default search action
Nadia Ben Azzouna
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j11]Jihene Latrech, Zahra Kodia, Nadia Ben Azzouna:
Twit-CoFiD: a hybrid recommender system based on tweet sentiment analysis. Soc. Netw. Anal. Min. 14(1): 123 (2024) - [j10]Jihene Latrech, Zahra Kodia, Nadia Ben Azzouna:
CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning. J. Supercomput. 80(1): 1160-1182 (2024) - [j9]Rihab Abidi, Nadia Ben Azzouna, Wassim Trojet, Ghaleb Hoblos, Nabil Sahli:
A study of mechanisms and approaches for IoV trust models requirements achievement. J. Supercomput. 80(3): 4157-4201 (2024) - 2023
- [j8]Ilhem Souissi, Rihab Abidi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Said:
ECOTRUST: A novel model for Energy COnsumption TRUST assurance in electric vehicular networks. Ad Hoc Networks 149: 103246 (2023) - [j7]Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said:
A fuzzy logic-based model for filtering dishonest recommendations in the Social Internet of Things. J. Ambient Intell. Humaniz. Comput. 14(5): 6181-6200 (2023) - 2020
- [j6]Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:
RPMInter-work: a multi-agent approach for planning the task-role assignments in inter-organisational workflow. Enterp. Inf. Syst. 14(5): 611-640 (2020) - [j5]Ilhem Souissi, Nadia Ben Azzouna, Lamjed Ben Said:
A multi-level study for trust management models assessment in VANETs. Int. J. Comput. Intell. Stud. 9(1/2): 107-127 (2020) - 2019
- [j4]Ilhem Souissi, Nadia Ben Azzouna, Lamjed Ben Said:
A multi-level study of information trust models in WSN-assisted IoT. Comput. Networks 151: 12-30 (2019) - [j3]Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia:
Trust management in vehicular ad hoc networks: a survey. Int. J. Ad Hoc Ubiquitous Comput. 31(4): 230-243 (2019) - 2004
- [j2]Nadia Ben Azzouna, Fabrice Clérot, Christine Fricker, Fabrice Guillemin:
A flow-based approach to modeling ADSL traffic on an IP backbone link. Ann. des Télécommunications 59(11-12): 1260-1299 (2004) - [j1]Nadia Ben Azzouna, Fabrice Guillemin:
Experimental analysis of the impact of peer-to-peer applications on traffic in commercial IP networks. Eur. Trans. Telecommun. 15(6): 511-522 (2004)
Conference and Workshop Papers
- 2024
- [c26]Jihene Latrech, Zahra Kodia, Nadia Ben Azzouna:
Context-based Collaborative Filtering: K-Means Clustering and Contextual Matrix Factorization*. CoDIT 2024: 1-5 - [c25]Alia Maaloul, Meriam Jemel, Nadia Ben Azzouna:
XAI based feature selection for gestational diabetes Mellitus prediction. CoDIT 2024: 1939-1944 - [c24]Wiem Ben Ghozzi, Zahra Kodia, Nadia Ben Azzouna:
Fatigue Detection for the Elderly Using Machine Learning Techniques. CoDIT 2024: 2055-2060 - [c23]Hamdi Ouechtati, Nadia Ben Azzouna:
Towards an Adaptive Trust Management Model Based on ANFIS in the SIoT. SECRYPT 2024: 710-715 - [c22]Malek Lachheb, Rihab Abidi, Nadia Ben Azzouna, Nabil Sahli:
Infrastructure-Based Communication Trust Model for Intelligent Transportation Systems. VEHITS 2024: 513-521 - 2023
- [c21]Hamida Labidi, Nadia Ben Azzouna, Khaled Hassine, Mohamed Salah Gouider:
An improved genetic algorithm for solving the multi-objective vehicle routing problem with environmental considerations. KES 2023: 3866-3875 - [c20]Rihab Abidi, Nabil Sahli, Wassim Trojet, Nadia Ben Azzouna, Ghaleb Hoblos:
An Infrastructure-Based Trust Management Framework for Cooperative ITS. VEHITS 2023: 329-336 - 2021
- [c19]Rihab Abidi, Nadia Ben Azzouna:
Self-adaptive trust management model for social IoT services. ISNCC 2021: 1-7 - 2019
- [c18]Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Said:
A New Fuzzy Logic Based Model for Location Trust Estimation in Electric Vehicular Networks. AINA 2019: 341-352 - [c17]Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said:
A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things. AINA 2019: 1157-1168 - 2018
- [c16]Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Saïd:
Fuzzy Logic based Model for Energy Consumption Trust Estimation in Electric Vehicular Networks. ICETE (2) 2018: 387-399 - [c15]Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said:
Towards a self-adaptive access control middleware for the Internet of Things. ICOIN 2018: 545-550 - 2017
- [c14]Hamdi Ouechtati, Nadia Ben Azzouna:
Trust-ABAC Towards an Access Control System for the Internet of Things. GPC 2017: 75-89 - [c13]Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia:
Towards a Self-adaptive Trust Management Model for VANETs. SECRYPT 2017: 513-518 - 2016
- [c12]Rim Helali, Nadia Ben Azzouna, Khaled Ghédira:
QOS prediction in ubiquitous environments: An MLR based service selection approach. IWCMC 2016: 904-908 - 2015
- [c11]Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:
ECA rules for controlling authorisation plan to satisfy dynamic constraints. PST 2015: 133-138 - 2014
- [c10]Rim Helali, Nadia Ben Azzouna, Khaled Ghédira:
Service Selection in Ubiquitous Environments: A Novel Approach Using CBR and Skyline Computing. UIC/ATC/ScalCom 2014: 384-389 - 2013
- [c9]Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:
A novel approach for dynamic authorisation planning in constrained workflow systems. SIN 2013: 388-391 - [c8]Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:
Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints. SIN 2013: 440-443 - 2012
- [c7]Rim Helali, Nadia Ben Azzouna, Khaled Ghédira:
Towards a Semantic and Dynamic Cluster based Web Service Discovery System for Ubiquitous Environments. ICEIS (2) 2012: 295-300 - [c6]Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:
Towards a Scalable and Dynamic Access Control System for Web Services. WEBIST 2012: 161-166 - 2010
- [c5]Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:
Towards a Dynamic Access Control Model for E-Government Web Services. APSCC 2010: 433-440 - 2005
- [c4]Nadia Ben Azzouna, Fabrice Guillemin, Stephanie Poisson, Philippe Robert, Christine Fricker, Nelson Antunes:
Inverting sampled ADSL traffic. ICC 2005: 1-5 - 2004
- [c3]Walid Saddi, Nadia Ben Azzouna, Fabrice Guillemin:
IP Traffic Classification via Blind Source Separation Based on Jacobi Algorithm. ECUMN 2004: 287-296 - [c2]Nadia Ben Azzouna, Fabrice Guillemin:
Impact of peer-to-peer applications on wide area network traffic: an experimental approach. GLOBECOM 2004: 1544-1548 - 2003
- [c1]Nadia Ben Azzouna, Fabrice Guillemin:
Analysis of ADSL traffic on an IP backbone link. GLOBECOM 2003: 3742-3746
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint