Mohammed Erradi

Affiliations:
  • Mohammed V University in Rabat, Morocco


According to our database1, Mohammed Erradi authored at least 79 papers between 1986 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Heterogeneous text graph for comprehensive multilingual sentiment analysis: capturing short- and long-distance semantics.
PeerJ Comput. Sci., 2024

Non-Local Context-Aware Attention for Object Detection in Remote Sensing Images.
Proceedings of the 19th International Joint Conference on Computer Vision, 2024

2023
Trans-IDS: A Transformer-Based Intrusion Detection System.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Encrypted Search: Not Enough to Ensure Privacy.
Proceedings of the Networked Systems - 11th International Conference, 2023

A Peer to Peer Federated Graph Neural Network for Threat Intelligence.
Proceedings of the Networked Systems - 11th International Conference, 2023

SlideGCN: Slightly Deep Graph Convolutional Network for Multilingual Sentiment Analysis.
Proceedings of the Advances in Computational Intelligence, 2023

2022
Checking causal consistency of distributed databases.
Computing, 2022

2021
Cloud Key Management using Trusted Execution Environment.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
Design and Development of an e-Learning Project Management System: Modelling and Prototyping.
Int. J. Emerg. Technol. Learn., 2020

A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

Boosting Sequential Consistency Checking Using Saturation.
Proceedings of the Automated Technology for Verification and Analysis, 2020

2019
Harnessing Cloud Computing Services for E-Learning Systems in Higher Education: Impact and Effects.
Int. J. Inf. Commun. Technol. Educ., 2019

Special issue on NETYS'17 selected papers.
Computing, 2019

Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis.
Proceedings of the Networked Systems - 7th International Conference, 2019

Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

Gradual Consistency Checking.
Proceedings of the Computer Aided Verification - 31st International Conference, 2019

Design of an e-Learning project management system.
Proceedings of the BDIoT'19: The 4th International Conference On Big Data and Internet of Things, 2019

2018
Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies.
EAI Endorsed Trans. Security Safety, 2018

A formal basis for the design and analysis of firewall security policies.
J. King Saud Univ. Comput. Inf. Sci., 2018

Using an Intelligent Tutoring System to Support Learners' WMC in e-learning: Application in Mathematics Learning.
Int. J. Emerg. Technol. Learn., 2018

Using cloud computing services in e-learning process: Benefits and challenges.
Educ. Inf. Technol., 2018

Towards a Smart Learning Management System (smart-LMS) to Improve Collaborative Learning in Higher Education.
Proceedings of the 3rd International Conference on Smart City Applications, 2018

Automata-Based Bottom-Up Design of Conflict-Free Security Policies Specified as Policy Expressions.
Proceedings of the Networked Systems - 6th International Conference, 2018

Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Enhancing collaborative learning in Web 2.0-based e-learning systems: A design framework for building collaborative e-learning contents.
Educ. Inf. Technol., 2017

Model driven flexible design of a wireless body sensor network for health monitoring.
Comput. Networks, 2017

Dynamic coalitional matching game approach for fair and swift data-gathering in wireless body sensor networks.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

Current trends in text_spotting.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

Clustering-based Approach for Anomaly Detection in XACML Policies.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

ABAC Rule Reduction via Similarity Computation.
Proceedings of the Networked Systems - 5th International Conference, 2017

Aspect-Oriented State Machines for Resolving Conflicts in XACML Policies.
Proceedings of the Networked Systems - 5th International Conference, 2017

Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017

Coalition game for video content clustering in content delivery networks.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

ABAC Based Online Collaborations in the Cloud.
Proceedings of the Emerging Technologies for Developing Countries, 2017

2016
Analysis and Verification of XACML Policies in a Medical Cloud Environment.
Scalable Comput. Pract. Exp., 2016

Using cloud computing and a multi-agents system to improve collaborative e-learning in LMS.
Proceedings of the 11th International Conference on Intelligent Systems: Theories and Applications, 2016

An Approach to Resolve NP-Hard Problems of Firewalls.
Proceedings of the Networked Systems - 4th International Conference, 2016

Nearest Neighbors Graph Construction: Peer Sampling to the Rescue.
Proceedings of the Networked Systems - 4th International Conference, 2016

Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

Towards a collaborative e-learning platform based on a multi-agents system.
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

2015
A ferry-assisted solution for forwarding function in Wireless Sensor Networks.
Pervasive Mob. Comput., 2015

A distributed protocol for privacy preserving aggregation with non-permanent participants.
Computing, 2015

How to secure a collaborative session in a single tenant environment.
Proceedings of the International Conference on Protocol Engineering, 2015

Distributed Privacy-Preserving Data Aggregation via Anonymization.
Proceedings of the Networked Systems - Third International Conference, 2015

A game theory-based approach for robots deploying wireless sensor nodes.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Towards a Decentralized OSN for a Privacy-preserving e-health System.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015

curlX: A middleware to enforce access control policies within a cloud environment.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Access control in a collaborative session in multi tenant environment.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

Access control policies enforcement in a cloud environment: Openstack.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
Automata-based approach to design and analyze security policies.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A Formal Modeling Approach for Emergency Crisis Response in Health during Catastrophic Situation.
Proceedings of the Information Systems for Crisis Response and Management in Mediterranean Countries, 2014

A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

2013
An Evaluation Model of Digital Educational Resources.
Int. J. Emerg. Technol. Learn., 2013

A Discovery Service for Automatic Composition of Web Services Oriented-Agent.
Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013

A Flexible Wireless Body Sensor Network System for Health Monitoring.
Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013

A Distributed Polling with Probabilistic Privacy.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

A Distributed Protocol for Privacy Preserving Aggregation.
Proceedings of the Networked Systems - First International Conference, 2013

Design of an annular ring Ferry-assisted topology for Wireless Sensor Networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

2012
A transformation approach for collaboration based requirement models
CoRR, 2012

Using aspect-oriented state machines for detecting and resolving feature interactions.
Comput. Sci. Inf. Syst., 2012

A dynamic proxy for lightweight web service composition.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

Towards a session based OrBAC model.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

Performance analysis of WiFi/WiMax vertical handover based on media independent handover.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2011
Personalized Web Services for Web Information Extraction
CoRR, 2011

Distributed Context Management in Collaborative Environment.
Proceedings of the 11th Annual International Conference on New Technologies of Distributed Systems, 2011

HaVe-2W3G: A vertical handoff solution between WLAN, WiMAX and 3G networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Using Aspect-Oriented State Machines for Resolving Feature Interactions.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

2010
Decision tree based context management in a collaborative environment.
Proceedings of the NOTERE 2010, Annual International Conference on New Technologies of Distributed Systems, Touzeur, Tunisia, May 31, 2010

2008
Description of a teleconferencing floor control protocol and its implementation.
Eng. Appl. Artif. Intell., 2008

A meta-level architecture for QoS awareness in a mobile environment.
Proceedings of the 8th international conference on New technologies in distributed systems, 2008

2005
An Adaptable Middleware for Personalizing Web Applications.
Proceedings of the WEBIST 2005, 2005

1999
A Layered Cooperative Architecture and its Application in TeleTeaching Framework.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1997
An Experiment for the Processing of Feature Interactions within an Object-Oriented Environment.
Proceedings of the Feature Interactions in Telecommunications Networks IV, 1997

1995
Dynamic Evolution of Distributed Systems Specifications Using Reflective Language.
Int. J. Softw. Eng. Knowl. Eng., 1995

Adapt Dynamic Evolution in a Reflective Object-Oriented Computer Language.
IEICE Trans. Inf. Syst., 1995

1992
A framework for dynamic evolution of object-oriented specifications.
Proceedings of the Conference on Software Maintenance, 1992

1988
Visual interaction using an iconic system.
Vis. Comput., 1988

1986
Principles of an Icons-Based Command Language.
Proceedings of the 1986 ACM SIGMOD International Conference on Management of Data, 1986


  Loading...