Abdellah Ezzati

Orcid: 0000-0002-1456-0661

According to our database1, Abdellah Ezzati authored at least 52 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A novel dynamic multi-objective task scheduling optimization based on Dueling DQN and PER.
J. Supercomput., December, 2023

A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments.
Comput. Syst. Sci. Eng., 2023

Deep Learning for Image and Sound Data: An Overview.
Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision, 2023

2022
Digital Certifications in Moroccan Universities: Concepts, Challenges, and Solutions.
Proceedings of the 13th International Conference on Ambient Systems, 2022

Microservices, a Step from the Low-Code to the No-Code.
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022

2021
A novel multiclass priority algorithm for task scheduling in cloud computing.
J. Supercomput., 2021

Makespan Optimisation in Cloudlet Scheduling with Improved DQN Algorithm in Cloud Computing.
Sci. Program., 2021

A study of task scheduling algorithms in cloud computing.
Proceedings of the NISS2021: The 4th International Conference on Networking, Information Systems & Security, KENITRA, Morocco, April 1, 2021

2020
Fast Cloud-Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing.
J. Ambient Intell. Humaniz. Comput., 2020

IoT security: challenges and countermeasures.
Proceedings of the 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) / The 10th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2020) / Affiliated Workshops, 2020

Run Time Optimization using a novel implementation of Parallel-PSO for real-world applications.
Proceedings of the 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2020

2019
Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing.
J. Ambient Intell. Humaniz. Comput., 2019

Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing.
Int. J. Digit. Crime Forensics, 2019

An Efficient Energy-Aware Tasks Scheduling with Deadline-Constrained in Cloud Computing.
Comput., 2019

An Electronic Nose Natural Neural Learning Model in Real Work Environment.
IEEE Access, 2019

A new service broker algorithm optimizing the cost and response time for cloud computing.
Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies (ANT 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 (EDI40 2019) / Affiliated Workshops, April 29, 2019

2018
A novel task scheduling approach based on dynamic queues and hybrid meta-heuristic algorithms for cloud computing environment.
Clust. Comput., 2018

A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing.
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018

A Practical Sensors Software to Manage Fault Signals' Impact.
Proceedings of the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018) / The 8th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2018) / Affiliated Workshops, 2018

Deadline and Energy Aware Task Scheduling in Cloud Computing.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018

2017
Study and Development of a Symmetric protocol to secure communications in WSN.
CoRR, 2017

Study and Development of a New Symmetric Key Management Scheme for Wireless Sensor Networks.
CoRR, 2017

Building open virtual cloud lab for advanced education in networks and security.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

A Priority Based Task Scheduling in Cloud Computing Using a Hybrid MCDM Model.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

MultiPrime Cloud-RSA Scheme to Promote Data Confidentiality in the Cloud Environment.
Proceedings of the Innovations in Smart Cities and Applications, 2017

Internet of things security: challenges and perspectives.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A comparative between hadoop mapreduce and apache Spark on HDFS.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

A Capability Maturity Framework for IT Security Governance in Organizations.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017

Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

A new reformulation of the load balancing problem in cloud computing based on TSP and ACO.
Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, 2017

2016
LEAP Enhanced: A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN.
Int. J. Mob. Comput. Multim. Commun., 2016

Homomorphic encryption applied to secure storage and treatments of data in cloud.
Int. J. Cloud Comput., 2016

An advanced Study on Cryptography Mechanisms for Wireless Sensor Networks.
CoRR, 2016

An enhanced DTLS protocol for Internet of Things applications.
Proceedings of the 2016 International Conference on Wireless Networks and Mobile Communications, 2016

Cloud-ElGamal: An efficient homomorphic encryption scheme.
Proceedings of the 2016 International Conference on Wireless Networks and Mobile Communications, 2016

A Novel Architecture with Dynamic Queues Based on Fuzzy Logic and Particle Swarm Optimization Algorithm for Task Scheduling in Cloud Computing.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

Improvement of Leach Routing Algorithm Based on the Use of Game Theory.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSN.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

Can hybrid Homomorphic Encryption schemes be practical?
Proceedings of the 5th International Conference on Multimedia Computing and Systems, 2016

An Efficient Dynamic Priority-Queue Algorithm Based on AHP and PSO for Task Scheduling in Cloud Computing.
Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), 2016

DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

Securely Adapt a Paillier Encryption Scheme to Protect the Data Confidentiality in the Cloud Environment.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

2015
An Efficient Key Establishment Protocol for Wireless Sensor Networks.
Proceedings of the Advances in Ubiquitous Networking, 2015

Homomorphic Encryption as a Solution of Trust Issues in Cloud.
Proceedings of the International Conference on Big Data, 2015

A Global Hybrid Intrusion Detection System for Wireless Sensor Networks.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
A Novel Coverage and Connectivity Preserving Routing Protocol for Mission-Critical Wireless Sensor Networks.
J. Mobile Multimedia, 2014

OSCMAC Duty Cycle with Multi Helpers CT Mode WILEM Technology in Wireless Sensor Networks.
CoRR, 2014

A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks.
CoRR, 2014

LEACH protocol for multimedia traffic with a variable-size packet.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

Performance analysis of routing protocols for wireless sensor networks.
Proceedings of the Third IEEE International Colloquium in Information Science and Technology, 2014

Efficiency evaluation of routing protocols for Vanet.
Proceedings of the Third IEEE International Colloquium in Information Science and Technology, 2014

2012
Gateway and Cluster Head Election using Fuzzy Logic in heterogeneous wireless sensor networks.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012


  Loading...