Yassine Maleh

Orcid: 0000-0003-4704-5364

Affiliations:
  • Hassan 1st University, Settat, Morocco


According to our database1, Yassine Maleh authored at least 35 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
MSDN-IoT multicast group communication in IoT based on software defined networking.
J. Reliab. Intell. Environ., March, 2024

2023
A comprehensive survey on SDN security: threats, mitigations, and future directions.
J. Reliab. Intell. Environ., June, 2023

Fan Fault Diagnosis Using Acoustic Emission and Deep Learning Methods.
Informatics, March, 2023

Energy efficient offloading scheme for MEC-based augmented reality system.
Clust. Comput., February, 2023

Corrigendum to "Towards to intelligent routing for DTN protocols using machine learning techniques" [Simulation Modelling Practice and Theory 117 (2022) 102475].
Comput. Secur., 2023

A Novel Secure and Privacy-Preserving Model for OpenID Connect Based on Blockchain.
IEEE Access, 2023

Attack and anomaly detection in IoT Networks using machine learning approaches.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

A Comparative Study of Online Cybersecurity Training Platforms.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2023

2022
Cybersecurity in Morocco
Springer Briefs in Cybersecurity, Springer, ISBN: 978-3-031-18477-2, 2022

Guest Editorial: Advanced Computing and Blockchain Applications for Critical Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Flexible architecture for deployment of edge computing applications.
Simul. Model. Pract. Theory, 2022

Towards to intelligent routing for DTN protocols using machine learning techniques.
Simul. Model. Pract. Theory, 2022

Editorial.
J. ICT Stand., 2022

A systematic review and taxonomy of web applications threats.
Inf. Secur. J. A Glob. Perspect., 2022

Performance analysis of 6LoWPAN protocol for a flood monitoring system.
EURASIP J. Wirel. Commun. Netw., 2022

Blockchain-Based Traceability for Shipping Containers in Unimodal and Multimodal Logistics.
IEEE Access, 2022

2021
Study and Analysis of Multiconnectivity for Ultrareliable and Low-Latency Features in Networks and V2X Communications.
Wirel. Commun. Mob. Comput., 2021

Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity: Deadline for Manuscript Submission: September 15, 2021.
Big Data, 2021

Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity.
Big Data, 2021

Lean 4.0 tools and technologies to improve companies' maturity level: the COVID-19 context.
Proceedings of the CENTERIS 2021 - International Conference on ENTERprise Information Systems / ProjMAN 2021 - International Conference on Project MANagement / HCist 2021, 2021

2020
Optimized Machine Learning Techniques for IoT 6LoWPAN Cyber Attacks Detection.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

2018
A Practical Agile Framework for IT Service and Asset Management ITSM/ITAM Through a Case Study.
J. Cases Inf. Technol., 2018

2017
Study and Development of a Symmetric protocol to secure communications in WSN.
CoRR, 2017

Study and Development of a New Symmetric Key Management Scheme for Wireless Sensor Networks.
CoRR, 2017

Building open virtual cloud lab for advanced education in networks and security.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

An Agile Framework for ITS Management In Organizations: A Case Study Based on DevOps.
Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, 2017

A Capability Maturity Framework for IT Security Governance in Organizations.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017

2016
LEAP Enhanced: A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN.
Int. J. Mob. Comput. Multim. Commun., 2016

An advanced Study on Cryptography Mechanisms for Wireless Sensor Networks.
CoRR, 2016

An enhanced DTLS protocol for Internet of Things applications.
Proceedings of the 2016 International Conference on Wireless Networks and Mobile Communications, 2016

DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

2015
An Efficient Key Establishment Protocol for Wireless Sensor Networks.
Proceedings of the Advances in Ubiquitous Networking, 2015

A Global Hybrid Intrusion Detection System for Wireless Sensor Networks.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks.
CoRR, 2014

Performance analysis of routing protocols for wireless sensor networks.
Proceedings of the Third IEEE International Colloquium in Information Science and Technology, 2014


  Loading...