Publications

Export 2330 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
M. Lalaoui, A. Afia, E., et Chiheb, R., « A self-tuned simulated annealing algorithm using hidden markov model », International Journal of Electrical and Computer Engineering, vol. 8, p. 291-298, 2018.
M. Lalaoui, A. Afia, E., et Chiheb, R., « A self-adaptive very fast simulated annealing based on Hidden Markov model », in Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017, 2018, vol. 2018-January, p. 1-8.
A. E. Afia, Lalaoui, M., et Chiheb, R., « A Self Controlled Simulated Annealing Algorithm using Hidden Markov Model State Classification », in Procedia Computer Science, 2019, vol. 148, p. 512-521.
Ma Younes et Abdellah, Yb, « Segmentation of Arabic Handwritten Text to Lines », in Procedia Computer Science, 2015, vol. 73, p. 115-121.
Y. Mokhtari et Yousfi, A., « Segmentation of Arabic handwritten text to lines », in INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, vol. 73, p. 115-121.
Ha Amraoui, Habbani, Aab, Hajami, Ac, et Bilal, Ed, « Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model », Mobile Information Systems, vol. 2016, 2016.
H. Amraoui, Habbani, A., Hajami, A., et Bilal, E., « Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model », MOBILE INFORMATION SYSTEMS, 2016.
M. Alouane et Bakkali, H. El, « Security, Privacy and Trust in Cloud Computing: A Comparative Study », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 23-30.
M. Alouane et H. Bakkali, E., « Security, privacy and trust in cloud computing: A comparative study », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
Ha L'Amrani, Idrissi, YbEl Bouzekr, et Ajhoun, Ra, « The security of web services: Secure communication and identity management », in CEUR Workshop Proceedings, 2015, vol. 1580, p. 56-60.
N. Mouchfiq, Habbani, A., et Benjbara, C., « Security issues in manets: A survey », Advances in Intelligent Systems and Computing, vol. 1184, p. 288-295, 2021.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., Security in the internet of things. 2018, p. 105-121.
N. Mouchfiq, Benjbara, C., et Habbani, A., « Security in MANETs: The Blockchain Issue », Communications in Computer and Information Science, vol. 1264, p. 219-232, 2020.
H. Amraoui, Habbani, A., Hajami, A., et Bilal, E., « Security & cooperation mechanisms over mobile ad hoc networks: A survey and challenges », in Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017, 2018, vol. 2018-January, p. 1-6.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Security analysis of low cost RFID systems », in WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems, 2014, p. 11-16.
A. E. Bekkali, Boulmalf, M., Essaaidi, M., et Mezzour, G., « Securing the Internet of Things (IoT) », in Proceedings - 2018 International Conference on Wireless Networks and Mobile Communications, WINCOM 2018, 2019.
H. Z. Naji et Zbakh, M., « A secure virtualization architecture based on a nested Nova hypervisor », in Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017, 2018, vol. 2018-January, p. 1-7.
Ta Chanyour, Saadane, Rb, et Belkasmi, Ma, « Secure sparse network coding for reliable routing in large scale DTMN », in Proceedings - 2015 3rd International Workshop on RFID and Adaptive Wireless Sensor Networks, RAWSN 2015 - In conjunction with the International Conference on NETworked sYStems, NETYS 2015, 2015, p. 57-62.
T. Chanyour, Saadane, R., et Belkasmi, M., « Secure Sparse Network Coding for Reliable Routing in Large Scale DTMN », in 2015 THIRD INTERNATIONAL WORKSHOP ON RFID AND ADAPTIVE WIRELESS SENSOR NETWORKS (RAWSN), 2015, p. 57-62.
K. Mrabet, Bouanani, F. El, et Ben-Azza, H., « A secure multi-hops routing for VANETs », in 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2015, p. 6-10.
Ka Mrabet, Bouanani, F. Ea, et Ben-Azza, Hb, « A secure multi-hops routing for VANETs », in International Conference on Wireless Networks and Mobile Communications, WINCOM 2015, 2015.
J. Elhachimi et Kobbane, A., « Secure Internet of Thing using Blockchain Technology », in 2022 7th International Conference on Smart and Sustainable Technologies, SpliTech 2022, 2022.
Y. Bensitel et Romadi, R., « Secure data storage in the cloud with homomorphic encryption », in Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016, 2017, p. 1-6.
A. Sebbar, Zkik, K., Baddi, Y., Boulmalf, M., et Kettani, M. D. Ech- Cherif, « Secure Data Sharing Framework Based on Supervised Machine Learning Detection System for Future SDN-Based Networks », Studies in Computational Intelligence, vol. 919, p. 355-371, 2021.
Ya Bensitel et Romadi, Rb, « Secure data in cloud computing using homomorphic encryption », Journal of Theoretical and Applied Information Technology, vol. 82, p. 206-211, 2015.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:631,506
    Education - This is a contributing Drupal Theme
    Design by WeebPal.