Brahim HAMID
Brahim HAMID
Associate Professor of Computer Science, Toulouse University -IRIT
Verified email at irit.fr
Title
Cited by
Cited by
Year
Enforcing S&D pattern design in RCES with modeling and formal approaches
B Hamid, S Gürgens, C Jouvray, N Desnos
International Conference on Model Driven Engineering Languages and Systems …, 2011
272011
Model-driven engineering for trusted embedded systems based on security and dependability patterns
B Hamid, J Geisel, A Ziani, JM Bruel, J Perez
International SDL Forum, 72-90, 2013
232013
Towards a model-based approach for reconfigurable dre systems
F Krichen, B Hamid, B Zalila, M Jmaiel
European Conference on Software Architecture, 295-302, 2011
202011
Designing fault-tolerant component based applications with a model driven approach
B Hamid, A Radermacher, A Lanusse, C Jouvray, S Gérard, F Terrier
IFIP International Workshop on Software Technolgies for Embedded and …, 2008
202008
Model-based security and dependability patterns in RCES: the TERESA approach
B Hamid, N Desnos, C Grepet, C Jouvray
Proceedings of the International Workshop on Security and Dependability for …, 2010
182010
A methodology for integration of patterns with validation purpose
B Hamid, C Percebois, D Gouteux
Proceedings of the 17th European conference on pattern languages of programs …, 2012
172012
Solving geometric constraints by a graph-constructive approach
S Ait-Aoudia, B Hamid, A Moussaoui, T Saadi
1999 IEEE International Conference on Information Visualization (Cat. No …, 1999
171999
Supporting pattern-based dependability engineering via model-driven development: Approach, tool-support and empirical validation
B Hamid, J Perez
Journal of Systems and Software 122, 239-273, 2016
162016
Security patterns modeling and formalization for pattern-based development of secure software systems
B Hamid, S Gürgens, A Fuchs
Innovations in Systems and Software Engineering 12 (2), 109-140, 2016
162016
A pattern for network functions virtualization
EB Fernandez, B Hamid
Proceedings of the 20th European Conference on Pattern Languages of Programs …, 2015
152015
Guiding the selection of security patterns based on security requirements and pattern classification
A Motii, B Hamid, A Lanusse, JM Bruel
Proceedings of the 20th European Conference on Pattern Languages of Programs …, 2015
152015
Towards a unified meta-model for resources-constrained embedded systems
A Ziani, B Hamid, S Trujillo
2011 37th EUROMICRO Conference on Software Engineering and Advanced …, 2011
142011
Designing dynamic reconfiguration for distributed real time embedded systems
F Krichen, B Hamid, B Zalila, B Coulette
2010 10th Annual International Conference on New Technologies of Distributed …, 2010
142010
A model-driven approach for developing a model repository: Methodology and tool support
B Hamid
Future Generation Computer Systems 68, 473-490, 2017
122017
A model-driven engineering framework for fault tolerance in dependable embedded systems design
A Ziani, B Hamid, JM Bruel
2012 38th Euromicro Conference on Software Engineering and Advanced …, 2012
122012
Towards a better integration of patterns in secure component-based systems design
R Bouaziz, B Hamid, N Desnos
International Conference on Computational Science and Its Applications, 607-621, 2011
122011
Development of reconfigurable distributed embedded systems with a model‐driven approach
F Krichen, B Hamid, B Zalila, M Jmaiel, B Coulette
Concurrency and Computation: Practice and Experience 27 (6), 1391-1411, 2015
112015
Engineering secure systems: models, patterns and empirical validation
B Hamid, D Weber
Computers & Security 77, 315-348, 2018
102018
Model-based real-time evaluation of security patterns: A SCADA system case study
A Motii, A Lanusse, B Hamid, JM Bruel
International Conference on Computer Safety, Reliability, and Security, 375-389, 2016
92016
A modeling and formal approach for the precise specification of security patterns
B Hamid, C Percebois
International Symposium on Engineering Secure Software and Systems, 95-112, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20