Abstract is missing.
- Information system security governance: Technology intelligence perspectiveMounia Zaydi, Bouchaib Nassereddine. 1-6 [doi]
- Designing optimal wireless-based ICT platform for smart grid - CDMA450 proof-of-conceptAbdelfatteh Haidine, Sanae El Hassani, Abdelhak Aqqal. 1-7 [doi]
- A secure cooperative transmission model in VANET using attribute based encryptionMounia Bouabdellah, Faissal El Bouanani, Hussain Ben-Azza. 1-6 [doi]
- Many-to-one matching game towards secure virtual machines migration in cloud computingAli Azougaghe, Omar Ait Oualhaj, Mustapha Hedabou, Mostafa Belkasmi, Abdellatif Kobbane. 1-7 [doi]
- ICH-LEACH: An enhanced LEACH protocol for wireless sensor networkM. Bennani Mohamed Taj, M. Ait Kbir. 1-5 [doi]
- A new performance results of MIMO system with orthogonal STBC over independent and identical weibull fading channelsAbdelmajid Bessate, Faissal El Bouanani. 1-7 [doi]
- Sparse deconvolution of periodic random impulses based on convex relaxationKhalid Sabri, Abdelouahad Choklati. 1-8 [doi]
- A reduced complexity decoder using compact genetic algorithm for linear block codesAhlam Berkani, Mostafa Belkasmi. 1-6 [doi]
- Design of good linear codes for a decoder based on majority voting procedureIssam Abderrahman Joundan, Saïd Nouh, Abdelwahed Namir. 1-6 [doi]
- Improving GGH cryptosystem using generalized low density latticesSarah Kamel, Mireille Sarkiss, Ghaya Rekaya-Ben Othman. 1-6 [doi]
- Design and analysis of protecting strategies against border crossing under irregular conditionsImen Arfaoui, Noureddine Boudriga, Khalifa Trimeche. 1-6 [doi]
- Topology-aware approach for reducing power consumption in LEO satellite constellationsMohammed Hussein, Israa Elayyan, Wasel Ghanem. 1-5 [doi]
- Correction of sensing imperfections using channel coding in cognitive radio networks while keeping sensing time lowReda Benkhouya, Idriss Chana, Youssef Hadi. 1-5 [doi]
- Authentication protocol conforming to EPC class-1 Gen-2 standardAhmed Maarof, Mohamed Senhadji, Zouheir Labbi, Mostafa Belkasmi. 1-6 [doi]
- LTE-a pro (4.5G) as pre-phase for 5G deployment: Closing the gap between technical requirements and network performanceAbdelfatteh Haidine, Sanae El Hassani. 1-7 [doi]
- Field study of cybercafe usage & security in MoroccoAbdellah Houmz, Mohamed Salim Mezzene, Asmaa Tellabt, Ghita Mezzour, Mohammed El Koutbi. 1-7 [doi]
- Performance analysis of TAS/MRC based MIMO systems over Weibull fading channelsToufik Chaayra, Faissal El Bouanani, Hussain Ben-Azza. 1-6 [doi]
- Non-binary Euclidean Geometry codes: Majority Logic DecodingM'rabet Zakaria, Ayoub Fouad, Belkasmi Mostafa, Yatribi Anouar, Zine El Abidine Alaoui Ismaili. 1-7 [doi]
- Intrusion detection system using PCA and Fuzzy PCA techniquesAmal Hadri, Khalid Chougdali, Rajae Touahni. 1-7 [doi]
- Construction and iterative threshold decoding for low rates Quasi-Cyclic One Step Majority logic decodable codesKarim Rkizat, Mohammed Lahmer, Mostafa Belkasmi, Saïd Nouh. 1-7 [doi]
- Energy efficient and scalable D2D architecture design for public safety networkKamran Ali, Huan Xuan Nguyen, Purav Shah, Quoc-Tuan Vien. 1-6 [doi]
- A comparative performance analysis of position estimation algorithms for GNSS localization in urban areasBassma Guermah, Hassan El Ghazi, Tayeb Sadiki, Yann Ben Maissa, Esmail Ahouzi. 1-7 [doi]
- Non-binary cyclic majority-logic decodable codes: An algebraic construction by using Genetic AlgorithmsAnouar Yatribi, Mostafa Belkasmi, Fouad Ayoub, Zakaria M'rabet. 1-9 [doi]
- A secure QoS aware VANETMouna Garai, Noureddine Boudriga. 1-6 [doi]
- Multi-user techniques in visible light communications: A surveyHanaa Marshoud, Paschalis C. Sofotasios, Sami Muhaidat, George K. Karagiannidis. 1-6 [doi]
- New decoder for linear block codesAbderrazak Farchane, Mostafa Belkasmi. 1-5 [doi]
- Majority logic coding schemes performance over FSO channelsSouad Labghough, Fouad Ayoub, Mostafa Belkasmi. 1-6 [doi]
- A game theoretic approach to multipath traffic control in Content-Centric NetworkingMohamed Labbi, Nabil BenSalah, Nabil Kannouf, Youssef Douzi, Mohammed Benabdellah, Abdelmalek Azizi. 1-7 [doi]
- Review on using game theory in resource allocation for LTE/LTE-AdvancedSanaa Oulaourf, Abdelfatteh Haidine, Hassan Ouahmane. 1-7 [doi]
- Performance analysis of random access mechanisms for machine type communications in LTE networksMariyam Ouaissa, Mariam Benmoussa, Abdallah Rhattoy, Mohammed Lahmer, Idriss Chana. 1-6 [doi]
- A survey on decentralized random access MAC protocols for cognitive radio networksWassim Fassi Fihri, Fatima Salahdine, Hassan El Ghazi, Naima Kaabouch. 1-7 [doi]
- Advanced Persistent Threat: New analysis driven by life cycle phases and their challengesBrahim I. D. Messaoud, Karim Guennoun, Mohamed Wahbi, Mohamed Sadik. 1-6 [doi]
- Threshold of the symmetry property of cyclic autocorrelation function detectorKawtar Zerhouni, Raja Elassali, Khalid Elbaamrani, Noureddine Idboufker, Fouzia Elbahhar Boukour. 1-6 [doi]
- Performance analysis of dual-hop underwater communication system subject to k-μ shadowed fading channelElmehdi Illi, Faissal El Bouanani, Fouad Ayoub. 1-6 [doi]
- A novel efficient ultralightweight authentication algorithm for RFID systemsZouheir Labbi, Mohamed Senhadji, Ahmed Maarof, Mostafa Belkasmi. 1-4 [doi]
- An efficient soft decision decoding algorithm using cyclic permutations and compact genetic algorithmHamza Boualame, Noria Tahiri, Idriss Chana, Ahmed Azouaoui, Mostafa Belkasmi. 1-6 [doi]
- Novel method for improving performances of normalized MS decoder using WIMAX codeAbdelilah Kadi, Mostafa Mrabti, Said Najah, Emmanuel Boutillon. 1-5 [doi]
- Epigenetic algorithm for performing intrusion detection systemMehdi Ezzarii, Hamid Elghazi, Hassan El Ghazi, Tayeb Sadiki. 1-6 [doi]