My Ahmed El Kiram

Affiliations:
  • Cadi Ayyad Univesity, Morocco


According to our database1, My Ahmed El Kiram authored at least 13 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Traffic Control, Congestion Management and Smart Parking through VANET, ML, and IoT: A Review.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

Foreground-Preserving Background Modification: A Deep Learning Approach.
Proceedings of the 17th International Conference on Signal-Image Technology & Internet-Based Systems, 2023

2021
Estimate Risks Eate for Android Applications Using Android Permissions.
Int. J. Mob. Comput. Multim. Commun., 2021

2020
Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud.
Int. J. Interact. Multim. Artif. Intell., 2020

New Security Risk Value Estimate Method for Android Applications.
Comput. J., 2020

2019
Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication.
Int. J. Commun. Networks Inf. Secur., 2019

Pervasive-Based Access Control Model for IoT Environments.
IEEE Access, 2019

2018
An Investigation into Permissions Requested by Mobile Banking on Android Platform.
Int. J. Mob. Comput. Multim. Commun., 2018

A Multi-agent System-Based Distributed Intrusion Detection System for a Cloud Computing.
Proceedings of the New Trends in Model and Data Engineering, 2018

2017
Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems.
Int. J. Interact. Multim. Artif. Intell., 2017

Side-Effects of Permissions Requested by Mobile Banking on Android Platform: A Case Study of Morocco.
Proceedings of the 2017 International Conference on E-commerce, 2017

2016
A New Protection for Android Applications.
Int. J. Interact. Multim. Artif. Intell., 2016

2015
Introduction to the Internet of Things security: Standardization and research challenges.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015


  Loading...