Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Algorithm for IS_A Hierarchy Derivation., , , and . OOIS, page 469-479. Springer, (1994)CITOM: An incremental construction of multilingual topic maps, , and . Data & knowledge engineering, (2012)Modelling Cyber-Physical Security in Healthcare Systems., , , and . CAiSE Forum, volume 424 of Lecture Notes in Business Information Processing, page 100-108. Springer, (2021)A conceptual meta-model for secured information systems., , , and . SESS@ICSE, page 22-28. ACM, (2011)De l'analyse des risques à l'expression des exigences de sécurité des systèmes d'information ., , , and . INFORSID, page 337-352. (2012)Méta modèle de la sécurité des systèmes d'information : Enrichissement par le contexte., , and . INFORSID, page 223-236. (2018)Proposed Approach for Evaluating the Quality of Topic Maps, , and . Model and Data Engineering, page 42--49. Berlin, Heidelberg, Springer Berlin Heidelberg, (2011)Towards an Assisted Reorganization of Is_A Hierarchies., and . OOIS, volume 2425 of Lecture Notes in Computer Science, page 536-548. Springer, (2002)SafecareOnto: A Cyber-Physical Security Ontology for Healthcare Systems., , , and . DEXA (2), volume 12924 of Lecture Notes in Computer Science, page 22-34. Springer, (2021)Automatic Help for Building and Maintaining Ontologies., and . NLDB, volume 2553 of Lecture Notes in Computer Science, page 27-39. Springer, (2002)