Building and maintaining ontologies: a set of algorithms N Lammari, E Métais Data & Knowledge Engineering 48 (2), 155-176, 2004 | 166 | 2004 |
Extracting generalization hierarchies from relational databases: A reverse engineering approach N Lammari, I Comyn-Wattiau, J Akoka Data & Knowledge Engineering 63 (2), 568-589, 2007 | 61 | 2007 |
Huma: A multi-layer framework for threat analysis in a heterogeneous log environment J Navarro, V Legrand, S Lagraa, J François, A Lahmadi, G De Santis, ... Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018 | 37 | 2018 |
Memory prosthesis E Métais, F Ghorbel, N Herradi, F Hamdi, N Lammari, D Nakache, ... Non-pharmacological therapies in dementia 3 (2), 177, 2012 | 25 | 2012 |
Towards an automatic detection of sensitive information in a database C Mouza, E Métais, N Lammari, J Akoka, T Aubonnet, I Comyn-Wattiau, ... 2010 Second International Conference on Advances in Databases, Knowledge …, 2010 | 20 | 2010 |
Relational database reverse engineering: Elicitation of generalization hierarchies J Akoka, I Comyn-Wattiau, N Lammari International Conference on Conceptual Modeling, 173-185, 1999 | 18 | 1999 |
Abstracting anonymization techniques: a prerequisite for selecting a generalization algorithm FB Fredj, N Lammari, I Comyn-Wattiau Procedia computer science 60, 206-215, 2015 | 14 | 2015 |
Sécurité des systèmes d'information N LAMMARI, N CUPPENS, R LALEAU Ingénierie des systèmes d'information (2001) 19 (6), 2014 | 14 | 2014 |
An algorithm to extract Is_A inheritance hierarchies from a relational database N Lammari Conceptual Modeling—ER’99: 18th International Conference on Conceptual …, 1999 | 14 | 1999 |
Security challenges for the critical infrastructures of the healthcare sector E Maia, I Praça, V Mantzana, I Gkotsis, P Petrucci, E Biasin, ... Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A …, 2020 | 12 | 2020 |
CITOM: An incremental construction of multilingual topic maps N Ellouze, N Lammari, E Métais Data & knowledge engineering 74, 46-62, 2012 | 11 | 2012 |
A conceptual meta-model for secured information systems N Lammari, JS Bucumi, J Akoka, I Comyn-Wattiau Proceedings of the 7th International Workshop on Software Engineering for …, 2011 | 11 | 2011 |
Ontology learning from databases: Some efficient methods to discover semantic patterns in data F Cerbah, N Lammari Perspectives in Ontology Learning, 30, 2014 | 10 | 2014 |
A framework for database evolution management I Comyn-Wattiau, J Akoka, N Lammari Workshop on Unanticipated Software Evolution, 105-113, 2003 | 9 | 2003 |
Towards an Assisted Reorganization of Is_A Hierarchies SSS Cherfi, N Lammari International Conference on Object-Oriented Information Systems, 536-548, 2002 | 9 | 2002 |
A semantic approach for semi-automatic detection of sensitive data J Akoka, I Comyn-Wattiau, C Du Mouza, H Fadili, N Lammari, E Metais, ... Information Resources Management Journal (IRMJ) 27 (4), 23-44, 2014 | 8 | 2014 |
POEM: an Ontology Manager based on Existence Constraints N Lammari, C Du Mouza, E Métais Database and Expert Systems Applications: 19th International Conference …, 2008 | 8 | 2008 |
Natural language processing and information systems Z Kedad, N Lammari, E Métais, F Meziane, Y Rezgui 12th International Conference on Applications of Natural Language to …, 2007 | 8 | 2007 |
Réorganisation des hiérarchies d'héritages dans un schéma conceptuel objet N Lammari Paris, CNAM, 1996 | 8 | 1996 |
Multiple viewpoints of IS-A inheritance hierarchies through normalization and denormalization mechanisms N Lammari, R Laleau, M Jouve OOIS’98: 1998 International Conference on Object-Oriented Information …, 1998 | 7 | 1998 |