Follow
Laila Fetjah
Laila Fetjah
Departement of mathematics and computer science Hassan II University
Verified email at etu.univh2c.ma - Homepage
Title
Cited by
Cited by
Year
Security and privacy issues in e-health cloud-based system: A comprehensive content analysis
CVV Nureni Ayofe Azeez
Egyptian Informatics Journal 20 (3), 97-108, 2019
1482019
A taxonomic review of the use of IoT and blockchain in healthcare applications
K Azbeg, O Ouchetto, SJ Andaloussi, L Fetjah
Irbm 43 (5), 511-519, 2022
612022
Blockchain and IoT for security and privacy: a platform for diabetes self-management
K Azbeg, O Ouchetto, SJ Andaloussi, L Fetjah, A Sekkaki
2018 4th international conference on cloud computing technologies and …, 2018
522018
An Overview of Blockchain Consensus Algorithms: Comparison, Challenges and Future Directions
K Azbeg, O Ouchetto, SJ Andaloussi, L Fetjah
Advances on Smart and Soft Computing, 357-369, 2020
212020
Toward a big data architecture for security events analytic
L Fetjah, K Benzidane, H El Alloussi, O El Warrak, S Jai-Andaloussi, ...
2016 IEEE 3rd international conference on cyber security and cloud computing …, 2016
182016
Towards a smart healthcare system: an architecture based on IoT, blockchain, and fog computing
L Fetjah, K Azbeg, O Ouchetto, SJ Andaloussi
International Journal of Healthcare Information Systems and Informatics …, 2021
162021
Securing the payment card data on cloud environment: Issues & perspectives
H El Alloussi, L Fetjah, A Chaichaa
International Journal of Computer Science and Network Security (IJCSNS) 14 …, 2014
92014
Application-based authentication on an inter-VM traffic in a cloud environment
K Benzidane, S Khoudali, L Fetjah, SJ Andaloussi, A Sekkaki
International Journal of Communication Networks and Information Security 11 …, 2019
72019
Toward a cloud-based security intelligence with big data processing
K Benzidane, H El Alloussi, O El Warrak, L Fetjah, SJ Andaloussi, ...
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 1089-1092, 2016
52016
Toward inter-VM visibility in a Cloud environment using packet inspection
K Benzidane, S Khoudali, F Leila, A Sekkaki
ICT 2013, 1-5, 2013
32013
L’état de l’art de la sécurité dans le Cloud Computing
H El Alloussi, L Fetjah, A Sekkaki
INTIS 2012, 3, 2012
22012
Quality of service information base (QoSIB) Manager for Electronic Commerce Application
K Nguyen, L Fetjah, B Kerhervé
Poster presented at CITR Annual Conference, Ottawa, Canada, 2001
22001
Quality of Service Information Base Manager for Electronic Commerce Applications
K Nguyen, L Fetjah, B Kerhervé
Poster presented at the CITR Annual Conference, Aylmer, Canada, 2001
22001
Providing QoS Mapping Rule using Data mining techniques
L Fetjah, A Sekkaki
IJCSNS 7 (12), 201, 2007
12007
Quality Information Modeling for QDD Support
L Fetjah, A Sekkaki
IJCSNS 7 (9), 90, 2007
12007
An Advanced IoT-Based Architecture for Healthcare Systems: A Focus on Blockchain-based Edge Computing for Diabetes Management
K Tlemçani, S Jai Andaloussi, K Azbeg, O Ouchetto, L Fetjah
Proceedings of the 6th International Conference on Networking, Intelligent …, 2023
2023
Security and privacy issues in e-health cloud-based system: A comprehensive content analysis
CVV Nureni Ayofe Azeez
Egyptian Informatics Journal 20 (3), 97-108, 2019
2019
Application of APSIS on a Card Payment Solution
H El Alloussi, K Benzidane, O El Warrak, L Fetjah, S Jai-Andaloussi, ...
Advances in Ubiquitous Networking 2: Proceedings of the UNet’16 2, 685-699, 2017
2017
Securing Card data on the Cloud
H El Alloussi, L Fetjah, A Chaichaa
International Journal on Advances in Security Volume 9, Number 1 & 2, 2016, 2016
2016
SECURWARE 2014
R Falk, CB Westphall
2014
The system can't perform the operation now. Try again later.
Articles 1–20