Internet of Things Security: Layered classification of attacks and possible Countermeasures O El Mouaatamid, M Lahmer, M Belkasmi Electron. J. Inf. Technol 9 (9), 24-37, 2016 | 87 | 2016 |
Applying encryption algorithm for data security in cloud storage Z Kartit, A Azougaghe, H Kamal Idrissi, M El Marraki, M Hedabou, ... Advances in Ubiquitous Networking: Proceedings of the UNet’15 1, 141-154, 2016 | 53 | 2016 |
Bitcoin security with post quantum cryptography MC Semmouni, A Nitaj, M Belkasmi Networked Systems: 7th International Conference, NETYS 2019, Marrakech …, 2019 | 31 | 2019 |
Ray tracing technique based 60 GHz band propagation modelling and influence of people shadowing A Khafaji, R Saadane, J El Abbadi, M Belkasmi International Journal of Electrical and Computer Engineering 2 (9), 1937-1943, 2008 | 31 | 2008 |
Constructing accurate and robust HMM/GMM models for an Arabic speech recognition system MOM Khelifa, YM Elhadj, Y Abdellah, M Belkasmi International Journal of Speech Technology 20, 937-949, 2017 | 30 | 2017 |
On the computing of the minimum distance of linear block codes by heuristic methods M Askali, A Azouaoui, S Nouh, M Belkasmi arXiv preprint arXiv:1303.4375, 2013 | 28 | 2013 |
Iterative threshold decoding of parallel concatenated block codes M Belkasmi, M Lahmer, M Benchrifa 4th International Symposium on Turbo Codes & Related Topics; 6th …, 2006 | 28 | 2006 |
For an independent spell-checking system from the Arabic language vocabulary H Bakkali, A Yousfi, H Gueddah, M Belkasmi International Journal of Advanced Computer Science and Applications, 2014 | 23 | 2014 |
An efficient algorithm for data security in cloud storage A Azougaghe, Z Kartit, M Hedabou, M Belkasmi, M El Marraki 2015 15th International Conference on Intelligent Systems Design and …, 2015 | 22 | 2015 |
Iterative threshold decoding of product codes constructed from majority logic decodable codes M Belkasmi, M Lahmer, F Ayoub 2006 2nd International Conference on Information & Communication …, 2006 | 22 | 2006 |
Efficient information set decoding based on genetic algorithms A Azouaoui, I Chana, M Belkasmi Scientific Research Publishing, 2012 | 21 | 2012 |
VHDL design and FPGA implementation of a parallel reed-solomon (15, K, D) encoder/decoder M Elharoussi, A Hamyani, M Belkasmi International Journal of Advanced Computer Science and Applications 4 (1), 2013 | 20 | 2013 |
New results for Shannon capacity over generalized multipath fading channels with MRC diversity FE Bouanani, H Ben-Azza, M Belkasmi EURASIP Journal on Wireless Communications and Networking 2012, 1-12, 2012 | 20 | 2012 |
An electronic voting system based on homomorphic encryption and prime numbers A Azougaghe, M Hedabou, M Belkasmi 2015 11th International Conference on Information Assurance and Security …, 2015 | 19 | 2015 |
Decoding of block codes by using genetic algorithms and permutations set S Nouh, I Chana, M Belkasmi International Journal of Communication Networks and Information Security …, 2013 | 18 | 2013 |
Efficient dual domain decoding of linear block codes using genetic algorithms A Azouaoui, M Belkasmi, A Farchane Journal of Electrical and Computer Engineering 2012, 19-19, 2012 | 18 | 2012 |
Iterative decoding of product block codes based on the genetic algorithms M Belkasmi, H Berbia, F El Bouanani 7th International ITG Conference on Source and Channel Coding, 1-6, 2008 | 18 | 2008 |
Many-to-one matching game towards secure virtual machines migration in cloud computing A Azougaghe, OA Oualhaj, M Hedabou, M Belkasmi, A Kobbane 2016 International Conference on Advanced Communication Systems and …, 2016 | 17 | 2016 |
The filtered combination of the weighted edit distance and the Jaro-Winkler distance to improve spellchecking Arabic texts H Gueddah, A Yousfi, M Belkasmi 2015 IEEE/ACS 12th International Conference of Computer Systems and …, 2015 | 17 | 2015 |
A scalable group authentication scheme based on combinatorial designs with fault tolerance for the Internet of things O El Mouaatamid, M Lahmer, M Belkasmi SN Computer Science 1, 1-13, 2020 | 16 | 2020 |