{"id":"https://openalex.org/W2354243640","doi":"https://doi.org/10.5220/0005874301020111","title":"RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems","display_name":"RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2354243640","doi":"https://doi.org/10.5220/0005874301020111","mag":"2354243640"},"language":"en","primary_location":{"id":"doi:10.5220/0005874301020111","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005874301020111","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005874301020111","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050561312","display_name":"Farid Adaili","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Farid Adaili","raw_affiliation_strings":["University of Carthage, CEDRIC Laboratory and National Conservatory of Arts and Crafts, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, CEDRIC Laboratory and National Conservatory of Arts and Crafts, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049696138","display_name":"Olfa Mosbahi","orcid":"https://orcid.org/0000-0002-0971-2368"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Olfa Mosbahi","raw_affiliation_strings":["University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102803559","display_name":"Mohamed Khalgui","orcid":"https://orcid.org/0000-0001-6311-3588"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Mohamed Khalgui","raw_affiliation_strings":["University of Carthage and Xidian University, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage and Xidian University, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007882938","display_name":"Samia Bouzefrane","orcid":"https://orcid.org/0000-0002-0979-1289"},"institutions":[{"id":"https://openalex.org/I124158823","display_name":"Conservatoire National des Arts et M\u00e9tiers","ror":"https://ror.org/0175hh227","country_code":"FR","type":"education","lineage":["https://openalex.org/I124158823","https://openalex.org/I4210134562"]},{"id":"https://openalex.org/I4210145724","display_name":"Centre d'Etudes et De Recherche en Informatique et Communications","ror":"https://ror.org/044j5mm75","country_code":"FR","type":"facility","lineage":["https://openalex.org/I4210145724"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Samia Bouzefrane","raw_affiliation_strings":["CEDRIC Laboratory and National Conservatory of Arts and Crafts, France"],"affiliations":[{"raw_affiliation_string":"CEDRIC Laboratory and National Conservatory of Arts and Crafts, France","institution_ids":["https://openalex.org/I124158823","https://openalex.org/I4210145724"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050561312"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":0.59904354,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77313148,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"102","last_page":"111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.8219075202941895},{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.7948353290557861},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7488937377929688},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5616898536682129},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.5606933832168579},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5530390739440918},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5231679081916809},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48210814595222473},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.47225967049598694},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4628680348396301},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4513043165206909},{"id":"https://openalex.org/keywords/component-based-software-engineering","display_name":"Component-based software engineering","score":0.44856828451156616},{"id":"https://openalex.org/keywords/software-architecture","display_name":"Software architecture","score":0.4202349781990051},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41799330711364746},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37427106499671936},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.3011101484298706},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2652907967567444},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.24503418803215027},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.23324981331825256},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2156585156917572},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.18711179494857788}],"concepts":[{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.8219075202941895},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.7948353290557861},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7488937377929688},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5616898536682129},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.5606933832168579},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5530390739440918},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5231679081916809},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48210814595222473},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47225967049598694},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4628680348396301},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4513043165206909},{"id":"https://openalex.org/C174683762","wikidata":"https://www.wikidata.org/wiki/Q609588","display_name":"Component-based software engineering","level":4,"score":0.44856828451156616},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.4202349781990051},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41799330711364746},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37427106499671936},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.3011101484298706},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2652907967567444},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.24503418803215027},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.23324981331825256},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2156585156917572},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.18711179494857788},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0005874301020111","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005874301020111","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-02425168v1","is_oa":true,"landing_page_url":"https://hal.science/hal-02425168","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"11th International Conference on Evaluation of Novel Software Approaches to Software Engineering, Apr 2016, Rome, Italy. pp.102-111, &#x27E8;10.5220/0005874301020111&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.5220/0005874301020111","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005874301020111","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W94712619","https://openalex.org/W1524000610","https://openalex.org/W1524147119","https://openalex.org/W1553713476","https://openalex.org/W1936948897","https://openalex.org/W2002601639","https://openalex.org/W2086196340","https://openalex.org/W2098592421","https://openalex.org/W2110967855","https://openalex.org/W2125347132","https://openalex.org/W2142425794","https://openalex.org/W2149209089","https://openalex.org/W2399777039","https://openalex.org/W2407152788","https://openalex.org/W2417449504","https://openalex.org/W2470014699","https://openalex.org/W2788342898","https://openalex.org/W4237735191"],"related_works":["https://openalex.org/W4206910357","https://openalex.org/W2056412463","https://openalex.org/W1548138051","https://openalex.org/W4230385779","https://openalex.org/W1811024770","https://openalex.org/W2542633692","https://openalex.org/W2907868081","https://openalex.org/W2784006287","https://openalex.org/W2343336663","https://openalex.org/W2134551179"],"abstract_inverted_index":{"International":[0],"audience":[1]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
