


default search action
2nd NISS 2019: Rabat, Morocco
- Badr Abouelmajd, Mohamed Ben Ahmed, Anouar Abdelhakim Boudhir, Hassan El Ghazi:
Proceedings of the 2nd International Conference on Networking, Information Systems & Security, NISS 2019, Rabat, Morocco, 27-29 March, 2019. ACM 2019, ISBN 978-1-4503-6645-8 - Youssef Ben Akka, Abderrafii Rahali, Hassane Alami, El Arbi Abdellaoui Alaoui:
Control and Command Of Several Greenhouses Via Telegram Messenger. 1:1-1:9 - Amine Belqruch, Abdelilah Maach:
SCADA security using SSH honeypot. 2:1-2:5 - Mabrouk Elmehdi, Abdelilah Maach:
Genetic Algorithm for Optimal Charge Scheduling of Electric Vehicle Fleet. 3:1-3:7 - Zakariyaa Ait El Mouden
, Abdeslam Jakimi
, Moha Hajar:
An application of spectral clustering approach to detect communities in data modeled by graphs. 4:1-4:5 - Daniel Becerra, Gerardo Vega:
Secret Sharing Scheme with Efficient Cheating Detection. 5:1-5:7 - Sara Diouani, Hicham Medromi:
Trade-off between Performance and Energy Management in Autonomic and Green Data Centers. 6:1-6:8 - Youness Mourtaji, Mohammed Bouhorma
, Daniyal M. Alghazzawi
:
Intelligent Framework for Malware Detection with Convolutional Neural Network. 7:1-7:6 - Adnane Ghani, El Hassan Ibn Elhaj, Ahmed Hammouch:
Quality adaptation by using scalable video coding (SVC) over P2P IP Multimedia Subsystem (P2P IMS). 8:1-8:12 - Khadija Elghomary
, Driss Bouzidi, Najima Daoudi
:
A Comparative Analysis of OSN and SIoT Trust Models for a trust model adapted to MOOCs platforms. 9:1-9:8 - Mohammed Sabiri:
Construction of Somme Quasi-Cyclic Codes Over a Finite Rings. 10:1-10:8 - Otto Petrovic:
Digital Media's impact on learning in daily life: a different view on eLearning using means of videography. 11:1-11:9 - Abdellah Zyane, Mohamed Nabil Bahiri, Abdelilah Ghammaz:
A based cloud computing solution using DiffServ architecture for scalability issue in IoT networks with multiple SLA requirements. 12:1-12:6 - Sara Riahi, Azzeddine Riahi:
Resource Allocation in Pre-5G Cellular Systems. 13:1-13:6 - Farah Lamharras, Najib Elkamoun, Ouidad Labouidya:
Energy Saved Approaches in Software Defined Networks: State of the Art. 14:1-14:5 - Younes Regragui
, Najem Moussa:
On the Self-Organization of Mobile Agents to Ensure Dynamic Multi-level Coverage in Sensor Networks. 15:1-15:7 - Meriem Atifi, Abdelaziz Marzak:
A Methodology to do Model-Based Testing using FMEA. 16:1-16:11 - Abdelghani Babori
, Hicham Fihri Fassi, Abdelkarim Zaid:
Research on MOOCs: current trends and taking into account of content. 17:1-17:9 - Abdelmounaim K. Belbachir
, Mohamed Charif, Otman Oulhaj:
Calculation and polynomial synthesis of the normalized response of a pseudo-elliptic lossy filter. 18:1-18:3 - Soukaina Ennouamani, Zouhir Mahani:
A Comparative Study of the Learner Model in Adaptive Mobile Learning Systems. 19:1-19:11 - Jamal Mirhisse, M'barek Nasri, Ahmad El Allaoui
, Djemaa Kachi:
Adapted Active Contours for Catadioptric Images using a Non-euclidean Metrics. 20:1-20:6 - Mohamed Amine Belhamra
, El Mamoun Souidi:
Introduction to Steganography in RRNS based Communications. 21:1-21:7 - Maroua Gharam, Noureddine Boudriga:
Game Theoretical model for Resource Allocation in 5G Hybrid HetNets. 22:1-22:7 - Marouane Mzibri, Abdelilah Maach, A. Elhadri:
A Novel Traffic Prediction System based on Floating Car Data and Machine Learning. 23:1-23:6 - Houda Daki, Asmaa El Hannani
, Hassan Ouahmane:
Big-Data Architecture for Electrical Consumption Forecasting in Educational Institutions Buildings. 24:1-24:6 - Elmahdi Khoudry, Abdelaziz Belfqih
, Jamal Boukherouaa, Faissal El Mariami
, Abdelmajid Berdai
:
An Overview of Smart Grid Communication Networks Technologies, Protocols and Challenges. 25:1-25:8 - Hamza Zemrane
, Youssef Baddi
, Abderrahim Hasbi
:
Ehealth smart application of WSN on WWAN. 26:1-26:8 - Ghafki Oumaima, Elachaak Lotfi, Elouaai Fatiha
, Bouhorma Mohammed
:
Deep Learning Approach as New Tool for Type 2 Diabetes Detection. 27:1-27:4 - Hassnae Remmach, Mohamed Sadgal
, Aziz Elfazziki:
A PSO Approach In The 3D Object Reconstruction Using Supershapes. 28:1-28:9 - Salma Bendaoud, Fatima Amounas, El Hassan El Kinani:
A New Image Encryption Scheme Based on Enhanced Elliptic Curve Cryptosystem Using DNA Computing. 29:1-29:5 - Mustapha El Hamzaoui, Faycal Bensalah
:
A theoretical model to illustrate the possible relations link the IS and the ICT to the organization digital information / Data. 30:1-30:10 - Driss Meskine, Noureddine Moussaid, Soukaina Berhich:
Blind image deblurring by game theory. 31:1-31:7 - Wail El Hilali
, Abdellah El Manouar:
Towards a sustainable world through a SMART digital transformation. 32:1-32:8 - Ali Gounni, Noureddine Rais, Mostafa Idrissi Azzouzi:
New Solutions to Reduce the Environmental Impact of Road Traffic Emissions, Using Sumo. 33:1-33:7 - Chaymae Benfares
, Younès El Bouzekri El Idrissi
, Karim Hamid:
Intelligent Decision Making for Depression Prevention and Detection based on AHP. 34:1-34:7 - Abir Bitat, Salah Merniz:
Formal verification of cryptographic circuits: A semi-automatic functional approach. 35:1-35:6 - Farah Chahlaoui, Mohammed Raiss El-Fenni, Hamza Dahmouni
:
Performance Analysis of Load Balancing Mechanisms in SDN Networks. 36:1-36:8 - Ahmed El Orche, Mohamed Bahaj
:
Approach to use ontology based on electronic payment system and machine learning to prevent Fraud. 37:1-37:6 - Cheikh Saliou Mbacke Babou, Bernard Ousmane Sané
, Ibrahima Niang:
A Hierarchical Method for Dynamic Job Execution in NREN-based Cloud Systems. 38:1-38:6 - Marouane Adnane
, Mohammed El Haj Tirari
, Sanaa El Fkihi, Rachid Oulad Haj Thami:
Prediction Demand for Classified Ads Using Machine Learning: an Experiment Study. 39:1-39:6 - Salma Ezziri, Omar Khadir:
Amelioration of a proxy signature using RSA encryption. 40:1-40:7 - Karima Berramla, El Abbassia Deba, Mohamed El Kamel, Abou El Hassen:
Semi-Automatic Generation of Transformation Rules: From AADL to Timed Automata. 41:1-41:7 - Fatima-zahra Moutai, Sara Hsaini
, Salma Azzouzi
, My El Hassan Charaf
:
Security Testing Approach for IaaS Infrastructure. 42:1-42:5 - Ben Abdel Ouahab Ikram
, Boudhir Anouar Abdelhakim, Astito Abdelali, Bassam A. Zafar
, Bouhorma Mohammed
:
Deep Learning architecture for temperature forecasting in an IoT LoRa based system. 43:1-43:6 - Younes Ed-Doughmi, Najlae Idrissi
:
Driver Fatigue Detection using Recurrent Neural Networks. 44:1-44:6 - Cheikh Saliou Mbacke Babou, Bernard Ousmane Sané
, Ibrahima Diané, Ibrahima Niang:
Home Edge Computing Architecture for Smart and Sustainable Agriculture and Breeding. 45:1-45:7 - Leila Zahhafi, Omar Khadir:
Anonymous Secure E-voting over a Network for Multiple Elections. 46:1-46:6 - Bernard Ousmane Sané
, Cheikh Saliou Mbacke Babou, Ibrahima Niang:
A Game Theoretic Approach for Virtual Machine Allocation Security in Cloud Computing. 47:1-47:6 - Rabab Sikal, Hanae Sbaï
, Laila Kjiri:
Promoting resource discovery in business process variability. 48:1-48:7 - Fouad Toufik, Mohamed Bahaj
:
Model Transformation From Object Relational Database to NoSQL Document Database. 49:1-49:5 - Zaydi Mounia, Nassereddine Bouchaib
:
A new comprehensive solution to handle information security Governance in organizations. 50:1-50:5 - Ossama Bouziani, Hafssa Benaboud
, Achraf Samir Chamkar, Saiida Lazaar
:
A Comparative study of Open Source IDSs according to their Ability to Detect Attacks. 51:1-51:5 - Siham Lamssaoui, Hafssa Benaboud
:
Novel Automatic Bank Check Recognition Based on Deep Learning. 52:1-52:5 - Anasse Hanafi
, Lotfi Elaachak
, Mohammed Bouhorma
:
A comparative Study of Augmented Reality SDKs to Develop an Educational Application in Chemical Field. 53:1-53:8 - Oussama Sbai
, Mohamed Elboukhari:
A simulation analyse of MANET's RREQ Flooding and HELLO Flooding attacks with ns-3. 54:1-54:5 - Mohamed Elghayyaty, Abdelkader Hadjoudja
, C. ElMahjoub, Omar Mouhib
, Anas el Habti el Idrissi:
Three Parallelization Syndrome Block for Reed Solomon code RS (255, 239) Used in Digital Video Broadcasting DVB-T. 55:1-55:4 - Stéphane Cédric Koumétio Tékouabou, Walid Cherif, Hassan Silkan
:
A data modeling approach for classification problems: application to bank telemarketing prediction. 56:1-56:7 - Samir Amri, Lahbib Zenkouar, Reda Benkhouya
:
A Comparative Study on the Efficiency of POS Tagging Techniques on Amazigh Corpus. 57:1-57:5 - Zakaria El Mrabet, Mehdi Ezzari, Hassan El Ghazi, Badr Abou El Majd:
Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure. 58:1-58:7 - Teimzit Amira, Mahnane Lamia, Mohamed Hafidi:
Flipped classroom for algorithmic teaching. 59:1-59:4 - Zouhair Chiba
, Noreddine Abghour
, Khalid Moussaid
, Amina El Omri
, Mohamed Rida
:
Smart Approach to Build A Deep Neural Network Based IDS for Cloud Environment Using an Optimized Genetic Algorithm. 60:1-60:12 - Fatima Ezzahra Ettahiri, Mina Elmaallam:
The impact of Fuzzy Logic on Knowledge Management in the context of Supply Chain: a state of art. 61:1-61:6 - Mohamed Saad Azizi, Moulay Lahcen Hasnaoui:
An energy efficient clustering protocol for homogeneous and heterogeneous wireless sensor network. 62:1-62:6 - Abderrahim Mesbah, Aissam Berrahou
, Abdelmajid El Alami
, Nadia Berrahou, Hassan Berbia
, Hassan Qjidaa
:
3D Object Classification using 3D Racah Moments Convolutional Neural Networks. 63:1-63:6 - Zouhir Lakhili, Abdelmajid El Alami
, Abderrahim Mesbah, Aissam Berrahou
, Hassan Qjidaa
:
3D Shape Classification Using 3D Discrete Moments and Deep Neural Networks. 64:1-64:6 - Ahmed Oussous
, Ayoub Ait Lahcen
, Samir Belfkih:
Impact of Text Pre-processing and Ensemble Learning on Arabic Sentiment Analysis. 65:1-65:9 - Pece Mitrevski
, Filip Mitrevski, Marjan Gusev
:
A Decade Time-Lapse of Cloud Performance and Dependability Modeling: Performability Evaluation Framework. 66:1-66:6 - Moukhliss Ghizlane
, Reda Filali Hilali
, Belhadaoui Hicham
:
A Smart Card Digital Identity Check Model for University Services Access. 67:1-67:4 - Imane Sahmi
, Tomader Mazri, Nabil Hmina
:
Study of the Different Security Threats on the Internet of Things and their Applications. 68:1-68:6 - Zaid Kartit, Ouafaa Diouri:
Security Extension for Routing Protocols in Ad hoc Mobile Networks: A comparative Study. 69:1-69:7 - Hicham El Mrabet
, Abdelaziz Aït Moussa
:
Smart School Guidance and Vocational Guidance System Through the Internet of Things. 70:1-70:5 - Nadir Kamel Benamara
, Ehlem Zigh
, Tarik Boudghene Stambouli, Mokhtar Keche:
Efficient Multispectral Face Recognition using Random Feature Selection and PSO-SVM. 71:1-71:6 - Hajar El Hannach
, Mohammed Benkhalifa:
Using Synonym and Definition WordNet Semantic relations for implicit aspect identification in Sentiment Analysis. 72:1-72:5 - Abdeljalil El Abdouli, Larbi Hassouni, Houda Anoun
:
A Distributed Approach for Mining Moroccan Hashtags using Twitter Platform. 73:1-73:10 - Abdellah Nabou
, My Driss Laanaoui, Mohammed Ouzzif:
Effect of Single and Cooperative Black Hole Attack in MANET using OLSR protocol. 74:1-74:5 - Naima Bousnina, Sanaa Ghouzali, Mounia Mikram, Wadood Abdul
:
DTCWT-DCT watermarking method for multimodal biometric authentication. 75:1-75:7 - Manal Nejjari
, Abdelouafi Meziane:
Overview of Opinion Detection Approaches in Arabic. 76:1-76:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.