Search dblp for Publications

export results for "stream:streams/conf/acosis:"

 download as .bib file

@proceedings{DBLP:conf/acosis/2019,
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61143-9},
  doi          = {10.1007/978-3-030-61143-9},
  isbn         = {978-3-030-61142-2},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/AlnajjarAMA19,
  author       = {Khawla A. Alnajjar and
                  Noora Abdulrahman and
                  Fatma Mahdi and
                  Marwah Alramsi},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Vehicle Collision Avoidance},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {53--64},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_5},
  doi          = {10.1007/978-3-030-61143-9\_5},
  timestamp    = {Thu, 25 Apr 2024 16:53:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/AlnajjarAMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/AmarO19,
  author       = {Meryem Amar and
                  Bouabid El Ouahidi},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {A Weighted {LSTM} Deep Learning for Intrusion Detection},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {170--179},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_14},
  doi          = {10.1007/978-3-030-61143-9\_14},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/AmarO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/Ar-ReyouchiLBRG19,
  author       = {El Miloud Ar{-}Reyouchi and
                  Yousra Lamrani and
                  Imane Benchaib and
                  Salma Rattal and
                  Kamal Ghoumid},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {{NCBP:} Network Coding Based Protocol for Recovering Lost Packets
                  in the Internet of Things},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {38--49},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_4},
  doi          = {10.1007/978-3-030-61143-9\_4},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/Ar-ReyouchiLBRG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/AzougagheFSB19,
  author       = {Es{-}Said Azougaghe and
                  Abderrazak Farchane and
                  Said Safi and
                  Mostafa Belkasmi},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Iterative Decoding of {GSCB} Codes Based on {RS} Codes Using Adapted
                  Scaling Factors},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {103--114},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_9},
  doi          = {10.1007/978-3-030-61143-9\_9},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/AzougagheFSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BelhabibBH19,
  author       = {Abdelfettah Belhabib and
                  Mohamed Boulouird and
                  Moha M'Rabet Hassani},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Pilot Assignment vs Soft Pilot Reuse to Surpass the Pilot Contamination
                  Problem: {A} Comparative Study in the Uplink Phase},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_1},
  doi          = {10.1007/978-3-030-61143-9\_1},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BelhabibBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BenaddiIDB19,
  author       = {Hafsa Benaddi and
                  Khalil Ibrahimi and
                  Haytham Dahri and
                  Abderrahim Benslimane},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {A Framework to Secure Cluster-Header Decision in Wireless Sensor Network
                  Using Blockchain},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {205--218},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_17},
  doi          = {10.1007/978-3-030-61143-9\_17},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BenaddiIDB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BoualameCB19,
  author       = {Hamza Boualame and
                  Idriss Chana and
                  Mostafa Belkasmi},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {An Efficient Semi-Algebraic Decoding Algorithm for Golay Code},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {95--102},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_8},
  doi          = {10.1007/978-3-030-61143-9\_8},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BoualameCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BoudaoudEA19,
  author       = {Abdelghani Boudaoud and
                  Mustapha Elharoussi and
                  Elhassane Abdelmounim},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Turbo Decoder Based on {DSC} Codes for Multiple-Antenna Systems},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {115--120},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_10},
  doi          = {10.1007/978-3-030-61143-9\_10},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BoudaoudEA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BouderbaM19,
  author       = {Saif Islam Bouderba and
                  Najem Moussa},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {On the {V2X} Velocity Synchronization at Unsignalized Intersections:
                  Right Hand Priority Based System},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {65--72},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_6},
  doi          = {10.1007/978-3-030-61143-9\_6},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BouderbaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BoumaoucheGZ19,
  author       = {Oualid Boumaouche and
                  Afifa Ghenai and
                  Nadia Zeghib},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Data Oriented Blockchain: Off-Chain Storage with Data Dedicated and
                  Prunable Transactions},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {195--204},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_16},
  doi          = {10.1007/978-3-030-61143-9\_16},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BoumaoucheGZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BousarhaneB19,
  author       = {Btissam Bousarhane and
                  Driss Bouzidi},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Convolutional Neural Networks for Traffic Signs Recognition},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {73--91},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_7},
  doi          = {10.1007/978-3-030-61143-9\_7},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BousarhaneB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/KarbalR19,
  author       = {Basma Karbal and
                  Rahal Romadi},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {A Comparison of Different Machine Learning Algorithms for Intrusion
                  Detection},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {157--169},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_13},
  doi          = {10.1007/978-3-030-61143-9\_13},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/KarbalR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/KerrichAD19,
  author       = {Mohamed Amine Kerrich and
                  Adnane Addaim and
                  Loubna Damej},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Proposed Solution for {HID} Fileless Ransomware Using Machine Learning},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {180--192},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_15},
  doi          = {10.1007/978-3-030-61143-9\_15},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/KerrichAD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/KirmiziogluT19,
  author       = {Riza Arda Kirmizioglu and
                  A. Murat Tekalp},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Multi-party WebRTC as a Managed Service over Multi-Operator {SDN}},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {25--37},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_3},
  doi          = {10.1007/978-3-030-61143-9\_3},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/KirmiziogluT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/Laaouine19,
  author       = {Jamal Laaouine},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {On the Hamming and Symbol-Pair Distance of Constacyclic Codes of Length
                  p\({}^{\mbox{s}}\) over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{pm\}+
                  u{\textbackslash}mathbb \{F\}{\_}\{pm\}{\textdollar}},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {137--154},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_12},
  doi          = {10.1007/978-3-030-61143-9\_12},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/Laaouine19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/MerahTMT19,
  author       = {Hocine Merah and
                  Larbi Talbi and
                  Mokhtaria Mesri and
                  Khaled Tahkoubit},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {New Channel Estimation for {MC-CDMA} System Under Fast Multipath Channel},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {14--24},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_2},
  doi          = {10.1007/978-3-030-61143-9\_2},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/MerahTMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/MouchfiqBH19,
  author       = {Nada Mouchfiq and
                  Chaimae Benjbara and
                  Ahmed Habbani},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Security in MANETs: The Blockchain Issue},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {219--232},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_18},
  doi          = {10.1007/978-3-030-61143-9\_18},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/MouchfiqBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/MrabetAB19,
  author       = {Zakaria M'rabet and
                  Fouad Ayoub and
                  Mostafa Belkasmi},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {A Threshold Decoding Algorithm for Non-binary {OSMLD} Codes},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {121--133},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_11},
  doi          = {10.1007/978-3-030-61143-9\_11},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/MrabetAB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/TioutiouD19,
  author       = {Abdelaali Tioutiou and
                  Ouafaa Diouri},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Improving IoT Security with Software Defined Networking {(SDN)}},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {233--238},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_19},
  doi          = {10.1007/978-3-030-61143-9\_19},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/TioutiouD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/ZamraniA19,
  author       = {Wiam Zamrani and
                  Esmail Ahouzi},
  editor       = {Mostafa Belkasmi and
                  Jalel Ben{-}Othman and
                  Cheng Li and
                  Mohamed Essaaidi},
  title        = {Optical Image Encryption Process Using Triple Deterministic Spherical
                  Phase Masks Array},
  booktitle    = {Advanced Communication Systems and Information Security - Second International
                  Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1264},
  pages        = {241--250},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-61143-9\_20},
  doi          = {10.1007/978-3-030-61143-9\_20},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/ZamraniA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/AliNSV16,
  author       = {Kamran Ali and
                  Huan Xuan Nguyen and
                  Purav Shah and
                  Quoc{-}Tuan Vien},
  title        = {Energy efficient and scalable {D2D} architecture design for public
                  safety network},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843929},
  doi          = {10.1109/ACOSIS.2016.7843929},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/AliNSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/ArfaouiBT16,
  author       = {Imen Arfaoui and
                  Noureddine Boudriga and
                  Khalifa Trimeche},
  title        = {Design and analysis of protecting strategies against border crossing
                  under irregular conditions},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843928},
  doi          = {10.1109/ACOSIS.2016.7843928},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/ArfaouiBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/AzougagheOHBK16,
  author       = {Ali Azougaghe and
                  Omar Ait Oualhaj and
                  Mustapha Hedabou and
                  Mostafa Belkasmi and
                  Abdellatif Kobbane},
  title        = {Many-to-one matching game towards secure virtual machines migration
                  in cloud computing},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843922},
  doi          = {10.1109/ACOSIS.2016.7843922},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/AzougagheOHBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BenkhouyaCH16,
  author       = {Reda Benkhouya and
                  Idriss Chana and
                  Youssef Hadi},
  title        = {Correction of sensing imperfections using channel coding in cognitive
                  radio networks while keeping sensing time low},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843938},
  doi          = {10.1109/ACOSIS.2016.7843938},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BenkhouyaCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BerkaniB16,
  author       = {Ahlam Berkani and
                  Mostafa Belkasmi},
  title        = {A reduced complexity decoder using compact genetic algorithm for linear
                  block codes},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843925},
  doi          = {10.1109/ACOSIS.2016.7843925},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BerkaniB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BessateB16,
  author       = {Abdelmajid Bessate and
                  Faissal El Bouanani},
  title        = {A new performance results of {MIMO} system with orthogonal {STBC}
                  over independent and identical weibull fading channels},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843947},
  doi          = {10.1109/ACOSIS.2016.7843947},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acosis/BessateB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BouabdellahBB16,
  author       = {Mounia Bouabdellah and
                  Faissal El Bouanani and
                  Hussain Ben{-}Azza},
  title        = {A secure cooperative transmission model in {VANET} using attribute
                  based encryption},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843940},
  doi          = {10.1109/ACOSIS.2016.7843940},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BouabdellahBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/BoualameTCAB16,
  author       = {Hamza Boualame and
                  Noria Tahiri and
                  Idriss Chana and
                  Ahmed Azouaoui and
                  Mostafa Belkasmi},
  title        = {An efficient soft decision decoding algorithm using cyclic permutations
                  and compact genetic algorithm},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843936},
  doi          = {10.1109/ACOSIS.2016.7843936},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/BoualameTCAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/ChaayraBB16,
  author       = {Toufik Chaayra and
                  Faissal El Bouanani and
                  Hussain Ben{-}Azza},
  title        = {Performance analysis of {TAS/MRC} based {MIMO} systems over Weibull
                  fading channels},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843937},
  doi          = {10.1109/ACOSIS.2016.7843937},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/ChaayraBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/EzzariiEGS16,
  author       = {Mehdi Ezzarii and
                  Hamid Elghazi and
                  Hassan El Ghazi and
                  Tayeb Sadiki},
  title        = {Epigenetic algorithm for performing intrusion detection system},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843948},
  doi          = {10.1109/ACOSIS.2016.7843948},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/EzzariiEGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/FarchaneB16,
  author       = {Abderrazak Farchane and
                  Mostafa Belkasmi},
  title        = {New decoder for linear block codes},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843939},
  doi          = {10.1109/ACOSIS.2016.7843939},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/FarchaneB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/FihriSGK16,
  author       = {Wassim Fassi Fihri and
                  Fatima Salahdine and
                  Hassan El Ghazi and
                  Naima Kaabouch},
  title        = {A survey on decentralized random access {MAC} protocols for cognitive
                  radio networks},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843917},
  doi          = {10.1109/ACOSIS.2016.7843917},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/FihriSGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/GaraiB16,
  author       = {Mouna Garai and
                  Noureddine Boudriga},
  title        = {A secure QoS aware {VANET}},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843919},
  doi          = {10.1109/ACOSIS.2016.7843919},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/GaraiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/GuermahGSMA16,
  author       = {Bassma Guermah and
                  Hassan El Ghazi and
                  Tayeb Sadiki and
                  Yann Ben Maissa and
                  Esmail Ahouzi},
  title        = {A comparative performance analysis of position estimation algorithms
                  for {GNSS} localization in urban areas},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843950},
  doi          = {10.1109/ACOSIS.2016.7843950},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/GuermahGSMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/HadriCT16,
  author       = {Amal Hadri and
                  Khalid Chougdali and
                  Rajae Touahni},
  title        = {Intrusion detection system using {PCA} and Fuzzy {PCA} techniques},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843930},
  doi          = {10.1109/ACOSIS.2016.7843930},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/HadriCT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/HaidineH16,
  author       = {Abdelfatteh Haidine and
                  Sanae El Hassani},
  title        = {LTE-a pro {(4.5G)} as pre-phase for 5G deployment: Closing the gap
                  between technical requirements and network performance},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843933},
  doi          = {10.1109/ACOSIS.2016.7843933},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/HaidineH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/HaidineHA16,
  author       = {Abdelfatteh Haidine and
                  Sanae El Hassani and
                  Abdelhak Aqqal},
  title        = {Designing optimal wireless-based {ICT} platform for smart grid - {CDMA450}
                  proof-of-concept},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843931},
  doi          = {10.1109/ACOSIS.2016.7843931},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/HaidineHA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/HoumzMTMK16,
  author       = {Abdellah Houmz and
                  Mohamed Salim Mezzene and
                  Asmaa Tellabt and
                  Ghita Mezzour and
                  Mohammed El Koutbi},
  title        = {Field study of cybercafe usage {\&} security in Morocco},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843916},
  doi          = {10.1109/ACOSIS.2016.7843916},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/HoumzMTMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/HusseinEG16,
  author       = {Mohammed Hussein and
                  Israa Elayyan and
                  Wasel Ghanem},
  title        = {Topology-aware approach for reducing power consumption in {LEO} satellite
                  constellations},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843923},
  doi          = {10.1109/ACOSIS.2016.7843923},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acosis/HusseinEG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/IlliBA16,
  author       = {Elmehdi Illi and
                  Faissal El Bouanani and
                  Fouad Ayoub},
  title        = {Performance analysis of dual-hop underwater communication system subject
                  to k-{\(\mu\)} shadowed fading channel},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843941},
  doi          = {10.1109/ACOSIS.2016.7843941},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acosis/IlliBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/JoundanNN16,
  author       = {Issam Abderrahman Joundan and
                  Sa{\"{\i}}d Nouh and
                  Abdelwahed Namir},
  title        = {Design of good linear codes for a decoder based on majority voting
                  procedure},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843918},
  doi          = {10.1109/ACOSIS.2016.7843918},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/JoundanNN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/KadiMNB16,
  author       = {Abdelilah Kadi and
                  Mostafa Mrabti and
                  Said Najah and
                  Emmanuel Boutillon},
  title        = {Novel method for improving performances of normalized {MS} decoder
                  using {WIMAX} code},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843926},
  doi          = {10.1109/ACOSIS.2016.7843926},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/KadiMNB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/KamelSO16,
  author       = {Sarah Kamel and
                  Mireille Sarkiss and
                  Ghaya Rekaya{-}Ben Othman},
  title        = {Improving {GGH} cryptosystem using generalized low density lattices},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843914},
  doi          = {10.1109/ACOSIS.2016.7843914},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/KamelSO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/LabbiBKDBA16,
  author       = {Mohamed Labbi and
                  Nabil BenSalah and
                  Nabil Kannouf and
                  Youssef Douzi and
                  Mohammed Benabdellah and
                  Abdelmalek Azizi},
  title        = {A game theoretic approach to multipath traffic control in Content-Centric
                  Networking},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843924},
  doi          = {10.1109/ACOSIS.2016.7843924},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/LabbiBKDBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/LabbiSMB16,
  author       = {Zouheir Labbi and
                  Mohamed Senhadji and
                  Ahmed Maarof and
                  Mostafa Belkasmi},
  title        = {A novel efficient ultralightweight authentication algorithm for {RFID}
                  systems},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843920},
  doi          = {10.1109/ACOSIS.2016.7843920},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/LabbiSMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/LabghoughAB16,
  author       = {Souad Labghough and
                  Fouad Ayoub and
                  Mostafa Belkasmi},
  title        = {Majority logic coding schemes performance over {FSO} channels},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843942},
  doi          = {10.1109/ACOSIS.2016.7843942},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/LabghoughAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/MaarofSLB16,
  author       = {Ahmed Maarof and
                  Mohamed Senhadji and
                  Zouheir Labbi and
                  Mostafa Belkasmi},
  title        = {Authentication protocol conforming to {EPC} class-1 Gen-2 standard},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843915},
  doi          = {10.1109/ACOSIS.2016.7843915},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/MaarofSLB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/MarshoudSMK16,
  author       = {Hanaa Marshoud and
                  Paschalis C. Sofotasios and
                  Sami Muhaidat and
                  George K. Karagiannidis},
  title        = {Multi-user techniques in visible light communications: {A} survey},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843945},
  doi          = {10.1109/ACOSIS.2016.7843945},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acosis/MarshoudSMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/MessaoudGWS16,
  author       = {Brahim I. D. Messaoud and
                  Karim Guennoun and
                  Mohamed Wahbi and
                  Mohamed Sadik},
  title        = {Advanced Persistent Threat: New analysis driven by life cycle phases
                  and their challenges},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843932},
  doi          = {10.1109/ACOSIS.2016.7843932},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acosis/MessaoudGWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/OuaissaBRLC16,
  author       = {Mariyam Ouaissa and
                  Mariam Benmoussa and
                  Abdallah Rhattoy and
                  Mohammed Lahmer and
                  Idriss Chana},
  title        = {Performance analysis of random access mechanisms for machine type
                  communications in {LTE} networks},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843934},
  doi          = {10.1109/ACOSIS.2016.7843934},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/OuaissaBRLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/OulaourfHO16,
  author       = {Sanaa Oulaourf and
                  Abdelfatteh Haidine and
                  Hassan Ouahmane},
  title        = {Review on using game theory in resource allocation for LTE/LTE-Advanced},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843946},
  doi          = {10.1109/ACOSIS.2016.7843946},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/OulaourfHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/RkizatLBN16,
  author       = {Karim Rkizat and
                  Mohammed Lahmer and
                  Mostafa Belkasmi and
                  Sa{\"{\i}}d Nouh},
  title        = {Construction and iterative threshold decoding for low rates Quasi-Cyclic
                  One Step Majority logic decodable codes},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843944},
  doi          = {10.1109/ACOSIS.2016.7843944},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/RkizatLBN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/SabriC16,
  author       = {Khalid Sabri and
                  Abdelouahad Choklati},
  title        = {Sparse deconvolution of periodic random impulses based on convex relaxation},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843927},
  doi          = {10.1109/ACOSIS.2016.7843927},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/SabriC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/TajK16,
  author       = {M. Bennani Mohamed Taj and
                  M. Ait Kbir},
  title        = {{ICH-LEACH:} An enhanced {LEACH} protocol for wireless sensor network},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843949},
  doi          = {10.1109/ACOSIS.2016.7843949},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/TajK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/YatribiBAM16,
  author       = {Anouar Yatribi and
                  Mostafa Belkasmi and
                  Fouad Ayoub and
                  Zakaria M'rabet},
  title        = {Non-binary cyclic majority-logic decodable codes: An algebraic construction
                  by using Genetic Algorithms},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843935},
  doi          = {10.1109/ACOSIS.2016.7843935},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/YatribiBAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/ZakariaFMAI16,
  author       = {Zakaria M'rabet and
                  Fouad Ayoub and
                  Mostafa Belkasmi and
                  Anouar Yatribi and
                  Zine El Abidine Alaoui Ismaili},
  title        = {Non-binary Euclidean Geometry codes: Majority Logic Decoding},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843943},
  doi          = {10.1109/ACOSIS.2016.7843943},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acosis/ZakariaFMAI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/ZaydiN16,
  author       = {Mounia Zaydi and
                  Bouchaib Nassereddine},
  title        = {Information system security governance: Technology intelligence perspective},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843921},
  doi          = {10.1109/ACOSIS.2016.7843921},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/ZaydiN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acosis/ZerhouniEEIB16,
  author       = {Kawtar Zerhouni and
                  Raja Elassali and
                  Khalid Elbaamrani and
                  Noureddine Idboufker and
                  Fouzia Elbahhar Boukour},
  title        = {Threshold of the symmetry property of cyclic autocorrelation function
                  detector},
  booktitle    = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACOSIS.2016.7843913},
  doi          = {10.1109/ACOSIS.2016.7843913},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/ZerhouniEEIB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acosis/2016,
  title        = {International Conference on Advanced Communication Systems and Information
                  Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7830757/proceeding},
  isbn         = {978-1-5090-6227-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acosis/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics