Homomorphic encryption method applied to Cloud Computing M Tebaa, S El Hajji, A El Ghazi 2012 National Days of Network Security and Systems, 86-89, 2012 | 309 | 2012 |
A highly efficient ECC-based authentication protocol for RFID H Lamrani Alaoui, A El Ghazi, M Zbakh, A Touhafi, A Braeken Journal of Sensors 2021, 1-16, 2021 | 23 | 2021 |
A survey on blockchain and artificial intelligence technologies for enhancing security and privacy in smart environments O Fadi, Z Karim, B Mohammed IEEE Access 10, 93168-93186, 2022 | 17 | 2022 |
Homomorphic encryption applied to the cloud computing security T Maha, E Saïd, E Abdellatif Proceedings of the World Congress on Engineering 1, 4-6, 2012 | 11 | 2012 |
Newton's method for the common eigenvector problem A El Ghazi, S El Hajji, L Giraud, S Gratton Journal of computational and applied mathematics 219 (2), 398-407, 2008 | 7 | 2008 |
Experimental-based mechanobiological modeling of the anabolic and catabolic effects of breast cancer on bone remodeling I Ait Oumghar, A Barkaoui, P Chabrand, AE Ghazi, C Jeanneau, ... Biomechanics and modeling in mechanobiology 21 (6), 1841-1856, 2022 | 5 | 2022 |
Machine learning and datamining methods for hybrid IoT intrusion detection A El Ghazi, AM Rachid 2020 5th international conference on cloud computing and artificial …, 2020 | 4 | 2020 |
Guide d’utilisation du logiciel MATLAB, département mathématiques et informatique A El Ghazi, S El Hajji Université Mohammed V, Maroc, 2004 | 4 | 2004 |
New version of iSCSI protocol to secure Cloud data storage A Elghazi, M Berrezzouq, Z Abdelali 2016 2nd International Conference on Cloud Computing Technologies and …, 2016 | 3 | 2016 |
Modeling and simulation of bone cells dynamic behavior under the late effect of breast cancer treatments IA Oumghar, A Barkaoui, AEL Ghazi, P Chabrand Medical Engineering & Physics 115, 103982, 2023 | 2 | 2023 |
Issues and Threats of Cloud Data Storage M Berrezzouq, A El Ghazi, Z Abdelali Cloud Computing and Big Data: Technologies, Applications and Security 3, 60-72, 2019 | 2 | 2019 |
Issues and threats of data stored in cloud M Berrezzouq, A Elghazi 2017 3rd International Conference of Cloud Computing Technologies and …, 2017 | 2 | 2017 |
Ghl algorithm extension based on a new technique of reducing congestion in obs networks V Mohammed International Journal of Software Engineering and Its Applications 9 (9 …, 2015 | 2 | 2015 |
New mechanism of burst construction to reduce losses in obs networks F Loukdache, S Elhajji, A El Ghazi International Journal of Software Engineering and Its Applications 8 (10), 73-82, 2014 | 1 | 2014 |
A short note on backward errors for the common eigenvector problem AEL Ghazi, SEL Hajji, L Giraud, S Gratton | 1 | 2014 |
Modeling an obs network in omnet++ and the impact of processing speed of control packets in such network F LOUKDACHE, S EL HAJJI, S KRIT, A EL GHAZI Proceedings of the World Congress on Engineering 2, 2013 | 1 | 2013 |
Modeling an OBS Network in OMNeT++ and the Impact of Data Channels in such Network F Loukdache, S Elhajji, S Krit, A El Ghazi Proceedings of the World Congress on Engineering 2, 2012 | 1 | 2012 |
Authentication Protocol for RFID Systems: A Survey HL Alaoui, M Zbakh, A Breaken, A Touhafi, A El Ghazi 2023 IEEE 6th International Conference on Cloud Computing and Artificial …, 2023 | | 2023 |
Machine learning and datamining methods for hybrid IoT intrusion detection AM Rachid, A El Ghazi | | 2023 |
PKN: A Hybrid Intrusion Detection System Installed on Fog Architecture AM Rachid, EG Abdellatif International Conference On Big Data and Internet of Things, 414-427, 2022 | | 2022 |