Follow
EL khoury Hicham
EL khoury Hicham
Associate Professor of Computer Science, Lebanese University
Verified email at ul.edu.lb
Title
Cited by
Cited by
Year
Ontology-based recommender system in higher education
C Obeid, I Lahoud, H El-Khoury, PA Champin
Companion Proceedings of the The Web Conference 2018, 1031-1034, 2018
1402018
A formal data flow-oriented model for distributed network security conflicts detection
H El-Khoury, R Laborde, F Barrère, M Chamoun, A Benzekri
ICNS 2012, The Eighth International Conference on Networking and Services, 20-27, 2012
102012
A novel hybrid recommender system approach for student academic advising named COHRS, supported by case-based reasoning and ontology
C Obeid, C Lahoud, KH El, PA Champin
Computer Science and Information Systems 19 (2), 979-1005, 2022
72022
A specification method for analyzing fine grained network security mechanism configurations
H El-Khoury, L Romain, B François, B Abdelmalek, C Maroun
2013 IEEE Conference on Communications and Network Security (CNS), 483-487, 2013
72013
A comparative analysis of different recommender systems for university major and career domain guidance
C Lahoud, S Moussa, C Obeid, EH Khoury, PA Champin
Education and Information Technologies, 1-27, 2022
52022
SpCLUST: Towards a fast and reliable clustering for potentially divergent biological sequences
J Matar, H EL-Khoury, JC Charr, C Guyeux, S Chrétien
Computers in biology and medicine 114, 103439, 2019
52019
A generic data flow security model
H El Khoury, R Laborde, B François, B Abdelmalek, C Maroun
4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 2011
5*2011
Generating database schemas from business artifact models
M Abi Assaf, Y Badr, H El Khoury, K Barbar
International Journal of Information Technology and Computer Science (IJITCS …, 2018
42018
A generic attribute-based model for network security mechanisms representation and configuration
H El Khoury, R Laborde, M Chamoun, F Barrère, A Benzekri
FCST, 2012
42012
Towards a Formal Data Flow Oriented Model for Network Security Policies Analysis
H El Khoury, R Laborde, F Barrere, A Benzekri
2011 Conference on Network and Information Systems Security, 1-7, 2011
42011
A data flow-oriented specification method for analysing network security configurations
H El-Khoury, R Laborde, F Barrère, A Benzekri, M Chamoun
International Journal of Internet Protocol Technology 7 8 (2-3), 58-76, 2014
32014
Conceptual clustering of university graduate students' trajectories using formal concept analysis: a case study in Lebanon
C Obeid, H EL-Khoury, C Lahoud, PA Champin
International Journal of Continuing Engineering Education and Life Long …, 2020
22020
Une modélisation formelle orientée flux de données pour l'analyse de configuration de sécurité réseau
H El Khoury
Université de Toulouse, Université Toulouse III-Paul Sabatier, 2014
12014
Economic Performance of a 250kW Solar PV System: Application to Lebanon
J Al Asmar, M Shraif, H El Khoury, J Monhem
4th IEEE Middle East and North Africa COMMunications Conference (MENACOMM …, 2022
2022
Impact of Eigensolvers on Spectral Clustering
J Matar, H El Khoury, JC Charr, C Guyeux
2021 3rd IEEE Middle East and North Africa COMMunications Conference …, 2021
2021
L¢impact de l¢entraînement assisté par ordinateur sur le développement des fonctions exécutives dans le cadre d¢un trouble déficitaire de l¢attention chez des enfants âgés de 7 …
K Abou Assi, H El Khoury, R Malek, H Naccache
IFIC, Université de Limoges, avec le soutien de l'AUF, 2019
2019
Smart switch (SMITCH-LB) for electricity load balancing and optimization
J MATAR, H El KHOURY
The International Journal of E-Learning and Educational Technologies in the …, 2019
2019
A formal data flow model to study network protocol encapsulation inconsistencies
F Barrère, R Laborde, H Elkhoury, A Benzekri
Proceedings of the International Conference on Security and Management (SAM), 1, 2014
2014
Vers un modèle formel orienté flux de données pour l¢analyse de politiques de sécurité réseau
LR El Khoury Hicham, B François, B Abdelmalek
The system can't perform the operation now. Try again later.
Articles 1–19