default search action
Mostafa Azizi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Abdellah Azizi, Mostafa Azizi, M'barek Nasri:
Artificial Intelligence Techniques in Medical Imaging: A Systematic Review. Int. J. Online Biomed. Eng. 19(17): 66-97 (2023) - 2022
- [j14]M. Umar Khan, Mostafa Azizi, Ana García Armada, José Joaquín Escudero Garzás:
Unsupervised Clustering for 5G Network Planning Assisted by Real Data. IEEE Access 10: 39269-39281 (2022) - [j13]Yassine Azizi, Mostafa Azizi, Mohamed Elboukhari:
Log Data Integrity Solution based on Blockchain Technology and IPFS. Int. J. Interact. Mob. Technol. 16(15): 4-15 (2022) - 2020
- [j12]Khalil Ibrahim Hamzaoui, Mohammed Berrajaa, Mostafa Azizi, Giuseppe Lipari, Pierre Boulet:
Measurement-based methodology for modelling the energy consumption of mobile devices. Int. J. Reason. based Intell. Syst. 12(1): 4-16 (2020) - [j11]Anas Mokhtari, Mostafa Azizi, Mohammed Gabli:
Scientific Applications in the Cloud: Resource Optimisation based on Metaheuristics. Scalable Comput. Pract. Exp. 21(4): 649-660 (2020) - [c20]Noureddine Kerzazi, Mariam Tajir, Redouane Boulouiz, Mohammed Bellaoui, Mostafa Azizi:
Teaching Pedigree Analysis and Risk Calculation for Diagnosis Purposes of Genetic Disease. WorldCIST (1) 2020: 472-485
2010 – 2019
- 2019
- [j10]Aymen Ghilen, Mostafa Azizi:
Integration of a quantum scheme for key distribution and authentication within EAP-TLS protocol. Int. J. Inf. Commun. Technol. 14(3): 277-294 (2019) - 2018
- [j9]Mohamed El Beqqal, Mostafa Azizi:
Taxonomy on IoT Technologies for Designing Smart Systems. Int. J. Interact. Mob. Technol. 12(5): 182-191 (2018) - [j8]Mohamed El Beqqal, Mostafa Azizi, Jean-Louis Lanet:
A Novel Approach for an Interoperable Biometric Verification. Int. J. Interact. Mob. Technol. 12(6): 124-132 (2018) - 2017
- [j7]Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue:
Enhancing the Security of IEEE 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution. Wirel. Pers. Commun. 95(2): 1655-1675 (2017) - [c19]Karima Aissaoui, Mostafa Azizi:
El-Security: E-learning Systems Security Checker Plug-in. BDCA 2017: 96:1-96:6 - 2016
- [j6]Sara Koulali, Essaid Sabir, Tarik Taleb, Mostafa Azizi:
A green strategic activity scheduling for UAV networks: A sub-modular game perspective. IEEE Commun. Mag. 54(5): 58-64 (2016) - [j5]Karima Aissaoui, El Hassane Ettifouri, Mostafa Azizi:
EXPEL Protocol Based Architecture for Cooperative E-Learning. Int. J. Emerg. Technol. Learn. 11(10): 59-64 (2016) - [j4]Aymen Ghilen, Mostafa Azizi, Ridha Bouallègue:
Upgrade of a quantum scheme for authentication and key distribution along with a formal verification based on model checking technique. Secur. Commun. Networks 9(18): 4949-4956 (2016) - [c18]Sara Koulali, Essaid Sabir, Mostafa Azizi:
Energy optimization through duty cycling scheduling in mobile social networks: A non-cooperative game theory approach. NOMS 2016: 772-775 - [c17]Sara Koulali, Mostafa Azizi, Essaïd Sabir, Rim Koulali:
Optimal Beaconing Policy for Tactical Unmanned Aerial Vehicles. UNet 2016: 659-667 - 2015
- [c16]Noura Ouerdi, Ilhame El Farissi, Abdelmalek Azizi, Mostafa Azizi:
Artificial neural network-based methodology for vulnerabilities detection in EMV cards. IAS 2015: 85-90 - [c15]Mohammed Amine Kasmi, Mostafa Azizi, Jean-Louis Lanet:
Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code. IAS 2015: 104-110 - [c14]Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue:
Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard. AICCSA 2015: 1-7 - [c13]Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue:
Integration of a quantum authenticated key distribution scheme in the EAP-TLS protocol. AICCSA 2015: 1-5 - [c12]Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue:
Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol. AICCSA 2015: 1-7 - [c11]Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue:
Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution. CANS 2015: 238-247 - 2014
- [c10]Sara Koulali, Essaid Sabir, Abdellatif Kobbane, Mostafa Azizi:
Ferry-based architecture for Participatory Sensing. IWCMC 2014: 845-849 - [c9]Mohamed Emharraf, Mohammed Rahmoun, Mohammed Saber, Mostafa Azizi:
Mobile robot unknown indoor environment exploration using self-localization and grid map building. SITA 2014: 1-5 - 2013
- [j3]Abdelmalek Azizi, Mostafa Azizi:
Instances of Arabic Cryptography in Morocco II. Cryptologia 37(4): 328-337 (2013) - 2012
- [c8]Mohammed-Amine Koulali, Abdellatif Kobbane, Mohammed El Koutbi, Mostafa Azizi:
QDGRP : A hybrid QoS Distributed Genetic routing protocol for Wireless Sensor Networks. ICMCS 2012: 47-52 - [c7]Noura Ouerdi, M'hammed Ziane, Abdelmalek Azizi, Mostafa Azizi:
Modeling Embedded Systems with SysML. ICMCS 2012: 905-910 - [c6]Ilhame El Farissi, Mostafa Azizi, Mimoun Moussaoui:
Detection of smart card attacks using neural networks. ICMCS 2012: 949-954 - [i2]Mohammed-Amine Koulali, Mohammed El Koutbi, Abdellatif Kobbane, Mostafa Azizi:
QGRP: A Novel QoS-Geographic Routing Protocol for Multimedia Wireless Sensor Networks. CoRR abs/1201.3950 (2012) - 2011
- [j2]Abdelmalek Azizi, Mostafa Azizi:
Instances of Arabic Cryptography in Morocco. Cryptologia 35(1): 47-57 (2011) - 2010
- [c5]Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Azizi:
Improving the Security of CHAP Protocol by Quantum Cryptography. IDC 2010: 241-245 - [i1]Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Azizi:
Analysis of the Security of BB84 by Model Checking. CoRR abs/1005.4504 (2010)
2000 – 2009
- 2009
- [j1]Mohammed Blej, Mostafa Azizi:
Modeling and Analysis of a Real-Time System Using the Networks of Extended Petri. J. Comput. 4(7): 641-645 (2009) - 2008
- [c4]Mohamed Elboukhari, Abdelmalek Azizi, Mostafa Azizi:
Security Oriented Analysis of B92 by Model Checking. NTMS 2008: 1-6 - 2002
- [c3]Mostafa Azizi:
Concurrent Hardware/Software Coverification with Java Threads. PARELEC 2002: 95-98 - 2000
- [c2]Mostafa Azizi, El Mostapha Aboulhamid, Sofiène Tahar:
Sequential and Distributed Simulations Using Java Threads. PARELEC 2000: 237-243
1990 – 1999
- 1999
- [c1]Mostafa Azizi, El Mostapha Aboulhamid, Sofiène Tahar:
Multithreading-based Coverification Technique of HW/SW Systems. PDPTA 1999: 1999-2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint