default search action
Abdellah Ezzati
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Zakariae Dlimi, Abdellah Ezzati, Said Ben Alla:
A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments. Comput. Syst. Sci. Eng. 47(1): 79-103 (2023) - [j12]Amine Chraibi, Said Ben Alla, Abdellah Touhafi, Abdellah Ezzati:
A novel dynamic multi-objective task scheduling optimization based on Dueling DQN and PER. J. Supercomput. 79(18): 21368-21423 (2023) - [c34]Manal Hilali, Abdellah Ezzati, Said Ben Alla:
Deep Learning for Image and Sound Data: An Overview. AICV 2023: 282-293 - 2022
- [c33]Mehdi Ait Said, Abdellah Ezzati, Sara Arezki:
Microservices, a Step from the Low-Code to the No-Code. AISI 2022: 779-788 - [c32]Mohamed Litoussi, Mohamed Fartitchou, Khalid El Makkaoui, Abdellah Ezzati, Zakaria El Allali:
Digital Certifications in Moroccan Universities: Concepts, Challenges, and Solutions. ANT/EDI40 2022: 95-100 - 2021
- [j11]Amine Chraibi, Said Ben Alla, Abdellah Ezzati:
Makespan Optimisation in Cloudlet Scheduling with Improved DQN Algorithm in Cloud Computing. Sci. Program. 2021: 7216795:1-7216795:11 (2021) - [j10]Hicham Ben Alla, Said Ben Alla, Abdellah Ezzati, Abdellah Touhafi:
A novel multiclass priority algorithm for task scheduling in cloud computing. J. Supercomput. 77(10): 11514-11555 (2021) - [c31]Zakaria Benlalia, Karim Abouelmehdi, Abderrahim Beni Hssane, Abdellah Ezzati:
A study of task scheduling algorithms in cloud computing. NISS (ACM) 2021: 42:1-42:5 - 2020
- [j9]Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane, Slimane Ouhmad:
Fast Cloud-Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing. J. Ambient Intell. Humaniz. Comput. 11(6): 2205-2214 (2020) - [c30]Amine Chraibi, Said Ben Alla, Abdellah Touhafi, Abdellah Ezzati:
Run Time Optimization using a novel implementation of Parallel-PSO for real-world applications. Cloudtech 2020: 1-7 - [c29]Mohamed Litoussi, Nabil Kannouf, Khalid El Makkaoui, Abdellah Ezzati, Mohamed Fartitchou:
IoT security: challenges and countermeasures. EUSPN/ICTH 2020: 503-508
2010 – 2019
- 2019
- [j8]Slimane Ouhmad, Khalid El Makkaoui, Abderrahim Beni Hssane, Abdelmajid Hajami, Abdellah Ezzati:
An Electronic Nose Natural Neural Learning Model in Real Work Environment. IEEE Access 7: 134871-134880 (2019) - [j7]Said Ben Alla, Hicham Ben Alla, Abdellah Touhafi, Abdellah Ezzati:
An Efficient Energy-Aware Tasks Scheduling with Deadline-Constrained in Cloud Computing. Comput. 8(2): 46 (2019) - [j6]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing. Int. J. Digit. Crime Forensics 11(3): 90-102 (2019) - [j5]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing. J. Ambient Intell. Humaniz. Comput. 10(12): 4629-4640 (2019) - [c28]Zakaria Benlalia, Abderrahim Beni Hssane, Karim Abouelmehdi, Abdellah Ezzati:
A new service broker algorithm optimizing the cost and response time for cloud computing. ANT/EDI40 2019: 992-997 - 2018
- [j4]Hicham Ben Alla, Said Ben Alla, Abdellah Touhafi, Abdellah Ezzati:
A novel task scheduling approach based on dynamic queues and hybrid meta-heuristic algorithms for cloud computing environment. Clust. Comput. 21(4): 1797-1820 (2018) - [c27]Hicham Ben Alla, Said Ben Alla, Abdellah Touhafi, Abdellah Ezzati:
Deadline and Energy Aware Task Scheduling in Cloud Computing. Cloudtech 2018: 1-8 - [c26]Slimane Ouhmad, Abderrahim Beni Hssane, Abdelmajid Hajami, Khalid El Makkaoui, Abdellah Ezzati:
A Practical Sensors Software to Manage Fault Signals' Impact. EUSPN/ICTH 2018: 207-214 - [c25]Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane, Slimane Ouhmad:
A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing. FNC/MobiSPC 2018: 83-90 - 2017
- [c24]Chouaib Moussaddaq, Abdellah Ezzati, Rachid Elharti:
A new reformulation of the load balancing problem in cloud computing based on TSP and ACO. BDCA 2017: 54:1-54:4 - [c23]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati, Anas El-Ansari:
Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing. EUSPN/ICTH 2017: 33-40 - [c22]Yassine Maleh, Abdelkebir Sahid, Abdellah Ezzati, Mustapha Belaïssaoui:
A Capability Maturity Framework for IT Security Governance in Organizations. IBICA 2017: 221-233 - [c21]Mohamed Saouabi, Abdellah Ezzati:
A comparative between hadoop mapreduce and apache Spark on HDFS. IML 2017: 14:1-14:4 - [c20]Amina Harit, Abdellah Ezzati, Rachid Elharti:
Internet of things security: challenges and perspectives. ICC 2017: 167:1-167:8 - [c19]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
MultiPrime Cloud-RSA Scheme to Promote Data Confidentiality in the Cloud Environment. SCA 2017: 445-452 - [c18]Hicham Ben Alla, Said Ben Alla, Abdellah Ezzati:
A Priority Based Task Scheduling in Cloud Computing Using a Hybrid MCDM Model. UNet 2017: 235-246 - [c17]Yassine Maleh, Abdelkebir Sahid, Abdellah Ezzati, Mustapha Belaïssaoui:
Building open virtual cloud lab for advanced education in networks and security. WINCOM 2017: 1-6 - [i5]Yassine Maleh, Abdellah Ezzati:
Study and Development of a New Symmetric Key Management Scheme for Wireless Sensor Networks. CoRR abs/1701.00159 (2017) - [i4]Yassine Maleh, Abdellah Ezzati:
Study and Development of a Symmetric protocol to secure communications in WSN. CoRR abs/1701.00401 (2017) - 2016
- [j3]Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane:
Homomorphic encryption applied to secure storage and treatments of data in cloud. Int. J. Cloud Comput. 5(3): 207-217 (2016) - [j2]Yassine Maleh, Abdellah Ezzati:
LEAP Enhanced: A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN. Int. J. Mob. Comput. Multim. Commun. 7(3): 42-66 (2016) - [c16]Yassine Maleh, Abdellah Ezzati, Mustapha Belaïssaoui:
DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things. BDAW 2016: 54:1-54:7 - [c15]Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane:
Securely Adapt a Paillier Encryption Scheme to Protect the Data Confidentiality in the Cloud Environment. BDAW 2016: 57:1-57:3 - [c14]Hicham Ben Alla, Said Ben Alla, Abdellah Ezzati, Abdellah Touhafi:
An Efficient Dynamic Priority-Queue Algorithm Based on AHP and PSO for Task Scheduling in Cloud Computing. HIS 2016: 134-143 - [c13]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
Can hybrid Homomorphic Encryption schemes be practical? ICMCS 2016: 294-298 - [c12]Mohammed Fihri, Youssef El Fatimi, Abdelhalim Hnini, Abdellah Ezzati:
Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSN. ICC 2016 2016: 78:1-78:4 - [c11]Youssef El Fatimi, Mohammed Fihri, Abedellah Ezzati:
Improvement of Leach Routing Algorithm Based on the Use of Game Theory. ICC 2016 2016: 80:1-80:5 - [c10]Hicham Ben Alla, Said Ben Alla, Abdellah Ezzati, Ahmed Mouhsen:
A Novel Architecture with Dynamic Queues Based on Fuzzy Logic and Particle Swarm Optimization Algorithm for Task Scheduling in Cloud Computing. UNet 2016: 205-217 - [c9]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
Cloud-ElGamal: An efficient homomorphic encryption scheme. WINCOM 2016: 63-66 - [c8]Yassine Maleh, Abdellah Ezzati, Mustapha Belaïssaoui:
An enhanced DTLS protocol for Internet of Things applications. WINCOM 2016: 168-173 - [i3]Yassine Maleh, Abdellah Ezzati:
An advanced Study on Cryptography Mechanisms for Wireless Sensor Networks. CoRR abs/1609.05323 (2016) - 2015
- [c7]Yassine Maleh, Abdellah Ezzati, Youssef Qasmaoui, Mohamed Mbida:
A Global Hybrid Intrusion Detection System for Wireless Sensor Networks. ANT/SEIT 2015: 1047-1052 - [c6]Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane:
Homomorphic Encryption as a Solution of Trust Issues in Cloud. BDCA 2015: 40-45 - [c5]Yassin Maleh, Abdellah Ezzati:
An Efficient Key Establishment Protocol for Wireless Sensor Networks. UNet 2015: 339-352 - 2014
- [j1]Said Ben Alla, Abdellah Ezzati:
A Novel Coverage and Connectivity Preserving Routing Protocol for Mission-Critical Wireless Sensor Networks. J. Mobile Multimedia 9(3&4): 286-302 (2014) - [c4]Mohammed Fihri, Otmani Mohamed, Abdelhalim Hnini, Abdellah Ezzati:
Efficiency evaluation of routing protocols for Vanet. CIST 2014: 410-414 - [c3]Yassine Maleh, Abdellah Ezzati:
Performance analysis of routing protocols for wireless sensor networks. CIST 2014: 420-424 - [c2]Abdelhalim Hnini, Abdellah Ezzati, Abdelmajid Hajami:
LEACH protocol for multimedia traffic with a variable-size packet. ICMCS 2014: 906-909 - [i2]Yassine Maleh, Abdellah Ezzati:
A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks. CoRR abs/1401.1982 (2014) - [i1]Mohamed Mbida, Abdellah Ezzati:
OSCMAC Duty Cycle with Multi Helpers CT Mode WILEM Technology in Wireless Sensor Networks. CoRR abs/1405.1993 (2014) - 2012
- [c1]Said Ben Alla, Abdellah Ezzati, Ahmed Mohsen:
Gateway and Cluster Head Election using Fuzzy Logic in heterogeneous wireless sensor networks. ICMCS 2012: 761-766
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint