default search action
Mohammed Boulmalf
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Sara Mobsite, Nabih Alaoui, Mohammed Boulmalf, Mounir Ghogho:
Activity Classification and Fall Detection Using Monocular Depth and Motion Analysis. IEEE Access 12: 1525-1541 (2024) - [j24]Sara Mobsite, Nabih Alaoui, Mohammed Boulmalf, Mounir Ghogho:
Feature fusion-based computer vision system for fall and head injury detection trained on a new humanlike doll-based dataset. Eng. Appl. Artif. Intell. 137: 109069 (2024) - [j23]Sara Mobsite, Nabih Alaoui, Mohammed Boulmalf, Mounir Ghogho:
A Privacy-Preserving AIoT Framework for Fall Detection and Classification Using Hierarchical Learning With Multilevel Feature Fusion. IEEE Internet Things J. 11(15): 26531-26547 (2024) - [j22]Youssef Baddi, Anass Sebbar, Karim Zkik, Yassin Maleh, Faysal Bensalah, Mohammed Boulmalf:
MSDN-IoT multicast group communication in IoT based on software defined networking. J. Reliab. Intell. Environ. 10(1): 93-104 (2024) - 2023
- [j21]Abla El bekkali, Mohamed Essaaidi, Mohammed Boulmalf:
A Blockchain-Based Architecture and Framework for Cybersecure Smart Cities. IEEE Access 11: 76359-76370 (2023) - [j20]Sara Mobsite, Nabih Alaoui, Mohammed Boulmalf, Mounir Ghogho:
Semantic segmentation-based system for fall detection and post-fall posture classification. Eng. Appl. Artif. Intell. 117(Part): 105616 (2023) - [c35]Anass Sebbar, Othmane Cherqi, Khalid Chougdali, Mohammed Boulmalf:
Real-Time Anomaly Detection in SDN Architecture Using Integrated SIEM and Machine Learning for Enhancing Network Security. GLOBECOM 2023: 1795-1800 - [c34]Anass Sebbar, Mohammed Boulmalf:
BCDS-SDN: Privacy and Trusted Data Sharing Using Blockchain Based on a Software-Defined Network's Edge Computing Architecture. ICC 2023: 6578-6583 - [c33]Sara Mobsite, Nabih Alaoui, Mohammed Boulmalf, Mounir Ghogho:
A Deep Learning Dual-Stream Framework for Fall Detection. IWCMC 2023: 1226-1231 - [c32]Achraf Haibi, Kenza Oufaska, Khalid El Yassini, Mohammed Boulmalf, Mohsine Bouya:
On the use of RFID Middleware for real-time data stream processing. NISS 2023: 46:1-46:5 - [c31]Othmane Cherqi, Anass Sebbar, Khalid Chougdali, Mohammed Boulmalf, Houda Benbrahim:
Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis. WINCOM 2023: 1-7 - 2022
- [j19]Achraf Haibi, Kenza Oufaska, Khalid El Yassini, Mohammed Boulmalf, Mohsine Bouya:
Systematic Mapping Study on RFID Technology. IEEE Access 10: 6363-6380 (2022) - [j18]Oumaima Fadi, Karim Zkik, Abdellatif El Ghazi, Mohammed Boulmalf:
A Survey on Blockchain and Artificial Intelligence Technologies for Enhancing Security and Privacy in Smart Environments. IEEE Access 10: 93168-93186 (2022) - [j17]Sara Lahlou, Youness Moukafih, Anass Sebbar, Karim Zkik, Mohammed Boulmalf, Mounir Ghogho:
TD-RA policy-enforcement framework for an SDN-based IoT architecture. J. Netw. Comput. Appl. 204: 103390 (2022) - 2021
- [j16]Abdelfettah Mabrouk, Assia Naja, Omar Ait Oualhaj, Abdellatif Kobbane, Mohammed Boulmalf:
A cooperative game based mechanism for autonomous organization and ubiquitous connectivity in VANETs. Simul. Model. Pract. Theory 107: 102213 (2021) - [c30]Sara Mobsite, Nabih Alaoui, Mohammed Boulmalf:
A framework for elders fall detection using deep learning. CIST 2021: 69-74 - 2020
- [j15]Anass Sebbar, Karim Zkik, Youssef Baddi, Mohammed Boulmalf, Mohamed Dafir Ech-Cherif El Kettani:
MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context. J. Ambient Intell. Humaniz. Comput. 11(12): 5875-5894 (2020) - [c29]Assia Naja, Omar Ait Oualhaj, Mohammed Boulmalf, Mohamed Essaaidi, Abdellatif Kobbane:
Alert Message Dissemination using Graph-based Markov Decision Process Model in VANETs. ICC 2020: 1-6
2010 – 2019
- 2019
- [j14]Yassir Rouchdi, Kenza Oufaska, Achraf Haibi, Khalid El Yassini, Mohammed Boulmalf:
Role-based access control in BagTrac application. Int. J. Knowl. Eng. Soft Data Paradigms 6(3/4): 196-206 (2019) - [j13]Assia Naja, Mohammed Boulmalf, Mohamed Essaaidi:
A Distributed Priority-Based Rebroadcasting Protocol for VANETs: Mitigating the Storm Problem. Mob. Networks Appl. 24(5): 1555-1568 (2019) - [j12]Assia Naja, Mohammed Boulmalf, Mohamed Essaaidi, Omar Ait Oualhaj:
Adaptive alert content dissemination protocol inspired from volunteer's dilemma game for Vehicular Ad-hoc Networks. Veh. Commun. 19 (2019) - [c28]Karim Zkik, Anass Sebbar, Youssef Baddi, Mohammed Boulmalf:
Secure Multipath Mutation SMPM in Moving Target Defense Based on SDN. ANT/EDI40 2019: 977-984 - [c27]Anass Sebbar, Karim Zkik, Mohammed Boulmalf, Mohamed Dafir Ech-Cherif El Kettani:
New context-based node acceptance CBNA framework for MitM detection in SDN Architecture. EUSPN/ICTH 2019: 825-830 - [c26]Anass Sebbar, Karim Zkik, Youssef Baddi, Mohammed Boulmalf, Mohamed Dafir Ech-Cherif El Kettani:
Using advanced detection and prevention technique to mitigate threats in SDN architecture. IWCMC 2019: 90-95 - [c25]Assia Naja, Mohammed Boulmalf, Mohamed Essaaidi:
A game theoretical based rebroadcasting protocol for content dissemination in VANETs. IWCMC 2019: 591-596 - [c24]Youssef Baddi, Anass Sebbar, Karim Zkik, Mohammed Boulmalf, Mohamed Dafir Ech-Cherif El Kettani:
MSND: Multicast Software Defined Network Based Solution to Multicast Tree Construction. UNet 2019: 245-256 - [c23]Karim Zkik, Anass Sebbar, Youssef Baddi, Amine Belhadi, Mohammed Boulmalf:
An efficient modular security plane AM-SecP for hybrid distributed SDN. WiMob 2019: 354-359 - 2018
- [c22]L. Mellouk, Mohammed Boulmalf, Abdessadek Aaroud, Khalid Zine-Dine, Driss Benhaddou:
Genetic Algorithm to Solve Demand Side Management and Economic Dispatch Problem. ANT/SEIT 2018: 611-618 - [c21]Asmae Bentaleb, Younes El Bouzekri, Ayoub Ait Lahcen, Mohammed Boulmalf:
Context Aware Recommender Systems for Tourism: A Concise Review. CIST 2018: 149-154 - [c20]Anass Sebbar, Mohammed Boulmalf, Mohamed Dafir Ech-Cherif El Kettani, Youssef Baddi:
Detection MITM Attack in Multi-SDN Controller. CIST 2018: 583-587 - [c19]Yassir Rouchdi, Achraf Haibi, Khalid El Yassini, Mohammed Boulmalf, Kenza Oufaska:
RFID Application to Airport Luggage Tracking as a Green Logistics Approach. CIST 2018: 642-649 - [c18]Abla El bekkali, Mohammed Boulmalf, Mohammad Essaaidi, Ghita Mezzour:
Securing the Internet of Things (IoT). WINCOM 2018: 1-6 - 2015
- [j11]Mehdia Ajana El-Khaddar, Mhammed Chraibi, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi, Abdelilah Maach:
A policy-based middleware for context-aware pervasive computing. Int. J. Pervasive Comput. Commun. 11(1): 43-68 (2015) - 2014
- [j10]Abderrahim Benslimane, Clément Saad, Jean-Claude König, Mohammed Boulmalf:
Cooperative localization techniques for wireless sensor networks: free, signal and angle based techniques. Wirel. Commun. Mob. Comput. 14(17): 1627-1646 (2014) - [c17]Taib Bouhouche, Mehdia Ajana El-Khaddar, Mohammed Boulmalf, Mohsine Bouya, Mohammed Elkoutbi:
A new middleware architecture for the integration of RFID technology into information systems. ICMCS 2014: 1025-1030 - 2012
- [c16]Khaled Shuaib, Hashir Kidwai, Mohammed Boulmalf:
VOIP course development with laboratory experiments for undergraduate information technology students. EDUCON 2012: 1-6 - [c15]Tayeb Sadiki, Mounir Ghogho, Mohammed Boulmalf, Ahmed Belgana:
Models to generate mobility based on the Bayesian approach for Vehicular Ad-hoc Networks (VANETs). ICMCS 2012: 427-431 - [c14]Mehdia Ajana El-Khaddar, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi, Ahmed Habbani:
Emerging wireless technologies in e-health trends, challenges, and framework design issues. ICMCS 2012: 440-445 - [c13]Mohammed Boulmalf, Ahmed Belgana, Tayeb Sadiki, Sara Hussein, Tarik Aouam, Hamid Harroud:
A lightweight middleware for an e-health WSN based system using Android technology. ICMCS 2012: 551-556 - [c12]Mohammed Boulmalf, Tarik Aouam, Mounir Ghogho, Syed Ali Raza Zaidi, N. Yaagoubi:
Power Savings and Performance Analysis in Wireless Networks. VTC Fall 2012: 1-5 - 2011
- [j9]Mehdia E. Ajana, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi:
FlexRFID Middleware in the Supply Chain: Strategic Values and Challenges. Int. J. Mob. Comput. Multim. Commun. 3(2): 19-32 (2011) - [c11]Mohamed Ghallali, Driss El Ouadghiri, Mohammad Essaaidi, Mohammed Boulmalf:
Mobile phones security: the spread of malware via MMS and Bluetooth, prevention methods. MoMM 2011: 256-259 - [c10]Abderrahmane Lakas, Mohamed Adel Serhani, Mohammed Boulmalf:
A hybrid cooperative service discovery scheme for mobile services in VANET. WiMob 2011: 25-31 - 2010
- [c9]Mariam Ouanaim, Hamid Harroud, Aziz Berrado, Mohammed Boulmalf:
Dynamic user profiling approach for services discovery in mobile environments. IWCMC 2010: 550-554
2000 – 2009
- 2009
- [j8]Tarik Aouam, Mohammed Boulmalf, Hamid Harroud:
A quality of service based planning for IEEE802.11g networks. Int. J. Auton. Adapt. Commun. Syst. 2(2): 128-142 (2009) - [j7]Tarik Aouam, Ali Diabat, Mohammed Boulmalf, Abdelaziz Soufyane:
Linear incentive contracts for natural gas LDC regulation. Int. J. Appl. Decis. Sci. 2(1): 57-73 (2009) - [c8]Mohammed Boulmalf, Jawad Abrache, Tarik Aouam, Hamid Harroud:
Traffic analysis for GSM networks. AICCSA 2009: 498-503 - [c7]Y. Bouzid, Hamid Harroud, Mohammed Boulmalf, Ahmed Karmouch:
Context-based services discovery in mobile environments. ICT 2009: 13-18 - [c6]Mehdia E. Ajana, Mohammed Boulmalf, Hamid Harroud, Habib Hamam:
A Policy Based Event Management Middleware for Implementing RFID Applications. WiMob 2009: 406-410 - [c5]Y. Bouzid, Hamid Harroud, Aziz Berrado, Mohammed Boulmalf, Ahmed Karmouch:
A Context-aware Platform to Support Mobile Users with Personalized Services. WINSYS 2009: 153-158 - 2008
- [c4]Hesham El-Sayed, Sherali Zeadally, Mohammed Boulmalf:
Experimental Evaluation and Characterization of Long-Distance 802.11g Links. ICN 2008: 511-516 - 2007
- [j6]Mohammed Boulmalf, Ezedin Barka, Abderrahmane Lakas:
Analysis of the effect of security on data and voice traffic in WLAN. Comput. Commun. 30(11-12): 2468-2477 (2007) - [j5]Mohammed Boulmalf, Abderrahmane Lakas:
Semi-empirical method for simulating wireless indoor attenuation. Int. J. Adv. Media Commun. 1(3): 211-223 (2007) - [j4]Abderrahmane Lakas, Mohammed Boulmalf:
Experimental Analysis of VoIP over Wireless Local Area Networks. J. Commun. 2(4): 3-9 (2007) - [j3]Ezedin Barka, Mohammed Boulmalf:
On the Impact of Security on the Performance of WLANs. J. Commun. 2(4): 10-17 (2007) - [j2]Khaled Shuaib, Maryam Alnuaimi, Mohammed Boulmalf, Imad Jawhar, Farag M. Sallabi, Abderrahmane Lakas:
Performance Evaluation of IEEE 802.15.4: Experimental and Simulation Results. J. Commun. 2(4): 29-37 (2007) - [c3]Ezedin Barka, Mohammed Boulmalf:
Impact of Encryption on the Throughput of Infrastructure WLAN IEEE 802.11g. WCNC 2007: 2691-2697 - 2006
- [c2]Abderrahmane Lakas, Khaled Shuaib, Mohammed Boulmalf:
ACP: an interactive classroom response system for active learning environment. IWCMC 2006: 1301-1306 - 2005
- [j1]Abdelaziz Soufyane, Mohammed Boulmalf:
Solution of linear and nonlinear parabolic equations by the decomposition method. Appl. Math. Comput. 162(2): 687-693 (2005) - 2001
- [c1]Mohammed Boulmalf, Gilles Y. Delisle:
Microstrip antenna array for mobile communications. ISSPA 2001: 470-472
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint