71 results on '"Ezzati, Abdellah"'
Search Results
2. Microservices Adoption: An Industrial Inquiry into Factors Influencing Decisions and Implementation Strategies
3. Toward a Prescriptive Analysis in Machine Learning: Use Case of Employability in Morocco
4. A Novel Artificial Intelligence Technique for Cloud Computing Using a New Heuristic Initialisation and PSO-Parallel Execution
5. Building a Maturity Framework for Information Security Governance Through an Empirical Study in Organizations
6. LEAP Enhanced
7. Building a Maturity Framework for Information Security Governance Through an Empirical Study in Organizations
8. A Capability Maturity Framework for IT Security Governance in Organizations
9. Key Management Protocols for Smart Sensor Networks
10. MultiPrime Cloud-RSA Scheme to Promote Data Confidentiality in the Cloud Environment
11. A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments
12. A Priority Based Task Scheduling in Cloud Computing Using a Hybrid MCDM Model
13. An Efficient Dynamic Priority-Queue Algorithm Based on AHP and PSO for Task Scheduling in Cloud Computing
14. An efficient cloudlet scheduling via bin packing in cloud computing
15. Reducing the training time of deep learning models using synchronous SGD and large batch size
16. A Novel Architecture with Dynamic Queues Based on Fuzzy Logic and Particle Swarm Optimization Algorithm for Task Scheduling in Cloud Computing
17. Assessing Cost and Response Time of a Web Application Hosted in a Cloud Environment
18. Cloud-RSA: An Enhanced Homomorphic Encryption Scheme
19. An Efficient Key Establishment Protocol for Wireless Sensor Networks
20. Digital Certifications in Moroccan Universities: Concepts, Challenges, and Solutions
21. Makespan Optimisation in Cloudlet Scheduling with Improved DQN Algorithm in Cloud Computing
22. A study of task scheduling algorithms in cloud computing
23. A novel multiclass priority algorithm for task scheduling in cloud computing
24. A Lightweight Blockchain for IoT in Smart City (IoT-SmartChain)
25. Task Scheduling Optimisation for Cloud Computing using a New PSO-initialisation
26. Hierarchical Adaptive Balanced Routing Protocol for Energy Efficiency in Heterogeneous Wireless Sensor Networks
27. Run Time Optimization using a novel implementation of Parallel-PSO for real-world applications
28. A Dynamic Task Scheduling Algorithm for Cloud Computing Environment
29. Comparing load balancing algorithms for web application in cloud environment
30. IoT security: challenges and countermeasures
31. Prediction Model for Employability in Morocco Using Data Mining Techniques
32. Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing
33. Fast Cloud–Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing
34. An Efficient Energy-Aware Tasks Scheduling with Deadline-Constrained in Cloud Computing
35. A data mining process using classification techniques for employability prediction
36. An Electronic Nose Natural Neural Learning Model in Real Work Environment
37. MultiPrime cloud-RSA: a fast homomorphic encryption scheme for data confidentiality protection in clouds
38. Deadline and Energy Aware Task Scheduling in Cloud Computing
39. A novel task scheduling approach based on dynamic queues and hybrid meta-heuristic algorithms for cloud computing environment
40. Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing
41. A Practical Sensors Software to Manage Fault Signals’ Impact
42. A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing
43. Building open virtual cloud lab for advanced education in networks and security
44. A comparative between hadoop mapreduce and apache Spark on HDFS
45. A new reformulation of the load balancing problem in cloud computing based on TSP and ACO
46. Internet of things security
47. Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing
48. Securely Adapt a Paillier Encryption Scheme to Protect the Data Confidentiality in the Cloud Environment
49. DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things
50. Cloud-ElGamal: An efficient homomorphic encryption scheme
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.