Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Mouaad Mohy-Eddine"'
Publikováno v:
Big Data Mining and Analytics, Vol 6, Iss 3, Pp 273-287 (2023)
Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in industrial sectors. It is designed to implicate embedded technologies in manufacturing fields to enhance their operations. However, IIoT involves some se
Externí odkaz:
https://doaj.org/article/0961fc841b594dfdbebeac0c2aeb129b
Autor:
Hanaa Attou, Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Abdulatif Alabdultif, Naif Almusallam
Publikováno v:
Applied Sciences, Vol 13, Iss 17, p 9588 (2023)
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics, such as scalability and flexibility. However, despite these advantages, security concerns remain a significant challenge for cloud providers. CC introduces new vu
Externí odkaz:
https://doaj.org/article/77a3bc5e4e414bd287b6f74392cb5403
Publikováno v:
Multimedia Tools and Applications.
Publikováno v:
Artificial Intelligence and Smart Environment ISBN: 9783031262531
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::de7f5cd7313c87b0126cda2ada9011f6
https://doi.org/10.1007/978-3-031-26254-8_82
https://doi.org/10.1007/978-3-031-26254-8_82
Autor:
Mouaad Mohy-Eddine, Mourade Azrour, Jamal Mabrouki, Fatima Amounas, Azidine Guezzaz, Said Benkirane
Publikováno v:
Advanced Technology for Smart Environment and Energy ISBN: 9783031256615
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cd5d7d33b3098e5a1992797cbe6aaf1b
https://doi.org/10.1007/978-3-031-25662-2_24
https://doi.org/10.1007/978-3-031-25662-2_24
Publikováno v:
Journal of Computer Virology and Hacking Techniques.
Autor:
Azidine Guezzaz, Mourade Azrour, Said Benkirane, Mouaad Mohy-Eddine, Hanaa Attou, Maryam Douiba
Publikováno v:
The International Arab Journal of Information Technology. 19
Due to the development of cloud computing and Internet of Things (IoT) environments, such as healthcare systems, telecommunications and Industry 4.0 or Industrial IoT (IIoT) many daily services are transformed. Therefore, Security issues become usefu
Publikováno v:
International Journal of Embedded Systems. 15:467