default search action
Salim Chehida
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Salim Chehida, Éric Rutten, Guillaume Giraud, Stéphane Mocanu:
A model-based approach for self-adaptive security in CPS: Application to smart grids. J. Syst. Archit. 150: 103118 (2024) - [j5]Abdelhakim Baouya, Salim Chehida, Saddek Bensalem, Levent Gürgen, Richard Nicholson, Miquel Cantero, Mario Diaz-Nava, Enrico Ferrera:
Deploying warehouse robots with confidence: the BRAIN-IoT framework's functional assurance. J. Supercomput. 80(1): 1206-1237 (2024) - [c20]Hamzah Al-Qadasi, Djafer Yahia Messaoud Benchadi, Salim Chehida, Kazuhiro Fukui, Saddek Bensalem:
Neural Network Innovations in Image-Based Malware Classification: A Comparative Study. AINA (4) 2024: 252-265 - [c19]Xu Tao, Rui Zhao, Salim Chehida, Davide Conzon, Enrico Ferrera, Saddek Bensalem:
A User-Centric Privacy Control Framework for Decentralized IoT Platforms. QUATIC 2024: 408-415 - 2023
- [c18]Salim Chehida, Akram Idani, Mario Cortes Cornax, Germán Vega:
A Formal MDE Framework for Inter-DSL Collaboration. COORDINATION 2023: 232-249 - [c17]Salim Chehida, Karim Fellah, Éric Rutten, Guillaume Giraud, Stéphane Mocanu:
Model-based Self-adaptive Management in a Smart Grid Substation. ETFA 2023: 1-8 - 2022
- [j4]Abdelhakim Baouya, Salim Chehida, Samir Ouchani, Saddek Bensalem, Marius Bozga:
Generation and verification of learned stochastic automata using k-NN and statistical model checking. Appl. Intell. 52(8): 8874-8894 (2022) - [j3]Salim Chehida, Abdelhakim Baouya, Saddek Bensalem, Marius Bozga:
Learning and analysis of sensors behavior in IoT systems using statistical model checking. Softw. Qual. J. 30(2): 367-388 (2022) - [c16]Salim Chehida, Saddek Bensalem, Davide Conzon, Enrico Ferrera, Xu Tao:
BRAIN-IoT Architecture and Platform for Building IoT Systems. IoTBDS 2022: 67-77 - 2021
- [j2]Salim Chehida, Yves Ledru, Yoann Blein, Germán Vega:
An SMT-based approach for generating trace examples and counter-examples of parametric properties. Int. J. Crit. Comput. Based Syst. 10(2): 143-183 (2021) - [c15]Salim Chehida, Abdelhakim Baouya, Saddek Bensalem:
Component-Based Approach Combining UML and BIP for Rigorous System Design. FACS 2021: 27-43 - [c14]Salim Chehida, Jean-Claude Tshilenge Mfumu:
Analysis and Prediction of Viral Infections using Statistical Model Checking. MEDES 2021: 43-48 - 2020
- [c13]Salim Chehida, Abdelhakim Baouya, Diego Fernández Alonso, Paul-Emmanuel Brun, Guillemette Massot, Marius Bozga, Saddek Bensalem:
Asset-Driven Approach for Security Risk Assessment in IoT Systems. CRiSIS 2020: 149-163 - [c12]Abdelhakim Baouya, Salim Chehida, Miquel Cantero, Marta Millet, Saddek Bensalem, Marius Bozga:
Formal Modeling and Simulation of Collaborative Intelligent Robots. ESOCC Workshops 2020: 41-52 - [c11]Abdelhakim Baouya, Salim Chehida, Saddek Bensalem, Marius Bozga:
Fog Computing and Blockchain for Massive IoT Deployment. MECO 2020: 1-4 - [c10]Salim Chehida, Abdelhakim Baouya, Marius Bozga, Saddek Bensalem:
Exploration of Impactful Countermeasures on IoT Attacks. MECO 2020: 1-4 - [c9]Salim Chehida, Abdelhakim Baouya, Saddek Bensalem, Marius Bozga:
Applied Statistical Model Checking for a Sensor Behavior Analysis. QUATIC 2020: 399-411 - [c8]Salim Chehida, Abdelhakim Baouya, Miquel Cantero, Paul-Emmanuel Brun, Guillemette Massot:
Risk Assessment in IoT Case Study: Collaborative Robots System. SAM IoT 2020: 3-10 - [c7]Xu Tao, Davide Conzon, Enrico Ferrera, Shuai Li, Jürgen Götz, Laurent Maillet-Contoz, Emmanuel Michel, Mario Diaz-Nava, Abdelhakim Baouya, Salim Chehida:
Model Based Methodology and Framework for Design and Management of Next-Gen IoT Systems. SAM IoT 2020: 80-90 - [c6]Abdelhakim Baouya, Salim Chehida, Saddek Bensalem, Marius Bozga:
Formal Modeling and Verification of Blockchain Consensus Protocol for IoT Systems. SoMeT 2020: 330-342
2010 – 2019
- 2018
- [c5]Ansem Ben Cheikh, Yoann Blein, Salim Chehida, Germán Vega, Yves Ledru, Lydie du Bousquet:
An Environment for the ParTraP Trace Property Language (Tool Demonstration). RV 2018: 437-446 - 2016
- [j1]Salim Chehida, Akram Idani, Yves Ledru, Mustapha Kamel Rahmouni:
Extensions du diagramme d'activité pour la spécification de politiques RBAC. Ingénierie des Systèmes d Inf. 21(2): 11-37 (2016) - [c4]Salim Chehida, Akram Idani, Yves Ledru, Mustapha Kamel Rahmouni:
Combining UML and B for the specification and validation of RBAC policies in business process activities. RCIS 2016: 1-12 - 2015
- [c3]Salim Chehida, Akram Idani, Yves Ledru, Mustapha Kamel Rahmouni:
Extensions du diagramme d'activité pour contrôler l'accès au SI. INFORSID 2015: 151-165 - 2012
- [c2]Salim Chehida, Mustapha Kamel Rahmouni:
Security Requirements Analysis of Web Applications Using UML. ICWIT 2012: 232-239
2000 – 2009
- 2009
- [c1]Salim Chehida, Mustapha Kamel Rahmouni:
Proposition d'un Processus de Développement pour la Modélisation Sécurisée des Systèmes d'Information. CIIA 2009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint