Follow
EL khoury Hicham
EL khoury Hicham
Associate Professor of Computer Science, Lebanese University
Verified email at ul.edu.lb
Title
Cited by
Cited by
Year
Ontology-based recommender system in higher education
C Obeid, I Lahoud, H El-Khoury, PA Champin
Companion Proceedings of the The Web Conference 2018, 1031-1034, 2018
1462018
A formal data flow-oriented model for distributed network security conflicts detection
H El-Khoury, R Laborde, F Barrère, M Chamoun, A Benzekri
ICNS 2012, The Eighth International Conference on Networking and Services, 20-27, 2012
102012
A comparative analysis of different recommender systems for university major and career domain guidance
C Lahoud, S Moussa, C Obeid, EH Khoury, PA Champin
Education and Information Technologies, 1-27, 2022
92022
A novel hybrid recommender system approach for student academic advising named COHRS, supported by case-based reasoning and ontology
C Obeid, C Lahoud, KH El, PA Champin
Computer Science and Information Systems 19 (2), 979-1005, 2022
72022
A specification method for analyzing fine grained network security mechanism configurations
H El-Khoury, L Romain, B François, B Abdelmalek, C Maroun
2013 IEEE Conference on Communications and Network Security (CNS), 483-487, 2013
72013
SpCLUST: Towards a fast and reliable clustering for potentially divergent biological sequences
J Matar, H EL-Khoury, JC Charr, C Guyeux, S Chrétien
Computers in biology and medicine 114, 103439, 2019
52019
Generating database schemas from business artifact models
M Abi Assaf, Y Badr, H El Khoury, K Barbar
International Journal of Information Technology and Computer Science (IJITCS …, 2018
52018
A generic data flow security model
H El Khoury, R Laborde, B François, B Abdelmalek, C Maroun
4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 2011
5*2011
A generic attribute-based model for network security mechanisms representation and configuration
H El Khoury, R Laborde, M Chamoun, F Barrère, A Benzekri
FCST, 2012
42012
Towards a Formal Data Flow Oriented Model for Network Security Policies Analysis
H El Khoury, R Laborde, F Barrere, A Benzekri
2011 Conference on Network and Information Systems Security, 1-7, 2011
42011
Conceptual clustering of university graduate students' trajectories using formal concept analysis: a case study in Lebanon
C Obeid, H EL-Khoury, C Lahoud, PA Champin
International Journal of Continuing Engineering Education and Life Long …, 2020
32020
A data flow-oriented specification method for analysing network security configurations
H El-Khoury, R Laborde, F Barrère, A Benzekri, M Chamoun
International Journal of Internet Protocol Technology 7 8 (2-3), 58-76, 2014
32014
Une modélisation formelle orientée flux de données pour l'analyse de configuration de sécurité réseau
H El Khoury
Université de Toulouse, Université Toulouse III-Paul Sabatier, 2014
12014
Automated Submission of Digital Content to Digital Repositories Through Web API
AA Maroun, R Ali, F Charbel, EK Hicham, B Youakim
2nd International Engineering Conference on Electrical, Energy, and …, 2023
2023
Economic Performance of a 250kW Solar PV System: Application to Lebanon
J Al Asmar, M Shraif, H El Khoury, J Monhem
4th IEEE Middle East and North Africa COMMunications Conference (MENACOMM …, 2022
2022
Impact of Eigensolvers on Spectral Clustering
J Matar, H El Khoury, JC Charr, C Guyeux
2021 3rd IEEE Middle East and North Africa COMMunications Conference …, 2021
2021
L’impact de l’entraînement assisté par ordinateur sur le développement des fonctions exécutives dans le cadre d’un trouble déficitaire de l’attention chez des enfants âgés de 7 …
K Abou Assi, H El Khoury, R Malek, H Naccache
IFIC, Université de Caen, 2019
2019
Smart switch (SMITCH-LB) for electricity load balancing and optimization
J MATAR, H El KHOURY
The International Journal of E-Learning and Educational Technologies in the …, 2019
2019
A formal data flow model to study network protocol encapsulation inconsistencies
F Barrère, R Laborde, H Elkhoury, A Benzekri
Proceedings of the International Conference on Security and Management (SAM), 1, 2014
2014
A Specification Method for Analyzing Fine Grained Network Security Mechanism Configurations
LR El Khoury Hicham, B François, B Abdelmalek, C Maroun
The system can't perform the operation now. Try again later.
Articles 1–20