default search action
Mohammed Erradi
Person information
- affiliation: Mohammed V University in Rabat, Morocco
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]El Mahdi Mercha, Houda Benbrahim, Mohammed Erradi:
Heterogeneous text graph for comprehensive multilingual sentiment analysis: capturing short- and long-distance semantics. PeerJ Comput. Sci. 10: e1876 (2024) - [c63]Mohammed Ali Essabri, Jamal Rebii, Mohammed Erradi:
Tool Augmented LLMs for Big Data Analysis. NETYS 2024: 118-123 - [c62]El Mostapha Chakir, Marouane Hachimi, Mohammed Erradi:
Towards a Secure and Intelligent Access Control Policy Adapter for Big Data Environment. SECRYPT 2024: 345-356 - [c61]Yassin Terraf, El Mahdi Mercha, Mohammed Erradi:
Non-Local Context-Aware Attention for Object Detection in Remote Sensing Images. VISIGRAPP (2): VISAPP 2024: 130-138 - [c60]Ahmed Khoumsi, Mohammed Erradi, Fahd Adni:
Combining Cryptography and Discrete-Event Systems to Study Sensor and Actuator Cyberattacks. WISTP 2024: 33-48 - 2023
- [c59]El Mahdi Mercha, Houda Benbrahim, Mohammed Erradi:
SlideGCN: Slightly Deep Graph Convolutional Network for Multilingual Sentiment Analysis. IWANN (2) 2023: 91-103 - [c58]Mouad Bouharoun, Bilal Taghdouti, Mohammed Erradi:
A Peer to Peer Federated Graph Neural Network for Threat Intelligence. NETYS 2023: 35-40 - [c57]Achraf Nia, Hossam Tarouchi, Mohammed Erradi:
Encrypted Search: Not Enough to Ensure Privacy. NETYS 2023: 81-89 - [c56]El Mahdi Mercha, El Mostapha Chakir, Mohammed Erradi:
Trans-IDS: A Transformer-Based Intrusion Detection System. SECRYPT 2023: 402-409 - 2022
- [j19]Rachid Zennou, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea, Mohammed Erradi:
Checking causal consistency of distributed databases. Computing 104(10): 2181-2201 (2022) - 2021
- [c55]Jaouhara Bouamama, Mustapha Hedabou, Mohammed Erradi:
Cloud Key Management using Trusted Execution Environment. SECRYPT 2021: 560-567 - 2020
- [j18]Maha Khaldi, Mohamed Erradi:
Design and Development of an e-Learning Project Management System: Modelling and Prototyping. Int. J. Emerg. Technol. Learn. 15(19): 95-106 (2020) - [c54]Rachid Zennou, Mohamed Faouzi Atig, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea, Mohammed Erradi:
Boosting Sequential Consistency Checking Using Saturation. ATVA 2020: 360-376 - [c53]Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi:
A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies. SoCPaR 2020: 836-846 - [i3]Rachid Zennou, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea, Mohammed Erradi:
Checking Causal Consistency of Distributed Databases. CoRR abs/2011.09753 (2020)
2010 – 2019
- 2019
- [j17]Yahya Benkaouz, Mohammed Erradi:
Special issue on NETYS'17 selected papers. Computing 101(9): 1305 (2019) - [j16]Abderrahim El Mhouti, Mohamed Erradi:
Harnessing Cloud Computing Services for E-Learning Systems in Higher Education: Impact and Effects. Int. J. Inf. Commun. Technol. Educ. 15(2): 18-30 (2019) - [c52]Maha Khaldi, Mohammed Erradi:
Design of an e-Learning project management system. BDIoT 2019 - [c51]Rachid Zennou, Ahmed Bouajjani, Constantin Enea, Mohammed Erradi:
Gradual Consistency Checking. CAV (2) 2019: 267-285 - [c50]Meryeme Ayache, Ahmed Khoumsi, Mohammed Erradi:
Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines. CommNet 2019: 1-10 - [c49]Rachid Zennou, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea, Mohammed Erradi:
Checking Causal Consistency of Distributed Databases. NETYS 2019: 35-51 - [c48]Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi:
Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis. NETYS 2019: 250-266 - 2018
- [j15]Abderrahim El Mhouti, Mohamed Erradi, Azeddine Nasseh:
Using cloud computing services in e-learning process: Benefits and challenges. Educ. Inf. Technol. 23(2): 893-909 (2018) - [j14]Bouchra El Mamoun, Mohamed Erradi, Abderrahim El Mhouti:
Using an Intelligent Tutoring System to Support Learners' WMC in e-learning: Application in Mathematics Learning. Int. J. Emerg. Technol. Learn. 13(12): 142-156 (2018) - [j13]Ahmed Khoumsi, Mohammed Erradi, Wadie Krombi:
A formal basis for the design and analysis of firewall security policies. J. King Saud Univ. Comput. Inf. Sci. 30(1): 51-66 (2018) - [j12]Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi:
Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies. EAI Endorsed Trans. Security Safety 5(16): e3 (2018) - [c47]Maryem Ait El Hadj, Mohammed Erradi, Ahmed Khoumsi, Yahya Benkaouz:
Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach. IEEE BigData 2018: 5330-5332 - [c46]Ahmed Khoumsi, Mohammed Erradi:
Automata-Based Bottom-Up Design of Conflict-Free Security Policies Specified as Policy Expressions. NETYS 2018: 343-357 - [c45]Abderrahim El Mhouti, Mohamed Erradi:
Towards a Smart Learning Management System (smart-LMS) to Improve Collaborative Learning in Higher Education. SCA 2018: 7:1-7:9 - 2017
- [j11]Ahmed Harbouche, Noureddine Djedi, Mohammed Erradi, Jalel Ben-Othman, Abdellatif Kobbane:
Model driven flexible design of a wireless body sensor network for health monitoring. Comput. Networks 129: 548-571 (2017) - [j10]Abderrahim El Mhouti, Azeddine Nasseh, Mohamed Erradi, José Marfa Vasquèz:
Enhancing collaborative learning in Web 2.0-based e-learning systems: A design framework for building collaborative e-learning contents. Educ. Inf. Technol. 22(5): 2351-2364 (2017) - [c44]Mohamed Amine Madani, Mohammed Erradi, Yahya Benkaouz:
ABAC Based Online Collaborations in the Cloud. AFRICATEK 2017: 67-76 - [c43]Nesrine Ben Hassine, Pascale Minet, Mohammed-Amine Koulali, Mohammed Erradi, Dana Marinca, Dominique Barth:
Coalition game for video content clustering in content delivery networks. CCNC 2017: 407-413 - [c42]Maryem Ait El Hadj, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi:
Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies. IBICA 2017: 298-308 - [c41]Maryem Ait El Hadj, Yahya Benkaouz, Bernd Freisleben, Mohammed Erradi:
ABAC Rule Reduction via Similarity Computation. NETYS 2017: 86-100 - [c40]Meryeme Ayache, Mohammed Erradi, Bernd Freisleben, Ahmed Khoumsi:
Aspect-Oriented State Machines for Resolving Conflicts in XACML Policies. NETYS 2017: 166-171 - [c39]Maryem Ait El Hadj, Meryeme Ayache, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi:
Clustering-based Approach for Anomaly Detection in XACML Policies. SECRYPT 2017: 548-553 - [c38]Issam Elaalyani, Mohammed Erradi, Markus Mühling, Bernd Freisleben:
Current trends in text_spotting. WINCOM 2017: 1-6 - [c37]Ahmed Harbouche, Mouna Elmachkour, Noureddine Djedi, Mohammed Erradi, Abdellatif Kobbane:
Dynamic coalitional matching game approach for fair and swift data-gathering in wireless body sensor networks. WINCOM 2017: 1-6 - 2016
- [j9]Meryeme Ayache, Mohammed Erradi, Ahmed Khoumsi, Bernd Freisleben:
Analysis and Verification of XACML Policies in a Medical Cloud Environment. Scalable Comput. Pract. Exp. 17(3): 189-206 (2016) - [c36]Meryeme Ayache, Mohammed Erradi, Bernd Freisleben, Ahmed Khoumsi:
Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments. CCSW 2016: 55-59 - [c35]Abderrahim El Mhouti, Azeddine Nasseh, Mohamed Erradi:
Towards a collaborative e-learning platform based on a multi-agents system. CIST 2016: 511-516 - [c34]Yahya Benkaouz, Mohammed Erradi, Bernd Freisleben:
Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering. ABAC@CODASPY 2016: 72-75 - [c33]Yahya Benkaouz, Mohammed Erradi, Anne-Marie Kermarrec:
Nearest Neighbors Graph Construction: Peer Sampling to the Rescue. NETYS 2016: 48-62 - [c32]Ahmed Khoumsi, Mohamed Erradi, Meryeme Ayache, Wadie Krombi:
An Approach to Resolve NP-Hard Problems of Firewalls. NETYS 2016: 229-243 - [c31]Abderrahim El Mhouti, Azeddine Nasseh, Mohamed Erradi, José Marfa Vasquèz:
Using cloud computing and a multi-agents system to improve collaborative e-learning in LMS. SITA 2016: 1-6 - 2015
- [j8]Yahya Benkaouz, Mohammed Erradi:
A distributed protocol for privacy preserving aggregation with non-permanent participants. Computing 97(9): 893-912 (2015) - [j7]Ait Oualhaj Omar, Abdellatif Kobbane, Essaid Sabir, Jalel Ben-Othman, Mohammed Erradi:
A ferry-assisted solution for forwarding function in Wireless Sensor Networks. Pervasive Mob. Comput. 22: 126-135 (2015) - [c30]Meryeme Ayache, Mohammed Erradi, Bernd Freisleben:
Access control policies enforcement in a cloud environment: Openstack. IAS 2015: 26-31 - [c29]Mohamed Amine Madani, Mohammed Erradi, Yahya Benkaouz:
Access control in a collaborative session in multi tenant environment. IAS 2015: 129-134 - [c28]Meryeme Ayache, Mohammed Erradi, Bernd Freisleben:
curlX: A middleware to enforce access control policies within a cloud environment. CNS 2015: 771-772 - [c27]Yahya Benkaouz, Mohammed Erradi:
Towards a Decentralized OSN for a Privacy-preserving e-health System. EUSPN/ICTH 2015: 284-291 - [c26]Ines Khoufi, Pascale Minet, Mohammed-Amine Koulali, Mohammed Erradi:
A game theory-based approach for robots deploying wireless sensor nodes. IWCMC 2015: 557-562 - [c25]Yahya Benkaouz, Mohammed Erradi, Bernd Freisleben:
Distributed Privacy-Preserving Data Aggregation via Anonymization. NETYS 2015: 94-108 - [c24]Mohamed Amine Madani, Mohammed Erradi:
How to secure a collaborative session in a single tenant environment. CFIP/NOTERE 2015: 1-6 - 2014
- [c23]Ahmed Khoumsi, Wadie Krombi, Mohammed Erradi:
A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies. FPS 2014: 221-236 - [c22]Ait Oualhaj Omar, Abdellatif Kobbane, Essaid Sabir, Mohammed Erradi, Jalel Ben-Othman:
A ferry-assisted solution for forwarding function in Wireless Sensor Networks. ISCC 2014: 1-6 - [c21]Mohammed Ouzzif, Marouane Hamdani, Hassan Mountassir, Mohammed Erradi:
A Formal Modeling Approach for Emergency Crisis Response in Health during Catastrophic Situation. ISCRAM-med 2014: 112-119 - [c20]Wadie Krombi, Mohammed Erradi, Ahmed Khoumsi:
Automata-based approach to design and analyze security policies. PST 2014: 306-313 - 2013
- [j6]Abderrahim El Mhouti, Mohamed Erradi, Azeddine Nasseh:
An Evaluation Model of Digital Educational Resources. Int. J. Emerg. Technol. Learn. 8(2): 29-35 (2013) - [c19]Essaid Sabir, Abdellatif Kobbane, Mohammed-Amine Koulali, Mohammed Erradi:
Design of an annular ring Ferry-assisted topology for Wireless Sensor Networks. WMNC 2013: 1-5 - [c18]Yahya Benkaouz, Mohammed Erradi:
A Distributed Protocol for Privacy Preserving Aggregation. NETYS 2013: 221-232 - [c17]Yahya Benkaouz, Rachid Guerraoui, Mohammed Erradi, Florian Huc:
A Distributed Polling with Probabilistic Privacy. SRDS 2013: 41-50 - [c16]Abdellah Kouider El Ouahed, Mohamed Erradi, Hamid Azzoune:
A Discovery Service for Automatic Composition of Web Services Oriented-Agent. WETICE 2013: 33-35 - [c15]Ahmed Harbouche, Mohammed Erradi, Abdellatif Kobbane:
A Flexible Wireless Body Sensor Network System for Health Monitoring. WETICE 2013: 44-49 - 2012
- [j5]Tom Dinkelaker, Mohammed Erradi, Meryeme Ayache:
Using aspect-oriented state machines for detecting and resolving feature interactions. Comput. Sci. Inf. Syst. 9(3): 1045-1074 (2012) - [c14]Yahya Benkaouz, Blaise Angoma, Mohammed Erradi:
Performance analysis of WiFi/WiMax vertical handover based on media independent handover. ICMCS 2012: 36-40 - [c13]Sara Najam, Tom Dinkelaker, Mohamed Erradi, Mohamed Ouzzif:
A dynamic proxy for lightweight web service composition. ICMCS 2012: 699-704 - [c12]Mohamed Amine Madani, Mohammed Erradi:
Towards a session based OrBAC model. ICMCS 2012: 918-923 - [i2]Ahmed Harbouche, Mohammed Erradi, Aïcha Mokhtari:
A transformation approach for collaboration based requirement models. CoRR abs/1202.1718 (2012) - 2011
- [c11]Tom Dinkelaker, Mohammed Erradi:
Using Aspect-Oriented State Machines for Resolving Feature Interactions. FedCSIS 2011: 809-816 - [c10]Blaise Angoma, Mohammed Erradi, Yahya Benkaouz, Amine Berqia, Mohammed Charaf Akalay:
HaVe-2W3G: A vertical handoff solution between WLAN, WiMAX and 3G networks. IWCMC 2011: 101-106 - [c9]Yassine El Ghayam, Mohammed Erradi:
Distributed Context Management in Collaborative Environment. NOTERE 2011: 1-8 - [i1]Zahi Jarir, Mohamed Quafafou, Mohammed Erradi:
Personalized Web Services for Web Information Extraction. CoRR abs/1108.5460 (2011) - 2010
- [c8]Yassine El Ghayam, Mohammed Erradi:
Decision tree based context management in a collaborative environment. NOTERE 2010: 151-156
2000 – 2009
- 2008
- [j4]Mohammed Ouzzif, Mohammed Erradi, Hassan Mountassir:
Description of a teleconferencing floor control protocol and its implementation. Eng. Appl. Artif. Intell. 21(3): 430-441 (2008) - [c7]Zahi Jarir, Mohammed Erradi:
A meta-level architecture for QoS awareness in a mobile environment. NOTERE 2008: 10:1-10:8 - 2005
- [c6]Zahi Jarir, Mohammed Erradi:
An Adaptable Middleware for Personalizing Web Applications. WEBIST 2005: 287-292
1990 – 1999
- 1999
- [c5]A. Ibriz, Mohammed Erradi, Hassan Mountassir, Michel Tréhel:
A Layered Cooperative Architecture and its Application in TeleTeaching Framework. PDPTA 1999: 1516-1522 - 1997
- [c4]Youssef Iraqi, Mohammed Erradi:
An Experiment for the Processing of Feature Interactions within an Object-Oriented Environment. FIW 1997: 298-312 - 1995
- [j3]Issam A. Hamid, Mohammed Erradi, Gregor von Bochmann, Setsuo Ohsuga:
Adapt Dynamic Evolution in a Reflective Object-Oriented Computer Language. IEICE Trans. Inf. Syst. 78-D(4): 363-382 (1995) - [j2]Issam A. Hamid, Mohammed Erradi:
Dynamic Evolution of Distributed Systems Specifications Using Reflective Language. Int. J. Softw. Eng. Knowl. Eng. 5(4): 511-540 (1995) - 1994
- [c3]Issam A. Hamid, Mohammed Erradi:
Dynamic evolution of distributed systems specifications using reflective language. APSEC 1994: 208-219 - 1992
- [c2]Mohammed Erradi, Gregor von Bochmann, Rachida Dssouli:
A framework for dynamic evolution of object-oriented specifications. ICSM 1992: 96-104
1980 – 1989
- 1988
- [j1]Mohammed Erradi, Claude Frasson:
Visual interaction using an iconic system. Vis. Comput. 4(2): 98-108 (1988) - 1986
- [c1]Claude Frasson, Mohammed Er-radi:
Principles of an Icons-Based Command Language. SIGMOD Conference 1986: 144-152
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 23:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint