ABDELLAOUI Abderrahim
Email : abderrahim.abdellaoui@uit.ac.ma
Établissement : Ecole Nationale des Sciences Appliquées
Laboratoire :
📚 Publications Scopus — Total : 24
| Titre | Année | 🔗 Voir |
|---|---|---|
| Securing and Ensuring the Confidentiality of Medical Data in the Era of Decentralized Technologies: A Blockchain and Self-Sovereign Identity-Based Approach | 2025 | 🔗 Voir |
| Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon | 2025 | 🔗 Voir |
| AI and IoT in smart healthcare: Transforming patient care and enhancing security | 2025 | 🔗 Voir |
| Adversarial Retraining and White-Box Attacks for Robust Malware Detection | 2025 | 🔗 Voir |
| Cyberattacks in healthcare: Analyzing recent trends and preventive measures | 2024 | 🔗 Voir |
| Towards Secure Agent Migration in Mobile Cloud Computing Using JADE Framework | 2024 | 🔗 Voir |
| Blockchain technology in healthcare: Improving security, privacy, and secure transactions in patient-centered systems | 2024 | 🔗 Voir |
| Design of a new DNA Encryption Algorithm based on Simon Algorithm | 2024 | 🔗 Voir |
| A Hybrid Lightweight Encryption Using SPECK and SIMON for E-Health Using IoT | 2024 | 🔗 Voir |
| Cybersecurity Challenges in the Global Aviation Network | 2024 | 🔗 Voir |
| PwnShield: An Automated Approach to Detect and Exploit Buffer Overflows and Bypassing Modern Mitigation Techniques | 2024 | 🔗 Voir |
| Enhancing Intensive Care Patient Prognostics with Machine Learning | 2023 | 🔗 Voir |
| MQTT-PRESENT: Approach to secure internet of things applications using MQTT protocol | 2021 | 🔗 Voir |
| Network Traffic Analysis using Big Data and Deep Learning Techniques | 2020 | 🔗 Voir |
| LSTM deep learning method for network intrusion detection system | 2020 | 🔗 Voir |
| AES-Present: A new secure IoT-based scheme for Telemedicine and E-Health systems | 2018 | 🔗 Voir |
| XxTEA-VCLOUD:A security scheme for the vehicular cloud network using a lightweight encryption algorithm | 2018 | 🔗 Voir |
| Copyright protection in the external private cloud using a multi-agent system and Chebyshev polynomials | 2018 | 🔗 Voir |
| Security against malicious node in the vehicular cloud computing using a software-defined networking architecture | 2017 | 🔗 Voir |
| A security scheme for mobile cloud using multi-agents system | 2016 | 🔗 Voir |
| A Robust Authentication Scheme for Telecare Medicine Information System | 2016 | 🔗 Voir |
| A Novel Strong Password Generator for Improving Cloud Authentication | 2016 | 🔗 Voir |
| An efficient framework for enhancing user authentication in cloud storage using digital watermark | 2015 | 🔗 Voir |
| Out-of-band authentication using image-based one time password in the cloud environment | 2015 | 🔗 Voir |
