Performance analysis of VoIP traffic in WiMAX using various service classes T Anouari, A Haqiq arXiv preprint arXiv:1308.0223, 2013 | 63 | 2013 |
Predicting chronic kidney failure disease using data mining techniques B Boukenze, A Haqiq, H Mousannif Advances in Ubiquitous Networking 2: Proceedings of the UNet’16 2, 701-712, 2017 | 58 | 2017 |
Predictive analytics in healthcare system using data mining techniques B Boukenze, H Mousannif, A Haqiq Comput Sci Inf Technol 1, 1-9, 2016 | 48 | 2016 |
Effect of Mobility and Traffic Models on the energy consumption in MANET Routing Protocols SE Kafhali, A Haqiq arXiv preprint arXiv:1304.3259, 2013 | 40 | 2013 |
What vulnerability do we need to patch first? JB Hong, DS Kim, A Haqiq 2014 44th annual IEEE/IFIP international conference on dependable systems …, 2014 | 35 | 2014 |
Performance of data mining techniques to predict in healthcare case study: chronic kidney failure disease B Boukenze, H Mousannif, A Haqiq Int. Journal of Database Managment systems 8 (30), 1-9, 2016 | 34 | 2016 |
DDoS flooding attack mitigation in software defined networks S MAHRACH, A HAQIQ International Journal of Advanced Computer Science and Applications 11 (1), 2020 | 28 | 2020 |
Cybersecurity and privacy in cyber physical systems Y Maleh, M Shojafar, A Darwish, A Haqiq CRC Press, 2019 | 26 | 2019 |
Simulation analysis of routing protocols using manhattan grid mobility model in MANET Y Saadi, SE Kafhali, A Haqiq, B Nassereddine arXiv preprint arXiv:1304.2035, 2013 | 26 | 2013 |
Proof of concept blockchain-based voting system A Fatrah, S El Kafhali, A Haqiq, K Salah Proceedings of the 4th International Conference on Big Data and Internet of …, 2019 | 23 | 2019 |
A review of SLA specification languages in the cloud computing A Maarouf, A Marzouk, A Haqiq 2015 10th International Conference on Intelligent Systems: Theories and …, 2015 | 22 | 2015 |
Performance modelling and analysis of connection admission control in OFDMA based WiMAX system with MMPP queuing AE Bouchti, SE Kafhali, A Haqiq arXiv preprint arXiv:1304.2033, 2013 | 19 | 2013 |
Practical modeling of the SLA life cycle in cloud computing A Maarouf, A Marzouk, A Haqiq 2015 15th International Conference on Intelligent Systems Design and …, 2015 | 18 | 2015 |
Modeling cyber-attack for SCADA systems using CoPNet approach A El Bouchti, A Haqiq 2012 IEEE International Conference on Complex Systems (ICCS), 1-6, 2012 | 18 | 2012 |
Toward an integrated dynamic defense system for strategic detecting attacks in cloud networks using stochastic game EM Kandoussi, M Hanini, I El Mir, A Haqiq Telecommunication Systems 73 (3), 397-417, 2020 | 17 | 2020 |
Software defined stochastic model for moving target defense I El Mir, A Chowdhary, D Huang, S Pisharody, DS Kim, A Haqiq Proceedings of the Third International Afro-European Conference for …, 2018 | 17 | 2018 |
Mathematical Model based on Game Theory and Markov Chains for Analysing the Transmission Cost in SA-ZD Mechanism. A Boujnoui, A Zaaloul, A Haqiq International Journal of Computer Information Systems & Industrial …, 2018 | 17 | 2018 |
Contribution of new technologies in the relationship between the governance and the social responsibility at the Moroccan university Y El Hissi, Z Benjouid, A Haqiq, LL Idrissi International Journal of Service Science, Management, Engineering, and …, 2018 | 16 | 2018 |
Perform sensing and transmission in parallel in cognitive radio systems: Spectrum and energy efficiency M Ridouani, A Hayar, A Haqiq Digital Signal Processing 62, 65-80, 2017 | 16 | 2017 |
Towards a trusted third party based on multi-agent systems for automatic control of the quality of service contract in the cloud computing A Maarouf, A Marzouk, A Haqiq 2015 International Conference on Electrical and Information Technologies …, 2015 | 16 | 2015 |