Christophe Feltus
Orcid: 0000-0002-7182-8185
According to our database1,
Christophe Feltus
authored at least 65 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Int. J. Knowl. Syst. Sci., 2023
Development of Build-MaaS Architecture, a Mobility-as-a-Service platform for the Construction Sector.
Proceedings of the 6th International Conference on Information and Computer Technologies, 2023
Towards Enhancing Open Innovation Efficiency: A Method for Ontological Integration of BPMN and EMMO.
Proceedings of the 18th Conference on Computer Science and Intelligence Systems, 2023
2022
Cluster-Based Vehicle Routing on Road Segments in Dematerialised Traffic Infrastructures.
J. Inf. Technol. Res., 2022
Learning Algorithm Recommendation Framework for IS and CPS Security: Analysis of the RNN, LSTM, and GRU Contributions.
Int. J. Syst. Softw. Secur. Prot., 2022
Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, 2022
Proceedings of the Information Security Practice and Experience, 2022
2021
AI'S Contribution to Ubiquitous Systems and Pervasive Networks Security - Reinforcement Learning vs Recurrent Networks.
J. Ubiquitous Syst. Pervasive Networks, 2021
Proceedings of the Advances in Conceptual Modeling, 2021
LogicGAN-based Data Augmentation Approach to Improve Adversarial Attack DNN Classifiers.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
2020
Proceedings of the 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) / The 10th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2020) / Affiliated Workshops, 2020
2019
An integrated conceptual model for information system security risk management supported by enterprise architecture management.
Softw. Syst. Model., 2019
Deriving Information System Security and Privacy From Value Cocreation Theory: Case Study in the Financial Sector.
Int. J. Serv. Sci. Manag. Eng. Technol., 2019
2018
Int. J. Inf. Syst. Serv. Sect., 2018
Proceedings of the Trends and Advances in Information Systems and Technologies, 2018
Proceedings of the 12th International Workshop on Value Modeling and Business Ontologies, 2018
Solving the trust issues in the process of transportation of dangerous goods by using blockchain technology.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Towards a Language to Support Value Cocreation: An Extension to the ArchiMate Modeling Framework.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018
Value CoCreation (VCC) Language Design in the Frame of a Smart Airport Network Case Study.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Capability-Driven Design of Business Service Ecosystem to Support Risk Governance in Regulatory Ecosystems.
Complex Syst. Informatics Model. Q., 2017
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF.
CoRR, 2017
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017
Conceptualization of a Value Cocreation Language for Knowledge-Intensive Business Services.
Proceedings of the Information Technology for Management. Ongoing Research and Development, 2017
Evaluation of the risk and security overlay of archimate to model information system security risks.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Workshop, 2017
Proceedings of the 8th International Conference on Ambient Systems, 2017
2016
Int. J. Inf. Technol. Manag., 2016
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF.
Proceedings of the Practice of Enterprise Modeling, 2016
Proceedings of the 6th International Conference on IT Convergence and Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Adopting trust and assurance as indicators for the reassignment of responsibilities in multi-agent systems.
Knowl. Eng. Rev., 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Alignment of ReMMo with RBAC to manage access rights in the frame of enterprise architecture.
Proceedings of the 9th IEEE International Conference on Research Challenges in Information Science, 2015
Towards the ENTRI Framework: Security Risk Management Enhanced by the Use of Enterprise Architectures.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015
Proceedings of the Advanced Information Systems Engineering Workshops, 2015
2014
Aligning Access Rights to Governance Needs with the Responsability MetaModel (ReMMo) in the Frame of Enterprise Architecture
PhD thesis, 2014
Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems.
Proceedings of the 1st International Conference on Information and Communication Technologies for Disaster Management, 2014
2013
Critical Infrastructures Governance Exploring SCADA Cybernetics through Architectured Policy Semantic.
Proceedings of the IEEE International Conference on Systems, 2013
Metamodel for reputation based agents system: case study for electrical distribution SCADA design.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Conceptual Integration of Enterprise Architecture Management and Security Risk Management.
Proceedings of the 17th IEEE International Enterprise Distributed Object Computing Conference Workshops, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Service specification and service compliance: How to consider the responsibility dimension?
J. Serv. Sci. Res., 2012
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Enterprise Architecture Enhanced with Responsibility to Manage Access Rights - Case Study in an EU Institution.
Proceedings of the Practice of Enterprise Modeling - 5th IFIP WG 8.1 Working Conference, 2012
2011
ReMoLa: Responsibility model language to align access rights with business process requirements.
Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, 2011
Reputation Based Dynamic Responsibility to Agent Assignement for Critical Infrastructure.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2011
Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Conceptualizing a responsibility based approach for elaborating and verifying RBAC policies conforming with CobiT framework requirements.
Proceedings of the Third International Workshop on Requirements Engineering and Law, 2010
Proceedings of the Eighth International Network Conference (INC 2010), 2010
A multi-agent based decision mechanism for incident reaction in telecommunication network.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010
Proceedings of the ARES 2010, 2010
2009
Building a responsibility model using modal logic - towards Accountability, Aapability and Commitment concepts.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504.
Proceedings of the IEEE International Conference on Research Challenges in Information Science, 2008
If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network.
Proceedings of the CRiSIS '08, 2008
2007
An Ontology for Requirements Analysis of Managers' Policies in Financial Institutions.
Proceedings of the Enterprise Interoperability II, 2007
2006
Improving Operational Risk Management Systems by Formalizing the Basel II Regulation with Goal Models and the ISO/IEC 15504 Approach.
Proceedings of the CAISE*06 Workshop on Regulations Modelling and their Validation and Verification ReMo2V '06, 2006
2004
Méthode d'évaluation NOEMI. Une méthode d'évaluation de la qualité des processus informatiques en petites et moyennes entreprises.
Ingénierie des Systèmes d Inf., 2004