Mustapha Belaïssaoui

According to our database1, Mustapha Belaïssaoui authored at least 18 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
NoSQL-based approach in data warehousing and OLAP cube computation.
Int. J. Inf. Decis. Sci., 2023

Factors Affecting the Adoption of Information Technology in the Context of Moroccan Smes.
Proceedings of the Advances in Information and Communication, 2023

2022
Difficulties Affecting the Success of the ERP Implementation in the Context of Moroccan SMEs.
Proceedings of the Future Technologies Conference, 2022

2020
Optimized Machine Learning Techniques for IoT 6LoWPAN Cyber Attacks Detection.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

Key-value data warehouse : Models and OLAP analysis.
Proceedings of the 2nd IEEE International Conference on Electronics, 2020

New approach for implementing big datamart using NoSQL key-value stores.
Proceedings of the 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2020

2018
A Practical Agile Framework for IT Service and Asset Management ITSM/ITAM Through a Case Study.
J. Cases Inf. Technol., 2018

2017
Building open virtual cloud lab for advanced education in networks and security.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

An Agile Framework for ITS Management In Organizations: A Case Study Based on DevOps.
Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, 2017

A Capability Maturity Framework for IT Security Governance in Organizations.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017

2016
An enhanced DTLS protocol for Internet of Things applications.
Proceedings of the 2016 International Conference on Wireless Networks and Mobile Communications, 2016

DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

2015
A framework for an effective cybersecurity strategy implementation: Fundamental pillars identification.
Proceedings of the 15th International Conference on Intelligent Systems Design and Applications, 2015

Fundamental pillars for an effective cybersecurity strategy.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2008
Dynamic Backtracking for Distributed Constraint Optimization.
Proceedings of the ECAI 2008, 2008

2003
L'algorithme "Optimal Distributed Intelligent BackTracking".
Tech. Sci. Informatiques, 2003

L'optimalité de l'algorithme "Distributed Intelligent Backtracking".
Proceedings of the Journées Francophones de Programmation en Logique avec Contraintes (JFPLC 2003), 2003

2001
Les réseaux de contraintes distribuées et le backtracking.
Proceedings of the Fondements des systèmes multi-agents : modèles, spécifications formelles et vérification - JFIADSMA 01, 2001


  Loading...