default search action
Abdelhakim Baouya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Abdelhakim Baouya, Brahim Hamid, Levent Gürgen, Saddek Bensalem:
Rigorous Security Analysis of RabbitMQ Broker with Concurrent Stochastic Games. Internet Things 26: 101161 (2024) - [j7]Abdelhakim Baouya, Salim Chehida, Saddek Bensalem, Levent Gürgen, Richard Nicholson, Miquel Cantero, Mario Diaz-Nava, Enrico Ferrera:
Deploying warehouse robots with confidence: the BRAIN-IoT framework's functional assurance. J. Supercomput. 80(1): 1206-1237 (2024) - 2023
- [j6]Abdelhakim Baouya, Otmane Aït Mohamed, Samir Ouchani:
Toward a context-driven deployment optimization for embedded systems: a product line approach. J. Supercomput. 79(2): 2180-2211 (2023) - 2022
- [j5]Abdelhakim Baouya, Salim Chehida, Samir Ouchani, Saddek Bensalem, Marius Bozga:
Generation and verification of learned stochastic automata using k-NN and statistical model checking. Appl. Intell. 52(8): 8874-8894 (2022) - [j4]Salim Chehida, Abdelhakim Baouya, Saddek Bensalem, Marius Bozga:
Learning and analysis of sensors behavior in IoT systems using statistical model checking. Softw. Qual. J. 30(2): 367-388 (2022) - [c11]Abdelhakim Baouya, Samir Ouchani, Saddek Bensalem:
Formal Modelling and Security Analysis of Inter-Operable Systems. IEA/AIE 2022: 555-567 - 2021
- [j3]Abdelhakim Baouya, Otmane Aït Mohamed, Samir Ouchani, Djamal Bennouar:
Reliability-driven Automotive Software Deployment based on a Parametrizable Probabilistic Model Checking. Expert Syst. Appl. 174: 114572 (2021) - [c10]Salim Chehida, Abdelhakim Baouya, Saddek Bensalem:
Component-Based Approach Combining UML and BIP for Rigorous System Design. FACS 2021: 27-43 - 2020
- [c9]Salim Chehida, Abdelhakim Baouya, Diego Fernández Alonso, Paul-Emmanuel Brun, Guillemette Massot, Marius Bozga, Saddek Bensalem:
Asset-Driven Approach for Security Risk Assessment in IoT Systems. CRiSIS 2020: 149-163 - [c8]Abdelhakim Baouya, Salim Chehida, Miquel Cantero, Marta Millet, Saddek Bensalem, Marius Bozga:
Formal Modeling and Simulation of Collaborative Intelligent Robots. ESOCC Workshops 2020: 41-52 - [c7]Abdelhakim Baouya, Salim Chehida, Saddek Bensalem, Marius Bozga:
Fog Computing and Blockchain for Massive IoT Deployment. MECO 2020: 1-4 - [c6]Salim Chehida, Abdelhakim Baouya, Marius Bozga, Saddek Bensalem:
Exploration of Impactful Countermeasures on IoT Attacks. MECO 2020: 1-4 - [c5]Salim Chehida, Abdelhakim Baouya, Saddek Bensalem, Marius Bozga:
Applied Statistical Model Checking for a Sensor Behavior Analysis. QUATIC 2020: 399-411 - [c4]Salim Chehida, Abdelhakim Baouya, Miquel Cantero, Paul-Emmanuel Brun, Guillemette Massot:
Risk Assessment in IoT Case Study: Collaborative Robots System. SAM IoT 2020: 3-10 - [c3]Xu Tao, Davide Conzon, Enrico Ferrera, Shuai Li, Jürgen Götz, Laurent Maillet-Contoz, Emmanuel Michel, Mario Diaz-Nava, Abdelhakim Baouya, Salim Chehida:
Model Based Methodology and Framework for Design and Management of Next-Gen IoT Systems. SAM IoT 2020: 80-90 - [c2]Abdelhakim Baouya, Salim Chehida, Saddek Bensalem, Marius Bozga:
Formal Modeling and Verification of Blockchain Consensus Protocol for IoT Systems. SoMeT 2020: 330-342
2010 – 2019
- 2019
- [j2]Abdelhakim Baouya, Otmane Aït Mohamed, Djamal Bennouar, Samir Ouchani:
Safety analysis of train control system based on model-driven design methodology. Comput. Ind. 105: 1-16 (2019) - 2015
- [j1]Abdelhakim Baouya, Djamal Bennouar, Otmane Aït Mohamed, Samir Ouchani:
A quantitative verification framework of SysML activity diagrams under time constraints. Expert Syst. Appl. 42(21): 7493-7510 (2015) - [c1]Abdelhakim Baouya, Djamal Bennouar, Otmane Aït Mohamed, Samir Ouchani:
On the Probabilistic Verification of Time Constrained SysML State Machines. SoMeT 2015: 425-441
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint