Follow
EL khoury Hicham
EL khoury Hicham
Associate Professor of Computer Science, Lebanese University
Verified email at ul.edu.lb
Title
Cited by
Cited by
Year
Ontology-based recommender system in higher education
C Obeid, I Lahoud, H El-Khoury, PA Champin
Companion Proceedings of the The Web Conference 2018, 1031-1034, 2018
1422018
A formal data flow-oriented model for distributed network security conflicts detection
H El-Khoury, R Laborde, F Barrère, M Chamoun, A Benzekri
ICNS 2012, The Eighth International Conference on Networking and Services, 20-27, 2012
102012
A novel hybrid recommender system approach for student academic advising named COHRS, supported by case-based reasoning and ontology
C Obeid, C Lahoud, KH El, PA Champin
Computer Science and Information Systems 19 (2), 979-1005, 2022
72022
A specification method for analyzing fine grained network security mechanism configurations
H El-Khoury, L Romain, B François, B Abdelmalek, C Maroun
2013 IEEE Conference on Communications and Network Security (CNS), 483-487, 2013
72013
A comparative analysis of different recommender systems for university major and career domain guidance
C Lahoud, S Moussa, C Obeid, EH Khoury, PA Champin
Education and Information Technologies, 1-27, 2022
52022
SpCLUST: Towards a fast and reliable clustering for potentially divergent biological sequences
J Matar, H EL-Khoury, JC Charr, C Guyeux, S Chrétien
Computers in biology and medicine 114, 103439, 2019
52019
Generating database schemas from business artifact models
M Abi Assaf, Y Badr, H El Khoury, K Barbar
International Journal of Information Technology and Computer Science (IJITCS …, 2018
52018
A generic data flow security model
H El Khoury, R Laborde, B François, B Abdelmalek, C Maroun
4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 2011
5*2011
A generic attribute-based model for network security mechanisms representation and configuration
H El Khoury, R Laborde, M Chamoun, F Barrère, A Benzekri
FCST, 2012
42012
Towards a Formal Data Flow Oriented Model for Network Security Policies Analysis
H El Khoury, R Laborde, F Barrere, A Benzekri
2011 Conference on Network and Information Systems Security, 1-7, 2011
42011
A data flow-oriented specification method for analysing network security configurations
H El-Khoury, R Laborde, F Barrère, A Benzekri, M Chamoun
International Journal of Internet Protocol Technology 7 8 (2-3), 58-76, 2014
32014
Conceptual clustering of university graduate students' trajectories using formal concept analysis: a case study in Lebanon
C Obeid, H EL-Khoury, C Lahoud, PA Champin
International Journal of Continuing Engineering Education and Life Long …, 2020
22020
Une modélisation formelle orientée flux de données pour l'analyse de configuration de sécurité réseau
H El Khoury
Université de Toulouse, Université Toulouse III-Paul Sabatier, 2014
12014
Economic Performance of a 250kW Solar PV System: Application to Lebanon
J Al Asmar, M Shraif, H El Khoury, J Monhem
4th IEEE Middle East and North Africa COMMunications Conference (MENACOMM …, 2022
2022
Impact of Eigensolvers on Spectral Clustering
J Matar, H El Khoury, JC Charr, C Guyeux
2021 3rd IEEE Middle East and North Africa COMMunications Conference …, 2021
2021
L’impact de l’entraînement assisté par ordinateur sur le développement des fonctions exécutives dans le cadre d’un trouble déficitaire de l’attention chez des enfants âgés de 7 …
K Abou Assi, H El Khoury, R Malek, H Naccache
IFIC, Université de Limoges, avec le soutien de l'AUF, 2019
2019
Smart switch (SMITCH-LB) for electricity load balancing and optimization
J MATAR, H El KHOURY
The International Journal of E-Learning and Educational Technologies in the …, 2019
2019
A formal data flow model to study network protocol encapsulation inconsistencies
F Barrère, R Laborde, H Elkhoury, A Benzekri
Proceedings of the International Conference on Security and Management (SAM), 1, 2014
2014
Vers un modèle formel orienté flux de données pour l’analyse de politiques de sécurité réseau
LR El Khoury Hicham, B François, B Abdelmalek
The system can't perform the operation now. Try again later.
Articles 1–19