- Mssassi, A. Abou El Kalam, Leveraging Blockchain for Enhanced Traceability and Transparency in Sustainable Development,International Conference on Advanced Intelligent Systems for Sustainable Development (AI2SD’2023) pp 162–177, 15-17 October Marrakech, Morocco, Springer, Lecture Notes in Networks and Systems book series (LNNS,volume 930)
- Elbalbali, AI-Driven Big Data Quality Improvement for Efficient Threat Detection in Agricultural IoT Systems, International Conference on Advanced Intelligent Systems for Sustainable Development (AI2SD’2023) pp 39–47, 15-17 October Marrakech, Morocco, Springer, Lecture Notes in Networks and Systems book series (LNNS,volume 930)
- Mssassi, A. Abou El Kalam, , « Game Theory-Based Incentive Design for Mitigating Malicious Behavior in Blockchain Networks », Journal of Sensor and Actuator Networks, January 2024, vol. 13, N° 1, DOI: https://doi.org/10.3390/jsan13010007
Thomson Reuters, https://www.mdpi.com/2224-2708/13/1/7
- Talha, M., Abou El Kalam, A., Big Data: Towards a Collaborative Security System at the Service of Data Quality, Lecture Notes in Networks and Systems, 2022, 420 LNNS, pp. 595–606, Thomson Reuters
- Abou El Kalam, “Securing SCADA and critical industrial systems: From needs to security mechanisms”, International Journal of Critical Infrastructure Protection (IJCIP), Volume 32, 2021, Thomson Reuters, https://www.sciencedirect.com/science/article/abs/pii/S1874548220300585?via%3Dihub
- Talha, A. Abou El Kalam, Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms, Journal of Universal Computer Science, 2021, 27(12), pp. 1300–1324, Thomson Reuters
- Mokhtari, J.E., El Kalam, A.A., Benhaddou, S., Leroy, J.-P., Dynamic Management of Security Policies in PrivOrBAC, International Journal of Advanced Computer Science and Applications, 2021, 12(6), pp.693–701
- Tarik Hidar, Anas Abou El Kalam, Siham Benhadou,Oussama Mounnan, Using blockchain based authentication solution for remote surgery in tactile internet, International Journal of Advanced Computer Science and Applications (IJACSA), Volume 12,Issue 2, 2021, Thomson Reuters, https://thesai.org/Publications/ViewPaper?Volume=12&Issue=2&Code=IJACSA&SerialNo=35
- Talha, A. Abou El Kalam, PACT: Privacy Aware Contact-Tracing Big Data Security and Privacy in the COVID-19, Journal of Multidisciplinary Engineering Science and Technology (JMEST), Vol. 7 Issue 5, 2020, Thomson Reuters, http://www.jmest.org/wp-content/uploads/JMESTN42353389.pdf
- Talha, N. Elmarzouki, A. Abou El Kalam, Towards a Powerful Solution for Data Accuracy Assessment in the Big Data Context, Vol. 11, No. 2, International Journal of Advanced Computer Science and Applications (IJACSA), Thomson Reuters, https://thesai.org/Downloads/Volume11No2/Paper_54-Towards_a_Powerful_Solution_for_Data_Accuracy_Assessment.pdf , DOI: 10.14569/ijacsa.2020.0110254
- A Outchakoucht, H Es-Samaali, AA El Kalam, S Benhadou, “Machine Learning based Access Control Framework for the Internet of Things”, International Journal of Advanced Computer Science and Applications (IJACSA), Volume 11 Issue 2, 2020. DOI : 10.14569/IJACSA.2020.0110243 https://thesai.org/Downloads/Volume11No2/Paper_43- Machine_Learning_based_Access_Control_Framework.pdf
- Es-Samaali, A. Abou El Kalam, A. Outchakoucht, S. Benhadou, Machine Learning Enhanced Access Control for Big Data, IJCSNS International Journal of Computer Science and Network Security, VOL.20 No.3, http://paper.ijcsns.org/07_book/202003/20200312.pdf
- Outchakoucht, H. Es-Samaali, A. Abou El Kalam, S. Benhadou, « Reinforcement Learning and Blockchain to secure the Internet of Things », Revue Internet of Things, 30 janvier 2019, DOI : 10.21494/ISTE.OP.2019.0324, Volume3, Numéro 1, ISTE.
https://www.openscience.fr/Apprentissage-par-Renforcement-et-Blockchain-Nouvelle-approche-pour-securiser-l
- Talha, N. Elmarzouki, A. Abou El Kalam, Quality and Security in Big Data: Challenges as opportunities to build a powerful wrap-up solution, Journal of Ubiquitous Systems & Pervasive Networks, Volume 12, No. 1 (2020) pp. 09-15, h ttp://iasks.org/wp-content/uploads/pdf/juspn/Vol-12_Issue-1/Pape-2_JUSPN20201201009015.pdf
- Ouaddah, A. Abou El Kalam, A. Ait ouahman, “FairAccess: A new Access control framework for preserving security and privacy in The Internet of Things », Journal of Security and Communication Networks (SCN), Janvier 2017, Edition Wiley, disponible à http://onlinelibrary.wiley.com/doi/10.1002/sec.1748/abstract
Thomson & Reuters, Impact Factor: 1,067.
- Ouaddah, A. Abou El Kalam, A. Ait ouahman, “FairAccess: a new Blockchain-based access control framework for the Internet of Things“, Security and Communication Networks, Networks, 9: 5943–5964. doi: 10.1002/sec.1748. Décembre 2016, Wiley Onlinr Library, Disponible à : http://onlinelibrary.wiley.com/doi/10.1002/sec.1748/abstract
Thomson Reuters (ISI), Impact Factor: 1.067.
- Abou El Kalam, A., Ferreira, A., Kratz, F., Bilateral teleoperation system using QoS and secure communication networks for telemedicine applications, IEEE Systems Journal, 2016, 10(2), pp. 709–720, 7101218, Thomson Reuters
- Agnaou, A. Abou El Kalam, A. Ait ouahman,, “Automated technique to reduce positive and negative false from attacks collected through the deployment of distributed honeypot network”, International Journal of Computer Science and Information Security (IJCSIS), Volume 14 No. 9, September 2016, disponible à https://arxiv.org/ftp/arxiv/papers/1611/1611.03252.pdf et https://www.academia.edu/30682433/Automated_technique_to_reduce_positive_and_negative_false_from_attacks_collected_through_the_deployment_of_distributed_honeypot_network
Thomson & Reuters, Impact Factor : 0,553
- Ouaddah, H. Mousannif, A. Abou El Kalam, A. Ait ouahman, “Access control in The Internet of Things: Big challenges and new opportunities”, Computer Networks Journal (COMNET), Elsevier, DOI: 10.1016/j.comnet.2016.11.007, disponible à http://www.sciencedirect.com/science/article/pii/S1389128616303735 ; https://www.journals.elsevier.com/computer-networks/ Thomson Reuters, Impact Factor: 2,516.
- Ait Mrabti, A. Abou El Kalam, A. Ait ouahman, N. Ammari, « New mechanism for Cloud Computing Storage Security », International Journal of Advanced Computer Science and Applications (IJACSA), Vol 7, N° 7, July 2016.
Disponible à : http://science.thomsonreuters.com/cgi-bin/jrnlst/jlresults.cgi?PC=MASTER&ISSN=2158-107X et http://thesai.org/Downloads/Volume7No7/Paper_73-New_mechanism_for_Cloud_Computing_Storage.pdf
Thomson Reuters : 1,324
- Bouij, A. Abou El Kalam, A. Ait ouahman, “Smart-OrBAC : Enforcing security in the Internet of Things”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 6, No. 11, 2015.
http://thesai.org/Publications/ViewPaper?Volume=6&Issue=11&Code=ijacsa&SerialNo=3
Thomson Reuters : 1,324
- El Kalam, A.A., Leroy, J.-P., Bessa, L., Mahe, J.-M., A CIM based security policy refinement process from security objectives to concrete configurations, International Journal of Soft Computing, 2015, 10(6), pp. 369–382, Scopus
- Ameziane, A. Abou El Kalam, B. Bouhoula, R. Abbassi, A., Ait Ouahman, « Integrity-OrBAC: A new model to preserve Critical Infrastructures Integrity ». International Journal of Information Security, Springer, 2014., DOI 10.1007/s10207-014-0254-9, 14(4), pp.367-385. Disponible à : http://link.springer.com/article/10.1007%2Fs10207-014-0254-9
Thomson & Reuters Impact factor : 1,915.
- Essaouini, F. Cuppens, N. Cuppens-Boulahia, A. Abou El Kalam, “Conflict Detection in Obligation with Deadline Policies”, EURASIP Journal on Information Security, Springer, 2014, disponible à http://jis.eurasipjournals.com/content/2014/1/13
Thomson Reuters Impact Factor : 1,746
- Abou El Kalam, M. Gad El Rab, Y. Deswarte, “A Model-Driven Approach for Experimental Evaluation of Intrusion Detection Systems”, Security and Communication Networks (SCN), 2013, Wiley. DOI : 10.1002/sec.911. http://onlinelibrary.wiley.com/doi/10.1002/sec.911/abstract
Thomson & Reuters Impact factor : 1,064
- Nasr, A. Abou El Kalam, C. Fraboul. « IDS Benchmarking in the Context of Wireless networks », International Journal of Computer and System Sciences, Elsevier, 2013, http://www.journals.elsevier.com/journal-of-computer-and-system-sciences/call-for-papers/special-issue-on-wireless-networks-intrusion/ .
Thomson & Reuters Impact factor : 1,157
- Bensaidi, A. Abou El kalam, A. Marzouk, “OrBAC: A Trust Organization Based Access Control Model For Cloud Computing Systems”, International Journal of Soft Computing and Engineering, Volume-2, Issue-4, September 2012, ISSN: 2231-2307 , disponible à http://www.ijsce.org/v2i4.php
- Abou El Kalam, M. Maachaoui, N. Idboufker, A. Ait Ouahman, “A secure architecture for nomadic users in IMS Network”, International Journal of Mobile Computing and Multimedia Communications (IJMCMC), IGI Global, DOI: 10.4018/jmcmc.2012010101, Volume 4, Issue 1, 2012, http://www.igi-global.com/article/secure-architecture-nomadic-user-ims/63047 . http://dl.acm.org/citation.cfm?id=2440596
- Essaouini, A. Abou El Kalam, A. Ait ouahman, “Modeling Security Policies with Recommendations”, International Journal of Computer Science and Network Security (IJCSNS), octobre 2011, ISSN : 1738-7906, Volume Number: Vol.11, No.10, http://paper.ijcsns.org/07_book/201111/20111121.pdf
Thomson Reuter, Impact Factor 2,56
- Essaouini, A. Abou El Kalam, A. Ait ouahman, “Access Control Policy: A Framework to Enforce Recommendations”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 2 (5) , 2011, 2452-2463 , Septembre 2011, ISSN : 0975-9646, Pages: 2452-2463, disponible à http://www.ijcsit.com/docs/Volume%202/vol2issue5/ijcsit20110205128.pdf
- Mostafa, A. Abou El Kalam, M. Maachaoui, N. Idboufker, “Specification,Implementation and Performance Evaluation of the QoS-friendly Encapsulating Security Payload (Q-ESP) Protocol”, Security and Communication Networks (SCN), 2010, Wiley, disponible à http://onlinelibrary.wiley.com/doi/10.1002/sec.268/abstract
Thomson & Reuters Impact factor : 0,414
- Abou El Kalam, A. Baina, Y. Deswarte, M. Kaaniche, “PolyOrBAC: A Security Framework for Critical Infrastructures”, International Journal of Critical Infrastructure Protection (IJCIP), vol. 2(4), Décembre 2009, 37pp, Elseiver, LNCS, http://dx.doi.org/10.1016/j.ijcip.2009.08.005.
Thomson & Reuters Impact factor 1,906 (sur 5 ans)
- Abou El Kalam, Y. Deswarte, “Sensitive Data Anonymization“, IA Newsletter, IATAC (Information Assurance Technology Analysis Center), Vol 9, N° 2, pp. 8-16, 15 juin 2006, http://iac.dtic.mil/iatac/download/Vol9_No2.pdf.
- Livadariu, V. Patriciu, A. Abou El Kalam, “A Study About Biometric Encoding Systems”, Selectionné dans International Conference on Security for Information Technology and Communication SECITC’08, 27-28 Novembre 2008, également séléctionné pour publication dans Journal Journal of Information and Communication Technology, 2009, ISBN 978-605-505-137-9.
- Abou El Kalam, M. Gad, « Evaluation des systèmes de détection d’intrusion », Revue de la REE, Numéro spécial « Risques et Sécurité des Réseaux et des systèmes à composante logicielle », N° 6/7, pp. 24-32, juin-juillet 2006, http://www.see.asso.fr/htdocs/main.php/ree2006.php/1233/.
- Abou El Kalam, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, R. Elbaida, C. Saurel, G. Trouessin, « Modèles et politiques de sécurité des systèmes d’information et de communication en santé et social », Informatique et Systémique, édition Hermès, volume 7-2005, n° 3-4 de Santé et Systémique (Ed. Lavoisier-Hermes), avril 2005, 21 pp.
- Abou El Kalam, Y. Deswarte, « Modèle de sécurité pour le secteur de la santé », Techniques et Sciences Informatiques (TSI), numéro spécial Sécurité informatique, (éd) Hermès, .V 23, n° 3, 2004, pp.291-321.
- Abou El Kalam, R. Elbaida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, G. Tracouessin, « ORBAC : un modèle de contrôle d’accès basé sur les organisations », Cahiers francophones de la recherche en sécurité de l’information, Numéro II, 1er trimestre 2003, pp30-43.