Photo

GAHI Youssef

Email : youssef.gahi@uit.ac.ma

Établissement : Ecole Nationale des Sciences Appliquées

Laboratoire :

📚 Publications Scopus — Total : 83
Titre Année 🔗 Voir
Empirical Evaluation of Big Data Stacks: Performance and Design Analysis of Hadoop, Modern, and Cloud Architectures 2026 🔗 Voir
DRADG: A Dynamic Risk-Adaptive Data Governance Framework for Modern Digital Ecosystems 2026 🔗 Voir
Data Management in Smart Manufacturing Supply Chains: A Systematic Review of Practices and Applications (2020–2025) 2026 🔗 Voir
Mobile Threat Detection Model Using Tiny ML: Malware Case Study 2026 🔗 Voir
AVI-SHIELD: An Explainable TinyML Cross-Platform Threat Detection Framework for Aviation Mobile Security 2026 🔗 Voir
Toward Resilient Cyber Defense: Integrating AI and Blockchain for Smart Risk Management 2025 🔗 Voir
Adaptive, Privacy-Enhanced Real-Time Fraud Detection in Banking Networks Through Federated Learning and VAE-QLSTM Fusion 2025 🔗 Voir
Enhancing DataOps practices through innovative collaborative models: A systematic review 2025 🔗 Voir
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework 2025 🔗 Voir
Systematic review for attack tactics, privacy, and safety models in big data systems 2025 🔗 Voir
Quantum Computing and AI Applications in Industry 5.0 Use Cases 2025 🔗 Voir
Rethinking Big Data Value Chains: A Comparative Framework Across Hadoop, Modern, and Cloud Stacks 2025 🔗 Voir
Modern Data Stack Demystified: A Strategic Framework for Scalable Adoption 2025 🔗 Voir
Quantum-Resistant Blockchain for Secure Health Data Exchange in Post-Quantum Era 2025 🔗 Voir
Unlocking Revolutionary Use Cases and Data Privacy Controls Throughout Quantum Computing and Blockchain 2025 🔗 Voir
Addressing Security Gaps in MCP: Design of a Resilient Reference Architecture 2025 🔗 Voir
Risks Assessment of AI Integration in Cybersecurity: A Synergistic Approach with FMECA and ISO 31000 2025 🔗 Voir
Harnessing Data-Driven Approaches for Robust Real-Time Fraud Prevention and Detection 2025 🔗 Voir
Leveraging Federated Learning for Detecting Fraud in Banking Systems 2025 🔗 Voir
A Conceptual Real-Time and Privacy-Preserving Architecture for Banking Fraud Detection 2025 🔗 Voir
Pioneering Quantum AI Applications for Fraud Detection in FinTechs 2025 🔗 Voir
Enhancing Mobile Threat Detection through TinyML and Auditable ML 2025 🔗 Voir
Natural Language Processing in the Nuclear Industry: Opportunities and Challenges 2025 🔗 Voir
Digital banking fortification: a real-time isolation forest architecture for detecting online transaction fraud 2024 🔗 Voir
Unified Data Framework for Enhanced Data Management, Consumption, Provisioning, Processing and Movement 2024 🔗 Voir
Active Metadata and Machine Learning based Framework for Enhancing Big Data Quality 2024 🔗 Voir
Real-Time Online Banking Fraud Detection Model by Unsupervised Learning Fusion 2024 🔗 Voir
Synergy of Machine Learning and Blockchain Strategies for Transactional Fraud Detection in FinTech Systems 2024 🔗 Voir
Securing EHRs With a Novel Token-Based and PPoS Blockchain Methodology 2024 🔗 Voir
Integrating Generative AI for Advancing Agile Software Development and Mitigating Project Management Challenges 2024 🔗 Voir
Quantum Cryptology in the Big Data Security Era 2024 🔗 Voir
Securing the Future: Harnessing Blockchain's Power Against New-Age Vulnerabilities 2024 🔗 Voir
Enhanced Banking Security: Isolation Forest with Attention Mechanism for Sophisticated Fraud Detection 2024 🔗 Voir
Enhancing Blockchain Consensus Mechanisms with Artificial Intelligence: Potential Improvements and Applications 2024 🔗 Voir
An Automated Big Data Quality Anomaly Correction Framework Using Predictive Analysis 2023 🔗 Voir
Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records 2023 🔗 Voir
A private cloud-based Datalab for scalable DSML pipelines 2023 🔗 Voir
High Availabale Hadoop Deployment Modes with Enterprise-Level capabilities 2023 🔗 Voir
Enabling open banking and analytics in the cloud through a distributed data anonymization pipeline 2023 🔗 Voir
Data Security Patterns for Critical Big Data Systems 2023 🔗 Voir
Quality Anomaly Detection Using Predictive Techniques: An Extensive Big Data Quality Framework for Reliable Data Analysis 2023 🔗 Voir
An Efficient Framework for the Implementation of Sustainable Industry 4.0 2023 🔗 Voir
Moving Towards Blockchain-Based Methods for Revitalizing Healthcare Domain 2023 🔗 Voir
Online Continual Learning Data Quality Framework for Entity Resolution 2023 🔗 Voir
Big Data Quality Anomaly Scoring Framework Using Artificial Intelligence 2023 🔗 Voir
Analysis of Banking Fraud Detection Methods through Machine Learning Strategies in the Era of Digital Transactions 2023 🔗 Voir
End-to-End Real-time Architecture for Fraud Detection in Online Digital Transactions 2023 🔗 Voir
An Advanced Big Data Quality Framework Based on Weighted Metrics 2022 🔗 Voir
Metadata Quality in the Era of Big Data and Unstructured Content 2022 🔗 Voir
Data Quality in the Era of Big Data: A Global Review 2022 🔗 Voir
Securing Big Data-Based Smart Applications Using Blockchain Technology 2022 🔗 Voir
An End-to-End Big Data Deduplication Framework based on Online Continuous Learning 2022 🔗 Voir
Preface 2022 🔗 Voir
CPC-H2: Convolution Power-based Cryptosystem and Digital Signature 2021 🔗 Voir
Machine Learning and Deep Learning Models for Big Data Issues 2021 🔗 Voir
An End to End Cloud Computing Privacy Framework Using Blind Processing 2021 🔗 Voir
A Novel Approach for Big Data Monetization as a Service 2021 🔗 Voir
Big data value chain: A unified approach for integrated data quality and security 2020 🔗 Voir
An adaptable big data value chain framework for end-to-end big data monetization 2020 🔗 Voir
Big data monetization throughout Big Data Value Chain: a comprehensive review 2020 🔗 Voir
Fully homomorphic encryption without noise 2020 🔗 Voir
Network security strategies in big data context 2020 🔗 Voir
A multi-layer big data value chain approach for security issues 2020 🔗 Voir
Correction to: A novel adaptable approach for sentiment analysis on big social data (Journal of Big Data, (2018), 5, 1, (12), 10.1186/s40537-018-0120-0) 2019 🔗 Voir
Big data quality metrics for sentiment analysis approaches 2019 🔗 Voir
Full consideration of big data characteristics in sentiment analysis context 2019 🔗 Voir
A secure multi-user database-as-a-service approach for cloud computing privacy 2019 🔗 Voir
The impact of big data quality on sentiment analysis approaches 2019 🔗 Voir
A novel adaptable approach for sentiment analysis on big social data 2018 🔗 Voir
Big Data Analytics: A Comparison of Tools and Applications 2018 🔗 Voir
Security analysis of C-BGP: A light alternative to S-BGP 2016 🔗 Voir
Blind forwarding for secure and private communications in untrusted networks 2016 🔗 Voir
Wormhole Detection in Secured BGP Networks 2016 🔗 Voir
A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks 2016 🔗 Voir
Big Data Analytics: Security and privacy challenges 2016 🔗 Voir
Blind decryption for cloud computing 2016 🔗 Voir
Performance analysis of private information retrieval scheme based on homomorphic encryption 2016 🔗 Voir
Private video streaming service using leveled somewhat homomorphic encryption 2014 🔗 Voir
Securing internet applications using homomorphic encryption schemes 2013 🔗 Voir
A fully private video on-Demand service 2012 🔗 Voir
An encrypted trust-based routing protocol 2012 🔗 Voir
Encrypted processes for oblivious data retrieval 2011 🔗 Voir
Biometric identification system based on electrocardiogram data 2008 🔗 Voir