Abderrahim Sekkaki

According to our database1, Abderrahim Sekkaki authored at least 51 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Content Based Video Retrieval by Using Distributed Real-Time System Based on Storm.
Int. J. Embed. Real Time Commun. Syst., 2019

Application-based authentication on an inter-VM traffic in a Cloud environment.
Int. J. Commun. Networks Inf. Secur., 2019

Secure and Lightweight HMAC Mutual Authentication Protocol for Communication between IoT Devices and Fog Nodes.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

2018
Anomaly classification in digital mammography based on multiple-instance learning.
IET Image Process., 2018

Semantic integration of UML class diagram with semantic validation on segments of mappings.
CoRR, 2018

A Graph Theory Based Network Selection Algorithm in Heterogeneous Wireless Networks.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Fast-Tracking Application for Traffic Signs Recognition.
Proceedings of the Computer Vision and Graphics - International Conference, 2018

Blockchain and IoT for Security and Privacy: A Platform for Diabetes Self-management.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018

Similarity Performance of Keyframes Extraction on Bounded Content of Motion Histogram.
Proceedings of the Big Data, Cloud and Applications - Third International Conference, 2018

Automatic Classification of Air Pollution and Human Health.
Proceedings of the Big Data, Cloud and Applications - Third International Conference, 2018

2017
An improved policy for network selection decision based on enhanced-topsis and utility function.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Towards an inter-Cloud architecture in healthcare system.
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017

Implementation of new broker based on the eTOM framework for dynamic supply of resources during the composition of virtual networks.
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017

Optimal vertical handover based on TOPSIS algorithm and utility function in heterogeneous wireless networks.
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017

Content based video retrieval based on bounded coordinate of motion histogram.
Proceedings of the 4th International Conference on Control, 2017

2016
An Optimized Vertical Handover Approach Based on M-ANP and TOPSIS in Heterogeneous Wireless Networks.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

Automatic Detection of Suspicious Lesions in Digital X-ray Mammograms.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

Application of APSIS on a Card Payment Solution.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

Performance analysis of minutia-based fingerprint matching algorithms.
Proceedings of the 11th International Conference on Intelligent Systems: Theories and Applications, 2016

Toward a cloud-based security intelligence with big data processing.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Toward a Big Data Architecture for Security Events Analytic.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
Survey and comparison of MADM methods for network selection access in heterogeneous networks.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Ontological approach for Data WareHouse design.
Proceedings of the International Conference on Protocol Engineering, 2015

Automatically density based breast segmentation for mammograms by using dynamic K-means algorithm and Seed Based Region Growing.
Proceedings of the 2015 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, 2015

2014
Mass segmentation in mammograms based on the minimisation of energy and active contour model.
Proceedings of the 2014 IEEE International Symposium on Medical Measurements and Applications, 2014

Method and algorithm for mass segmentation in mammograms based on the minimisation of energy and active contour model.
Proceedings of the 8th International Symposium on Medical Information and Communication Technology, 2014

New Security Approach for ZigBee Weaknesses.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

Soccer Video Summarization Using Video Content Analysis and Social Media Streams.
Proceedings of the 1st IEEE/ACM International Symposium on Big Data Computing, 2014

2013
Semantic Integration Process of Business Components through Ontology Alignment.
J. Softw., 2013

Semantic Matching of Security Policies to Support Security Experts
CoRR, 2013

Semantic integration process of business components to support information system designers
CoRR, 2013

Toward Agent Based Inter-VM Traffic Authentication in a Cloud Environment.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Secured architecture for inter-VM traffic in a Cloud environment.
Proceedings of the 2nd IEEE Latin American Conference on Cloud Computing and Communications, 2013

Lightweight real-time decoding of video on J2ME devices.
Proceedings of the 20st International Conference on Telecommunications, 2013

Medical content based image retrieval by using the Hadoop framework.
Proceedings of the 20st International Conference on Telecommunications, 2013

Toward inter-VM visibility in a Cloud environment using packet inspection.
Proceedings of the 20st International Conference on Telecommunications, 2013

Mass segmentation in mammograms by using Bidimensional Emperical Mode Decomposition BEMD.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

2012
Autonomous agent-based inspection for inter-VM traffic in a Cloud environment.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Semantic conflict resolution for integration of business components
CoRR, 2011

An Ontology-Based Method for Semantic Integration of Business Components.
Proceedings of the 11th Annual International Conference on New Technologies of Distributed Systems, 2011

2010
Towards an architecture for semantic integration of business components
CoRR, 2010

A model for semantic integration of business components
CoRR, 2010

2008
Intrusion Detection for Computational Grids.
Proceedings of the NTMS 2008, 2008

2005
Policy-based Resolution of the Diffie-Hellman Protocol Vulnerability.
Proceedings of the 4th Latin American Network Operations and Management Symposium, 2005

Policy-Based Management of the inter-Domain communications Security.
Proceedings of the 4th Latin American Network Operations and Management Symposium, 2005

2003
Extending TINA with Secure On-Line Accounting Services.
J. Netw. Syst. Manag., 2003

2001
Development of a Prototype Based on TINA Accounting and Security Management Architecture.
Proceedings of the 21st International Conference of the Chilean Computer Science Society (SCCC 2001), 2001

Development of a Prototype based on TINA Accounting Management Architecture.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

Development of Accounting Management Based Service Environment in Tina, Java and Corba Architectures.
Proceedings of the Networking, 2001

Security within TINA accounting architecture management.
Proceedings of the IEEE International Conference on Communications, 2001

Accounting management based service environment in a TINA architecture.
Proceedings of the IEEE International Conference on Communications, 2001


  Loading...