Load balancing cloud computing: state of art A Khiyaita, H El Bakkali, M Zbakh, D El Kettani 2012 National Days of Network Security and Systems, 106-109, 2012 | 188 | 2012 |
Analysis of identity management systems using blockchain technology S El Haddouti, MDEC El Kettani 2019 International Conference on Advanced Communication Technologies and …, 2019 | 103 | 2019 |
MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context A Sebbar, K Zkik, Y Baddi, M Boulmalf, MDECE Kettani Journal of Ambient Intelligence and Humanized Computing 11 (12), 5875-5894, 2020 | 48 | 2020 |
A verifiable fully homomorphic encryption scheme for cloud computing security A El-Yahyaoui, MD ECH-CHERIF EL KETTANI Technologies 7 (1), 21, 2019 | 26 | 2019 |
Detection MITM attack in multi-SDN controller A Sebbar, M Boulmalf, MDEC El Kettani, Y Baddi 2018 IEEE 5th International Congress on Information Science and Technology …, 2018 | 23 | 2018 |
MIdM: an open architecture for mobile identity management MDEC El Kettani, B En-Nasry JoC 2 (2), 25-32, 2011 | 23 | 2011 |
Fully homomorphic encryption: state of art and comparison ELY Ahmed, MD Elkettani International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 21 | 2016 |
A verifiable fully homomorphic encryption scheme to secure big data in cloud computing AEYMDECE Kettani International Conference on Wireless Networks and Mobile Communications …, 2017 | 19* | 2017 |
VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM Y Baddi, MDEC El Kettani 2012 International Conference on Multimedia Computing and Systems, 595-600, 2012 | 19 | 2012 |
Towards an interoperable identity management framework: a comparative study SE Haddouti, MDECE Kettani arXiv preprint arXiv:1902.11184, 2019 | 17 | 2019 |
An Efficient Fully Homomorphic Encryption Scheme. A El-Yahyaoui, MDEC El Kettani Int. J. Netw. Secur. 21 (1), 91-99, 2019 | 17 | 2019 |
Data privacy in cloud computing A El-Yahyaoui, MDEC El Kettani 2018 4th International Conference on Computer and Technology Applications …, 2018 | 15 | 2018 |
Using advanced detection and prevention technique to mitigate threats in SDN architecture A Sebbar, Z Karim, Y Baddi, M Boulmalf, MDEC El Kettani 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 14 | 2019 |
Parallel GRASP algorithm with delay and delay variation for core selection in shared tree based multicast routing protocols Y Baddi, MDEC El Kettani Third international conference on innovative computing technology (INTECH …, 2013 | 11 | 2013 |
A Task Allocation Algorithm For Distributed Systems M Zbakh, MDE Kettani Journal of Theoretical and Applied Information Technology 33 (1), 15-21, 2011 | 11 | 2011 |
Towards an open framework for mobile digital identity management through strong authentication methods B En-Nasry, M Dafir Ech-Cherif El Kettani Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011 | 11 | 2011 |
VND-CS: A variable neighborhood descent algorithm for core selection problem in multicast routing protocol Y Baddi, MDEC El Kettani Networked Digital Technologies: 4th International Conference, NDT 2012 …, 2012 | 10 | 2012 |
New context-based node acceptance CBNA framework for MitM detection in SDN Architecture A Sebbar, K Zkik, M Boulmalf, MDEC El Kettani Procedia Computer Science 160, 825-830, 2019 | 9 | 2019 |
Secure data sharing framework based on supervised machine learning detection system for future SDN-based networks A Sebbar, K Zkik, Y Baddi, M Boulmalf, MD Ech-Cherif El Kettani Machine Intelligence and Big Data Analytics for Cybersecurity Applications …, 2021 | 8 | 2021 |
Key management for secure multicast communication: A survey Y Baddi, MDEC El Kettani 2013 National Security Days (JNS3), 1-6, 2013 | 8 | 2013 |