default search action
Amine Baïna
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Sidna Jeddou, Luis Díez, Abdellah Najid, Amine Baïna, Ramón Agüero Calvo:
On the Performance of Transport Protocols Over mmWave Links: Empirical Comparison of TCP and QUIC. IEEE Open J. Commun. Soc. 4: 2596-2608 (2023) - [c28]Oumaima Bellar, Amine Baïna, Mostafa Bellafkih:
Application of Machine Learning to Sentiment Analysis. AICV 2023: 138-148 - [c27]Elhabyb Khaoula, Amine Baïna, Bellafkih Mostafa:
Evaluation and Comparison of Energy Consumption Prediction Models Case Study: Smart Home. AICV 2023: 179-187 - [c26]Elhabyb Khaoula, Amine Baïna, Bellafkih Mostafa:
Forecasting diurnal Heating Energy Consumption of HVAC system using ANN, RNN, ARNN. SITA 2023: 1-6 - 2022
- [j12]Sidna Jeddou, Fátima Fernández, Luis Díez, Amine Baïna, Najid Abdallah, Ramón Agüero:
Delay and Energy Consumption of MQTT over QUIC: An Empirical Characterization Using Commercial-Off-The-Shelf Devices. Sensors 22(10): 3694 (2022) - 2021
- [j11]Ouafae Kasmi, Amine Baïna, Mostafa Bellafkih:
Fuzzy logic based clustering algorithm for management in critical infrastructure. Clust. Comput. 24(1): 433-458 (2021) - [j10]Sidna Jeddou, Amine Baïna, Najid Abdallah, Hassan El Alami:
Power Consumption prediction of IoT application Protocols Based on Linear Regression. Int. J. Artif. Intell. Mach. Learn. 11(2): 0 (2021) - [j9]Zineb Bakraouy, Wissam Abbass, Amine Baïna, Mostafa Bellafkih:
Fuzzy Multi Agent System for Automatic Classification and Negotiation of QOS in Cloud Computing. J. Autom. Mob. Robotics Intell. Syst. 14(3): 56-64 (2021) - 2020
- [j8]Amine Baïna, Khalid Benali, Mostafa Bellafkih, Nawal Ait Aali:
Unified enterprise modelling language-based interoperability for collaborative access control framework in critical infrastructures. Int. J. Netw. Virtual Organisations 22(1): 75-100 (2020) - [j7]Ouafae Kasmi, Nawal Ait Aali, Amine Baïna, Mostafa Bellafkih, Loubna Echabbi:
Comparative analysis of fuzzy logic and AHP method for QoS management in LTE network: IMS case study. Int. J. Wirel. Mob. Comput. 19(3): 213-223 (2020) - [c25]Ouafae Kasmi, Amine Baïna, Mostafa Bellafkih:
Multi Level interdependencies Management for resilience in Critical Infrastructures. SITA 2020: 11:1-11:6 - [c24]Sidna Jeddou, Amine Baïna, Abdallah Najid, Hassan El Alami:
Analysis and evaluation of communication Protocols for IoT Applications. SITA 2020: 42:1-42:6 - [c23]Wissam Abbass, Amine Baïna, Mostafa Bellafkih:
Evaluation of security risks using Apriori algorithm. SITA 2020: 47:1-47:6 - [c22]Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih:
Agreement-Broker: Performance Analysis Using KNN, SVM, and ANN Classifiers. SoCPaR 2020: 868-879
2010 – 2019
- 2019
- [j6]Ouafae Kasmi, Amine Baïna, Mostafa Bellafkih:
Security evaluation management over LTE critical infrastructures networks: IMS case study. Int. J. Crit. Infrastructures 15(4): 285-306 (2019) - [j5]Zineb Bakraouy, Wissam Abbass, Amine Baïna, Mostafa Bellafkih:
The IT Infrastructure's Industrialization and Mastering. J. Commun. 14(10): 884-891 (2019) - [j4]Wissam Abbass, Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih:
Assessing the Internet of Things Security Risks. J. Commun. 14(10): 958-964 (2019) - [j3]Nawal Ait Aali, Amine Baïna, Loubna Echabbi:
Trust Management Approach for Securingthe Services Access: Telecom OperatorsCollaborations in IMS Network. J. Mobile Multimedia 15(1-2): 51-70 (2019) - [c21]Abir Ismaili-Alaoui, Ouafae Kasmi, Amine Baïna, Karim Baïna, Khalid Benali, Mostafa Bellafkih:
Priority-Based Event Management using Fuzzy Logic for an IoT-BPM Architecture. SOCA 2019: 111-118 - [c20]Wissam Abbass, Amine Baïna, Mostafa Bellafkih:
ArchiMate based Security Risk Assessment as a service: preventing and responding to the cloud of things' risks. WINCOM 2019: 1-5 - [c19]Ouafae Kasmi, Amine Baïna, Mostafa Bellafkih:
Toward a Dynamic QoS Management over LTE/EPC Network using ANFIS. WINCOM 2019: 1-6 - 2018
- [j2]Nawal Ait Aali, Amine Baïna, Loubna Echabbi:
Trust Management in Collaborative Systems for Critical Infrastructure Protection. Secur. Commun. Networks 2018: 7938727:1-7938727:15 (2018) - [c18]Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih:
Autonomous SLAs Negotiation Based on Agreement-Broker: Services Availability. CIST 2018: 48-53 - [c17]Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih:
Availability of Web Services based on Autonomous Classification and Negotiation of SLAs. ICMCS 2018: 1-6 - [c16]Zineb Bakraouy, Wissam Abbass, Amine Baïna, Mostafa Bellafkih:
MAS for Services Availability in Cloud of Things Network: Monitoring and Reactivity. SITA 2018: 10:1-10:6 - [c15]Wissam Abbass, Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih:
Classifying IoT security risks using Deep Learning algorithms. WINCOM 2018: 1-6 - [c14]Iman Ben Abdelkrim, Amine Baïna, Christophe Feltus, Jocelyn Aubert, Mostafa Bellafkih, Djamel Khadraoui:
Coalition-OrBAC: An Agent-Based Access Control Model for Dynamic Coalitions. WorldCIST (1) 2018: 1060-1070 - 2017
- [c13]Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih:
System Multi Agents for Automatic Negotiation of SLA in Cloud Computing. IBICA 2017: 234-244 - [c12]Ouafae Kasmi, Amine Baïna, Mostafa Bellafkih:
Multi level integrity management in enhanced telecom operation for LTE/LTE-A networks. WINCOM 2017: 1-6 - 2016
- [c11]Wissam Abbass, Amine Baïna, Mostafa Bellafkih:
Improvement of information system security risk management. CIST 2016: 182-187 - [c10]Lamiae Chtioui, Amine Baïna, Mostafa Bellafkih:
Towards the conception of a new approach for modeling interdependencies in Critical Infrastructures. CIST 2016: 269-274 - [c9]Nawal Ait Aali, Younes El Bouzekri El Idrissi, Amine Baïna, Loubna Echabbi:
Collaboration decision making based on AHP method in Tr-OrBAC model: Case study. CIST 2016: 779-784 - [c8]Ouafae Kasmi, Amine Baïna, Mostafa Bellafkih:
Multi level integrity management in critical infrastructure. SITA 2016: 1-6 - 2015
- [c7]Iman Ben Abdelkrim, Amine Baïna, Mostafa Bellafkih:
Coalition-based access control models for critical infrastructures. AICCSA 2015: 1-6 - [c6]Nawal Ait Aali, Amine Baïna, Loubna Echabbi:
Trust integration in collaborative access control model for Critical Infrastructures. SITA 2015: 1-6 - 2014
- [c5]Aziz Kaddani, Amine Baïna, Loubna Echabbi:
Towards a Model Driven Security for critical infrastructures using OrBAC. ICMCS 2014: 1235-1240 - 2012
- [c4]Amine Baïna, Youssef Laarouchi:
MultiLevel-OrBAC: Multi-Level Integrity management in organization based access control framework. ICMCS 2012: 933-938
2000 – 2009
- 2009
- [b1]Amine Baïna:
Controle d'accès pour les grandes infrastructures critiques. Application au réseau d'énergie électrique. INSA Toulouse, France, 2009 - [j1]Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
PolyOrBAC: A security framework for Critical Infrastructures. Int. J. Crit. Infrastructure Prot. 2(4): 154-169 (2009) - 2008
- [c3]Amine Baïna, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaâniche:
Access control for cooperative systems: A comparative analysis. CRiSIS 2008: 19-26 - [c2]Amine Baïna, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaâniche:
Collaborative Access Control For Critical Infrastructures. Critical Infrastructure Protection 2008: 189-201 - 2007
- [c1]Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
Access Control for Collaborative Systems: A Web Services Based Approach. ICWS 2007: 1064-1071
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint