Security and privacy issues in e-health cloud-based system: A comprehensive content analysis CVV Nureni Ayofe Azeez Egyptian Informatics Journal 20 (3), 97-108, 2019 | 160 | 2019 |
A taxonomic review of the use of IoT and blockchain in healthcare applications K Azbeg, O Ouchetto, SJ Andaloussi, L Fetjah Irbm 43 (5), 511-519, 2022 | 65 | 2022 |
Blockchain and IoT for security and privacy: a platform for diabetes self-management K Azbeg, O Ouchetto, SJ Andaloussi, L Fetjah, A Sekkaki 2018 4th international conference on cloud computing technologies and …, 2018 | 54 | 2018 |
An Overview of Blockchain Consensus Algorithms: Comparison, Challenges and Future Directions K Azbeg, O Ouchetto, SJ Andaloussi, L Fetjah Advances on Smart and Soft Computing, 357-369, 2020 | 28 | 2020 |
Towards a smart healthcare system: an architecture based on IoT, blockchain, and fog computing L Fetjah, K Azbeg, O Ouchetto, SJ Andaloussi International Journal of Healthcare Information Systems and Informatics …, 2021 | 20 | 2021 |
Toward a big data architecture for security events analytic L Fetjah, K Benzidane, H El Alloussi, O El Warrak, S Jai-Andaloussi, ... 2016 IEEE 3rd international conference on cyber security and cloud computing …, 2016 | 18 | 2016 |
Securing the payment card data on cloud environment: Issues & perspectives H El Alloussi, L Fetjah, A Chaichaa International Journal of Computer Science and Network Security (IJCSNS) 14 …, 2014 | 9 | 2014 |
Application-based authentication on an inter-VM traffic in a cloud environment K Benzidane, S Khoudali, L Fetjah, SJ Andaloussi, A Sekkaki International Journal of Communication Networks and Information Security 11 …, 2019 | 7 | 2019 |
Toward a cloud-based security intelligence with big data processing K Benzidane, H El Alloussi, O El Warrak, L Fetjah, SJ Andaloussi, ... NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 1089-1092, 2016 | 5 | 2016 |
L’état de l’art de la sécurité dans le Cloud Computing H El Alloussi, L Fetjah, A Sekkaki INTIS 2012, 3, 2012 | 4 | 2012 |
Toward inter-VM visibility in a Cloud environment using packet inspection K Benzidane, S Khoudali, F Leila, A Sekkaki ICT 2013, 1-5, 2013 | 3 | 2013 |
Anonymous attribute based access control in cloud computing N Meddah, A Toumanari, L Fetjah Int. J. Eng. Res. Technol 4 (04), 753-756, 2015 | 2 | 2015 |
Quality of service information base (QoSIB) Manager for Electronic Commerce Application K Nguyen, L Fetjah, B Kerhervé Poster presented at CITR Annual Conference, Ottawa, Canada, 2001 | 2 | 2001 |
Quality of Service Information Base Manager for Electronic Commerce Applications K Nguyen, L Fetjah, B Kerhervé Poster presented at the CITR Annual Conference, Aylmer, Canada, 2001 | 2 | 2001 |
An Advanced IoT-Based Architecture for Healthcare Systems: A Focus on Blockchain-based Edge Computing for Diabetes Management K Tlemçani, S Jai Andaloussi, K Azbeg, O Ouchetto, L Fetjah Proceedings of the 6th International Conference on Networking, Intelligent …, 2023 | 1 | 2023 |
Providing QoS Mapping Rule using Data mining techniques L Fetjah, A Sekkaki IJCSNS 7 (12), 201, 2007 | 1 | 2007 |
Quality Information Modeling for QDD Support L Fetjah, A Sekkaki IJCSNS 7 (9), 90, 2007 | 1 | 2007 |
Security and privacy issues in e-health cloud-based system: A comprehensive content analysis CVV Nureni Ayofe Azeez Egyptian Informatics Journal 20 (3), 97-108, 2019 | | 2019 |
Application of APSIS on a Card Payment Solution H El Alloussi, K Benzidane, O El Warrak, L Fetjah, S Jai-Andaloussi, ... Advances in Ubiquitous Networking 2: Proceedings of the UNet’16 2, 685-699, 2017 | | 2017 |
Securing Card data on the Cloud H El Alloussi, L Fetjah, A Chaichaa International Journal on Advances in Security Volume 9, Number 1 & 2, 2016, 2016 | | 2016 |