An integrated artificial intelligence of things environment for river flood prevention Z Boulouard, M Ouaissa, M Ouaissa, F Siddiqui, M Almutiq, M Krichen Sensors 22 (23), 9485, 2022 | 32 | 2022 |
An Enhanced Authentication Protocol based Group for Vehicular Communications over 5G Networks M Ouaissa, M Houmer, M Ouaissa | 31 | 2020 |
A fog-cluster based load-balancing technique P Singh, R Kaur, J Rashid, S Juneja, G Dhiman, J Kim, M Ouaissa Sustainability 14 (13), 7961, 2022 | 28 | 2022 |
An Efficient and Secure Authentication and Key Agreement Protocol of LTE Mobile Network for an IoT System M Ouaissa, M Ouaissa, A Rhattoy | 17 | 2019 |
Advances in greener energy technologies AK Bhoi, KS Sherpa, A Kalam, GS Chae Springer, 2020 | 16 | 2020 |
An improved privacy authentication protocol for 5G mobile networks M Ouaissa, M Ouaissa 2020 International Conference on Advances in Computing, Communication …, 2020 | 15 | 2020 |
Detecting hateful and offensive speech in Arabic social media using transfer learning Z Boulouard, M Ouaissa, M Ouaissa, M Krichen, M Almutiq, K Gasmi Applied Sciences 12 (24), 12823, 2022 | 13 | 2022 |
Opportunistic networks: fundamentals, applications and emerging trends A Verma, P Verma, SK Dhurandher, I Woungang CRC Press, 2021 | 12 | 2021 |
New security level of authentication and key agreement protocol for the IoT on LTE mobile networks M Ouaissa, A Rhattoy, I Chana 2018 6th International Conference on Wireless Networks and Mobile …, 2018 | 12 | 2018 |
A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks M Ouaissa, A Rhattoy International Journal of Electrical and Computer Engineering (IJECE) 8 (2 …, 2018 | 12 | 2018 |
A secure vehicle to everything (v2x) communication model for intelligent transportation system M Ouaissa, M Ouaissa, M Houmer, S El Hamdani, Z Boulouard Computational Intelligence in Recent Communication Networks, 83-102, 2022 | 11 | 2022 |
Secure authentication scheme for 5g-based v2x communications M Houmer, M Ouaissa, M Ouaissa Procedia Computer Science 198, 276-281, 2022 | 11 | 2022 |
A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture M Ouaissa, A Rhattoy International Journal of Intelligent Engineering and Systems 12 (1), 151-164, 2019 | 11 | 2019 |
Artificial intelligence of things (AIoT) for renewable energies systems S El Himer, M Ouaissa, M Ouaissa, Z Boulouard Artificial Intelligence of Things for Smart Green Energy Management, 1-13, 2022 | 9 | 2022 |
Cyber security for next-generation computing technologies IU Khan, M Ouaissa, M Ouaissa, Z Abou El Houda, MF Ijaz CRC Press, 2024 | 8 | 2024 |
Machine learning for hate speech detection in arabic social media Z Boulouard, M Ouaissa, M Ouaissa Computational Intelligence in Recent Communication Networks, 147-162, 2022 | 8 | 2022 |
Analysis of Authentication and Key Agreement (AKA) Protocols in Long-Term Evolution (LTE) Access Network M Ouaissa, A Rhattoy, M Lahmer Advances in Electronics, Communication and Computing, 1-9, 2018 | 8 | 2018 |
Data Analytics and Management: Proceedings of ICDAM A Khanna, D Gupta, Z Pólkowski, S Bhattacharyya, O Castillo Springer, 2021 | 7 | 2021 |
Cyber security issues for iot based smart grid infrastructure M Ouaissa, M Ouaissa IOP Conference Series: Materials Science and Engineering 937 (1), 012001, 2020 | 7 | 2020 |
SE-GPSR: Secured and enhanced greedy perimeter stateless routing protocol for vehicular ad hoc networks M Houmer, M Ouaissa, M Ouaissa, M Hasnaoui International Association of Online Engineering, 2020 | 7 | 2020 |