Security and privacy in cloud computing: technical review YS Abdulsalam, M Hedabou Future Internet 14 (1), 11, 2021 | 134 | 2021 |
Dew-cloud-based hierarchical federated learning for intrusion detection in IoMT P Singh, GS Gaba, A Kaur, M Hedabou, A Gurtov IEEE journal of biomedical and health informatics 27 (2), 722-731, 2022 | 65 | 2022 |
An artificial intelligence approach toward food spoilage detection and analysis E Sonwani, U Bansal, R Alroobaea, AM Baqasah, M Hedabou Frontiers in Public Health 9, 816226, 2022 | 63 | 2022 |
Applying encryption algorithm for data security in cloud storage Z Kartit, A Azougaghe, H Kamal Idrissi, M El Marraki, M Hedabou, ... Advances in Ubiquitous Networking: Proceedings of the UNet’15 1, 141-154, 2016 | 62 | 2016 |
Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare GS Gaba, M Hedabou, P Kumar, A Braeken, M Liyanage, M Alazab Sustainable Cities and Society 80, 103766, 2022 | 61 | 2022 |
Design and analysis of high-speed free space optical (FSO) communication system for supporting fifth generation (5G) data services in diverse geographical locations of India H Singh, N Mittal, R Miglani, H Singh, GS Gaba, M Hedabou IEEE Photonics Journal 13 (5), 1-12, 2021 | 59 | 2021 |
Countermeasures for preventing comb method against SCA attacks M Hedabou, P Pinel, L Bénéteau Information Security Practice and Experience: First International Conference …, 2005 | 50 | 2005 |
A comb method to render ECC resistant against Side Channel Attacks M Hedabou, P Pinel, L Bénéteau Cryptology ePrint Archive, 2004 | 38 | 2004 |
CS-IBE: a data confidentiality system in public cloud storage system A Bentajer, M Hedabou, K Abouelmehdi, S Elfezazi Procedia computer science 141, 559-564, 2018 | 36 | 2018 |
An IBE-based design for assured deletion in cloud storage A Bentajer, M Hedabou, K Abouelmehdi, Z Igarramen, S El Fezazi Cryptologia 43 (3), 254-265, 2019 | 34 | 2019 |
A novel intrusion detection approach using machine learning ensemble for IoT environments P Verma, A Dumka, R Singh, A Ashok, A Gehlot, PK Malik, GS Gaba, ... Applied Sciences 11 (21), 10268, 2021 | 30 | 2021 |
An efficient machine learning-based resource allocation scheme for SDN-enabled fog computing environment J Singh, P Singh, M Hedabou, N Kumar IEEE Transactions on Vehicular Technology 72 (6), 8004-8017, 2023 | 28 | 2023 |
Energy-efficient and secure load balancing technique for SDN-enabled fog computing J Singh, P Singh, EM Amhoud, M Hedabou Sustainability 14 (19), 12951, 2022 | 24 | 2022 |
An efficient algorithm for data security in cloud storage A Azougaghe, Z Kartit, M Hedabou, M Belkasmi, M El Marraki 2015 15th International Conference on Intelligent Systems Design and …, 2015 | 23 | 2015 |
Many-to-one matching game towards secure virtual machines migration in cloud computing A Azougaghe, OA Oualhaj, M Hedabou, M Belkasmi, A Kobbane 2016 International Conference on Advanced Communication Systems and …, 2016 | 19 | 2016 |
An electronic voting system based on homomorphic encryption and prime numbers A Azougaghe, M Hedabou, M Belkasmi 2015 11th International Conference on Information Assurance and Security …, 2015 | 19 | 2015 |
FADETPM: Novel approach of file assured deletion based on trusted platform module Z Igarramen, M Hedabou Cloud Computing and Big Data: Technologies, Applications and Security 3, 49-59, 2019 | 18 | 2019 |
Cryptography for addressing cloud computing security, privacy, and trust issues M Hedabou Computer and Cyber Security, 281-304, 2018 | 17 | 2018 |
Some ways to secure elliptic curve cryptosystems M Hedabou, L Bénéteau, P Pinel Advances in applied Clifford algebras 18, 677-688, 2008 | 17 | 2008 |
A frobenius map approach for an efficient and secure multiplication on Koblitz curves M Hedabou International Journal of Network Security 3 (3), 239-243, 2006 | 16 | 2006 |