46 results on '"Ezzati, Abdellah"'
Search Results
2. Digital Certifications in Moroccan Universities: Concepts, Challenges, and Solutions
3. A novel multiclass priority algorithm for task scheduling in cloud computing
4. IoT security: challenges and countermeasures
5. Fast Cloud–Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing
6. Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing
7. A Practical Sensors Software to Manage Fault Signals’ Impact
8. A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing
9. A novel task scheduling approach based on dynamic queues and hybrid meta-heuristic algorithms for cloud computing environment
10. Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing
11. Microservices Adoption: An Industrial Inquiry into Factors Influencing Decisions and Implementation Strategies.
12. A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments.
13. A Global Hybrid Intrusion Detection System for Wireless Sensor Networks
14. An efficient cloudlet scheduling via bin packing in cloud computing.
15. A Lightweight Blockchain for IoT in Smart City (IoT-SmartChain).
16. Makespan Optimisation in Cloudlet Scheduling with Improved DQN Algorithm in Cloud Computing.
17. Study and Development of a New Symmetric Key Management Scheme for Wireless Sensor Networks
18. Data mining classification algorithms.
19. CBCRT Topology of Control Protocol in Mobile Wireless Sensor Networks
20. Proposition of an employability prediction system using data mining techniques in a big data environment.
21. Signal Stength Localization Mechanism In WSN
22. A comparative between hadoop mapreduce and apache Spark on HDFS.
23. A new reformulation of the load balancing problem in cloud computing based on TSP and ACO.
24. Cloud-RSA: An Enhanced Homomorphic Encryption Scheme.
25. Assessing Cost and Response Time of a Web Application Hosted in a Cloud Environment.
26. A Novel Architecture with Dynamic Queues Based on Fuzzy Logic and Particle Swarm Optimization Algorithm for Task Scheduling in Cloud Computing.
27. CAFISGO: a Capability Assessment Framework for Information Security Governance in Organizations.
28. DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things.
29. An enhanced DTLS protocol for Internet of Things applications.
30. Cloud-ElGamal: An efficient homomorphic encryption scheme.
31. An Efficient Key Establishment Protocol for Wireless Sensor Networks.
32. Challenges of using homomorphic encryption to secure cloud computing.
33. LEAP Enhanced: A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN.
34. Lightweight Intrusion Detection Scheme for Wireless Sensor Networks.
35. LEACH protocol for multimedia traffic with a variable-size packet.
36. Effect of a node's death on behavior of the LEACH protocol and its descendants.
37. Performance analysis of routing protocols for wireless sensor networks.
38. Gateway and Cluster Head Election using Fuzzy Logic in heterogeneous wireless sensor networks.
39. Evaluation of LEACH QoS subject to multimedia traffic types.
40. Coverage and Connectivity Preserving Routing Protocol for heterogeneous wireless sensor networks.
41. Balanced and Centralized Distributed Energy Efficient Clustering for heterogeneous wireless sensor networks.
42. Securely Adapt a Paillier Encryption Scheme to Protect the Data Confidentiality in the Cloud Environment.
43. Throughput and Network Lifetime Maximization in Dual-Radio Sensor Networks Integrated Into the Internet of Things.
44. A QoS-Guaranteed Coverage and Connectivity Preservation Routing Protocol for Heterogeneous Wireless Sensor Networks.
45. Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing.
46. An Efficient Energy-Aware Tasks Scheduling with Deadline-Constrained in Cloud Computing †.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.