关注
Mariya Ouaissa
Mariya Ouaissa
Asssitant Professor in Networks and Cybersecurity, FSSM, Cadi Ayyad University Marrakech, Morocco
在 uca.ac.ma 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An integrated artificial intelligence of things environment for river flood prevention
Z Boulouard, M Ouaissa, M Ouaissa, F Siddiqui, M Almutiq, M Krichen
Sensors 22 (23), 9485, 2022
312022
An Enhanced Authentication Protocol based Group for Vehicular Communications over 5G Networks
M Ouaissa, M Houmer, M Ouaissa
302020
A fog-cluster based load-balancing technique
P Singh, R Kaur, J Rashid, S Juneja, G Dhiman, J Kim, M Ouaissa
Sustainability 14 (13), 7961, 2022
272022
An Efficient and Secure Authentication and Key Agreement Protocol of LTE Mobile Network for an IoT System
M Ouaissa, M Ouaissa, A Rhattoy
162019
An improved privacy authentication protocol for 5G mobile networks
M Ouaissa, M Ouaissa
2020 International Conference on Advances in Computing, Communication …, 2020
152020
Advances in greener energy technologies
AK Bhoi, KS Sherpa, A Kalam, GS Chae
Springer, 2020
152020
Opportunistic networks: fundamentals, applications and emerging trends
A Verma, P Verma, SK Dhurandher, I Woungang
CRC Press, 2021
132021
Detecting hateful and offensive speech in arabic social media using transfer learning
Z Boulouard, M Ouaissa, M Ouaissa, M Krichen, M Almutiq, K Gasmi
Applied Sciences 12 (24), 12823, 2022
122022
New security level of authentication and key agreement protocol for the IoT on LTE mobile networks
M Ouaissa, A Rhattoy, I Chana
2018 6th International Conference on Wireless Networks and Mobile …, 2018
122018
A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks
M Ouaissa, A Rhattoy
International Journal of Electrical and Computer Engineering (IJECE) 8 (2 …, 2018
122018
A secure vehicle to everything (v2x) communication model for intelligent transportation system
M Ouaissa, M Ouaissa, M Houmer, S El Hamdani, Z Boulouard
Computational Intelligence in Recent Communication Networks, 83-102, 2022
112022
Secure authentication scheme for 5g-based v2x communications
M Houmer, M Ouaissa, M Ouaissa
Procedia Computer Science 198, 276-281, 2022
102022
A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture
M Ouaissa, A Rhattoy
International Journal of Intelligent Engineering and Systems 12 (1), 151-164, 2019
102019
Data Analytics and Management: Proceedings of ICDAM
A Khanna, D Gupta, Z Pólkowski, S Bhattacharyya, O Castillo
Springer, 2021
92021
Machine learning for hate speech detection in arabic social media
Z Boulouard, M Ouaissa, M Ouaissa
Computational Intelligence in Recent Communication Networks, 147-162, 2022
82022
Analysis of Authentication and Key Agreement (AKA) Protocols in Long-Term Evolution (LTE) Access Network
M Ouaissa, A Rhattoy, M Lahmer
Advances in Electronics, Communication and Computing, 1-9, 2018
82018
AI and IoT for sustainable development in emerging countries
Z Boulouard, M Ouaissa, M Ouaissa, S El Himer
Springer International Publishing, 2022
72022
SE-GPSR: Secured and enhanced greedy perimeter stateless routing protocol for vehicular ad hoc networks
M Houmer, M Ouaissa, M Ouaissa, M Hasnaoui
International Association of Online Engineering, 2020
72020
Group access authentication of machine to machine communications in LTE networks
M Ouaissa, A Rhattoy, M Lahmer
Proceedings of the Second International Conference on Internet of things and …, 2017
72017
Cyber Security for Next-Generation Computing Technologies
IU Khan, M Ouaissa, M Ouaissa, Z Abou El Houda, MF Ijaz
CRC Press, 2024
62024
系统目前无法执行此操作,请稍后再试。
文章 1–20