selected scholarly activity
-
chapters
-
conferences
- An OWL Multi-Dimensional Information Security Ontology. Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering. 372-380. 2023
- An Ontology-Based Semantic Model of Mid-Winter Breakup of Ice Cover on Canadian Rivers. IAHR International Symposium on Ice. 2022
- DISEL: A Language for Specifying DIS-Based Ontologies. Lecture Notes in Computer Science. 155-171. 2022
- A Formal Engineering Approach to Product Family Modeling. 2021 International Symposium on Theoretical Aspects of Software Engineering (TASE). 87-94. 2021
- DIS: A Data-centred Knowledge Representation Formalism. 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS). 1-8. 2021
- Towards an Automatic Approach to the Design of A Generic Ontology for Information Security. 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS). 1-8. 2021
- Configuration and Governance of Dynamic Secure SDN. Procedia Computer Science. 131-139. 2021
- Formalizing Graphical Modularization Approaches for Ontologies and the Knowledge Loss. Communications in Computer and Information Science. 388-412. 2020
- Software Requirements for an Ultra Large Scale System to Compute Multi Dimension Mean Failure Cost. Communications in Computer and Information Science. 361-370. 2019
- Toward Measuring Knowledge Loss due to Ontology Modularization. Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. 174-184. 2019
- A Framework for Multi-view Reconciliation and for Medical Devices Personalization. Lecture Notes in Computer Science. 71-87. 2017
- Defense in Depth Formulation and Usage in Dynamic Access Control. Lecture Notes in Computer Science. 253-274. 2017
- Conto: A Protégé Plugin for Configuring Ontologies. Procedia Computer Science. 179-186. 2016
- The Interchange Format of Tabular Expressions Using XML. Lecture Notes in Computer Science. 29-43. 2016
- Towards an Ontology Design Architecture. 2015 International Conference on Computational Science and Computational Intelligence (CSCI). 132-135. 2015
- A Multidimensional Approach towards a Quantitative Assessment of Security Threats. Procedia Computer Science. 507-514. 2015
- Towards the Certification of Covert Channel Freeness in Cloud-based Systems. Procedia Computer Science. 318-325. 2015
- Endowing Concurrent Kleene Algebra with Communication Actions. Lecture Notes in Computer Science. 19-36. 2014
- Envisioning a Requirements Specification Template for Medical Device Software. Lecture Notes in Computer Science. 209-223. 2014
- Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-based Covert Channels. Procedia Computer Science. 276-285. 2014
- Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics. Procedia Computer Science. 266-275. 2014
- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes. Lecture Notes in Computer Science. 62-77. 2013
- An Algebraic Approach Towards Data Cleaning. Procedia Computer Science. 50-59. 2013
- An Aspect-Oriented Language for Product Family Specification. Procedia Computer Science. 482-489. 2012
- On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey. Procedia Computer Science. 458-465. 2012
- Verification of Aspectual Composition in Feature-Modeling. Lecture Notes in Computer Science. 109-125. 2012
- A formal test for detecting information leakage via covert channels. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. 41-41. 2011
- Exploring Covert Channels. Proceedings of the Annual Hawaii International Conference on System Sciences. 1-10. 2011
- A tool for formal feature modeling based on BDDs and product families algebra. 13th Workshop on Requirements Engineering, WER 2010. 109-120. 2010
- Verification of Information Flow in Agent-Based Systems. Lecture Notes in Business Information Processing. 252-266. 2009
- Algebraic View Reconciliation. 2008 Sixth IEEE International Conference on Software Engineering and Formal Methods. 85-+. 2008
- A Generic Execution Framework for Models of Computation. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 45-54. 2007
- Adopting Computational Independent Models for Derivation of Architectural Requirements of Software Product Lines. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 91-101. 2007
- Challenges when using Model Driven Architecture in the development of Safety Critical Software. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 127-136. 2007
- Designing a Unified Process for Embedded Systems. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 77-90. 2007
- Executable Use Cases: a Supplement to Model-Driven Development?. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 8-15. 2007
- ModES: Embedded Systems Design Methodology and Tools based on MDE. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 67-76. 2007
- Model-Driven Consistency Checking of Behavioural Specifications. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 115-126. 2007
- Model-driven development of Particle System Families. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 102-114. 2007
- On the Applicability Scope of Model Driven Engineering. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 3-7. 2007
- Tool Support for Model Driven Development of Pervasive Systems. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 33-44. 2007
- Towards a Model-Driven Approach for Ontology-Based Context-Aware Application Development: A Case Study. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 21-32. 2007
- XIS-UML Profile for eXtreme Modeling Interactive Systems. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). 55-66. 2007
- Message from the Organizers. Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES'07). vii-vii. 2007
- Model-based Methodologies for Pervasive and Embedded Software, 4th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, MOMPES 2007, Braga, Portugal, March 31, 2007, Proceedings. MOMPES. 2007
- Feature Algebra. Lecture Notes in Computer Science. 300-315. 2006
- Modeling and Veri cation of cryptographic protocols using coloured petri nets and design/CPN. Proceedings of MOMPES 2005 - 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software. 1-19. 2005
- Formal Derivation of Functional Architectural Design.. SEFM. 356-265. 2004
- Formal derivation of functional architectural design. Proceedings of the Second International Conference on Software Engineering and Formal Methods, 2004. SEFM 2004.. 356-365. 2004
- Requirements Scenarios Based System-Testing.. SEKE. 252-257. 2004
- Interpretation of Tabular Expressions Using Arrays of Relations. Studies in Fuzziness and Soft Computing. 3-14. 2001
- Remarks on Mereology of Relations.. RelMiCS. 133-140. 2000
- Integration of sequential scenarios. IEEE Transactions on Software Engineering. 695-708. 1998
- Towards a uniform relational semantics for tabular expressions.. RelMiCS. 53-57. 1998
- Integration of sequential scenarios. Lecture Notes in Computer Science. 310-326. 1997
-
journal articles
- Hardening of network segmentation using automated referential penetration testing. Journal of Network and Computer Applications. 224:103851-103851. 2024
- Two formal design solutions for the generalization of network segmentation. Journal of Network and Computer Applications. 222:103763-103763. 2024
- A hybrid ontology‐based semantic and machine learning model for the prediction of spring breakup. Computer-Aided Civil and Infrastructure Engineering. 39:264-280. 2024
- The prediction of mid-winter and spring breakups of ice cover on Canadian rivers using a hybrid ontology-based and machine learning model. Environmental Modelling & Software. 160:105577-105577. 2023
- Architecture for ontology-supported multi-context reasoning systems. Data & Knowledge Engineering. 140:102044-102044. 2022
- A Review on Ontology Modularization Techniques - A Multi-Dimensional Perspective. IEEE Transactions on Knowledge and Data Engineering. 35:1-1. 2022
- A Wearable Tele-Health System towards Monitoring COVID-19 and Chronic Diseases. IEEE Reviews in Biomedical Engineering. 15:61-84. 2022
- A quantitative assessment of security risks based on a multifaceted classification approach. International Journal of Information Security. 20:493-510. 2021
- A Formal Approach to Network Segmentation. Computers and Security. 103:102162-102162. 2021
- Introduction to the Special Section: Convergence of Automation Technology, Biomedical Engineering, and Health Informatics Toward the Healthcare 4.0. IEEE Reviews in Biomedical Engineering. 11:249-259. 2018
- Mitigating covert channels based on analysis of the potential for communication. Theoretical Computer Science. 643:1-37. 2016
- On the weaving process of aspect-oriented product family algebra. Journal of Logical and Algebraic Methods in Programming. 85:146-172. 2016
- Investigative support for information confidentiality. Journal of Ambient Intelligence and Humanized Computing. 6:425-451. 2015
- A Formulation of the Potential for Communication Condition using C2KA. Electronic Proceedings in Theoretical Computer Science. 161:161-174. 2014
- An aspect-oriented language for feature-modeling. Journal of Ambient Intelligence and Humanized Computing. 5:343-356. 2014
- Preface. Procedia Computer Science. 21:7-8. 2013
- Optimization in Computer Engineering—Theory and Applications: Book Review of Chapter 8—Applying Graph Coloring to Frequency Assignment. Journal of Software Engineering and Applications. 05:109-109. 2012
- An algebra of product families. Software and Systems Modeling (SoSyM). 10:161-182. 2011
- Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution. Fundamenta Informaticae. 112:305-335. 2011
- Supplementing Product Families with Behaviour.. Int. J. Softw. Informatics. 5:245-266. 2011
- Requirements Analysis for Engineering Computation: A Systematic Approach for Improving Reliability. Reliable Computing. 13:83-107. 2006
- Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/CPN.. Nord. J. Comput.. 12:200-228. 2005
- Requirements Scenarios Formalization Technique. Electronic Notes in Theoretical Computer Science. 44:112-135. 2003
- On a formal semantics of tabular expressions. Science of Computer Programming. 39:189-213. 2001
- Integration of sequential scenarios. ACM SIGSOFT Software Engineering Notes. 22:310-326. 1997
-
preprints