default search action
Yassine Maleh
Person information
- affiliation: Hassan 1st University, Settat, Morocco
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Mohamed Zaoui, Yousra Belfaik, Yassine Sadqi, Yassine Maleh, Karim Ouazzane:
A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Toward Effective Mitigation Strategies. IEEE Access 12: 72224-72241 (2024) - [j27]Ismail Lamaakal, Ibrahim Ouahbi, Khalid El Makkaoui, Yassine Maleh, Pawel Plawiak, Fahad Alblehai:
A TinyDL Model for Gesture-Based Air Handwriting Arabic Numbers and Simple Arabic Letters Recognition. IEEE Access 12: 76589-76605 (2024) - [j26]Amine Sallah, El Arbi Abdellaoui Alaoui, Said Agoujil, Mudasir Ahmad Wani, Mohamed Hammad, Yassine Maleh, Ahmed A. Abd El-Latif:
Fine-Tuned Understanding: Enhancing Social Bot Detection With Transformer-Based Classification. IEEE Access 12: 118250-118269 (2024) - [j25]Abdelhadi Zineddine, Oumaima Chakir, Yassine Sadqi, Yassine Maleh, Gurjot Singh Gaba, Andrei V. Gurtov, Kapal Dev:
A systematic review of cybersecurity assessment methods for HTTPS. Comput. Electr. Eng. 115: 109137 (2024) - [j24]Abdeslam Rehaimi, Yassine Sadqi, Yassine Maleh, Gurjot Singh Gaba, Andrei V. Gurtov:
Towards a federated and hybrid cloud computing environment for sustainable and effective provisioning of cyber security virtual laboratories. Expert Syst. Appl. 252: 124267 (2024) - [j23]Walid El Mouhtadi, Mohamed El Bakkali, Yassine Maleh, Soufyane Mounir, Karim Ouazzane:
Refining malware detection with enhanced machine learning algorithms using hyperparameter tuning. Int. J. Crit. Comput. Based Syst. 11(1/2): 48-67 (2024) - [j22]Youssef Baddi, Anass Sebbar, Karim Zkik, Yassin Maleh, Faysal Bensalah, Mohammed Boulmalf:
MSDN-IoT multicast group communication in IoT based on software defined networking. J. Reliab. Intell. Environ. 10(1): 93-104 (2024) - [j21]Mohamed Fartitchou, Ismail Lamaakal, Yassine Maleh, Khalid El Makkaoui, Zakaria El Allali, Pawel Plawiak, Fahad Alblehai, Ahmed A. Abd El-Latif:
IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem. Sensors 24(17): 5716 (2024) - [e1]Belgacem Ben Hedia, Yassine Maleh, Moez Krichen:
Verification and Evaluation of Computer and Communication Systems - 16th International Conference, VECoS 2023, Marrakech, Morocco, October 18-20, 2023, Proceedings. Lecture Notes in Computer Science 14368, Springer 2024, ISBN 978-3-031-49736-0 [contents] - [i6]Utsha Roy, Mst. Sazia Tahosin, Md. Mahedi Hassan, Taminul Islam, Fahim Imtiaz, Md Rezwane Sadik, Yassine Maleh, Rejwan Bin Sulaiman, Md. Simul Hasan Talukder:
Enhancing Bangla Fake News Detection Using Bidirectional Gated Recurrent Units and Deep Learning Techniques. CoRR abs/2404.01345 (2024) - [i5]Mohamed Fartitchou, Ismail Lamaakal, Khalid El Makkaoui, Zakaria El Allali, Yassine Maleh:
BlockMEDC: Blockchain Smart Contracts for Securing Moroccan Higher Education Digital Certificates. CoRR abs/2410.07258 (2024) - 2023
- [j20]Yousra Belfaik, Yassine Sadqi, Yassine Maleh, Said Safi, Lo'ai Ali Tawalbeh, Khaled Salah:
A Novel Secure and Privacy-Preserving Model for OpenID Connect Based on Blockchain. IEEE Access 11: 67660-67678 (2023) - [j19]Abdelhamied A. Ateya, Ammar Muthanna, Andrey Koucheryavy, Yassine Maleh, Ahmed A. Abd El-Latif:
Energy efficient offloading scheme for MEC-based augmented reality system. Clust. Comput. 26(1): 789-806 (2023) - [j18]El Arbi Abdellaoui Alaoui, Stéphane Cédric Koumétio Tékouabou, Yassine Maleh, Anand Nayyar:
Corrigendum to "Towards to intelligent routing for DTN protocols using machine learning techniques" [Simulation Modelling Practice and Theory 117 (2022) 102475]. Comput. Secur. 124: 103012 (2023) - [j17]Giuseppe Ciaburro, Sankar Padmanabhan, Yassine Maleh, Virginia Puyana-Romero:
Fan Fault Diagnosis Using Acoustic Emission and Deep Learning Methods. Informatics 10(1): 24 (2023) - [j16]Yassine Maleh, Youssef Qasmaoui, Khalid El Gholami, Yassine Sadqi, Soufyane Mounir:
A comprehensive survey on SDN security: threats, mitigations, and future directions. J. Reliab. Intell. Environ. 9(2): 201-239 (2023) - [j15]El Arbi Abdellaoui Alaoui, Stéphane Cédric Koumétio Tékouabou, Yassine Maleh, Anand Nayyar:
Corrigendum to "Towards to intelligent routing for DTN protocols using machine learning techniques" [Simulation Modelling Practice and Theory 117 (2022) 102475]. Simul. Model. Pract. Theory 123: 102689 (2023) - [c12]Abdeslam Rehaimi, Yassine Sadqi, Yassine Maleh:
A Comparative Study of Online Cybersecurity Training Platforms. VECoS 2023: 122-134 - [c11]Salah El Hajla, Ennaji Mahfoud, Yassine Maleh, Soufyane Mounir:
Attack and anomaly detection in IoT Networks using machine learning approaches. WINCOM 2023: 1-7 - 2022
- [b1]Yassine Maleh, Youness Maleh:
Cybersecurity in Morocco. Springer Briefs in Cybersecurity, Springer 2022, ISBN 978-3-031-18477-2, pp. 1-92 - [j14]Feruz K. Elmay, Khaled Salah, Ibrar Yaqoob, Raja Jayaraman, Ammar Ayman Battah, Yassine Maleh:
Blockchain-Based Traceability for Shipping Containers in Unimodal and Multimodal Logistics. IEEE Access 10: 133539-133556 (2022) - [j13]Gabriel Piñeres-Espitia, Shariq Aziz Butt, Francisco Estévez-Ortiz, Alejandro Cama-Pinto, Yassine Maleh:
Performance analysis of 6LoWPAN protocol for a flood monitoring system. EURASIP J. Wirel. Commun. Netw. 2022(1): 16 (2022) - [j12]Yassine Sadqi, Yassine Maleh:
A systematic review and taxonomy of web applications threats. Inf. Secur. J. A Glob. Perspect. 31(1): 1-27 (2022) - [j11]Yassine Maleh, Lo'ai Tawalbeh:
Editorial. J. ICT Stand. 10(2): 1-2 (2022) - [j10]Yassine Maleh, Lo'ai Tawalbeh:
Editorial. J. ICT Stand. 10(3): i-ii (2022) - [j9]Abdukodir Khakimov, Ibrahim A. Elgendy, Ammar Muthanna, Evgeny Mokrov, Konstantin E. Samouylov, Yassine Maleh, Ahmed A. Abd El-Latif:
Flexible architecture for deployment of edge computing applications. Simul. Model. Pract. Theory 114: 102402 (2022) - [j8]El Arbi Abdellaoui Alaoui, Stéphane Cédric Koumétio Tékouabou, Yassine Maleh, Anand Nayyar:
Towards to intelligent routing for DTN protocols using machine learning techniques. Simul. Model. Pract. Theory 117: 102475 (2022) - [j7]Ahmed A. Abd El-Latif, Yassine Maleh, Marinella Petrocchi, Valentina Casola:
Guest Editorial: Advanced Computing and Blockchain Applications for Critical Industrial IoT. IEEE Trans. Ind. Informatics 18(11): 8282-8286 (2022) - 2021
- [j6]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity. Big Data 9(2): 146-147 (2021) - [j5]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity: Deadline for Manuscript Submission: September 15, 2021. Big Data 9(3): 149-150 (2021) - [j4]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity: Deadline for Manuscript Submission: September 15, 2021. Big Data 9(4): 322-323 (2021) - [j3]Alexander Paramonov, Jialiang Peng, Dmitry Kashkarov, Ammar Muthanna, Ibrahim A. Elgendy, Andrey Koucheryavy, Yassine Maleh, Ahmed A. Abd El-Latif:
Study and Analysis of Multiconnectivity for Ultrareliable and Low-Latency Features in Networks and V2X Communications. Wirel. Commun. Mob. Comput. 2021: 1718099:1-1718099:10 (2021) - [c10]Elafri Najwa, Bertrand Rose, Yassine Maleh, Gabriela Fernandes, Majed Abdeen, Sassi Souad:
Lean 4.0 tools and technologies to improve companies' maturity level: the COVID-19 context. CENTERIS/ProjMAN/HCist 2021: 207-216 - 2020
- [c9]Yassine Maleh, Abdelkebir Sahid, Mustapha Belaïssaoui:
Optimized Machine Learning Techniques for IoT 6LoWPAN Cyber Attacks Detection. SoCPaR 2020: 669-677
2010 – 2019
- 2018
- [j2]Abdelkebir Sahid, Yassine Maleh, Mustapha Belaïssaoui:
A Practical Agile Framework for IT Service and Asset Management ITSM/ITAM Through a Case Study. J. Cases Inf. Technol. 20(4): 71-92 (2018) - 2017
- [c8]Yassine Maleh, Abdelkebir Sahid, Abdellah Ezzati, Mustapha Belaïssaoui:
A Capability Maturity Framework for IT Security Governance in Organizations. IBICA 2017: 221-233 - [c7]Abdelkebir Sahid, Yassine Maleh, Mustapha Belaïssaoui:
An Agile Framework for ITS Management In Organizations: A Case Study Based on DevOps. ICCWCS 2017: 67:1-67:8 - [c6]Yassine Maleh, Abdelkebir Sahid, Abdellah Ezzati, Mustapha Belaïssaoui:
Building open virtual cloud lab for advanced education in networks and security. WINCOM 2017: 1-6 - [i4]Yassine Maleh, Abdellah Ezzati:
Study and Development of a New Symmetric Key Management Scheme for Wireless Sensor Networks. CoRR abs/1701.00159 (2017) - [i3]Yassine Maleh, Abdellah Ezzati:
Study and Development of a Symmetric protocol to secure communications in WSN. CoRR abs/1701.00401 (2017) - 2016
- [j1]Yassine Maleh, Abdellah Ezzati:
LEAP Enhanced: A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN. Int. J. Mob. Comput. Multim. Commun. 7(3): 42-66 (2016) - [c5]Yassine Maleh, Abdellah Ezzati, Mustapha Belaïssaoui:
DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things. BDAW 2016: 54:1-54:7 - [c4]Yassine Maleh, Abdellah Ezzati, Mustapha Belaïssaoui:
An enhanced DTLS protocol for Internet of Things applications. WINCOM 2016: 168-173 - [i2]Yassine Maleh, Abdellah Ezzati:
An advanced Study on Cryptography Mechanisms for Wireless Sensor Networks. CoRR abs/1609.05323 (2016) - 2015
- [c3]Yassine Maleh, Abdellah Ezzati, Youssef Qasmaoui, Mohamed Mbida:
A Global Hybrid Intrusion Detection System for Wireless Sensor Networks. ANT/SEIT 2015: 1047-1052 - [c2]Yassin Maleh, Abdellah Ezzati:
An Efficient Key Establishment Protocol for Wireless Sensor Networks. UNet 2015: 339-352 - 2014
- [c1]Yassine Maleh, Abdellah Ezzati:
Performance analysis of routing protocols for wireless sensor networks. CIST 2014: 420-424 - [i1]Yassine Maleh, Abdellah Ezzati:
A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks. CoRR abs/1401.1982 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint