Photo

ABDELLAOUI Abderrahim

Email : abderrahim.abdellaoui@uit.ac.ma

Établissement : Ecole Nationale des Sciences Appliquées

Laboratoire :

📚 Publications Scopus — Total : 24
Titre Année 🔗 Voir
Securing and Ensuring the Confidentiality of Medical Data in the Era of Decentralized Technologies: A Blockchain and Self-Sovereign Identity-Based Approach 2025 🔗 Voir
Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon 2025 🔗 Voir
AI and IoT in smart healthcare: Transforming patient care and enhancing security 2025 🔗 Voir
Adversarial Retraining and White-Box Attacks for Robust Malware Detection 2025 🔗 Voir
Cyberattacks in healthcare: Analyzing recent trends and preventive measures 2024 🔗 Voir
Towards Secure Agent Migration in Mobile Cloud Computing Using JADE Framework 2024 🔗 Voir
Blockchain technology in healthcare: Improving security, privacy, and secure transactions in patient-centered systems 2024 🔗 Voir
Design of a new DNA Encryption Algorithm based on Simon Algorithm 2024 🔗 Voir
A Hybrid Lightweight Encryption Using SPECK and SIMON for E-Health Using IoT 2024 🔗 Voir
Cybersecurity Challenges in the Global Aviation Network 2024 🔗 Voir
PwnShield: An Automated Approach to Detect and Exploit Buffer Overflows and Bypassing Modern Mitigation Techniques 2024 🔗 Voir
Enhancing Intensive Care Patient Prognostics with Machine Learning 2023 🔗 Voir
MQTT-PRESENT: Approach to secure internet of things applications using MQTT protocol 2021 🔗 Voir
Network Traffic Analysis using Big Data and Deep Learning Techniques 2020 🔗 Voir
LSTM deep learning method for network intrusion detection system 2020 🔗 Voir
AES-Present: A new secure IoT-based scheme for Telemedicine and E-Health systems 2018 🔗 Voir
XxTEA-VCLOUD:A security scheme for the vehicular cloud network using a lightweight encryption algorithm 2018 🔗 Voir
Copyright protection in the external private cloud using a multi-agent system and Chebyshev polynomials 2018 🔗 Voir
Security against malicious node in the vehicular cloud computing using a software-defined networking architecture 2017 🔗 Voir
A security scheme for mobile cloud using multi-agents system 2016 🔗 Voir
A Robust Authentication Scheme for Telecare Medicine Information System 2016 🔗 Voir
A Novel Strong Password Generator for Improving Cloud Authentication 2016 🔗 Voir
An efficient framework for enhancing user authentication in cloud storage using digital watermark 2015 🔗 Voir
Out-of-band authentication using image-based one time password in the cloud environment 2015 🔗 Voir