Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:conf/acosis:"
@proceedings{DBLP:conf/acosis/2019, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61143-9}, doi = {10.1007/978-3-030-61143-9}, isbn = {978-3-030-61142-2}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/AlnajjarAMA19, author = {Khawla A. Alnajjar and Noora Abdulrahman and Fatma Mahdi and Marwah Alramsi}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Vehicle Collision Avoidance}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {53--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_5}, doi = {10.1007/978-3-030-61143-9\_5}, timestamp = {Thu, 25 Apr 2024 16:53:32 +0200}, biburl = {https://dblp.org/rec/conf/acosis/AlnajjarAMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/AmarO19, author = {Meryem Amar and Bouabid El Ouahidi}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {A Weighted {LSTM} Deep Learning for Intrusion Detection}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {170--179}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_14}, doi = {10.1007/978-3-030-61143-9\_14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/AmarO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/Ar-ReyouchiLBRG19, author = {El Miloud Ar{-}Reyouchi and Yousra Lamrani and Imane Benchaib and Salma Rattal and Kamal Ghoumid}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {{NCBP:} Network Coding Based Protocol for Recovering Lost Packets in the Internet of Things}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {38--49}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_4}, doi = {10.1007/978-3-030-61143-9\_4}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/Ar-ReyouchiLBRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/AzougagheFSB19, author = {Es{-}Said Azougaghe and Abderrazak Farchane and Said Safi and Mostafa Belkasmi}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Iterative Decoding of {GSCB} Codes Based on {RS} Codes Using Adapted Scaling Factors}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {103--114}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_9}, doi = {10.1007/978-3-030-61143-9\_9}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/AzougagheFSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BelhabibBH19, author = {Abdelfettah Belhabib and Mohamed Boulouird and Moha M'Rabet Hassani}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Pilot Assignment vs Soft Pilot Reuse to Surpass the Pilot Contamination Problem: {A} Comparative Study in the Uplink Phase}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {3--13}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_1}, doi = {10.1007/978-3-030-61143-9\_1}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BelhabibBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BenaddiIDB19, author = {Hafsa Benaddi and Khalil Ibrahimi and Haytham Dahri and Abderrahim Benslimane}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {A Framework to Secure Cluster-Header Decision in Wireless Sensor Network Using Blockchain}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {205--218}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_17}, doi = {10.1007/978-3-030-61143-9\_17}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BenaddiIDB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BoualameCB19, author = {Hamza Boualame and Idriss Chana and Mostafa Belkasmi}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {An Efficient Semi-Algebraic Decoding Algorithm for Golay Code}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {95--102}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_8}, doi = {10.1007/978-3-030-61143-9\_8}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BoualameCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BoudaoudEA19, author = {Abdelghani Boudaoud and Mustapha Elharoussi and Elhassane Abdelmounim}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Turbo Decoder Based on {DSC} Codes for Multiple-Antenna Systems}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {115--120}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_10}, doi = {10.1007/978-3-030-61143-9\_10}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BoudaoudEA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BouderbaM19, author = {Saif Islam Bouderba and Najem Moussa}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {On the {V2X} Velocity Synchronization at Unsignalized Intersections: Right Hand Priority Based System}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {65--72}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_6}, doi = {10.1007/978-3-030-61143-9\_6}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BouderbaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BoumaoucheGZ19, author = {Oualid Boumaouche and Afifa Ghenai and Nadia Zeghib}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Data Oriented Blockchain: Off-Chain Storage with Data Dedicated and Prunable Transactions}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {195--204}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_16}, doi = {10.1007/978-3-030-61143-9\_16}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BoumaoucheGZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BousarhaneB19, author = {Btissam Bousarhane and Driss Bouzidi}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Convolutional Neural Networks for Traffic Signs Recognition}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {73--91}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_7}, doi = {10.1007/978-3-030-61143-9\_7}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BousarhaneB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/KarbalR19, author = {Basma Karbal and Rahal Romadi}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {A Comparison of Different Machine Learning Algorithms for Intrusion Detection}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {157--169}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_13}, doi = {10.1007/978-3-030-61143-9\_13}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/KarbalR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/KerrichAD19, author = {Mohamed Amine Kerrich and Adnane Addaim and Loubna Damej}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Proposed Solution for {HID} Fileless Ransomware Using Machine Learning}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {180--192}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_15}, doi = {10.1007/978-3-030-61143-9\_15}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/KerrichAD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/KirmiziogluT19, author = {Riza Arda Kirmizioglu and A. Murat Tekalp}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Multi-party WebRTC as a Managed Service over Multi-Operator {SDN}}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {25--37}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_3}, doi = {10.1007/978-3-030-61143-9\_3}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/KirmiziogluT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/Laaouine19, author = {Jamal Laaouine}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {On the Hamming and Symbol-Pair Distance of Constacyclic Codes of Length p\({}^{\mbox{s}}\) over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{pm\}+ u{\textbackslash}mathbb \{F\}{\_}\{pm\}{\textdollar}}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {137--154}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_12}, doi = {10.1007/978-3-030-61143-9\_12}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/Laaouine19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/MerahTMT19, author = {Hocine Merah and Larbi Talbi and Mokhtaria Mesri and Khaled Tahkoubit}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {New Channel Estimation for {MC-CDMA} System Under Fast Multipath Channel}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {14--24}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_2}, doi = {10.1007/978-3-030-61143-9\_2}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/MerahTMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/MouchfiqBH19, author = {Nada Mouchfiq and Chaimae Benjbara and Ahmed Habbani}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Security in MANETs: The Blockchain Issue}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {219--232}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_18}, doi = {10.1007/978-3-030-61143-9\_18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/MouchfiqBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/MrabetAB19, author = {Zakaria M'rabet and Fouad Ayoub and Mostafa Belkasmi}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {A Threshold Decoding Algorithm for Non-binary {OSMLD} Codes}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {121--133}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_11}, doi = {10.1007/978-3-030-61143-9\_11}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/MrabetAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/TioutiouD19, author = {Abdelaali Tioutiou and Ouafaa Diouri}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Improving IoT Security with Software Defined Networking {(SDN)}}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {233--238}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_19}, doi = {10.1007/978-3-030-61143-9\_19}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/TioutiouD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/ZamraniA19, author = {Wiam Zamrani and Esmail Ahouzi}, editor = {Mostafa Belkasmi and Jalel Ben{-}Othman and Cheng Li and Mohamed Essaaidi}, title = {Optical Image Encryption Process Using Triple Deterministic Spherical Phase Masks Array}, booktitle = {Advanced Communication Systems and Information Security - Second International Conference, {ACOSIS} 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1264}, pages = {241--250}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-61143-9\_20}, doi = {10.1007/978-3-030-61143-9\_20}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/ZamraniA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/AliNSV16, author = {Kamran Ali and Huan Xuan Nguyen and Purav Shah and Quoc{-}Tuan Vien}, title = {Energy efficient and scalable {D2D} architecture design for public safety network}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843929}, doi = {10.1109/ACOSIS.2016.7843929}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acosis/AliNSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/ArfaouiBT16, author = {Imen Arfaoui and Noureddine Boudriga and Khalifa Trimeche}, title = {Design and analysis of protecting strategies against border crossing under irregular conditions}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843928}, doi = {10.1109/ACOSIS.2016.7843928}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/ArfaouiBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/AzougagheOHBK16, author = {Ali Azougaghe and Omar Ait Oualhaj and Mustapha Hedabou and Mostafa Belkasmi and Abdellatif Kobbane}, title = {Many-to-one matching game towards secure virtual machines migration in cloud computing}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843922}, doi = {10.1109/ACOSIS.2016.7843922}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/AzougagheOHBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BenkhouyaCH16, author = {Reda Benkhouya and Idriss Chana and Youssef Hadi}, title = {Correction of sensing imperfections using channel coding in cognitive radio networks while keeping sensing time low}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843938}, doi = {10.1109/ACOSIS.2016.7843938}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BenkhouyaCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BerkaniB16, author = {Ahlam Berkani and Mostafa Belkasmi}, title = {A reduced complexity decoder using compact genetic algorithm for linear block codes}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843925}, doi = {10.1109/ACOSIS.2016.7843925}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BerkaniB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BessateB16, author = {Abdelmajid Bessate and Faissal El Bouanani}, title = {A new performance results of {MIMO} system with orthogonal {STBC} over independent and identical weibull fading channels}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843947}, doi = {10.1109/ACOSIS.2016.7843947}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acosis/BessateB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BouabdellahBB16, author = {Mounia Bouabdellah and Faissal El Bouanani and Hussain Ben{-}Azza}, title = {A secure cooperative transmission model in {VANET} using attribute based encryption}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843940}, doi = {10.1109/ACOSIS.2016.7843940}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BouabdellahBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/BoualameTCAB16, author = {Hamza Boualame and Noria Tahiri and Idriss Chana and Ahmed Azouaoui and Mostafa Belkasmi}, title = {An efficient soft decision decoding algorithm using cyclic permutations and compact genetic algorithm}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843936}, doi = {10.1109/ACOSIS.2016.7843936}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/BoualameTCAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/ChaayraBB16, author = {Toufik Chaayra and Faissal El Bouanani and Hussain Ben{-}Azza}, title = {Performance analysis of {TAS/MRC} based {MIMO} systems over Weibull fading channels}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843937}, doi = {10.1109/ACOSIS.2016.7843937}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/ChaayraBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/EzzariiEGS16, author = {Mehdi Ezzarii and Hamid Elghazi and Hassan El Ghazi and Tayeb Sadiki}, title = {Epigenetic algorithm for performing intrusion detection system}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843948}, doi = {10.1109/ACOSIS.2016.7843948}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/EzzariiEGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/FarchaneB16, author = {Abderrazak Farchane and Mostafa Belkasmi}, title = {New decoder for linear block codes}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843939}, doi = {10.1109/ACOSIS.2016.7843939}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/FarchaneB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/FihriSGK16, author = {Wassim Fassi Fihri and Fatima Salahdine and Hassan El Ghazi and Naima Kaabouch}, title = {A survey on decentralized random access {MAC} protocols for cognitive radio networks}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843917}, doi = {10.1109/ACOSIS.2016.7843917}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/FihriSGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/GaraiB16, author = {Mouna Garai and Noureddine Boudriga}, title = {A secure QoS aware {VANET}}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843919}, doi = {10.1109/ACOSIS.2016.7843919}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/GaraiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/GuermahGSMA16, author = {Bassma Guermah and Hassan El Ghazi and Tayeb Sadiki and Yann Ben Maissa and Esmail Ahouzi}, title = {A comparative performance analysis of position estimation algorithms for {GNSS} localization in urban areas}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843950}, doi = {10.1109/ACOSIS.2016.7843950}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/GuermahGSMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/HadriCT16, author = {Amal Hadri and Khalid Chougdali and Rajae Touahni}, title = {Intrusion detection system using {PCA} and Fuzzy {PCA} techniques}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843930}, doi = {10.1109/ACOSIS.2016.7843930}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/HadriCT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/HaidineH16, author = {Abdelfatteh Haidine and Sanae El Hassani}, title = {LTE-a pro {(4.5G)} as pre-phase for 5G deployment: Closing the gap between technical requirements and network performance}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843933}, doi = {10.1109/ACOSIS.2016.7843933}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/HaidineH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/HaidineHA16, author = {Abdelfatteh Haidine and Sanae El Hassani and Abdelhak Aqqal}, title = {Designing optimal wireless-based {ICT} platform for smart grid - {CDMA450} proof-of-concept}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843931}, doi = {10.1109/ACOSIS.2016.7843931}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/HaidineHA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/HoumzMTMK16, author = {Abdellah Houmz and Mohamed Salim Mezzene and Asmaa Tellabt and Ghita Mezzour and Mohammed El Koutbi}, title = {Field study of cybercafe usage {\&} security in Morocco}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843916}, doi = {10.1109/ACOSIS.2016.7843916}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/HoumzMTMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/HusseinEG16, author = {Mohammed Hussein and Israa Elayyan and Wasel Ghanem}, title = {Topology-aware approach for reducing power consumption in {LEO} satellite constellations}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843923}, doi = {10.1109/ACOSIS.2016.7843923}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acosis/HusseinEG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/IlliBA16, author = {Elmehdi Illi and Faissal El Bouanani and Fouad Ayoub}, title = {Performance analysis of dual-hop underwater communication system subject to k-{\(\mu\)} shadowed fading channel}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843941}, doi = {10.1109/ACOSIS.2016.7843941}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acosis/IlliBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/JoundanNN16, author = {Issam Abderrahman Joundan and Sa{\"{\i}}d Nouh and Abdelwahed Namir}, title = {Design of good linear codes for a decoder based on majority voting procedure}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843918}, doi = {10.1109/ACOSIS.2016.7843918}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/JoundanNN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/KadiMNB16, author = {Abdelilah Kadi and Mostafa Mrabti and Said Najah and Emmanuel Boutillon}, title = {Novel method for improving performances of normalized {MS} decoder using {WIMAX} code}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843926}, doi = {10.1109/ACOSIS.2016.7843926}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/KadiMNB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/KamelSO16, author = {Sarah Kamel and Mireille Sarkiss and Ghaya Rekaya{-}Ben Othman}, title = {Improving {GGH} cryptosystem using generalized low density lattices}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843914}, doi = {10.1109/ACOSIS.2016.7843914}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/KamelSO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/LabbiBKDBA16, author = {Mohamed Labbi and Nabil BenSalah and Nabil Kannouf and Youssef Douzi and Mohammed Benabdellah and Abdelmalek Azizi}, title = {A game theoretic approach to multipath traffic control in Content-Centric Networking}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843924}, doi = {10.1109/ACOSIS.2016.7843924}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/LabbiBKDBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/LabbiSMB16, author = {Zouheir Labbi and Mohamed Senhadji and Ahmed Maarof and Mostafa Belkasmi}, title = {A novel efficient ultralightweight authentication algorithm for {RFID} systems}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843920}, doi = {10.1109/ACOSIS.2016.7843920}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/LabbiSMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/LabghoughAB16, author = {Souad Labghough and Fouad Ayoub and Mostafa Belkasmi}, title = {Majority logic coding schemes performance over {FSO} channels}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843942}, doi = {10.1109/ACOSIS.2016.7843942}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/LabghoughAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/MaarofSLB16, author = {Ahmed Maarof and Mohamed Senhadji and Zouheir Labbi and Mostafa Belkasmi}, title = {Authentication protocol conforming to {EPC} class-1 Gen-2 standard}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843915}, doi = {10.1109/ACOSIS.2016.7843915}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/MaarofSLB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/MarshoudSMK16, author = {Hanaa Marshoud and Paschalis C. Sofotasios and Sami Muhaidat and George K. Karagiannidis}, title = {Multi-user techniques in visible light communications: {A} survey}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843945}, doi = {10.1109/ACOSIS.2016.7843945}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acosis/MarshoudSMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/MessaoudGWS16, author = {Brahim I. D. Messaoud and Karim Guennoun and Mohamed Wahbi and Mohamed Sadik}, title = {Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843932}, doi = {10.1109/ACOSIS.2016.7843932}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acosis/MessaoudGWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/OuaissaBRLC16, author = {Mariyam Ouaissa and Mariam Benmoussa and Abdallah Rhattoy and Mohammed Lahmer and Idriss Chana}, title = {Performance analysis of random access mechanisms for machine type communications in {LTE} networks}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843934}, doi = {10.1109/ACOSIS.2016.7843934}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/OuaissaBRLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/OulaourfHO16, author = {Sanaa Oulaourf and Abdelfatteh Haidine and Hassan Ouahmane}, title = {Review on using game theory in resource allocation for LTE/LTE-Advanced}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843946}, doi = {10.1109/ACOSIS.2016.7843946}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/OulaourfHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/RkizatLBN16, author = {Karim Rkizat and Mohammed Lahmer and Mostafa Belkasmi and Sa{\"{\i}}d Nouh}, title = {Construction and iterative threshold decoding for low rates Quasi-Cyclic One Step Majority logic decodable codes}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843944}, doi = {10.1109/ACOSIS.2016.7843944}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/RkizatLBN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/SabriC16, author = {Khalid Sabri and Abdelouahad Choklati}, title = {Sparse deconvolution of periodic random impulses based on convex relaxation}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843927}, doi = {10.1109/ACOSIS.2016.7843927}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/SabriC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/TajK16, author = {M. Bennani Mohamed Taj and M. Ait Kbir}, title = {{ICH-LEACH:} An enhanced {LEACH} protocol for wireless sensor network}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843949}, doi = {10.1109/ACOSIS.2016.7843949}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/TajK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/YatribiBAM16, author = {Anouar Yatribi and Mostafa Belkasmi and Fouad Ayoub and Zakaria M'rabet}, title = {Non-binary cyclic majority-logic decodable codes: An algebraic construction by using Genetic Algorithms}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843935}, doi = {10.1109/ACOSIS.2016.7843935}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/YatribiBAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/ZakariaFMAI16, author = {Zakaria M'rabet and Fouad Ayoub and Mostafa Belkasmi and Anouar Yatribi and Zine El Abidine Alaoui Ismaili}, title = {Non-binary Euclidean Geometry codes: Majority Logic Decoding}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843943}, doi = {10.1109/ACOSIS.2016.7843943}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acosis/ZakariaFMAI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/ZaydiN16, author = {Mounia Zaydi and Bouchaib Nassereddine}, title = {Information system security governance: Technology intelligence perspective}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843921}, doi = {10.1109/ACOSIS.2016.7843921}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/ZaydiN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acosis/ZerhouniEEIB16, author = {Kawtar Zerhouni and Raja Elassali and Khalid Elbaamrani and Noureddine Idboufker and Fouzia Elbahhar Boukour}, title = {Threshold of the symmetry property of cyclic autocorrelation function detector}, booktitle = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACOSIS.2016.7843913}, doi = {10.1109/ACOSIS.2016.7843913}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/ZerhouniEEIB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acosis/2016, title = {International Conference on Advanced Communication Systems and Information Security, {ACOSIS} 2016, Marrakesh, Morocco, October 17-19, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7830757/proceeding}, isbn = {978-1-5090-6227-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acosis/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.