


Остановите войну!
for scientists:


default search action
Yassine Maleh
Person information

- affiliation: Hassan 1st University, Settat, Morocco
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Abdelhamied A. Ateya, Ammar Muthanna, Andrey Koucheryavy, Yassine Maleh, Ahmed A. Abd El-Latif
:
Energy efficient offloading scheme for MEC-based augmented reality system. Clust. Comput. 26(1): 789-806 (2023) - [j17]El Arbi Abdellaoui Alaoui, Stéphane Cédric Koumétio Tékouabou, Yassine Maleh, Anand Nayyar:
Corrigendum to "Towards to intelligent routing for DTN protocols using machine learning techniques" [Simulation Modelling Practice and Theory 117 (2022) 102475]. Comput. Secur. 124: 103012 (2023) - [j16]Giuseppe Ciaburro
, Sankar Padmanabhan, Yassine Maleh
, Virginia Puyana-Romero
:
Fan Fault Diagnosis Using Acoustic Emission and Deep Learning Methods. Informatics 10(1): 24 (2023) - [j15]El Arbi Abdellaoui Alaoui, Stéphane Cédric Koumétio Tékouabou, Yassine Maleh, Anand Nayyar:
Corrigendum to "Towards to intelligent routing for DTN protocols using machine learning techniques" [Simulation Modelling Practice and Theory 117 (2022) 102475]. Simul. Model. Pract. Theory 123: 102689 (2023) - 2022
- [b1]Yassine Maleh, Youness Maleh:
Cybersecurity in Morocco. Springer Briefs in Cybersecurity, Springer 2022, ISBN 978-3-031-18477-2, pp. 1-92 - [j14]Feruz K. Elmay
, Khaled Salah
, Ibrar Yaqoob
, Raja Jayaraman
, Ammar Ayman Battah
, Yassine Maleh
:
Blockchain-Based Traceability for Shipping Containers in Unimodal and Multimodal Logistics. IEEE Access 10: 133539-133556 (2022) - [j13]Gabriel Piñeres-Espitia
, Shariq Aziz Butt
, Francisco Estévez-Ortiz, Alejandro Cama-Pinto, Yassine Maleh
:
Performance analysis of 6LoWPAN protocol for a flood monitoring system. EURASIP J. Wirel. Commun. Netw. 2022(1): 16 (2022) - [j12]Yassine Sadqi
, Yassine Maleh
:
A systematic review and taxonomy of web applications threats. Inf. Secur. J. A Glob. Perspect. 31(1): 1-27 (2022) - [j11]Yassine Maleh, Lo'ai Tawalbeh:
Editorial. J. ICT Stand. 10(2): 1-2 (2022) - [j10]Yassine Maleh, Lo'ai Tawalbeh:
Editorial. J. ICT Stand. 10(3): i-ii (2022) - [j9]Abdukodir Khakimov, Ibrahim A. Elgendy
, Ammar Muthanna
, Evgeny Mokrov, Konstantin E. Samouylov
, Yassine Maleh
, Ahmed A. Abd El-Latif
:
Flexible architecture for deployment of edge computing applications. Simul. Model. Pract. Theory 114: 102402 (2022) - [j8]El Arbi Abdellaoui Alaoui, Stéphane Cédric Koumétio Tékouabou
, Yassine Maleh
, Anand Nayyar:
Towards to intelligent routing for DTN protocols using machine learning techniques. Simul. Model. Pract. Theory 117: 102475 (2022) - [j7]Ahmed A. Abd El-Latif
, Yassine Maleh, Marinella Petrocchi
, Valentina Casola
:
Guest Editorial: Advanced Computing and Blockchain Applications for Critical Industrial IoT. IEEE Trans. Ind. Informatics 18(11): 8282-8286 (2022) - 2021
- [j6]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh
, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity. Big Data 9(2): 146-147 (2021) - [j5]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh
, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity: Deadline for Manuscript Submission: September 15, 2021. Big Data 9(3): 149-150 (2021) - [j4]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh
, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity: Deadline for Manuscript Submission: September 15, 2021. Big Data 9(4): 322-323 (2021) - [j3]Alexander Paramonov
, Jialiang Peng
, Dmitry Kashkarov, Ammar Muthanna
, Ibrahim A. Elgendy
, Andrey Koucheryavy
, Yassine Maleh
, Ahmed A. Abd El-Latif
:
Study and Analysis of Multiconnectivity for Ultrareliable and Low-Latency Features in Networks and V2X Communications. Wirel. Commun. Mob. Comput. 2021: 1718099:1-1718099:10 (2021) - [c10]Elafri Najwa, Rose Bertrand, Yassine Maleh
, Gabriela Fernandes
, Majed Abdeen, Sassi Souad:
Lean 4.0 tools and technologies to improve companies' maturity level: the COVID-19 context. CENTERIS/ProjMAN/HCist 2021: 207-216 - 2020
- [c9]Yassine Maleh
, Abdelkebir Sahid
, Mustapha Belaïssaoui:
Optimized Machine Learning Techniques for IoT 6LoWPAN Cyber Attacks Detection. SoCPaR 2020: 669-677
2010 – 2019
- 2018
- [j2]Abdelkebir Sahid
, Yassine Maleh
, Mustapha Belaïssaoui:
A Practical Agile Framework for IT Service and Asset Management ITSM/ITAM Through a Case Study. J. Cases Inf. Technol. 20(4): 71-92 (2018) - 2017
- [c8]Yassine Maleh
, Abdelkebir Sahid
, Abdellah Ezzati
, Mustapha Belaïssaoui:
A Capability Maturity Framework for IT Security Governance in Organizations. IBICA 2017: 221-233 - [c7]Abdelkebir Sahid
, Yassine Maleh
, Mustapha Belaïssaoui:
An Agile Framework for ITS Management In Organizations: A Case Study Based on DevOps. ICCWCS 2017: 67:1-67:8 - [c6]Yassine Maleh
, Abdelkebir Sahid
, Abdellah Ezzati
, Mustapha Belaïssaoui:
Building open virtual cloud lab for advanced education in networks and security. WINCOM 2017: 1-6 - [i4]Yassine Maleh, Abdellah Ezzati:
Study and Development of a New Symmetric Key Management Scheme for Wireless Sensor Networks. CoRR abs/1701.00159 (2017) - [i3]Yassine Maleh, Abdellah Ezzati:
Study and Development of a Symmetric protocol to secure communications in WSN. CoRR abs/1701.00401 (2017) - 2016
- [j1]Yassine Maleh
, Abdellah Ezzati
:
LEAP Enhanced: A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN. Int. J. Mob. Comput. Multim. Commun. 7(3): 42-66 (2016) - [c5]Yassine Maleh
, Abdellah Ezzati
, Mustapha Belaïssaoui:
DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things. BDAW 2016: 54:1-54:7 - [c4]Yassine Maleh
, Abdellah Ezzati
, Mustapha Belaïssaoui:
An enhanced DTLS protocol for Internet of Things applications. WINCOM 2016: 168-173 - [i2]Yassine Maleh, Abdellah Ezzati:
An advanced Study on Cryptography Mechanisms for Wireless Sensor Networks. CoRR abs/1609.05323 (2016) - 2015
- [c3]Yassine Maleh
, Abdellah Ezzati
, Youssef Qasmaoui, Mohamed Mbida:
A Global Hybrid Intrusion Detection System for Wireless Sensor Networks. ANT/SEIT 2015: 1047-1052 - [c2]Yassin Maleh
, Abdellah Ezzati
:
An Efficient Key Establishment Protocol for Wireless Sensor Networks. UNet 2015: 339-352 - 2014
- [c1]Yassine Maleh
, Abdellah Ezzati
:
Performance analysis of routing protocols for wireless sensor networks. CIST 2014: 420-424 - [i1]Yassine Maleh, Abdellah Ezzati:
A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks. CoRR abs/1401.1982 (2014)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-05-18 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint