default search action
Oum-El-Kheir Aktouf
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Priyadarshini, Simon Greiner, Maike Massierer, Oum-El-Kheir Aktouf:
Software architecture based inter-feature analysis of safety and security interactions. EDCC 2024: 165-168 - [c42]Zoé Lagache, Annabelle Mercier, Oum-El-Kheir Aktouf, Arthur Baudet:
Toward CPS Security Monitoring: Employing Multi-Agent Systems and Digital Twins. ISSRE (Workshops) 2024: 303-306 - [c41]Antonello Calabrò, Said Daoudagh, Eda Marchetti, Oum-El-Kheir Aktouf, Annabelle Mercier:
Human-Centric Dev-X-Ops Process for Trustworthiness in AI-Based Systems. WEBIST 2024: 288-295 - [i1]Said Daoudagh, Eda Marchetti, Oum-El-Kheir Aktouf:
2HCDL: Holistic Human-Centered Development Lifecycle. CoRR abs/2405.01566 (2024) - 2023
- [c40]Arthur Baudet, Oum-El-Kheir Aktouf, Annabelle Mercier, Philippe Elbaz-Vincent:
Decentralized and Autonomous Key Management for Open Multi-agent Systems of Embedded Agents. CoopIS 2023: 119-136 - [c39]Mohammed El Amin Tebib, Pascal André, Mariem Graa, Oum-El-Kheir Aktouf:
PrivDroid: Android Security Code Smells Tool for Privilege Escalation Prevention. DASC/PiCom/CBDCom/CyberSciTech 2023: 1024-1031 - [c38]Mohamed Abdelsalam, Simon Greiner, Oum-El-Kheir Aktouf, Annabelle Mercier:
C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving. ESORICS Workshops (2) 2023: 159-175 - [c37]Arthur Baudet, Oum-El-Kheir Aktouf, Annabelle Mercier, Philippe Elbaz-Vincent:
MAKI: A Multi-Agent Public Key Infrastructure. ICAART (3) 2023: 177-184 - [c36]Priyadarshini, Simon Greiner, Maike Massierer, Oum-El-Kheir Aktouf:
Feature-based software architecture analysis to identify safety and security interactions. ICSA 2023: 12-22 - [c35]Ivan Baheux, Oum-El-Kheir Aktouf, Mohammed El Amin Tebib, Mariem Graa, Pascal André, Yves Ledru:
DroidSecTester: Towards context-driven modelling and detection of Android application vulnerabilities. ISSREW 2023: 136-141 - 2022
- [c34]Arthur Baudet, Oum-El-Kheir Aktouf, Annabelle Mercier, Philippe Elbaz-Vincent:
Decentralized Public Key Infrastructure for Autonomous Embedded Systems. C&ESAR 2022: 99-114 - [c33]Jerry Gao, Wencen Wu, Oum-El-Kheir Aktouf:
Adequate Testing Unmanned Autonomous Vehicle Systems - Infrastructures, Approaches, Issues, Challenges, and Needs. SOSE 2022: 154-164 - 2021
- [j6]Arthur Baudet, Oum-El-Kheir Aktouf, Annabelle Mercier, Philippe Elbaz-Vincent:
Systematic Mapping Study of Security in Multi-Embedded-Agent Systems. IEEE Access 9: 154902-154913 (2021) - [c32]Mohammed El Amin Tebib, Pascal André, Oum-El-Kheir Aktouf, Mariem Graa:
Assisting Developers in Preventing Permissions Related Security Issues in Android Applications. EDCC Workshops 2021: 132-143 - [c31]Arthur Baudet, Oum-El-Kheir Aktouf, Annabelle Mercier, Jean-Paul Jamont:
A Case Study of Run-Time Testing of Self Organizations in Multi-Embedded-Agent Systems. PDP 2021: 62-66 - 2020
- [c30]Nguyen Thanh Binh, Mariem Allagui, Oum-El-Kheir Aktouf, Ioannis Parissis, Le Thi Thanh Binh:
Experience Report on Developing a Crowdsourcing Test Platform for Mobile Applications. ICCCI (CCIS Volume) 2020: 651-661 - [c29]Emilia Cioroaica, Stanislav Chren, Oum-El-Kheir Aktouf, Alf Larsson, Ram Chillarege, Thomas Kuhn, Daniel Schneider, Christian Wolschke:
Towards Creation of Automated Prediction Systems for Trust and Dependability Evaluation. SoftCOM 2020: 1-6
2010 – 2019
- 2019
- [j5]Abderrahmane Sensaoui, Oum-El-Kheir Aktouf, David Hély, Stephane Di Vito:
An In-depth Study of MPU-Based Isolation Techniques. J. Hardw. Syst. Secur. 3(4): 365-381 (2019) - [c28]Abderrahmane Sensaoui, David Hély, Oum-El-Kheir Aktouf:
Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices. EDCC 2019: 31-38 - [c27]Abderrahmane Sensaoui, Oum-El-Kheir Aktouf, David Hély:
SHCoT: Secure (and Verified) Hybrid Chain of Trust to Protect from Malicious Software in LightWeight Devices. ISSRE Workshops 2019: 434-439 - [c26]Arthur Baudet, Oum-El-Kheir Aktouf, Annabelle Mercier, Jean-Paul Jamont:
Toward Testing Self-organizations in Multi-Embedded-Agent Systems. SERENE 2019: 97-108 - [c25]Arthur Darroux, Jean-Paul Jamont, Oum-El-Kheir Aktouf, Annabelle Mercier:
An Energy Aware Approach to Trust Management Systems for Embedded Multi-Agent Systems. SERENE 2019: 121-137 - 2017
- [c24]Camille Barnier, Oum-El-Kheir Aktouf, Annabelle Mercier, Jean-Paul Jamont:
Toward an Embedded Multi-agent System Methodology and Positioning on Testing. ISSRE Workshops 2017: 239-244 - 2015
- [c23]Tao Zhang, Jerry Gao, Oum-El-Kheir Aktouf, Tadahiro Uehara:
Test Model and Coverage Analysis for Location-based Mobile Services. SEKE 2015: 80-86 - [c22]Oum-El-Kheir Aktouf, Tao Zhang, Jerry Gao, Tadahiro Uehara:
Testing Location-Based Function Services for Mobile Applications. SOSE 2015: 308-314 - 2014
- [b1]Oum-El-Kheir Aktouf:
Test et diagnostic en ligne dans les systèmes embarqués. (Online testing and diagnosis in embedded systems). Université Grenoble Alpes, France, 2014 - [j4]Imad Belkacem, Safia Nait Bahloul, Oum-El-Kheir Aktouf:
Data Analysis of an RFID System for Its Dependability. Int. J. Embed. Real Time Commun. Syst. 5(3): 1-22 (2014) - [c21]Yazid Benazzouz, Oum-El-Kheir Aktouf, Ioannis Parissis:
A Fault Fuzzy-ontology for Large Scale Fault-tolerant Wireless Sensor Networks. KES 2014: 203-212 - 2013
- [c20]Rafik Kheddam, Oum-El-Kheir Aktouf, Ioannis Parissis, Sanaa Boughazi:
Monitoring of RFID failures resulting from LLRP misconfigurations. SoftCOM 2013: 1-6 - 2012
- [c19]Dima Hamdan, Oum-El-Kheir Aktouf, Ioannis Parissis, Bachar El-Hassan, Abbas Hijazi, Bassam Moslem:
A Self-Monitoring, Adaptive and Resource Efficient Approach for Improving QoS in Wireless Sensor Networks. CyberC 2012: 393-400 - [c18]Gilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hély:
Evaluation of a new RFID system performance monitoring approach. DATE 2012: 1439-1442 - [c17]Rafik Kheddam, Oum-El-Kheir Aktouf, Ioannis Parissis:
An Extended LLRP Model for RFID System Test and Diagnosis. ICST 2012: 529-538 - [c16]Dima Hamdan, Oum-El-Kheir Aktouf, Ioannis Parissis, Bachar El-Hassan, Abbas Hijazi:
Integrated fault tolerance framework for wireless sensor networks. ICT 2012: 1-6 - [c15]Dima Hamdan, Oum-El-Kheir Aktouf, Ioannis Parissis, Abbas Hijazi, Mira Sarkis, Bachar El-Hassan:
SMART Service for Fault Diagnosis in Wireless Sensor Networks. NGMAST 2012: 211-216 - [c14]Rafik Kheddam, Oum-El-Kheir Aktouf, Ioannis Parissis:
Online monitoring and diagnosis of RFID readers and tags. SoftCOM 2012: 1-9 - 2011
- [j3]Gilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, Minh Duc Nguyen, David Hély:
RFID System On-line Testing Based on the Evaluation of the Tags Read-Error-Rate. J. Electron. Test. 27(3): 267-276 (2011) - [c13]Minh-Duc Nguyen, Gilles Fritz, Oum-El-Kheir Aktouf, Vincent Beroulle, David Hély:
Towards middleware-based fault-tolerance in RFID systems. EWDC 2011: 49-52 - [c12]Gilles Fritz, Boutheina Maaloul, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hély:
Read rate profile monitoring for defect detection in RFID Systems. RFID-TA 2011: 89-94 - [c11]Gilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hély:
SystemC modeling of RFID systems for robustness analysis. SoftCOM 2011: 1-5
2000 – 2009
- 2008
- [c10]Thi Quynh Bui, Oum-El-Kheir Aktouf, Michel Dang:
Software component diagnosis service: architecture description. SIES 2008: 134-140 - 2007
- [c9]Thi Quynh Bui, Oum-El-Kheir Aktouf:
Diagnosis service for embedded software component based systems. EFTS 2007: 3 - 2001
- [j2]Oum-El-Kheir Benkahla:
Host-diagnosis algorithms for parallel systems. J. Syst. Archit. 47(8): 675-695 (2001)
1990 – 1999
- 1999
- [c8]Maisaa Khalil, Oum-El-Kheir Benkahla, Chantal Robach:
An Experimental Comparison of Software Diagnosis Methods. EUROMICRO 1999: 2146-2149 - 1998
- [j1]Oum-El-Kheir Benkahla, Chouki Aktouf, Chantal Robach:
Performance Evaluation of Distributed Diagnosis Algorithms in Parallel Systems. Parallel Comput. 24(8): 1205-1222 (1998) - [c7]Oum-El-Kheir Benkahla, Chantal Robach:
Off-Line Diagnosis of Parallel Systems. SRDS 1998: 360-365 - 1996
- [c6]Oum-El-Kheir Benkahla, F. Chevassu, B. Remy, Chantal Robach:
Performance Evaluation of Testing Strategies in Parallel Systems. EUROMICRO 1996: 371-378 - [c5]Oum-El-Kheir Benkahla, Chouki Aktouf, Chantal Robach:
System-Diagnosis of Cluster-Based Parallel Architectures. PDP 1996: 305-309 - 1995
- [c4]Oum-El-Kheir Benkahla, Chouki Aktouf, Chantal Robach:
Distributed off-line testing of parallel systems. Asian Test Symposium 1995: 2-8 - [c3]Oum-El-Kheir Benkahla, Chouki Aktouf, Chantal Robach:
A Diagnosis Strategy for Cluster-Based Parallel Architectures. PDPTA 1995: 111-120 - [c2]Oum-El-Kheir Benkahla, Chouki Aktouf, Chantal Robach:
Host-Diagnosis of Parallel Systems. PDPTA 1995: 148-157 - 1994
- [c1]Chouki Aktouf, Oum-El-Kheir Benkahla, Chantal Robach:
Distributed validation of massively parallel machines. ISPAN 1994: 326-333
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint