Seguir
Youssef Iraqi
Youssef Iraqi
University Mohammed VI Polytechnic
Dirección de correo verificada de um6p.ma - Página principal
Título
Citado por
Citado por
Año
Phishing Detection: A Literature Survey
M Khonji, Y Iraqi, A Jones
IEEE Communications Surveys & Tutorials, 1-31, 2013
7292013
Gateway placement optimization in wireless mesh networks with QoS constraints
B Aoun, R Boutaba, Y Iraqi, G Kenward
IEEE Journal on Selected Areas in Communications 24 (11), 2127-2136, 2006
3482006
Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey
E Bellini, Y Iraqi, E Damiani
IEEE Access 8, 21127-21151, 2020
2172020
Routing protocols in wireless mesh networks: challenges and design considerations
S Waharte, R Boutaba, Y Iraqi, B Ishibashi
Multimedia tools and Applications 29, 285-303, 2006
2162006
Human eye controlled computer mouse interface
H Bhaskar, Y Iraqi, S Al Sharif
US Patent 9,075,453, 2015
1722015
A multi-commodity flow based approach to virtual network resource allocation
W Szeto, Y Iraqi, R Boutaba
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
1622003
DORA: Efficient routing for MPLS traffic engineering
R Boutaba, W Szeto, Y Iraqi
Journal of Network and Systems Management 10 (3), 309-325, 2002
1162002
Adaptive packet video streaming over IP networks: a cross-layer approach
T Ahmed, A Mehaoua, R Boutaba, Y Iraqi
IEEE Journal on selected areas in Communications 23 (2), 385-401, 2005
1122005
Hybrid Automatic Repeat Request (HARQ) in Wireless Communications Systems and Standards: A Contemporary Survey
A Ahmed, A Al-Dweik, Y Iraqi, H Mukhtar, M Naeem, E Hossain
IEEE Communications Surveys & Tutorials 23 (4), 2711-2752, 2021
962021
On the Performance of IRS-Assisted Multi-Layer UAV Communications with Imperfect Phase Compensation
M Al-Jarrah, A Al-Dweik, E Alsusa, Y Iraqi, MS Alouini
IEEE Transactions on Communications, 2021
872021
A Slightly-modified GI-based Author-verifier with Lots of Features (ASGALF)
M Khonji, Y Iraqi
CLEF2014 Working Notes 1180, 977-983, 2014
862014
Peer-to-peer’s most wanted: malicious peers
L Mekouar, Y Iraqi, R Boutaba
Computer Networks 50 (4), 545-562, 2006
842006
Pricing and admission control for QoS-enabled Internet
T Li, Y Iraqi, R Boutaba
Computer Networks 46 (1), 87-110, 2004
782004
A state-of-the-art review of cloud forensics
S Almulla, Y Iraqi, A Jones
Journal of Digital Forensics, Security and Law 9 (4), 2, 2014
722014
Sliding contention window (SCW): Towards backoff range-based service differentiation over IEEE 802.11 wireless LAN networks
A Nafaa, A Ksentini, A Mehaoua, Y Iraqi, R Boutaba
IEEE network 19 (4), 45-51, 2005
712005
One-shot blind channel estimation for OFDM systems over frequency-selective fading channels
A Saci, A Al-Dweik, A Shami, Y Iraqi
IEEE Transactions on Communications 65 (12), 5445-5458, 2017
662017
Enhancing phishing e-mail classifiers: A lexical url analysis approach
M Khonji, Y Iraqi, A Jones
International Journal for Information Security Research (IJISR) 2 (1/2), 40, 2012
652012
Lightpaths on demand: a Web-services-based management system
R Boutaba, W Golab, Y Iraqi
IEEE Communications magazine 42 (7), 101-107, 2004
652004
Cloud forensics: A research perspective
S Almulla, Y Iraqi, A Jones
International Conference on Innovations in Information Technology (IIT), 66-71, 2013
542013
Lexical URL analysis for discriminating phishing and legitimate websites
M Khonji, Y Iraqi, A Jones
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
532011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20