Filtrer vos résultats
- 60
- 9
- 43
- 8
- 8
- 3
- 3
- 2
- 1
- 1
- 8
- 67
- 1
- 1
- 2
- 3
- 1
- 4
- 2
- 5
- 1
- 4
- 5
- 5
- 4
- 3
- 4
- 1
- 4
- 4
- 3
- 1
- 1
- 3
- 1
- 2
- 2
- 3
- 61
- 8
- 69
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 69
- 20
- 20
- 12
- 11
- 9
- 7
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
69 résultats
|
Méta modèle de la sécurité des systèmes d'information : enrichissement par le contexteINFORSID 2018 : 36e congrès INFormatique des ORganisation et Systèmes d'Information et de Décision, May 2018, Nantes, France. pp.63 - 87
Communication dans un congrès
hal-02283829v1
|
||
|
Relational Database Anonymization - A Model-driven Guiding Approach4th International Conference on Information Systems Security and Privacy, Jan 2018, Funchal, France. pp.161-170, ⟨10.5220/0006659201610170⟩
Communication dans un congrès
hal-02469154v1
|
||
POEM: an Ontology Manager based on Existence ConstraintsDEXA'08, Turin (Italie), Jan 2008, X, France. pp.81-88
Communication dans un congrès
hal-01125529v1
|
|||
Extracting generalization hierarchies from relational databases : a reverse engineering approachData and Knowledge Engineering, 2007, 63 (2), pp.568-589. ⟨10.1016/j.datak.2007.04.002⟩
Article dans une revue
istex
hal-01125290v1
|
|||
Preface of WISSE?14 (Fourth International Workshop on Information Systems Security Engineering)2014
Pré-publication, Document de travail
hal-01126563v1
|
|||
|
A semantic approach for semi-automatic detection of sensitive dataInformation Resources Management Journal, 2014, 27 (4), pp.23-44. ⟨10.4018/irmj.2014100102⟩
Article dans une revue
hal-01126551v1
|
||
|
Abstracting Anonymization Techniques: A Prerequisite for Selecting a Generalization AlgorithmKnowledge-Based and Intelligent Information & Engineering Systems 19th Annual Conference, KES-2015, Sep 2015, Marina Bay Sands, Singapore. pp.206-215, ⟨10.1016/j.procs.2015.08.120⟩
Communication dans un congrès
hal-03236910v1
|
||
A wiki-oriented on-line dictionary for human and social sciencesSemWiki2010 : 5th Workshop on Semantic Wikis, Linking Data and People, co-located with ESWC 2010 (European Semantic Web Conference), May 2010, Heraklion, Greece. pp.79-88
Communication dans un congrès
hal-00740324v1
|
|||
A conceptual meta-model for secured information systemsICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011), May 2011, Waikiki, Honolulu, Hawaii, United States. pp.22-28, ⟨10.1145/1988630.1988635⟩
Communication dans un congrès
hal-01125862v1
|
|||
Supporting database evolution : using ontologies matchingOOIS 2003 : 9th International Conference on Object-Oriented Information Systems, Sep 2003, Geneva, Switzerland. pp.284-288, ⟨10.1007/978-3-540-45242-3_27⟩
Communication dans un congrès
istex
hal-01124840v1
|
|||
Un Wiktionnaire pour les Sciences Sociales et HumainesLe dictionnaire électronique. Quelles perspectives pour les sciences humaines et sociales ?, Jan 2007, X, France
Communication dans un congrès
hal-01125504v1
|
|||
An Algorithm to Extract Is_A Inheritance Hierarchies from a Relational DatabaseER99, Jan 1999, X, France
Communication dans un congrès
hal-01124842v1
|
|||
Un modèle CIM pour les systèmes d'information sécurisésIBIMA 2010 : 15th International Business Information Management Association Conference on Knowledge Management and Innovation: a Business Competitive Edge Perspective, French Session, Nov 2010, Cairo, Égypte
Communication dans un congrès
hal-01125797v1
|
|||
Characterizing Generalization Algorithms-First Guidelines for Data PublishersKMIS 2014- International Conference on Knowledge Management and Information Sharing, Oct 2014, Rome, Italy
Communication dans un congrès
hal-01126561v1
|
|||
Deriving Normalized Is_A Hierarchies by Using Applicability ConstraintsCAISE'96 (Conference on Advanced Information Systems Engineering), Créte, Gréce, Jan 1996, X, France
Communication dans un congrès
hal-01124864v1
|
|||
Reorganizing classes by derivation of inheritances[Research Report] CEDRIC-95-576, CEDRIC Lab/CNAM. 1995
Rapport
hal-01124869v1
|
|||
An Ontology for cyber incident root cause analysis from event logs34th IBIMA Conference, Nov 2019, Madrid, Spain
Communication dans un congrès
hal-02471081v1
|
|||
Proc. and preface of the workshop on Information System Security Engineering (WISSE)Proc. and preface of the workshop on Information System Security Engineering (WISSE), in conjonction with CAiSE. 2011
Ouvrages
hal-01126188v1
|
|||
|
Managing Cyber-physical Incidents Propagation in Health ServicesResearch Challenges in Information Science: RCIS 2020, Sep 2020, Limassol, Cyprus
Communication dans un congrès
hal-02957720v1
|
||
RetroWeb: a Web Site Reverse Engineering ApproachInt. Conf. on Web Engineering (ICWE), Jan 2004, X, France
Communication dans un congrès
hal-01125022v1
|
|||
Ontology Learning from Databases: Some Efficient Methods to Discover Semantic Patterns in DataAKA / IOS Press. Serie. Perspectives in Ontology Learning, pp.30, 2014, 978-1-61499-379-7
Chapitre d'ouvrage
hal-01126185v1
|
|||
An Algorithm for IS_A Hierarchy DerivationOOIS'94 (Int. Conf. on Object-Oriented Information systems), Londres, Angleterre, Jan 1994, X, France. pp.469 à 479
Communication dans un congrès
hal-01124862v1
|
|||
Normalization and Denormalization : Two Mechanisms for Reorganizing IS_A Inheritance HierarchiesInt. Conf. on Object-Oriented Information Systems (OOIS'98), Paris, France, Jan 1998, X, France. pp.38-53
Communication dans un congrès
hal-01124870v1
|
|||
Actes du Worshop Decision Systems Engineering (DSE'03)Conférence CAiSE'03, Klagenfurt-Velden, Autriche, Jan 2003, X, France
Communication dans un congrès
hal-01125107v1
|
|||
A framework for database evolution managementUSE 2003 : 2nd International Workshop on Unanticipated Software Evolution, in conjunction with ETAPS 2003, Apr 2003, Warsaw, Poland. pp.1-9
Communication dans un congrès
hal-01124880v1
|
|||
Relational database reverse engineering : elicitation of generalization hierarchiesER’ 99 Workshops on Evolution and Change in Data Management, Reverse Engineering in Information Systems, and the World Wide Web and Conceptual Modeling, Nov 1999, Paris, France. pp.173-185, ⟨10.1007/3-540-48054-4_15⟩
Communication dans un congrès
istex
hal-01124843v1
|
|||
|
Security Challenges for the Critical Infrastructures of the Healthcare SectorJohn Soldatos, James Philpot and Gabriele Giunta (eds.). Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, Now Publishers, 2020, ⟨10.1561/9781680836875.ch8⟩
Chapitre d'ouvrage
hal-02943076v1
|
||
Building contextualized topic maps19th IBIMA (International Business Information Management Association) conference on Innovation Vision 2020: Sustainable growth, Entrepreneurship, Real Estate and Economic Development, Nov 2012, Barcelone, Spain
Communication dans un congrès
hal-01126211v1
|
|||
Proc. and Preface of WISSE?12 (Second International Workshop on Information Systems Security Engineering) qui a eu lieu en conjonction avec CAISE'2012 à Gdansk.WISSE?12. 2012
Ouvrages
hal-01126189v1
|
|||
Automatic Help for Building and Maintaining Ontology7th International Workshop on Application of Natural Language to Information Systems (NLDB'2002), Jan 2002, X, France
Communication dans un congrès
hal-01124838v1
|