Mohammed Ouzzif

According to our database1, Mohammed Ouzzif authored at least 55 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Resource-Aware Least Busy (RALB) Strategy for Load Balancing in Containerized Cloud Systems.
Int. J. Cloud Appl. Comput., 2023

Vulnerability Detection Approaches on Application Behaviors in Mobile Environment.
CoRR, 2023

An RFID-Based Traceability Approach to Improve the Overall Health Status Management in Morocco.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

Visually-Rich Document Understanding: Concepts, Taxonomy and Challenges.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

Predictive Maintenance-as-a-Service (PdMaaS) in Industry 4.0 using Blockchain.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

Traffic Control, Congestion Management and Smart Parking through VANET, ML, and IoT: A Review.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

A Comprehensive Survey On Efficient Transformers.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Androscanreg 2.0: Enhancement of Android Applications Analysis in a Flexible Blockchain Environment.
Int. J. Softw. Innov., 2022

Effect of black hole attack in different mobility models of MANET using OLSR protocol.
Int. J. Inf. Comput. Secur., 2022

Smart contract for cloud SLA using Service Oriented Architecture and Blockchain.
Proceedings of the 9th International Conference on Wireless Networks and Mobile Communications, 2022

Review on Machine Learning Based Intrusion Detection for MANET Security.
Proceedings of the 9th International Conference on Wireless Networks and Mobile Communications, 2022

Analysis of Load Balancing Algorithms Used in the Cloud Computing Environment: Advantages and Limitations.
Proceedings of the Future Technologies Conference, 2022

2021
New MPR Computation for Securing OLSR Routing Protocol Against Single Black Hole Attack.
Wirel. Pers. Commun., 2021

The Effects of Physical and Mac Parameters on the Routing by Cross-Layers Interaction Approach.
Int. J. Web Based Learn. Teach. Technol., 2021

Deep Learning Forwarding in NDN With a Case Study of Ethernet LAN.
Int. J. Web Based Learn. Teach. Technol., 2021

The quality factor for detecting node isolation attack in mobile ad hoc networks using OLSR protocol.
Int. J. Internet Protoc. Technol., 2021

Study of the use of gamification elements in e-learning applications.
Proceedings of the NISS2021: The 4th International Conference on Networking, Information Systems & Security, KENITRA, Morocco, April 1, 2021

2020
A new approach for increasing K-nearest neighbors performance.
Proceedings of the 8th International Conference on Wireless Networks and Mobile Communications, 2020

Normality Test to Detect the Congestion in MANET by Using OLSR Protocol.
Proceedings of the NISS 2020: The 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, March 31, 2020

2019
Routing and Clustering of Sensor Nodes in the Honeycomb Architecture.
J. Comput. Networks Commun., 2019

Optimal Routing and Clustering Technique for Wireless Sensor Networks.
J. Commun., 2019

Mobile nodes for improving security and lifetime efficiency in wireless sensor networks.
Int. J. Pervasive Comput. Commun., 2019

Improving Software Development Process using Data Traceability Management.
Int. J. Recent Contributions Eng. Sci. IT, 2019

Initial Centroid Selection Method for an Enhanced K-means Clustering Algorithm.
Proceedings of the Ubiquitous Networking - 5th International Symposium, 2019

Recommending Moodle Resources Using Chatbots.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019

A review on improving recommendations using traceability.
Proceedings of the 4th International Conference on Smart City Applications, 2019

Health monitoring system in a smart home.
Proceedings of the 4th International Conference on Smart City Applications, 2019

Effect of Single and Cooperative Black Hole Attack in MANET using OLSR protocol.
Proceedings of the 2nd International Conference on Networking, 2019

Deep Learning in Building Management Systems over NDN: Use Case of Forwarding and HVAC Control.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

2018
Determination of Itinerary Planning for Multiple Agents in Wireless Sensor Networks.
Int. J. Commun. Networks Inf. Secur., 2018

A Novel Security Framework for Managing Android Permissions Using Blockchain Technology.
Int. J. Cloud Appl. Comput., 2018

Evaluation of MANET Routing Protocols under Black Hole Attack Using AODV and OLSR in NS3.
Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications, 2018

Data security of smart cities.
Proceedings of the 3rd International Conference on Smart City Applications, 2018

From Big Data to Better Behavior in Self-Driving Cars.
Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing, 2018

2017
From Big data platforms to smarter solution, with intelligent learning: [PAV] 4 - Pave the way for Intelligence.
Proceedings of the 2017 International Conference on Cloud and Big Data Computing, ICCBDC 2017, London, United Kingdom, September 17, 2017

2016
Dynamic Clustering Algorithm for Tracking Targets with High and Variable Celerity (ATHVC).
J. Comput. Networks Commun., 2016

Packet Delay Analysis in Wireless Sensor Networks Using Fountain Code Enabled-DCF.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

Dynamic Clustering Algorithm for Tracking Target with High and Variable Celerity.
Proceedings of the 24th IEEE International Symposium on Modeling, 2016

An overview of traceability: Definitions and techniques.
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

Proposition of improvement areas in most heavy an light stemmer algorithms novel stemmer: EST.Stemmer.
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

2015
Analytical models for jitter and QoS requirements with IPP and MMPP-2 traffics.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2015

Statistical Learning Based Framework for Random Networks Knowledge Extraction Applied in Smart Cities.
Proceedings of the Advances in Ubiquitous Networking, 2015

A Survey on Flat Routing Protocols in Wireless Sensor Networks.
Proceedings of the Advances in Ubiquitous Networking, 2015

Security approaches based on elliptic curve cryptography in wireless sensor networks.
Proceedings of the 27th International Conference on Microelectronics, 2015

Fountain-code-enabled DCF for optimazing throughput in wireless sensors.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Building a structured collaboration system from XML specification.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Considering dependability requirements in the context of Decision Support Systems.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
A Formal Modeling Approach for Emergency Crisis Response in Health during Catastrophic Situation.
Proceedings of the Information Systems for Crisis Response and Management in Mediterranean Countries, 2014

Energy consumption balancing in wireless sensors networks.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

Aspect-Oriented Method for dependable data warehouse systems based on MDA approach.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

2013
Toward a New Approach for Modeling Dependability of Data Warehouse System.
CoRR, 2013

2012
Secure and reliable routing in mobile adhoc networks
CoRR, 2012

A dynamic proxy for lightweight web service composition.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2008
Description of a teleconferencing floor control protocol and its implementation.
Eng. Appl. Artif. Intell., 2008


  Loading...