M. A. Madani, Erradi, M., et Benkaouz, Y., « ABAC Based Online Collaborations in the Cloud », Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 206, p. 67-76, 2018.
F. Mourchid, Kobbane, A., Ben Othman, J., et M. Koutbi, E., « CGAM: A community and geography aware mobility model », International Journal of Communication Systems, vol. 31, 2018.
A. Sahnoun, Habbani, A., et J. Abbadi, E., « A coalition-formation game model for energy-efficient routing in mobile Ad-hoc network », International Journal of Electrical and Computer Engineering, vol. 8, p. 26-33, 2018.
A. Touhafi, Braeken, A., Tahiri, A., et Zbakh, M., « CoderLabs: A cloud-based platform for real-time online labs with user collaboration », Concurrency Computation, 2018.
B. Aylaj, Belkasmi, M., Nouh, S., et Zouaki, H., « Construction of regular quasi cyclic-low density parity check codes from cyclic codes », ARPN Journal of Engineering and Applied Sciences, vol. 13, p. 982-989, 2018.
A. Bentaleb et Ettalbi, A., « Context-aware for service composition optimization in cloud computing », Advances in Intelligent Systems and Computing, vol. 640, p. 311-321, 2018.
E. Badidi et Routaib, H., « A DaaS Based Framework for IoT Data Provisioning », Advances in Intelligent Systems and Computing, vol. 661, p. 369-379, 2018.
M. Sarhani, A. Afia, E., et Faizi, R., « Facing the feature selection problem with a binary PSO-GSA approach », Operations Research/ Computer Science Interfaces Series, vol. 62, p. 447-462, 2018.
M. Elmouhtadi, S. Fkihi, E., et Aboutajdine, D., « Fingerprint identification using hierarchical matching and topological structures », Studies in Computational Intelligence, vol. 730, p. 393-408, 2018.
A. Khoumsi, Erradi, M., et Krombi, W., « A formal basis for the design and analysis of firewall security policies », Journal of King Saud University - Computer and Information Sciences, vol. 30, p. 51-66, 2018.
M. Bouabdellah, Kaabouch, N., F. Bouanani, E., et Ben-Azza, H., « Network layer attacks and countermeasures in cognitive radio networks: A survey », Journal of Information Security and Applications, vol. 38, p. 40-49, 2018.
R. S. Kale, Wadhai, V. M., et Helonde, J. B., « Novel threshold formulation for energy detection method to efficient spectrum sensing in cognitive radio », Advances in Intelligent Systems and Computing, vol. 651, p. 25-35, 2018.
M. Ouzineb, Mhada, F. Z., Pellerin, R., et I. Hallaoui, E., « Optimal planning of buffer sizes and inspection station positions », Production and Manufacturing Research, vol. 6, p. 90-112, 2018.
C. B. Zapata, Fernandez-Aleman, J. L., Toval, A., et Idri, A., « Reusable Software Usability Specifications for mHealth Applications », Journal of Medical Systems, vol. 42, 2018.
M. Lalaoui, A. Afia, E., et Chiheb, R., « A self-tuned simulated annealing algorithm using hidden markov model », International Journal of Electrical and Computer Engineering, vol. 8, p. 291-298, 2018.
J. Maqboul et Bounabat, B., « Towards a completeness prediction based on the complexity and impact », Advances in Intelligent Systems and Computing, vol. 640, p. 108-116, 2018.