Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights M Zineddine Computers & Security 48, 1-18, 2015 | 39 | 2015 |
Optimizing security and quality of service in a real-time operating system using multi-objective Bat algorithm M Zineddine Future generation computer systems 87, 102-114, 2018 | 19 | 2018 |
Search engines crawling process optimization: a webserver approach M Zineddine Internet Research 26 (1), 311-331, 2016 | 16 | 2016 |
Mathematical design and preliminary mechanical analysis of the new lattice structure:“GE-SEZ*” structure processed by ABS polymer and FDM technology M El Jai, N Saidou, M Zineddine, H Bachiri Progress in Additive Manufacturing 6, 93-118, 2021 | 14 | 2021 |
Attitude towards robot assisted surgery: UAE context M Zineddine, N Arafa 2013 9th International Conference on Innovations in Information Technology …, 2013 | 12 | 2013 |
Automated healthcare information privacy and security: the UAE context M Zineddine Proceedings of European, Mediterranean & Middle Eastern conference on …, 2012 | 9 | 2012 |
An evaluative technique for drought impact on variation in agricultural LULC using remote sensing and machine learning M Mustapha, M Zineddine Environmental Monitoring and Assessment 196 (6), 515, 2024 | 8 | 2024 |
The status of Emirati women in the ICT sector M Zineddine, H Kindi Proceedings of the International Conference on Technology and Business …, 2011 | 8 | 2011 |
A novel trust model for fog computing using fuzzy neural networks and weighted weakest link M Zineddine Information & Computer Security 28 (5), 763-800, 2020 | 7 | 2020 |
Towards the implementation of refurbished EV lithium-ion batteries for smart grid energy storage C Alaoui, M Zineddine, S Nourddin 2017 Intelligent Systems and Computer Vision (ISCV), 1-5, 2017 | 5 | 2017 |
Automated healthcare information privacy and security: UAE case M Zineddine 2011 International Conference for Internet Technology and Secured …, 2011 | 5 | 2011 |
Assessing the Impact of climate change on seasonal variation in agricultural land use using Sentinel-2 and machine learning M Mustapha, M Zineddine Environmental Sciences Proceedings 29 (1), 51, 2023 | 4 | 2023 |
Hybrid BTMS for Lithium-Ion Batteries C Alaoui, M Zineddine, M Boulmalf 2017 International Renewable and Sustainable Energy Conference (IRSEC), 1-7, 2017 | 4 | 2017 |
Random Forest and Sentinel-2 Based Approach for Evaluating Climate Change on Olive Trees KU Majikumna, M Zineddine, M Mustapha 2024 4th International Conference on Innovative Research in Applied Science …, 2024 | 3 | 2024 |
Commercial software companies and open source community reaction to disclosed vulnerabilities: Case of Windows Server 2008 and Linux patching M Zineddine, C Alaoui, N Saidou 2017 International Conference on Wireless Technologies, Embedded and …, 2017 | 3 | 2017 |
The dilemma of securing industrial control systems: UAE context M Zineddine 2016 International Conference on Information Technology for Organizations …, 2016 | 3 | 2016 |
Compliance of the healthcare industry with the health insurance portability and accountability act security regulations in Washington state: A quantitative study two years … M Zineddine Capella University, 2008 | 3 | 2008 |
CTAB-crafted ZnO nanostructures for environmental remediation and pathogen control J Gaur, S Kumar, M Zineddine, H Kaur, M Pal, K Bala, V Kumar, GS Lotey, ... Scientific Reports 14 (1), 20561, 2024 | 2 | 2024 |
Cyber War Retaliation Decision: A Fuzzy Multi Criteria Decision Making Approach M Zineddine International Journal of Cyber Warfare and Terrorism (IJCWT) 1 (4), 10-31, 2011 | 2 | 2011 |
Is Your Automated Healthcare Information Secure? M Zineddine E-Healthcare Systems and Wireless Communications: Current and Future …, 2012 | 1 | 2012 |