Cross-domain internet of things application development: M3 framework and evaluation A Gyrard, SK Datta, C Bonnet, K Boudaoud Future Internet of Things and Cloud (FiCloud), 2015 3rd International …, 2015 | 108 | 2015 |
Applying Internet of Things for personalized healthcare in smart homes SK Datta, C Bonnet, A Gyrard, RPF da Costa, K Boudaoud Wireless and Optical Communication Conference (WOCC), 2015 24th, 164-169, 2015 | 103 | 2015 |
LOV4IoT: A second life for ontology-based domain knowledge to build Semantic Web of Things applications A Gyrard, C Bonnet, K Boudaoud, M Serrano Future Internet of Things and Cloud (FiCloud), 2016 IEEE 4th International …, 2016 | 95 | 2016 |
Enrich machine-to-machine data with semantic web technologies for cross-domain applications A Gyrard, C Bonnet, K Boudaoud Internet of Things (WF-IoT), 2014 IEEE World Forum on, 559-564, 2014 | 94 | 2014 |
oneM2M architecture based user centric IoT application development SK Datta, A Gyrard, C Bonnet, K Boudaoud Future Internet of Things and Cloud (FiCloud), 2015 3rd International …, 2015 | 84 | 2015 |
Network security management with intelligent agents K Boudaoud, H Labiod, R Boutaba, Z Guessoum Network Operations and Management Symposium, 2000. NOMS 2000. 2000 IEEE/IFIP …, 2000 | 67 | 2000 |
Standardizing generic cross-domain applications in Internet of Things A Gyrard, SK Datta, C Bonnet, K Boudaoud 2014 IEEE Globecom Workshops (GC Wkshps), 589-594, 2014 | 65 | 2014 |
A semantic engine for Internet of Things: cloud, mobile devices and gateways A Gyrard, SK Datta, C Bonnet, K Boudaoud Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 …, 2015 | 43 | 2015 |
A security framework for mobile cloud applications D Popa, M Cremene, M Borda, K Boudaoud Roedunet International Conference (RoEduNet), 2013 11th, 1-4, 2013 | 39 | 2013 |
An ontology-based approach for helping to secure the ETSI machine-to-machine architecture A Gyrard, C Bonnet, K Boudaoud Internet of Things (iThings), 2014 IEEE International Conference on, and …, 2014 | 38 | 2014 |
Emotion A Gyrard, SC Bonnet, K Boudaoud | 38* | |
The stac (security toolbox: attacks & countermeasures) ontology A Gyrard, C Bonnet, K Boudaoud Proceedings of the 22nd International Conference on World Wide Web, 165-166, 2013 | 34 | 2013 |
Cloud computing, security and data concealment C Delettre, K Boudaoud, M Riveill Computers and Communications (ISCC), 2011 IEEE Symposium on, 424-431, 2011 | 34 | 2011 |
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web of Things Applications A Gyrard, C Bonnet, K Boudaoud, M Serrano 2015 IEEE International Conference on Data Science and Data Intensive …, 2015 | 33 | 2015 |
Online dispute resolution systems as web services V Bonnet, K Boudaoud, M Gagnebin, J Harms, T Schultz Available at SSRN 899107, 2002 | 33 | 2002 |
Reusing and Unifying Background Knowledge for Internet of Things with LOV4IoT A Gyrard, G Atemezing, C Bonnet, K Boudaoud, M Serrano Future Internet of Things and Cloud (FiCloud), 2016 IEEE 4th International …, 2016 | 30 | 2016 |
An intelligent agent-based model for security management K Boudaoud, C McCathieNevile Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh …, 2002 | 27 | 2002 |
Demo Paper: Helping IoT Application Developers with Sensor-based Linked Open Rules A Gyrard, C Bonnet, K Boudaoud Terra Cognita and Semantic Sensor Networks, 105, 2014 | 23 | 2014 |
Helping IoT application developers with sensor-based linked open rules A Gyrard, C Bonnet, K Boudaoud Proceedings of the Seventh International Workshop on Semantic Sensor …, 2014 | 23* | 2014 |
Détection d'intrusions: Une nouvelle approche par systèmes multi-agents K Boudaoud Université de Versailles, France, 2002 | 23 | 2002 |