


default search action
ACOSIS 2016: Marrakesh, Morocco
- International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016, Marrakesh, Morocco, October 17-19, 2016. IEEE 2016, ISBN 978-1-5090-6227-0

- Mouna Garai

, Noureddine Boudriga:
A secure QoS aware VANET. 1-6 - Mehdi Ezzarii, Hamid Elghazi

, Hassan El Ghazi, Tayeb Sadiki:
Epigenetic algorithm for performing intrusion detection system. 1-6 - Mounia Bouabdellah

, Faissal El Bouanani
, Hussain Ben-Azza
:
A secure cooperative transmission model in VANET using attribute based encryption. 1-6 - Souad Labghough

, Fouad Ayoub
, Mostafa Belkasmi
:
Majority logic coding schemes performance over FSO channels. 1-6 - Ahlam Berkani, Mostafa Belkasmi

:
A reduced complexity decoder using compact genetic algorithm for linear block codes. 1-6 - Ahmed Maarof, Mohamed Senhadji, Zouheir Labbi, Mostafa Belkasmi

:
Authentication protocol conforming to EPC class-1 Gen-2 standard. 1-6 - Elmehdi Illi, Faissal El Bouanani

, Fouad Ayoub
:
Performance analysis of dual-hop underwater communication system subject to k-μ shadowed fading channel. 1-6 - Karim Rkizat, Mohammed Lahmer, Mostafa Belkasmi

, Saïd Nouh
:
Construction and iterative threshold decoding for low rates Quasi-Cyclic One Step Majority logic decodable codes. 1-7 - Hanaa Marshoud

, Paschalis C. Sofotasios
, Sami Muhaidat
, George K. Karagiannidis
:
Multi-user techniques in visible light communications: A survey. 1-6 - Zakaria M'rabet, Fouad Ayoub, Mostafa Belkasmi, Anouar Yatribi, Zine El Abidine Alaoui Ismaili

:
Non-binary Euclidean Geometry codes: Majority Logic Decoding. 1-7 - Anouar Yatribi, Mostafa Belkasmi

, Fouad Ayoub
, Zakaria M'rabet:
Non-binary cyclic majority-logic decodable codes: An algebraic construction by using Genetic Algorithms. 1-9 - Abdelmajid Bessate

, Faissal El Bouanani
:
A new performance results of MIMO system with orthogonal STBC over independent and identical weibull fading channels. 1-7 - Mohammed Hussein

, Israa Elayyan, Wasel Ghanem
:
Topology-aware approach for reducing power consumption in LEO satellite constellations. 1-5 - Sarah Kamel, Mireille Sarkiss

, Ghaya Rekaya-Ben Othman:
Improving GGH cryptosystem using generalized low density lattices. 1-6 - Sanaa Oulaourf, Abdelfatteh Haidine, Hassan Ouahmane:

Review on using game theory in resource allocation for LTE/LTE-Advanced. 1-7 - Abdelilah Kadi, Mostafa Mrabti, Said Najah, Emmanuel Boutillon:

Novel method for improving performances of normalized MS decoder using WIMAX code. 1-5 - Abdelfatteh Haidine, Sanae El Hassani

, Abdelhak Aqqal:
Designing optimal wireless-based ICT platform for smart grid - CDMA450 proof-of-concept. 1-7 - M. Bennani Mohamed Taj, M. Ait Kbir:

ICH-LEACH: An enhanced LEACH protocol for wireless sensor network. 1-5 - Brahim I. D. Messaoud, Karim Guennoun, Mohamed Wahbi, Mohamed Sadik

:
Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges. 1-6 - Bassma Guermah

, Hassan El Ghazi, Tayeb Sadiki, Yann Ben Maissa
, Esmail Ahouzi:
A comparative performance analysis of position estimation algorithms for GNSS localization in urban areas. 1-7 - Mounia Zaydi

, Bouchaib Nassereddine:
Information system security governance: Technology intelligence perspective. 1-6 - Amal Hadri, Khalid Chougdali

, Rajae Touahni:
Intrusion detection system using PCA and Fuzzy PCA techniques. 1-7 - Kawtar Zerhouni, Raja Elassali, Khalid Elbaamrani

, Noureddine Idboufker, Fouzia Elbahhar Boukour:
Threshold of the symmetry property of cyclic autocorrelation function detector. 1-6 - Mohamed Labbi

, Nabil BenSalah, Nabil Kannouf
, Youssef Douzi, Mohammed Benabdellah
, Abdelmalek Azizi
:
A game theoretic approach to multipath traffic control in Content-Centric Networking. 1-7 - Reda Benkhouya

, Idriss Chana
, Youssef Hadi
:
Correction of sensing imperfections using channel coding in cognitive radio networks while keeping sensing time low. 1-5 - Toufik Chaayra

, Faissal El Bouanani
, Hussain Ben-Azza
:
Performance analysis of TAS/MRC based MIMO systems over Weibull fading channels. 1-6 - Abdellah Houmz

, Mohamed Salim Mezzene, Asmaa Tellabt, Ghita Mezzour, Mohammed El Koutbi:
Field study of cybercafe usage & security in Morocco. 1-7 - Hamza Boualame

, Noria Tahiri, Idriss Chana
, Ahmed Azouaoui
, Mostafa Belkasmi
:
An efficient soft decision decoding algorithm using cyclic permutations and compact genetic algorithm. 1-6 - Khalid Sabri, Abdelouahad Choklati:

Sparse deconvolution of periodic random impulses based on convex relaxation. 1-8 - Issam Abderrahman Joundan, Saïd Nouh

, Abdelwahed Namir
:
Design of good linear codes for a decoder based on majority voting procedure. 1-6 - Imen Arfaoui, Noureddine Boudriga, Khalifa Trimeche:

Design and analysis of protecting strategies against border crossing under irregular conditions. 1-6 - Wassim Fassi Fihri

, Fatima Salahdine, Hassan El Ghazi, Naima Kaabouch:
A survey on decentralized random access MAC protocols for cognitive radio networks. 1-7 - Mariyam Ouaissa

, Mariam Benmoussa, Abdallah Rhattoy, Mohammed Lahmer, Idriss Chana
:
Performance analysis of random access mechanisms for machine type communications in LTE networks. 1-6 - Abderrazak Farchane, Mostafa Belkasmi

:
New decoder for linear block codes. 1-5 - Kamran Ali, Huan Xuan Nguyen

, Purav Shah
, Quoc-Tuan Vien
:
Energy efficient and scalable D2D architecture design for public safety network. 1-6 - Ali Azougaghe

, Omar Ait Oualhaj, Mustapha Hedabou, Mostafa Belkasmi
, Abdellatif Kobbane
:
Many-to-one matching game towards secure virtual machines migration in cloud computing. 1-7 - Abdelfatteh Haidine, Sanae El Hassani

:
LTE-a pro (4.5G) as pre-phase for 5G deployment: Closing the gap between technical requirements and network performance. 1-7 - Zouheir Labbi, Mohamed Senhadji, Ahmed Maarof, Mostafa Belkasmi

:
A novel efficient ultralightweight authentication algorithm for RFID systems. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














