Abdellatif Mezrioui

Orcid: 0000-0003-4731-355X

According to our database1, Abdellatif Mezrioui authored at least 27 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Drawing the Boundaries Between Blockchain and Blockchain-Like Systems: A Comprehensive Survey on Distributed Ledger Technologies.
Proc. IEEE, March, 2024

Machine learning in identity and access management systems: Survey and deep dive.
Comput. Secur., 2024

On Using Artificial Intelligence in Software Quality Assurance: A State of the Art.
Proceedings of the Eleventh Workshop on Software Quality Analysis, 2024

2023
IoT-Gov: A structured framework for internet of things governance.
Comput. Networks, September, 2023

GBTrust: Leveraging Edge Attention in Graph Neural Networks for Trust Management in P2P Networks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Machine Learning based Identity and Access Management Systems (ML I&AM): a Taxonomy.
Proceedings of the 7th IEEE Congress on Information Science and Technology, 2023

A Transpilation-Based Approach to Writing Secure Access Control Smart Contracts.
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023

2022
A Privacy by Design Methodology Application in Telecom Domain.
Int. J. Commun. Networks Inf. Secur., April, 2022

BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing.
J. Netw. Syst. Manag., 2022

IoT-Gov: an IoT governance framework using the blockchain.
Computing, 2022

Untangling the Overlap Between Blockchain and DLTs.
Proceedings of the Intelligent Computing, 2022

SOK: A Comprehensive Survey on Distributed Ledger Technologies.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Identity and Access Management Field: Challenges and State of the Art.
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022

2021
DCEA: A Reference model for Distributed Ledger Technologies.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Exploring blockchain-based Self Sovereign Identity Systems: challenges and comparative analysis.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

2020
A Methodology for Assuring Privacy by Design in Information Systems.
Int. J. Commun. Networks Inf. Secur., 2020

Inadequacy of IT Approaches to Manage Cyber Security in ICS Context.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

A Qualitative-Driven Study of Irreversible Data Anonymizing Techniques in Databases.
Proceedings of the SITA'20: Theories and Applications, 2020

2019
Toward a unified framework for Cloud Computing governance: An approach for evaluating and integrating IT management and governance models.
Comput. Stand. Interfaces, 2019

Cyber Security challenges and Issues of Industrial Control Systems-Some Security Recommendations.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

2018
Privacy Enhancement of Telecom Processes Interacting with Charging Data Records.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Privacy increase on telecommunication processes.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018

2016
COBIT Evaluation as a Framework for Cloud Computing Governance.
Int. J. Cloud Appl. Comput., 2016

2015
Requirements definition for a holistic approach of cloud computing governance.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
Challenges for IT based cloud computing governance.
Proceedings of the 9th International Conference on Intelligent Systems: Theories and Applications, 2014

2012
A new architecture for detecting DDoS/brute forcing attack and destroying the botnet behind.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2005
Using Active Agent for Intrusion Detection and Management.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005


  Loading...