaskolka, Ridha Khédri, Khair Eddin Sabri:
Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-based Covert Channels. FNC/MobiSPC 2014: 276-285 - [c20]Hao Wang, Yihai Chen, Ridha Khédri, Alan Wassyng:
Envisioning a Requirements Specification Template for Medical Device Software. PROFES 2014: 209-223 - [c19]Jason Jaskolka, Ridha Khédri:
A Formulation of the Potential for Communication Condition using C2KA. GandALF 2014: 161-174 - 2013
- [c18]Ridha Khédri, Karim Djouani:
Preface. EUSPN/ICTH 2013: 7-8 - [c17]Ridha Khédri, Fei Chiang, Khair Eddin Sabri:
An Algebraic Approach Towards Data Cleaning. EUSPN/ICTH 2013: 50-59 - 2012
- [c16]Khair Eddin Sabri, Ridha Khédri:
A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes. FPS 2012: 62-77 - [c15]Qinglei Zhang, Ridha Khédri, Jason Jaskolka:
Verification of Aspectual Composition in Feature-Modeling. SEFM 2012: 109-125 - [c14]Jason Jaskolka, Ridha Khédri, Qinglei Zhang:
On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey. ANT/MobiWIS 2012: 458-465 - [c13]Qinglei Zhang, Ridha Khédri, Jason Jaskolka:
An Aspect-Oriented Language for Product Family Specification. ANT/MobiWIS 2012: 482-489 - 2011
- [j7]Khair Eddin Sabri, Ridha Khédri:
Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution. Fundam. Informaticae 112(4): 305-335 (2011) - [j6]Peter Höfner, Ridha Khédri, Bernhard Möller:
Supplementing Product Families with Behaviour. Int. J. Softw. Informatics 5(1-2): 245-266 (2011) - [j5]Peter Höfner, Ridha Khédri, Bernhard Möller:
An algebra of product families. Softw. Syst. Model. 10(2): 161-182 (2011) - [c12]Jason Jaskolka, Ridha Khédri, Khair Eddin Sabri:
A formal test for detecting information leakage via covert channels. CSIIRW 2011: 41 - [c11]Jason Jaskolka, Ridha Khédri:
Exploring Covert Channels. HICSS 2011: 1-10 - 2010
- [c10]Fadil Alturki, Ridha Khédri:
A Tool for Formal Feature Modeling Based on BDDs and Product Families Algebra. WER 2010
2000 – 2009
- 2009
- [c9]Khair Eddin Sabri, Ridha Khédri, Jason Jaskolka:
Verification of Information Flow in Agent-Based Systems. MCETECH 2009: 252-266 - 2008
- [c8]Peter Höfner, Ridha Khédri, Bernhard Möller:
Algebraic View Reconciliation. SEFM 2008: 85-94 - 2007
- [j4]Spencer Smith, Lei Lai, Ridha Khédri:
Requirements Analysis for Engineering Computation: A Systematic Approach for Improving Reliability. Reliab. Comput. 13(1): 83-107 (2007) - [e1]João M. Fernandes, Ricardo Jorge Machado, Ridha Khédri, Siobhán Clarke:
Model-based Methodologies for Pervasive and Embedded Software, 4th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, MOMPES 2007, Braga, Portugal, March 31, 2007, Proceedings. IEEE Computer Society 2007, ISBN 0-7695-2769-8 [contents] - 2006
- [c7]Peter Höfner, Ridha Khédri, Bernhard Möller:
Feature Algebra. FM 2006: 300-315 - 2005
- [j3]Issam Al-Azzoni, Douglas G. Down, Ridha Khédri:
Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/CPN. Nord. J. Comput. 12(3): 200-228 (2005) - 2004
- [c6]Ridha Khédri, Imen Bourguiba:
Formal Derivation of Functional Architectural Design. SEFM 2004: 356-265 - [c5]Ridha Khédri, Imen Bourguiba:
Requirements Scenarios Based System-Testing. SEKE 2004: 252-257 - 2001
- [j2]Ryszard Janicki, Ridha Khédri:
On a formal semantics of tabular expressions. Sci. Comput. Program. 39(2-3): 189-213 (2001) - [c4]Ridha Khédri:
Requirements Scenarios Formalization Technique: N Versions Towards One Good Version. RelMiS 2001: 112-135 - 2000
- [c3]Ryszard Janicki, Ridha Khédri:
Remarks on Mereology of Relations. RelMiCS 2000: 133-140
1990 – 1999
- 1998
- [j1]Jules Desharnais, Marc Frappier, Ridha Khédri, Ali Mili:
Integration of Sequential Scenarios. IEEE Trans. Software Eng. 24(9): 695-708 (1998) - [c2]Jules Desharnais, Ridha Khédri, Ali Mili:
Towards a uniform relational semantics for tabular expressions. RelMiCS 1998: 53-57 - 1997
- [c1]Jules Desharnais, Marc Frappier, Ridha Khédri, Ali Mili:
Integration of Sequential Scenarios. ESEC / SIGSOFT FSE 1997: 310-326
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-12 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint