default search action
Brahim Hamid
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Abdelhakim Baouya, Brahim Hamid, Levent Gürgen, Saddek Bensalem:
Rigorous Security Analysis of RabbitMQ Broker with Concurrent Stochastic Games. Internet Things 26: 101161 (2024) - [c63]Robin Theveniaut, Brahim Hamid, Jason Jaskolka:
Interplay of Human Factors and Secure Architecture Design using Model-Driven Engineering. ASE Workshops 2024: 108-117 - 2023
- [c62]Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, Jason Jaskolka:
Formal model-based argument patterns for security cases. EuroPLoP 2023: 10:1-10:12 - [c61]Loïc Thierry, Jason Jaskolka, Brahim Hamid, Jean-Paul Bodeveix:
Specification and Verification of Communication Paradigms for CBSE in Event B. ICECCS 2023: 157-166 - [c60]Quentin Rouland, Brahim Hamid, Jean-Paul Bodeveix, Jason Jaskolka:
Formalizing the Relationship between Security Policies and Objectives in Software Architectures. ICSA-C 2023: 151-158 - [c59]Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, Jason Jaskolka:
Constructing Security Cases Based on Formal Verification of Security Requirements in Alloy. SAFECOMP Workshops 2023: 15-25 - [c58]Megha Quamara, Christina Kolb, Brahim Hamid:
Analyzing Origins of Safety and Security Interactions Using Feared Events Trees and Multi-level Model. SAFECOMP Workshops 2023: 176-187 - 2022
- [j10]Jason Jaskolka, Brahim Hamid, Sahar Kokaly:
Software Design Trends Supporting Multiconcern Assurance. IEEE Softw. 39(4): 22-26 (2022) - [c57]Megha Quamara, Gabriel Pedroza, Brahim Hamid:
Facilitating Safety and Security Co-design and Formal Analysis in Multi-layered System Modeling. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-8 - [c56]Megha Quamara, Gabriel Pedroza, Brahim Hamid:
Formal Analysis Approach for Multi-layered System Safety and Security Co-engineering. EDCC Workshops 2022: 18-31 - [c55]Jason Jaskolka, Brahim Hamid:
Towards the Integration of Human Factors in Collaborative Decision Making for Secure Architecture Design. ASE 2022: 224:1-224:8 - [c54]Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, Jason Jaskolka:
Towards logical specification of adversarial examples in machine learning. TrustCom 2022: 1575-1580 - 2021
- [j9]Quentin Rouland, Brahim Hamid, Jason Jaskolka:
Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support. J. Syst. Archit. 117: 102073 (2021) - [c53]Jason Jaskolka, Alvi Jawad, Joe Samuel, Brahim Hamid:
A Security Property Decomposition Argument Pattern for Structured Assurance Case Models. EuroPLoP 2021: 24:1-24:10 - [c52]Megha Quamara, Gabriel Pedroza, Brahim Hamid:
Multi-layered Model-based Design Approach towards System Safety and Security Co-engineering. MoDELS (Companion) 2021: 274-283 - [c51]Megha Quamara, Gabriel Pedroza, Brahim Hamid:
Introducing a Multi-layered Model-based Design Approach towards Safety-Security Co-engineering. QRS Companion 2021: 1163-1164 - 2020
- [j8]Quentin Rouland, Brahim Hamid, Jason Jaskolka:
Formal specification and verification of reusable communication models for distributed systems architecture. Future Gener. Comput. Syst. 108: 178-197 (2020) - [c50]Quentin Rouland, Brahim Hamid, Jason Jaskolka:
Reusable Formal Models for Threat Specification, Detection, and Treatment. ICSR 2020: 52-68
2010 – 2019
- 2019
- [c49]Quentin Rouland, Brahim Hamid, Jean-Paul Bodeveix, Mamoun Filali:
A Formal Methods Approach to Security Requirements Specification and Verification. ICECCS 2019: 236-241 - [c48]Brahim Hamid, Quentin Rouland, Jason Jaskolka:
Distributed Maintenance of a Spanning Tree of k-Connected Graphs. PRDC 2019: 217-226 - [e1]Brahim Hamid, Barbara Gallina, Asaf Shabtai, Yuval Elovici, Joaquín García-Alfaro:
Security and Safety Interplay of Intelligent Software Systems - ESORICS 2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11552, Springer 2019, ISBN 978-3-030-16873-5 [contents] - 2018
- [j7]Brahim Hamid, Donatus Weber:
Engineering secure systems: Models, patterns and empirical validation. Comput. Secur. 77: 315-348 (2018) - [c47]Quentin Rouland, Brahim Hamid, Jason Jaskolka:
Formalizing Reusable Communication Models for Distributed Systems Architecture. MEDI 2018: 198-216 - 2017
- [j6]Brahim Hamid:
A model-driven approach for developing a model repository: Methodology and tool support. Future Gener. Comput. Syst. 68: 473-490 (2017) - [c46]Eduardo B. Fernández, Brahim Hamid:
Two safety patterns: Safety Assertion and Safety Assertion Enforcer. EuroPLoP 2017: 30:1-30:9 - [c45]Brahim Hamid:
Assessment of the SEMCO Model-Based Repository Approach for Software System Engineering. MEDI 2017: 111-125 - 2016
- [j5]Brahim Hamid, Sigrid Gürgens, Andreas Fuchs:
Security patterns modeling and formalization for pattern-based development of secure software systems. Innov. Syst. Softw. Eng. 12(2): 109-140 (2016) - [j4]Brahim Hamid, Jon Pérez:
Supporting pattern-based dependability engineering via model-driven development: Approach, tool-support and empirical validation. J. Syst. Softw. 122: 239-273 (2016) - [c44]Anas Motii, Brahim Hamid, Agnes Lanusse, Jean-Michel Bruel:
Guiding the Selection of Security Patterns for Real-Time Systems. ICECCS 2016: 155-164 - [c43]Brahim Hamid:
A Model Repository Description Language - MRDL. ICSR 2016: 350-367 - [c42]Jacob Geisel, Brahim Hamid, David González, Jean-Michel Bruel:
Towards a Methodological Tool Support for Modeling Security-Oriented Processes. MEDI 2016: 31-41 - [c41]Anas Motii, Brahim Hamid, Agnes Lanusse, Jean-Michel Bruel:
Towards the integration of security patterns in UML component-based applications. PAME/VOLT@MoDELS 2016: 2-6 - [c40]Anas Motii, Agnes Lanusse, Brahim Hamid, Jean-Michel Bruel:
Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study. SAFECOMP Workshops 2016: 375-389 - 2015
- [j3]Fatma Krichen, Brahim Hamid, Bechir Zalila, Mohamed Jmaiel, Bernard Coulette:
Development of reconfigurable distributed embedded systems with a model-driven approach. Concurr. Comput. Pract. Exp. 27(6): 1391-1411 (2015) - [c39]Anas Motii, Brahim Hamid, Agnes Lanusse, Jean-Michel Bruel:
Guiding the selection of security patterns based on security requirements and pattern classification. EuroPLoP 2015: 10:1-10:17 - [c38]Eduardo B. Fernández, Brahim Hamid:
A pattern for network functions virtualization. EuroPLoP 2015: 47:1-47:9 - [c37]Jacob Geisel, Brahim Hamid, Jean-Michel Bruel:
Security Concepts as Add-On for Process Models. ICECCS 2015: 190-193 - [c36]Brahim Hamid:
Interplay of Security&Dependability and Resource Using Model-Driven and Pattern-Based Development. TrustCom/BigDataSE/ISPA (1) 2015: 254-262 - 2014
- [c35]Brahim Hamid, Christian Percebois:
A Modeling and Formal Approach for the Precise Specification of Security Patterns. ESSoS 2014: 95-112 - [c34]Brahim Hamid:
A Model-Driven Methodology Approach for Developing a Repository of Models. MEDI 2014: 29-44 - 2013
- [c33]Brahim Hamid, Adel Ziani, Jacob Geisel:
Towards tool support for pattern-based secure and dependable systems development. ACME@ECOOP 2013: 6:1-6:10 - [c32]Ansgar Radermacher, Brahim Hamid, Manel Fredj, Jean-Louis Profizi:
Process and tool support for design patterns with safety requirements. EuroPLoP 2013: 8:1-8:16 - [c31]Ansgar Radermacher, Arnaud Cuccuru, Sebastien Gerard, Brahim Hamid:
Split of composite components for distributed applications. FDL 2013: 1-6 - [c30]Brahim Hamid, Christian Percebois:
Model-Based Specification and Validation of Security and Dependability Patterns. FPS 2013: 65-82 - [c29]Adel Ziani, Brahim Hamid, Jacob Geisel, Jean-Michel Bruel:
A model-based repository of security and dependability patterns for trusted RCES. IRI 2013: 448-457 - [c28]Frédéric Mayart, Jean-Michel Bruel, Brahim Hamid:
How to Analyze Modeling Approach Comparison Criteria. CMA@MoDELS 2013 - [c27]Brahim Hamid, Jacob Geisel, Adel Ziani, Jean-Michel Bruel, Jon Pérez:
Model-Driven Engineering for Trusted Embedded Systems Based on Security and Dependability Patterns. SDL Forum 2013: 72-90 - [c26]Jacob Geisel, Brahim Hamid, Jean-Michel Bruel:
Repository-Centric Process Modeling - Example of a Pattern Based Development Process. SERA (selected papers) 2013: 247-261 - 2012
- [c25]Adel Ziani, Brahim Hamid, Jean-Michel Bruel:
A Model-Driven Engineering Framework for Fault Tolerance in Dependable Embedded Systems Design. EUROMICRO-SEAA 2012: 166-169 - [c24]Brahim Hamid, Christian Percebois, Damien Gouteux:
A methodology for integration of patterns with validation purpose. EuroPLoP 2012: 8:1-8:14 - [c23]Fatma Krichen, Brahim Hamid, Bechir Zalila, Mohamed Jmaiel:
Design-Time Verification of Reconfigurable Real-time Embedded Systems. HPCC-ICESS 2012: 1487-1494 - [c22]Fatma Krichen, Bechir Zalila, Mohamed Jmaiel, Brahim Hamid:
A Middleware for Reconfigurable Distributed Real-Time Embedded Systems. SERA (selected papers) 2012: 81-96 - [c21]Brahim Hamid, Jacob Geisel, Adel Ziani, David González:
Safety Lifecycle Development Process Modeling for Embedded Systems - Example of Railway Domain. SERENE 2012: 63-75 - [c20]Nicolas Desnos, Brahim Hamid, Christian Percebois, Damien Gouteux:
Towards a Security and Dependability Pattern Development Technique for Resource Constrained Embedded Systems. SWQD 2012: 193-204 - [c19]Fatma Krichen, Amal Ghorbel, Brahim Hamid, Bechir Zalila:
An MDE-Based Approach for Reconfigurable DRE Systems. WETICE 2012: 78-83 - 2011
- [j2]Brahim Hamid, Huaxi (Yulin) Zhang, Jacob Geisel, David González:
First Experiment on Modeling Safety LifeCycle Process in Railway Systems. Int. J. Dependable Trust. Inf. Syst. 2(2): 17-39 (2011) - [c18]Fatma Krichen, Brahim Hamid, Bechir Zalila, Mohamed Jmaiel:
Towards a Model-Based Approach for Reconfigurable DRE Systems. ECSA 2011: 295-302 - [c17]Adel Ziani, Brahim Hamid, Salvador Trujillo:
Towards a Unified Meta-model for Resources-Constrained Embedded Systems. EUROMICRO-SEAA 2011: 485-492 - [c16]Rahma Bouaziz, Brahim Hamid, Nicolas Desnos:
Towards a Better Integration of Patterns in Secure Component-Based Systems Design. ICCSA (5) 2011: 607-621 - [c15]Brahim Hamid, Sigrid Gürgens, Christophe Jouvray, Nicolas Desnos:
Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches. MoDELS 2011: 319-333 - [c14]Salvador Trujillo, Iñaki Alonso, Brahim Hamid, David González, Manuel Blanco, Huaxi (Yulin) Zhang:
Towards variability support for security and dependability patterns: a case study. SPLC Workshops 2011: 27 - 2010
- [c13]Brahim Hamid, Fatma Krichen:
Model-based engineering for dynamic reconfiguration in DRTES. ECSA Companion Volume 2010: 269-276 - [c12]Brahim Hamid, Adel Ziani:
An Environment for Design Software and Hardware Aspects of Clock Synchronization and Communication in DRTES. EUC 2010: 60-67 - [c11]Fatma Krichen, Brahim Hamid, Bechir Zalila, Bernard Coulette:
Designing Dynamic Reconfiguration for Distributed Real Time Embedded Systems. NOTERE 2010: 249-254
2000 – 2009
- 2008
- [c10]Brahim Hamid, Ansgar Radermacher, Patrick Vanuxeem, Agnes Lanusse, Sebastien Gerard:
A Fault-tolerance Framework for Distributed Component Systems. EUROMICRO-SEAA 2008: 84-91 - [c9]Brahim Hamid, Ansgar Radermacher, Agnes Lanusse, Christophe Jouvray, Sébastien Gérard, François Terrier:
Designing Fault-Tolerant Component Based Applications with a Model Driven Approach. SEUS 2008: 9-20 - 2007
- [c8]Brahim Hamid, Bertrand Le Saëc, Mohamed Mosbah:
Distributed Local 2-Connectivity Test of Graphs and Applications. ISPA 2007: 195-207 - [c7]Brahim Hamid, Mohamed Mosbah, Akka Zemmari:
A Self-stabilizing Distributed Algorithm for Resolving Conflicts. OTM Workshops (2) 2007: 1042-1051 - 2006
- [j1]Brahim Hamid, Mohamed Mosbah:
A Local Enumeration Protocol in Spite of Corrupted Data. J. Comput. 1(7): 9-20 (2006) - [c6]Brahim Hamid, Mohamed Mosbah:
A Local Self-stabilizing Enumeration Algorithm. DAIS 2006: 289-302 - 2005
- [c5]Brahim Hamid, Mohamed Mosbah:
Visualization of Self-Stabilizing Distributed Algorithms. IV 2005: 550-555 - [c4]Brahim Hamid, Mohamed Mosbah:
An Implementation of a Failure Detector for Local Computations in Graphs. Parallel and Distributed Computing and Networks 2005: 473-478 - [c3]Brahim Hamid, Mohamed Mosbah:
A Formal Model for Fault-Tolerance in Distributed Systems. SAFECOMP 2005: 108-121 - [c2]Brahim Hamid, Mohamed Mosbah:
An Automatic Approach to Self-Stabilization. SNPD 2005: 123-128 - [i1]Brahim Hamid, Ted Herman, Morten Mjelde:
The Poster Session of SSS 2005. CoRR abs/cs/0512021 (2005)
1990 – 1999
- 1999
- [c1]Samy Ait-Aoudia, Brahim Hamid, Adel Moussaoui, Toufik Saadi:
Solving Geometric Constraints by a Graph-Constructive Approach. IV 1999: 250-257
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint