Publications Bouabid EL OUAHIDI

Revues:

Indexé Scopus

1)     Ben Bouazza, N., Lemoudden, M., El Ouahidi, B., Bourget, D. “Identity federation scenarios for the cloud”,International Journal of Engineering and Technology, Volume 6, Issue 2, April/May 2014, Pages 1290-1295.

 

Indexé Scopus

2)     Ghallali, M., El Mir, A. , El Ouahidi, B. , Bounabat, B., El Hami, N. , Elmir, B., “Mobile security: Designing a new framework limiting malware spread in the mobile cloud computing”, Journal of Theoretical and Applied Information Technology, Volume 57, Issue 3, November 2013, Pages 354-366.

. Indexé Scopus

3)     Lemoudden, M. , Ben Bouazza, N. , El Ouahidi, B., Bourget, D., “A survey of cloud computing security overview of attack vectors and defense mechanisms” , Journal of Theoretical and Applied Information Technology, Volume 54, Issue 2, August 2013, Pages 325-330.

 

Indexé Scopus

4)     Erritali M, El Ouahidi B, “A survey on VANET intrusion detection systems”, International Journal of Engineering and Technology, Volume 5, Issue 2, 2013, Pages 1985-1989.

 

Indexé Scopus

5)     Erritali, M., El Ouahidi, B., Hssina, B, Bouikhalene, B., Merbouha, B. “An ontology-based intrusion detection for vehicular ad hoc networks”, Journal of Theoretical and Applied Information Technology Volume 53, Issue 3, July 2013, Pages 410-414.

 

Indexé Scopus

6)     Chihab, Y., Ouhman, A.A, Erritali, M, EL Ouahidi, B, “Detection & classification of internet intrusion based on the combination of random forest and Naïve Bayes”, International Journal of Engineering and Technology, Volume 5, Issue 3, June 2013, Pages 2116-2126.

 

Indexé Scopus

7)     Ammari N., Ghallali M., El Kalam M, EL Hami N., Ait Ouahman A, El Ouahidi B., “Mobile security: Security mechanisms and protection of mobile applications”, Journal of Theoretical and Applied Information Technology, Volume 70, Issue 2, 2014, Pages 302-315.

Indexé Scopus

8)     Haji, R. , Ghallali, M. , Hasbi, A.  El Ouahidi, B, “Designing an adaptive QOS-oriented and secure framework for wireless sensor networks in emergency situation”, Journal of Theoretical and Applied Information Technology, Volume 42, Issue 1, August 2012, Pages 59-69

Indexé:  

https://www.ijarcsse.com/indexing.php/

9)     M. Erritali, R. Oussama, B. El Ouahidi, ‘’UML modelling of geographic routing protocol"Greedy Perimeter Stateless Routing" for its  integration into the '' Java Network Simulator’’, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X,Volume 2, Issue 2,February 2012

 

 

Indexé:

http://airccse.org/journal/ijdps/indexing.html

10)  M. ERRITALI, R.Oussama Mohamed Reda, B. OuahidiA BEACONING APPROACH WITH KEY EXCHANGE IN VEHICULAR AD HOC NETWORKS’, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.6, November 2012 ISSN2229-3957 e-ISSN:0976-9757 doi: 10.5121/ijdps

 

Indexé:

http://airccse.org/journal/ijdps/indexing.html

11)  M. ERRITALI, R.Oussama Mohamed Reda, B. Ouahidi, ‘A Contribution to Secure The Routing Protocol –Greedy Permimeter Stateless Routing- Using A Symetric Signature Based AES and MD5 Hash’, International Journal of Distributed and Parallel Systems, Vol.2, No.5, November 2011 ISSN2229-3957 e-ISSN:0976-9757 doi: 10.5121/ijdps