Ontology-based recommender system in higher education C Obeid, I Lahoud, H El-Khoury, PA Champin Companion Proceedings of the The Web Conference 2018, 1031-1034, 2018 | 147 | 2018 |
A comparative analysis of different recommender systems for university major and career domain guidance C Lahoud, S Moussa, C Obeid, EH Khoury, PA Champin Education and Information Technologies, 1-27, 2022 | 10 | 2022 |
A formal data flow-oriented model for distributed network security conflicts detection H El-Khoury, R Laborde, F Barrère, M Chamoun, A Benzekri ICNS 2012, The Eighth International Conference on Networking and Services, 20-27, 2012 | 10 | 2012 |
A novel hybrid recommender system approach for student academic advising named COHRS, supported by case-based reasoning and ontology C Obeid, C Lahoud, KH El, PA Champin Computer Science and Information Systems 19 (2), 979-1005, 2022 | 9 | 2022 |
A specification method for analyzing fine grained network security mechanism configurations H El-Khoury, L Romain, B François, B Abdelmalek, C Maroun 2013 IEEE Conference on Communications and Network Security (CNS), 483-487, 2013 | 7 | 2013 |
SpCLUST: Towards a fast and reliable clustering for potentially divergent biological sequences J Matar, H EL-Khoury, JC Charr, C Guyeux, S Chrétien Computers in biology and medicine 114, 103439, 2019 | 5 | 2019 |
Generating database schemas from business artifact models M Abi Assaf, Y Badr, H El Khoury, K Barbar International Journal of Information Technology and Computer Science (IJITCS …, 2018 | 5 | 2018 |
A generic data flow security model H El Khoury, R Laborde, B François, B Abdelmalek, C Maroun 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 2011 | 5* | 2011 |
A generic attribute-based model for network security mechanisms representation and configuration H El Khoury, R Laborde, M Chamoun, F Barrère, A Benzekri FCST, 2012 | 4 | 2012 |
Towards a Formal Data Flow Oriented Model for Network Security Policies Analysis H El Khoury, R Laborde, F Barrere, A Benzekri 2011 Conference on Network and Information Systems Security, 1-7, 2011 | 4 | 2011 |
Conceptual clustering of university graduate students' trajectories using formal concept analysis: a case study in Lebanon C Obeid, H EL-Khoury, C Lahoud, PA Champin International Journal of Continuing Engineering Education and Life Long …, 2020 | 3 | 2020 |
A data flow-oriented specification method for analysing network security configurations H El-Khoury, R Laborde, F Barrère, A Benzekri, M Chamoun International Journal of Internet Protocol Technology 7 8 (2-3), 58-76, 2014 | 3 | 2014 |
Une modélisation formelle orientée flux de données pour l'analyse de configuration de sécurité réseau H El Khoury Université de Toulouse, Université Toulouse III-Paul Sabatier, 2014 | 1 | 2014 |
Automated Submission of Digital Content to Digital Repositories Through Web API AA Maroun, R Ali, F Charbel, EK Hicham, B Youakim 2nd International Engineering Conference on Electrical, Energy, and …, 2023 | | 2023 |
Economic Performance of a 250kW Solar PV System: Application to Lebanon J Al Asmar, M Shraif, H El Khoury, J Monhem 4th IEEE Middle East and North Africa COMMunications Conference (MENACOMM …, 2022 | | 2022 |
Impact of Eigensolvers on Spectral Clustering J Matar, H El Khoury, JC Charr, C Guyeux 2021 3rd IEEE Middle East and North Africa COMMunications Conference …, 2021 | | 2021 |
L’impact de l’entraînement assisté par ordinateur sur le développement des fonctions exécutives dans le cadre d’un trouble déficitaire de l’attention chez des enfants âgés de 7 … K Abou Assi, H El Khoury, R Malek, H Naccache IFIC, Université de Caen, 2019 | | 2019 |
Smart switch (SMITCH-LB) for electricity load balancing and optimization J MATAR, H El KHOURY The International Journal of E-Learning and Educational Technologies in the …, 2019 | | 2019 |
A formal data flow model to study network protocol encapsulation inconsistencies F Barrère, R Laborde, H Elkhoury, A Benzekri Proceedings of the International Conference on Security and Management (SAM), 1, 2014 | | 2014 |
A Specification Method for Analyzing Fine Grained Network Security Mechanism Configurations LR El Khoury Hicham, B François, B Abdelmalek, C Maroun | | |