default search action
Mohamed Hanini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j10]Oumaima Ghandour, Said El Kafhali, Mohamed Hanini:
Adaptive workload management in cloud computing for service level agreements compliance and resource optimization. Comput. Electr. Eng. 120: 109712 (2024) - [j9]Abdellah Amzil, Mohamed Abid, Mohamed Hanini, Abdellah Zaaloul, Said El Kafhali:
Stochastic analysis of fog computing and machine learning for scalable low-latency healthcare monitoring. Clust. Comput. 27(5): 6097-6117 (2024) - [j8]Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali:
Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features Analysis. J. Netw. Syst. Manag. 32(1): 18 (2024) - 2023
- [j7]Oumaima Ghandour, Said El Kafhali, Mohamed Hanini:
Computing Resources Scalability Performance Analysis in Cloud Computing Data Center. J. Grid Comput. 21(4): 61 (2023) - [j6]Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali:
Domain generated algorithms detection applying a combination of a deep feature selection and traditional machine learning models. J. Comput. Secur. 31(1): 85-105 (2023) - 2022
- [j5]Abdellah Amzil, Abdessamad Bellouch, Ahmed Boujnoui, Mohamed Hanini, Abdellah Zaaloul:
Analysis and performance optimization of LoRa network using the CE & SC hybrid approach. Int. J. Hybrid Intell. Syst. 18(1-2): 53-68 (2022) - 2020
- [j4]Kandoussi el Mehdi, Mohamed Hanini, Iman El Mir, Abdelkrim Haqiq:
Toward an integrated dynamic defense system for strategic detecting attacks in cloud networks using stochastic game. Telecommun. Syst. 73(3): 397-417 (2020) - 2019
- [j3]Mohamed Hanini, Said El Kafhali, Khaled Salah:
Dynamic VM allocation and traffic control to manage QoS and energy consumption in cloud computing environment. Int. J. Comput. Appl. Technol. 60(4): 307-316 (2019) - 2017
- [j2]Iman El Mir, Kandoussi el Mehdi, Mohamed Hanini, Abdelkrim Haqiq, Dong Seong Kim:
A Game Theoretic approach based virtual machine migration for cloud environment security. Int. J. Commun. Networks Inf. Secur. 9(3) (2017) - 2012
- [j1]Amine Berqia, Mohamed Hanini, Abdelkrim Haqiq:
Combined Queue Management and Scheduling Mechanism to Improve Intra-User Multi-Flow QoS in a Beyond 3, 5G Network. Int. J. Mob. Comput. Multim. Commun. 4(1): 57-68 (2012)
Conference and Workshop Papers
- 2023
- [c7]Mohamed Abid, Said El Kafhali, Abdellah Amzil, Mohamed Hanini:
An Efficient Meta-Heuristic Methods for Travelling Salesman Problem. AICV 2023: 498-507 - 2021
- [c6]Abdellah Amzil, Abdessamad Bellouch, Ahmed Boujnoui, Mohamed Hanini, Abdellah Zaaloul:
A Comparative Study of Three LoRa Collision Resolution Schemes: A Markov Model-Based Approach. IBICA 2021: 110-119 - 2019
- [c5]Said El Kafhali, Chorouk Chahir, Mohamed Hanini, Khaled Salah:
Architecture to manage Internet of Things Data using Blockchain and Fog Computing. BDIoT 2019 - [c4]Abdellah Ouammou, Mohamed Hanini, Abdelghani Ben Tahar, Said El Kafhali:
Analysis of a M/M/k system with exponential setup times and reserves servers. BDIoT 2019 - 2017
- [c3]Mohamed Hanini, Said El Kafhali:
Cloud Computing Performance Evaluation under Dynamic Resource Utilization and Traffic Control. BDCA 2017: 5:1-5:6 - [c2]Abdellah Ouammou, Mohamed Hanini, Said El Kafhali, Abdelghani Ben Tahar:
Energy Consumption and Cost Analysis for Data Centers with Workload Control. IBICA 2017: 92-101 - [c1]Kandoussi el Mehdi, Iman El Mir, Mohamed Hanini, Abdelkrim Haqiq:
Modeling an Anomaly-Based Intrusion Prevention System Using Game Theory. IBICA 2017: 266-276
Informal and Other Publications
- 2024
- [i6]Badr-Eddine Marani, Mohamed Hanini, Nihitha Malayarukil, Stergios Christodoulidis, Maria Vakalopoulou, Enzo Ferrante:
ViG-Bias: Visually Grounded Bias Discovery and Mitigation. CoRR abs/2407.01996 (2024) - 2015
- [i5]Abdellah Zaaloul, Mohamed Ben El Aattar, Mohamed Hanini, Abdelkrim Haqiq, Mohammed Boulmalaf:
Sharing Channel In IEEE 802.16 Using The Cooperative Model Of Slotted ALOHA. CoRR abs/1501.00923 (2015) - 2013
- [i4]Said El Kafhali, Mohamed Hanini, Abdelali El Bouchti, Abdelkrim Haqiq:
Performances Evaluation of Enhanced Basic Time Space Priority combined with an AQM. CoRR abs/1304.3256 (2013) - [i3]Mohamed Hanini, Said El Kafhali, Abdelkrim Haqiq, Amine Berqia:
Effect of the Feedback Function on the QoS in a Time Space Priority with Active Queue Management. CoRR abs/1304.3258 (2013) - [i2]Mohamed Hanini, Abdelali El Bouchti, Abdelkrim Haqiq, Amine Berqia:
An Enhanced Time Space Priority Scheme to Manage QoS for Multimedia Flows transmitted to an end user in HSDPA Network. CoRR abs/1308.2600 (2013) - 2012
- [i1]Said El Kafhali, Abdelali El Bouchti, Mohamed Hanini, Abdelkrim Haqiq:
Performance Analysis for Bandwidth Allocation in IEEE 802.16 Broadband Wireless Networks using BMAP Queueing. CoRR abs/1203.1757 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint