Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_38
A. Gourari, M. Raoufi, M. Skouri
{"title":"Formulating Quizzes Questions Using Artificial Intelligent Techniques","authors":"A. Gourari, M. Raoufi, M. Skouri","doi":"10.1007/978-981-16-3637-0_38","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_38","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122029794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_11
M. Boulouird, Jamal Amadid, Abdelhamid Riadi, M. Hassani
{"title":"Channel Estimation in Massive MIMO Systems for Spatially Correlated Channels with Pilot Contamination","authors":"M. Boulouird, Jamal Amadid, Abdelhamid Riadi, M. Hassani","doi":"10.1007/978-981-16-3637-0_11","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_11","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"102 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_14
Hind El Ghalbzouri, J. E. Bouhdidi
{"title":"Integrating Business Intelligence with Cloud Computing: State of the Art and Fundamental Concepts","authors":"Hind El Ghalbzouri, J. E. Bouhdidi","doi":"10.1007/978-981-16-3637-0_14","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_14","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122449160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_55
Farouq Zitouni, S. Harous, R. Maamri
{"title":"An Enhanced Social Spider Colony Optimization for Global Optimization","authors":"Farouq Zitouni, S. Harous, R. Maamri","doi":"10.1007/978-981-16-3637-0_55","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_55","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128039987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_27
Oussama Sbai, M. Elboukhari
{"title":"Comparative Study Between Network Layer Attacks in Mobile Ad Hoc Networks","authors":"Oussama Sbai, M. Elboukhari","doi":"10.1007/978-981-16-3637-0_27","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_27","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131955099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_26
Hector Torres-Calderon, Marco Velasquez, David Mauricio
{"title":"Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF","authors":"Hector Torres-Calderon, Marco Velasquez, David Mauricio","doi":"10.1007/978-981-16-3637-0_26","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_26","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122242500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}