default search action
Christophe Feltus
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Christophe Feltus, Damien Nicolas, Djamel Khadraoui:
Towards a Multidimensional Ontology Model for DIH-Based Organisations. Int. J. Knowl. Syst. Sci. 14(1): 1-19 (2023) - [c51]Christophe Feltus, Damien Nicolas, Carlos Kavka, Djamel Khadraoui, Salim Belouettar, Natalia A. Konchakova, Heinz A. Preisig, Peter Klein:
Towards Enhancing Open Innovation Efficiency: A Method for Ontological Integration of BPMN and EMMO. FedCSIS 2023: 471-479 - [c50]Djamel Khadraoui, Christophe Feltus:
Development of Build-MaaS Architecture, a Mobility-as-a-Service platform for the Construction Sector. ICICT 2023: 156-161 - 2022
- [j11]Christophe Feltus:
Learning Algorithm Recommendation Framework for IS and CPS Security: Analysis of the RNN, LSTM, and GRU Contributions. Int. J. Syst. Softw. Secur. Prot. 13(1): 1-23 (2022) - [j10]Christophe Feltus:
Cluster-Based Vehicle Routing on Road Segments in Dematerialised Traffic Infrastructures. J. Inf. Technol. Res. 15(1): 1-14 (2022) - [c49]Orhan Ermis, Christophe Feltus, Qiang Tang, Hoang Trang, Alexandre De Oliveira, Cu D. Nguyen, Alain Hirtzig:
A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks. ISPEC 2022: 345-363 - [c48]Jean-Sébastien Sottet, Pierre Brimont, Christophe Feltus, Benjamin Gâteau, Jean François Merche:
Towards a Lightweight Model-driven Smart-city Digital Twin. MODELSWARD 2022: 320-327 - 2021
- [j9]Christophe Feltus:
AI'S Contribution to Ubiquitous Systems and Pervasive Networks Security - Reinforcement Learning vs Recurrent Networks. J. Ubiquitous Syst. Pervasive Networks 15(2): 1-9 (2021) - [c47]Christophe Feltus:
LogicGAN-based Data Augmentation Approach to Improve Adversarial Attack DNN Classifiers. CSCI 2021: 180-185 - [c46]Christophe Feltus, Qin Ma, Henderik A. Proper, Pierre Kelsen:
Towards AI Assisted Domain Modeling. ER (Workshops) 2021: 75-89 - 2020
- [c45]Christophe Feltus:
Current and Future RL's Contribution to Emerging Network Security. EUSPN/ICTH 2020: 516-521 - [e2]Christophe Feltus, Paul Johannesson, Henderik A. Proper:
Proceedings of the Practice of Enterprise Modelling 2019 Conference Forum (short papers), Luxembourg, November 27-29, 2019. CEUR Workshop Proceedings 2586, CEUR-WS.org 2020 [contents]
2010 – 2019
- 2019
- [j8]Christophe Feltus:
Deriving Information System Security and Privacy From Value Cocreation Theory: Case Study in the Financial Sector. Int. J. Serv. Sci. Manag. Eng. Technol. 10(4): 1-25 (2019) - [j7]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus, Elio Goettelmann, Roel J. Wieringa:
An integrated conceptual model for information system security risk management supported by enterprise architecture management. Softw. Syst. Model. 18(3): 2285-2312 (2019) - 2018
- [j6]Eric Grandry, Christophe Feltus, Eric Dubois:
A Risk Integration Framework for the Service-Oriented Enterprise. Int. J. Inf. Syst. Serv. Sect. 10(3): 1-19 (2018) - [c44]Christophe Feltus, Erik H. A. Proper, Andreas Metzger, Juan Carlos Garcia Lopez, Rodrigo Castiñeira González:
Value CoCreation (VCC) Language Design in the Frame of a Smart Airport Network Case Study. AINA 2018: 858-865 - [c43]Christophe Feltus, Erik H. A. Proper, Kazem Haki:
Towards a Language to Support Value Cocreation: An Extension to the ArchiMate Modeling Framework. FedCSIS 2018: 751-760 - [c42]Adnan Imeri, Christophe Feltus, Djamel Khadraoui, Nazim Agoulmine, Damien Nicolas:
Solving the trust issues in the process of transportation of dangerous goods by using blockchain technology. SIN 2018: 25:1-25:2 - [c41]Henderik Alex Proper, Marija Bjekovic, Christophe Feltus, Iván S. Razo-Zapata:
On the Development of a Modelling Framework for Value Co-creation. VMBO 2018: 122-132 - [c40]Iman Ben Abdelkrim, Amine Baïna, Christophe Feltus, Jocelyn Aubert, Mostafa Bellafkih, Djamel Khadraoui:
Coalition-OrBAC: An Agent-Based Access Control Model for Dynamic Coalitions. WorldCIST (1) 2018: 1060-1070 - [e1]Henderik A. Proper, Stefan Strecker, Christian Huemer, Christophe Feltus, Wided Guédria, Iván S. Razo-Zapata, Manel Brichni, David Rozier, Mikhail M. Komarov, Svetlana V. Maltseva, Sérgio Guerreiro:
20th IEEE Conference on Business Informatics, CBI 2018, Vienna, Austria, July 11-14, 2018, Volume 2 - Research-in-Progress Papers and Workshops. IEEE Computer Society 2018 [contents] - 2017
- [j5]Christophe Feltus, Eric Grandry, François-Xavier Fontaine:
Capability-Driven Design of Business Service Ecosystem to Support Risk Governance in Regulatory Ecosystems. Complex Syst. Informatics Model. Q. 10: 75-99 (2017) - [c39]Jocelyn Aubert, Christophe Feltus, Andrea Kostakis, Djamel Khadraoui:
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics. ANT/SEIT 2017: 943-948 - [c38]Nicolas Mayer, Christophe Feltus:
Evaluation of the risk and security overlay of archimate to model information system security risks. EDOC Workshops 2017: 106-116 - [c37]Christophe Feltus, Lysanne Lessard, François B. Vernadat, Daniel Amyot, Erik H. A. Proper:
Conceptualization of a Value Cocreation Language for Knowledge-Intensive Business Services. AITM/ISM@FedCSIS 2017: 3-23 - [c36]Christophe Feltus, Erik H. A. Proper:
Conceptualization of an Abstract Language to Support Value Co-Creation. FedCSIS 2017: 971-980 - [c35]Christophe Feltus, Erik H. A. Proper:
Towards a security and privacy co-creation method. ICITST 2017: 75-80 - [c34]Christophe Feltus, Eric Grandry, Thomas Kupper, Jean-Noël Colin:
Model-driven Approach for Privacy Management in Business Ecosystem. MODELSWARD 2017: 392-400 - [i1]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus, Elio Goettelmann:
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF. CoRR abs/1701.01664 (2017) - 2016
- [j4]Christophe Feltus, Djamel Khadraoui:
Designing security policies for complex SCADA systems management and protection. Int. J. Inf. Technol. Manag. 15(4): 313-332 (2016) - [c33]Yannick Naudet, Nicolas Mayer, Christophe Feltus:
Towards a Systemic Approach for Information Security Risk Management. ARES 2016: 177-186 - [c32]Raúl Mazo, Christophe Feltus:
Framework for Engineering Complex Security Requirements Patterns. ICITCS 2016: 1-5 - [c31]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus:
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF. PoEM 2016: 353-361 - 2015
- [j3]Benjamin Gâteau, Moussa Ouedraogo, Christophe Feltus, Guy Guemkam, Grégoire Danoy, Marcin Seredynski, Samee U. Khan, Djamel Khadraoui, Pascal Bouvry:
Adopting trust and assurance as indicators for the reassignment of responsibilities in multi-agent systems. Knowl. Eng. Rev. 30(2): 187-200 (2015) - [c30]Christophe Feltus, François-Xavier Fontaine, Eric Grandry:
Towards Systemic Risk Management in the Frame of Business Service Ecosystem. CAiSE Workshops 2015: 27-39 - [c29]Nicolas Mayer, Eric Grandry, Christophe Feltus, Elio Goettelmann:
Towards the ENTRI Framework: Security Risk Management Enhanced by the Use of Enterprise Architectures. CAiSE Workshops 2015: 459-469 - [c28]Christophe Feltus, Eric Dubois, Michaël Petit:
Alignment of ReMMo with RBAC to manage access rights in the frame of enterprise architecture. RCIS 2015: 262-273 - [c27]André Rifaut, Christophe Feltus, Slim Turki, Djamel Khadraoui:
Analysis of the impact of ethical issues on the management of the access rights. SIN 2015: 12-19 - 2014
- [b1]Christophe Feltus:
Aligning Access Rights to Governance Needs with the Responsability MetaModel (ReMMo) in the Frame of Enterprise Architecture. University of Namur, Belgium, 2014 - [c26]Christophe Feltus, Moussa Ouedraogo, Djamel Khadraoui:
Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems. ICT-DM 2014: 1-8 - [c25]Hervé Cholez, Christophe Feltus:
Towards an Innovative Systemic Approach of Risk Management. SIN 2014: 61 - [c24]Christophe Feltus, Damien Nicolas, Claude Poupart:
Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration. SIN 2014: 109 - 2013
- [c23]Jonathan Blangenois, Guy Guemkam, Christophe Feltus, Djamel Khadraoui:
Organizational Security Architecture for Critical Infrastructure. ARES 2013: 316-323 - [c22]Eric Grandry, Christophe Feltus, Eric Dubois:
Conceptual Integration of Enterprise Architecture Management and Security Risk Management. EDOC Workshops 2013: 114-123 - [c21]Christophe Feltus, Djamel Khadraoui:
Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection. SIN 2013: 39-45 - [c20]Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui:
Metamodel for reputation based agents system: case study for electrical distribution SCADA design. SIN 2013: 251-255 - [c19]Christophe Feltus, Djamel Khadraoui:
On designing automatic reaction strategy for critical infrastructure SCADA system. SIN 2013: 444-445 - [c18]Christophe Feltus:
Industry program panel. SIN 2013: 465 - [c17]Djamel Khadraoui, Christophe Feltus:
Critical Infrastructures Governance Exploring SCADA Cybernetics through Architectured Policy Semantic. SMC 2013: 4766-4771 - 2012
- [j2]Abdelaziz Khadraoui, Christophe Feltus:
Service specification and service compliance: How to consider the responsibility dimension? J. Serv. Sci. Res. 4(1): 123-142 (2012) - [c16]Michaël Petit, Christophe Feltus, François B. Vernadat:
Enterprise Architecture Enhanced with Responsibility to Manage Access Rights - Case Study in an EU Institution. PoEM 2012: 132-147 - [c15]Christophe Feltus, Eric Dubois, Erik Proper, Iver Band, Michaël Petit:
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management. SIN 2012: 12-19 - 2011
- [c14]Cédric Bonhomme, Christophe Feltus, Michaël Petit:
Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management. ARES 2011: 248-253 - [c13]Guy Guemkam, Christophe Feltus, Pierre Schmitt, Cédric Bonhomme, Djamel Khadraoui, Zahia Guessoum:
Reputation Based Dynamic Responsibility to Agent Assignement for Critical Infrastructure. IAT 2011: 272-275 - [c12]Christophe Feltus, Michaël Petit, Eric Dubois:
ReMoLa: Responsibility model language to align access rights with business process requirements. RCIS 2011: 1-6 - 2010
- [c11]Christophe Feltus, Djamel Khadraoui, Jocelyn Aubert:
A Security Decision-Reaction Architecture for Heterogeneous Distributed Network. ARES 2010: 1-8 - [c10]Cédric Bonhomme, Christophe Feltus, Djamel Khadraoui:
A multi-agent based decision mechanism for incident reaction in telecommunication network. AICCSA 2010: 1-2 - [c9]Christophe Feltus:
Conceptual Trusted Incident Reaction Architecture. INC 2010: 143-152 - [c8]Christophe Feltus, Eric Dubois, Michaël Petit:
Conceptualizing a responsibility based approach for elaborating and verifying RBAC policies conforming with CobiT framework requirements. RELAW 2010: 34-43
2000 – 2009
- 2009
- [c7]Christophe Feltus, Michaël Petit:
Building a Responsibility Model Including Accountability, Capability and Commitment. ARES 2009: 412-419 - [c6]Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau, André Adelsbach, Marc Camy:
Methodology to Align Business and IT Policies: Use Case from an IT Company. ARES 2009: 762-767 - [c5]Christophe Feltus, Michaël Petit:
Building a responsibility model using modal logic - towards Accountability, Aapability and Commitment concepts. AICCSA 2009: 386-391 - 2008
- [c4]Christophe Incoul, Benjamin Gâteau, Jocelyn Aubert, Nicolas Bounoughaz, Christophe Feltus:
If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network. CRiSIS 2008: 85-92 - [c3]Benjamin Gâteau, Christophe Feltus, Jocelyn Aubert, Christophe Incoul:
An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504. RCIS 2008: 35-44 - 2007
- [c2]Christophe Feltus, André Rifaut:
An Ontology for Requirements Analysis of Managers' Policies in Financial Institutions. IESA 2007: 27-38 - 2006
- [c1]André Rifaut, Christophe Feltus:
Improving Operational Risk Management Systems by Formalizing the Basel II Regulation with Goal Models and the ISO/IEC 15504 Approach. ReMo2V 2006 - 2004
- [j1]Bernard Di Renzo, Matthieu Farcot, Christophe Feltus:
Méthode d'évaluation NOEMI. Une méthode d'évaluation de la qualité des processus informatiques en petites et moyennes entreprises. Ingénierie des Systèmes d Inf. 9(5-6): 51-68 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint