default search action
Mohammed Ouzzif
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c38]Zakariyae Bouflous, Fadoua Haraka, Mohammed Ouzzif, Khalid Bouragba:
Enhanced Vertical Pod Auto Scaling with Decision Tree Regressor-Max in Kubernetes. WINCOM 2024: 1-5 - 2023
- [j15]Zakariyae Bouflous, Mohammed Ouzzif, Khalid Bouragba:
Resource-Aware Least Busy (RALB) Strategy for Load Balancing in Containerized Cloud Systems. Int. J. Cloud Appl. Comput. 13(1): 1-14 (2023) - [c37]Jaouhara Bouamama, Yahya Benkaouz, Mohammed Ouzzif:
EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing. DASC/PiCom/CBDCom/CyberSciTech 2023: 375-382 - [c36]Yasser Elouargui, Mahmoud Zyate, Abdellatif Sassioui, Meriyem Chergui, Mohamed El-Kamili, Mohammed Ouzzif:
A Comprehensive Survey On Efficient Transformers. WINCOM 2023: 1-6 - [c35]Hajar Ouhmidou, Abdellah Nabou, Abdelouafi Ikidid, Wafa Bouassaba, Mohammed Ouzzif, Moulay Ahmed El Kiram:
Traffic Control, Congestion Management and Smart Parking through VANET, ML, and IoT: A Review. WINCOM 2023: 1-6 - [c34]Abdelhadi Rachad, Lotfi Gaiz, Khalid Bouragba, Mohammed Ouzzif:
Predictive Maintenance-as-a-Service (PdMaaS) in Industry 4.0 using Blockchain. WINCOM 2023: 1-6 - [c33]Abdellatif Sassioui, Rachid Benouini, Yasser El Ouargui, Mohamed El-Kamili, Meriyem Chergui, Mohammed Ouzzif:
Visually-Rich Document Understanding: Concepts, Taxonomy and Challenges. WINCOM 2023: 1-7 - [c32]Kamal Souali, Manal Souali, Mohammed Ouzzif:
An RFID-Based Traceability Approach to Improve the Overall Health Status Management in Morocco. WINCOM 2023: 1-6 - [i3]Abdellah Ouaguid, Mohamed Ouzzif, Noreddine Abghour:
Vulnerability Detection Approaches on Application Behaviors in Mobile Environment. CoRR abs/2307.16064 (2023) - 2022
- [j14]Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif:
Effect of black hole attack in different mobility models of MANET using OLSR protocol. Int. J. Inf. Comput. Secur. 18(1/2): 219-235 (2022) - [j13]Abdellah Ouaguid, Fadwa Fathi, Mouad Zouina, Mohammed Ouzzif, Noreddine Abghour:
Androscanreg 2.0: Enhancement of Android Applications Analysis in a Flexible Blockchain Environment. Int. J. Softw. Innov. 10(1): 1-28 (2022) - [c31]Zakariyae Bouflous, Mohammed Ouzzif, Khalid Bouragba:
Analysis of Load Balancing Algorithms Used in the Cloud Computing Environment: Advantages and Limitations. FTC (3) 2022: 206-226 - [c30]Wafa Bouassaba, Abdellah Nabou, Mohammed Ouzzif:
Review on Machine Learning Based Intrusion Detection for MANET Security. WINCOM 2022: 1-6 - [c29]Abdelhadi Rachad, Khalid Bouragba, Mohammed Ouzzif:
Smart contract for cloud SLA using Service Oriented Architecture and Blockchain. WINCOM 2022: 1-5 - 2021
- [j12]Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif:
The quality factor for detecting node isolation attack in mobile ad hoc networks using OLSR protocol. Int. J. Internet Protoc. Technol. 14(4): 197-204 (2021) - [j11]Mohamed Issam Ayadi, Abderrahim Maizate, Mohammed Ouzzif, Charif Mahmoudi:
Deep Learning Forwarding in NDN With a Case Study of Ethernet LAN. Int. J. Web Based Learn. Teach. Technol. 16(1): 1-9 (2021) - [j10]Ouchker Elmekki, Abderrahim Maizate, Mohammed Ouzzif:
The Effects of Physical and Mac Parameters on the Routing by Cross-Layers Interaction Approach. Int. J. Web Based Learn. Teach. Technol. 16(2): 1-11 (2021) - [j9]Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif:
New MPR Computation for Securing OLSR Routing Protocol Against Single Black Hole Attack. Wirel. Pers. Commun. 117(2): 525-544 (2021) - [c28]Ezzoubair Zecri, Mohammed Ouzzif, Ismail El Haddioui:
Study of the use of gamification elements in e-learning applications. NISS (ACM) 2021: 17:1-17:5 - 2020
- [c27]Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif, Mohammed-Alamine El Houssaini:
Normality Test to Detect the Congestion in MANET by Using OLSR Protocol. NISS 2020: 17:1-17:5 - [c26]Youssef Aamer, Yahya Benkaouz, Mohammed Ouzzif, Khalid Bouragba:
A new approach for increasing K-nearest neighbors performance. WINCOM 2020: 1-5
2010 – 2019
- 2019
- [j8]Othmane Rahmaoui, Kamal Souali, Mohammed Ouzzif:
Improving Software Development Process using Data Traceability Management. Int. J. Recent Contributions Eng. Sci. IT 7(1): 52-58 (2019) - [j7]Mohammed Saïd Salah, Abderrahim Maizate, Mohamed Ouzzif, Mohamed Toumi:
Mobile nodes for improving security and lifetime efficiency in wireless sensor networks. Int. J. Pervasive Comput. Commun. 15(1): 2-15 (2019) - [j6]Amine Rais, Khalid Bouragba, Mohammed Ouzzif:
Optimal Routing and Clustering Technique for Wireless Sensor Networks. J. Commun. 14(9): 758-764 (2019) - [j5]Amine Rais, Khalid Bouragba, Mohammed Ouzzif:
Routing and Clustering of Sensor Nodes in the Honeycomb Architecture. J. Comput. Networks Commun. 2019: 4861294:1-4861294:12 (2019) - [c25]Mohamed Issam Ayadi, Abderrahim Maizate, Mohamed Ouzzif, Charif Mahmoudi:
Deep Learning in Building Management Systems over NDN: Use Case of Forwarding and HVAC Control. iThings/GreenCom/CPSCom/SmartData 2019: 1192-1198 - [c24]Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif:
Effect of Single and Cooperative Black Hole Attack in MANET using OLSR protocol. NISS 2019: 74:1-74:5 - [c23]Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif:
A review on improving recommendations using traceability. SCA 2019: 69:1-69:4 - [c22]Naoufal Ainane, Mohamed Ouzzif, Khalid Bouragba:
Health monitoring system in a smart home. SCA 2019: 114:1-114:5 - [c21]Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif, Ismail El Haddioui:
Recommending Moodle Resources Using Chatbots. SITIS 2019: 677-680 - [c20]Youssef Aamer, Yahya Benkaouz, Mohammed Ouzzif, Khalid Bouragba:
Initial Centroid Selection Method for an Enhanced K-means Clustering Algorithm. UNet 2019: 182-190 - 2018
- [j4]Abdellah Ouaguid, Noreddine Abghour, Mohammed Ouzzif:
A Novel Security Framework for Managing Android Permissions Using Blockchain Technology. Int. J. Cloud Appl. Comput. 8(1): 55-79 (2018) - [j3]Amine Rais, Khalid Bouragba, Mohamed Ouzzif:
Determination of Itinerary Planning for Multiple Agents in Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - [c19]Fadwa Fathi, Noureddine Abghour, Mohammed Ouzzif:
From Big Data to Better Behavior in Self-Driving Cars. ICCBDC 2018: 42-46 - [c18]Naoufal Ainane, Mohamed Ouzzif, Khalid Bouragba:
Data security of smart cities. SCA 2018: 89:1-89:13 - [c17]Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif:
Evaluation of MANET Routing Protocols under Black Hole Attack Using AODV and OLSR in NS3. WINCOM 2018: 1-6 - 2017
- [c16]Fadwa Fathi, Noreddine Abghour, Mohammed Ouzzif:
From Big data platforms to smarter solution, with intelligent learning: [PAV] 4 - Pave the way for Intelligence. ICCBDC 2017: 11-16 - 2016
- [j2]Mohamed Toumi, Abderrahim Maizate, Mohammed Ouzzif, Med Said Salah:
Dynamic Clustering Algorithm for Tracking Targets with High and Variable Celerity (ATHVC). J. Comput. Networks Commun. 2016: 7631548:1-7631548:10 (2016) - [c15]Hanane El Manssouri, Soufiane Farrah, El Houssaine Ziyati, Mohammed Ouzzif:
Proposition of improvement areas in most heavy an light stemmer algorithms novel stemmer: EST.Stemmer. CIST 2016: 654-657 - [c14]Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif:
An overview of traceability: Definitions and techniques. CIST 2016: 789-793 - [c13]Mohamed Toumi, Abderrahim Maizate, Mohammed Ouzzif, Med Said Salah:
Dynamic Clustering Algorithm for Tracking Target with High and Variable Celerity. MASCOTS 2016: 475-480 - [c12]Rachid Aouami, Mohamed Hanaoui, Mounir Rifi, Mohammed Ouzzif:
Packet Delay Analysis in Wireless Sensor Networks Using Fountain Code Enabled-DCF. UNet 2016: 177-187 - 2015
- [c11]Imane Hilal, Nadia Afifi, Mohamed Ouzzif, Hicham Belhaddaoui:
Considering dependability requirements in the context of Decision Support Systems. AICCSA 2015: 1-8 - [c10]Sara Najam, Hajar Mousannif, Mohamed Ouzzif:
Building a structured collaboration system from XML specification. AICCSA 2015: 1-8 - [c9]Rachid Aouami, Essaid Sabir, Mounir Rifi, Mohamed Ouzzif:
Fountain-code-enabled DCF for optimazing throughput in wireless sensors. ICITST 2015: 431-436 - [c8]Mohammed Saïd Salah, Abderrahim Maizate, Mohammed Ouzzif:
Security approaches based on elliptic curve cryptography in wireless sensor networks. ICM 2015: 35-38 - [c7]Hassan Echoukairi, Khalid Bourgba, Mohammed Ouzzif:
A Survey on Flat Routing Protocols in Wireless Sensor Networks. UNet 2015: 311-324 - [c6]Smail Tigani, Mohammed Ouzzif, Rachid Saadane:
Statistical Learning Based Framework for Random Networks Knowledge Extraction Applied in Smart Cities. UNet 2015: 477-487 - [c5]Hicham Magri, Noreddine Abghour, Mohamed Ouzzif:
Analytical models for jitter and QoS requirements with IPP and MMPP-2 traffics. WINCOM 2015: 1-6 - 2014
- [c4]Amine Rais, Khalid Bouragba, Elhoussaine Ziyati, Mohammed Ouzzif:
Energy consumption balancing in wireless sensors networks. ICMCS 2014: 933-937 - [c3]Imane Hilal, Nadia Afifi, Belhadaoui Hicham, Reda Filali Hilali, Mohammed Ouzzif:
Aspect-Oriented Method for dependable data warehouse systems based on MDA approach. ICMCS 2014: 1274-1278 - [c2]Mohammed Ouzzif, Marouane Hamdani, Hassan Mountassir, Mohammed Erradi:
A Formal Modeling Approach for Emergency Crisis Response in Health during Catastrophic Situation. ISCRAM-med 2014: 112-119 - 2013
- [i2]Imane Hilal, Nadia Afifi, Reda Filali Hilali, Mohammed Ouzzif:
Toward a New Approach for Modeling Dependability of Data Warehouse System. CoRR abs/1311.1181 (2013) - 2012
- [c1]Sara Najam, Tom Dinkelaker, Mohamed Erradi, Mohamed Ouzzif:
A dynamic proxy for lightweight web service composition. ICMCS 2012: 699-704 - [i1]Rachid Haboub, Mohammed Ouzzif:
Secure and reliable routing in mobile adhoc networks. CoRR abs/1203.2044 (2012)
2000 – 2009
- 2008
- [j1]Mohammed Ouzzif, Mohammed Erradi, Hassan Mountassir:
Description of a teleconferencing floor control protocol and its implementation. Eng. Appl. Artif. Intell. 21(3): 430-441 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint