Maleh, Y. (2025). Traditional vs Generative AI Pentesting A Hands-On Approach to Hacking. CRC Taylor & Francis Group, ISBN: 9781041073994.
Maleh, Y. (2024). Web Application PenTesting: A Comprehensive Guide for Professionals (1st ed.). River Publishers. https://doi.org/10.1201/9788770046985. ISBN: 9788770046978.
Maleh, Y. & Sahid, A. (2024). Navigating IT Governance for Resilient Organizations. IGI Global. https://doi.org/10.4018/979-8-3693-3431-7. ISBN: 9798369334317.
Maleh, Y., Pentesting: Le Guide pratique pour devenir un Pentester Professionnel (2023). ISBN: 978-9920975346.
Maleh, Y., Maleh, Y. (2022). Cybersecurity in Morocco. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8.
Maleh, Y., Sahid, A., Alazab, M., Belaissaoui, M., (2021). IT Governance and Information Security Guides, Standards and Frameworks, CRC Taylor & Francis Group, ISBN: 9780367753245.
Sahid, A., Maleh, Y., Belaissaoui, M., (2020). Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, ISBN:9781800438118, Doi:10.1108/978-1-80043-810-120211002.
Maleh, Y., Sahid, A., & Belaissaoui, M. (Eds.). (2019). Strategic IT Governance and Performance Frameworks in Large Organizations (pp. 1-426). IGI Global, ISBN: 9781522578260.
Baddi, Y., Maleh, Y., Alsmadi, I., & Lahby, M. (Eds.). (2025). Generative AI for Cybersecurity and Privacy (1st ed.). CRC Press. https://doi.org/10.1201/9781003597476
Al-Haija, Q.A., Maleh, Y., & Odeh, A. (Eds.). (2025). Intelligent and Secure Solutions for Digital Transformation (1st ed.). CRC Press. https://doi.org/10.1201/9781003616511
El-Makkaoui, K., Lamaakal, I., Ouahbi, I., Maleh, Y., & Abd El-Latif, A.A. (Eds.). (2026). Tiny Machine Learning Techniques for Constrained Devices (1st ed.). Chapman and Hall/CRC. https://doi.org/10.1201/9781003544449
Sulaiman, R.B., Butt, U.J., Maleh, Y., Aljaidi, M., Talukder, M.S.H., & Nipun, M.S. (Eds.). (2025). Securing Health: The Convergence of AI and Cybersecurity in Healthcare (1st ed.). CRC Press. https://doi.org/10.1201/9781003543596
Lamaakal, I., Maleh, Y., El Makkaoui, K., Ouahbi, I., & Abd El-Latif, A. (Eds.). (2026). Theory, Practice, and Future Direction of Large Language Models. IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-8387-2
Lahby, M., Maleh, Y., Bucchiarone, A., & Schaeffer, S. E. (2024). General Aspects of Applying Generative AI in Higher Education: Opportunities and Challenges. DOI: https://doi.org/10.1007/978-3-031-65691-0. Springer, ISBN: 9783031656934
Almaiah, M. A., Maleh, Y., (Eds.). (2025). Machine Intelligence Applications in Cyber-Risk Management. IGI Global. https://doi.org/10.4018/979-8-3693-2691-6, 10.4018/979-8-3693-7540-2
Baddi, Y., Almaiah, M.A., Almomani, O., & Maleh, Y. (Eds.). (2024). The Art of Cyber Defense: From Risk Assessment to Threat Intelligence (1st ed.). CRC Press. https://doi.org/10.1201/9781032714806. ISBN: 9781032714783
Almaiah, M. A., Maleh, Y., & Alkhassawneh, A. (Eds.). (2024). Risk Assessment and Countermeasures for Cybersecurity. IGI Global. https://doi.org/10.4018/979-8-3693-2691-6, ISBN: 9798369326916
Hammad, M., Ali, G., El-Affendi, M.A., Maleh, Y., & Abd El-Latif, A.A. (Eds.). (2024). Secure Health: A Guide to Cybersecurity for Healthcare Managers (1st ed.). CRC Press. https://doi.org/10.1201/9781003470038. ISBN: 9781003470038
Maleh, Y., Zhang, J., & Hansali, A. (Eds.). (2024). Advances in Emerging Financial Technology and Digital Money (1st ed.). CRC Press. https://doi.org/10.1201/9781032667478, ISBN: 9781032667478
Almaiah, M. A., Maleh, Y., & Alkhassawneh, A. (Eds.). (2024). Risk Assessment and Countermeasures for Cybersecurity. IGI Global. https://doi.org/10.4018/979-8-3693-2691-6, ISBN: 9798369326916
Abd El-Latif, A. A., Tawalbeh, L., Maleh, Y. & Gupta, B. B. (Eds.). (2024). Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities. EAI Springer, ISBN: 978-3-031-51096-0
Kumar, A.S., Dhanraj, R.K., Maleh, Y., & Arockiam, D. (Eds.). (2024). Ubiquitous and Transparent Security: Challenges and Applications (1st ed.). CRC Press. https://doi.org/10.1201/9781003362685
Hedia, B. B., Krichen, M. & Maleh, Y. (Eds.). (2024). Verification and Evaluation of Computer and Communication Systems, Proceedings of the 16th International Conference, VECoS 2023, Marrakech, Morocco, October 18–20, 2023, Proceedings. LNCS Springer, ISBN: 978-3-031-49736-0
Abd El-Latif, A. A., Hammad, M., Maleh, Y., Gupta, B. B. & Mazurczyk, (Eds.). (2023). Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications. IET, ISBN: 978-1-83953-547-5
Lahby, M., Pathan, A.-S.K., Maleh, Y. (2023). Combatting Cyberbullying in Digital Media with Artificial Intelligence, Springer Studies in Computational Intelligence, CRC Taylor & Francis Group, ISBN: 9781032491882.
Abd El-Latif, A. A. Maleh, Y., El-Affendi, M. A. and Sadiq, A. (Eds.). (2023).Cybersecurity Management in Education Technologies Risks and Countermeasures for Advancements in E-learning. CRC Taylor & Francis Group, Edited book, ISBN: 9781032438320
Abd El-Latif, A. A., Ahmad Wani, M., Maleh, Y., & El-Affendi, M. A. (Eds.). (2023). Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques. IGI Global. https://doi.org/10.4018/978-1-6684-7216-3
Maleh, Y., Alazab, M., and Romdhani, I., (Eds.). (2023). Blockchain for Cybersecurity in Cyber-Physical Systems. Advances in Information Security. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8
Abd El-Latif, A. A., Maleh, Y., Mazurczyk, W., ELAffendi, M., & Alkanhal, M. I. (Eds.). (2023). Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Vol. 4). Springer Nature, ISBN: 978-3-031-21100-3
Bendaoud, M., Maleh, Y., & Padmanaban, S. (Eds.). (2023). Intelligent Control of Medium and High Power Converters. IET, ISBN: 978-1-83953-740-0.
Maleh, Y., A. Abd El-Latif, A., Curran, K., Siarry, P. (2023) Computational Intelligence for Medical Internet of Things (MIoT) Applications, Edited Book, Elsevier, ISBN: 9780323994217
Maleh, Y., Alazab, M., Tawalbeh, L., and Romdhani, I., (Eds.), (2023). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Edited book, River Publishers Series in Digital Security and Forensics, ISBN: 9788770227780
Maleh, Y., Mounir, S., Alazab, M., (Eds.), (2023).Computational Intelligence for Cybersecurity Management and Applications. Edited book, ISBN: 978103233503
Maleh, Y., Motahhir, S., Senhaji Hafid, A., (Eds.), (2022). Advances in Blockchain Technology for Cyber Physical Systems. Edited book, Springer Internet of Things Series, ISBN: 9783030936457
Keshav, K., Susheela, D., Akashdeep, B., Maleh, Y., (Eds.), (2022). Internet of Things and Cyber Physical Systems Security and Forensics. Edited book, CRC Taylor & Francis Grou, ISBN: 9781032254067
Lahby, Al-Fuqaha, Maleh, Y., (Eds.), (2022). Computational Intelligence Techniques for Green Smart Cities. Edited book, Springer Green Energy and Technology Series, ISBN: 9783030336452
Motahhir, S., and Maleh, Y., (2022). Security Engineering for Embedded and Cyber-Physical Systems, CRC Taylor & Francis Group, ISBN: 9781032235462.
Ouaissa, Mariyam, Boulouard, Zakaria, Ouaissa, Mariya and Maleh, Yassine., (Eds.), (2022). Artificial Intelligence of Things in Smart Environments: Applications in Transportation and Logistics, De Gruyter. ISBN: 9783110760477
SAIDI, R., EL BHIRI, B., MALEH, Y., MOSALLAM, A., ESSAAIDI, M., (Eds.), (2022). Advanced Technologies for Humanity. Proceedings of International Conference on Advanced Technologies for Humanity (ICATH'2021), Springer Lecture Notes on Data Engineering and Communications Technologies, ISBN: 9783030936457
Maleh, Y., Alazab, M., Gherabi, N., M., Tawalbeh, L., A. Abd El-Latif, A, . (Eds.), (2022). Advances in Information, Communication and Cybersecurity. Edited book, Springer Lecture Notes in Networks and Systems, Vol 353, ISBN: 978-3-030-917-371.
Baddi, Y., Gahi, Y., Maleh, Y., Alazab, M., Tawalbeh, L., (2022). Big Data Intelligence for Smart Applications, Springer Studies in Computational Intelligence, vol 994, ISBN: 978-3-030-87954-9.
Lahby, M., Pathan, A.-S.K., Maleh, Y., Yafooz, W.M.S. (2021). Combating Fake News With Computational Intelligence Techniques, Springer Studies in Computational Intelligence, vol 1001, ISBN: 978-3-030-90087-8.
Ghosh, U., Maleh, Y., Alazab, M., Khan Pathan, A.-S. (Eds.), (2021). Machine Intelligence and Data Analytics for Sustainable Future Smart Cities. Edited book, Springer Studies in Computational Intelligence, Vol 971, 978-3-030-72064
Maleh, Baddi, Y., M., Alazab, M., Tawalbeh, L., Romdhani, I. (Eds.), (2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Edited book, Springer Studies in Big Data, Vol 90, 978-3-030-74574-5.
Maleh, Y., Shojafar, M., Alazab, M., Baddi, Y., (2021) (Eds.). Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Edited book, Springer Studies in Computational Intelligence, Vol 919, ISBN 978-3-030-57024-8.
Maleh, Y., Shojafar, M., Alazab, M., Romdhani, I., (2020). Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications. Edited book, CRC Taylor & Francis. ISBN 9780367343101.
Maleh, Y., Mohammad, S., Ashraf, D., & Abdelkrim, H. (2019). Cybersecurity and Privacy in Cyber-Physical Systems (pp. 1-434). CRC Taylor and Francis, ISBN: 9781138346673.
Maleh, Y., Ezzati, A., & Belaissaoui, M. (Eds.). (2018). Security and Privacy in Smart Sensor Networks (pp. 1-446). IGI Global, ISBN: 9781522557364.
Maleh, Y. (Ed.). (2018). Security and Privacy Management, Techniques, and Protocols (pp. 1-426). IGI Global, ISBN: 9781522557364.
El Bhiri, B., Hussain, A., & Maleh, Y. (Eds.). (2025). AI and digital transformation: Innovations in supply chain, education, and energy systems (Proceedings of the 6th International Conference on Advanced Technologies for Humanity, ICATH 2024). Springer Cham. ISBN: 978-3-031-86836-8
Abd El-Latif, A.A., ElAffendi, M.A., AlShara, M.A., & Maleh, Y. (Eds.). (2025). Cybersecurity, Cybercrimes, and Smart Emerging Technologies: Proceedings of the Second International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (CCSET 2023), Riyadh, Saudi Arabia, 5th–7th December, 2023 (1st ed.). CRC Press. https://doi.org/10.1201/9781003614197
M. Mufti, M. Lahby, M. S. Kaiser, P. Manzoni, Y. Maleh. International Symposium on Green Technologies and Applications (ISGTA’2023), Procedia Computer Science, 236, 1 2024. https://doi.org/10.1016/j.procs.2024.04.329
Abd El-Latif, A. A., Tawalbeh, L., Maleh, Y. & Gupta, B. B. (Eds.). (2024). Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities, Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022), EAI Springer, ISBN: 978-3-031-51096-0
Hedia, B. B., Krichen, M. & Maleh, Y. (Eds.). (2024). Verification and Evaluation of Computer and Communication Systems, Proceedings of the 16th International Conference, VECoS 2023, Marrakech, Morocco, October 18–20, 2023, Proceedings. LNCS Springer, ISBN: 978-3-031-49736-0
Abd El-Latif, A. A., Maleh, Y., Mazurczyk, W., ELAffendi, M., & Alkanhal, M. I. (Eds.). (2023). Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Vol. 4). Springer Nature, ISBN: 978-3-031-21100-3
SAIDI, R., EL BHIRI, B., MALEH, Y., MOSALLAM, A., ESSAAIDI, M., (Eds.), (2022). Advanced Technologies for Humanity. Proceedings of International Conference on Advanced Technologies for Humanity (ICATH'2021), Springer Lecture Notes on Data Engineering and Communications Technologies, ISBN: 9783030936457
Maleh, Y., Alazab, M., Gherabi, N., M., Tawalbeh, L., A. Abd El-Latif, A, . (Eds.), (2022). Advances in Information, Communication and Cybersecurity. Edited book, Springer Lecture Notes in Networks and Systems, Vol 353, ISBN: 978-3-030-917-371.
Indexed Journals (Scopus/WoS)
Lamaakal, I., Yahyati, C., Charroud, Z., El Makkaoui, K., Ouahbi, I., Maleh, Y., ... & Niyato, D. (2025). Tiny Deep Learning Models with Hybrid Compression Techniques for Gesture-Based Air Handwriting Recognition of English Alphabets on Edge Device. IEEE Internet of Things Journal. 10.1109/JIOT.2025.3624283
Lamaakal, I., Yahyati, C., Maleh, Y., El Makkaoui, K., Ouahbi, I., & Niyato, D. (2025). An Explainable Tiny-Fast Kolmogorov–Arnold Network for Gesture-Based Air Handwriting Recognition of Tifinagh Letters in Resource-Constrained IoT Device. IEEE Internet of Things Journal. 10.1109/JIOT.2025.3625087
Lamaakal, I., Essahraui, S., Maleh, Y., El Makkaoui, K., Ouahbi, I., Bouami, M. F., ... & Niyato, D. (2025). A Comprehensive Survey on Tiny Machine Learning for Human Behavior Analysis. IEEE Internet of Things Journal. 10.1109/JIOT.2025.3565688
Lamaakal, I., Yahyati, C., Maleh, Y., El Makkaoui, K., Ouahbi, I., El-Latif, A. A. A., ... & El-Rahiem, B. A. (2025). A tiny inertial transformer for human activity recognition via multimodal knowledge distillation and explainable AI. Scientific Reports, 15(1), 42335. 10.1038/s41598-025-26297-2
El Gamouz, N., Elansari, T., Abdellaoui Alaoui, E. A., Hessane, A., Maleh, Y., & Agoujil, S. (2025). Enhancing credit card fraud detection using Hybrid MOPSO-SMOTE for imbalanced dataset resampling. Information Security Journal: A Global Perspective, 1–31. https://doi.org/10.1080/19393555.2025.2596617
Hajla, S. E., Ennaji, E. M., Maleh, Y., & Mounir, S. (2025). HFEL: A hybrid federated ensemble learning framework for intrusion detection in IoT networks. Cluster Computing, 28(13), 819. 10.1007/s10586-025-05587-4
Ouazzane, K., Ikeda, C., Djemai, R., Phipps, A., & Maleh, Y. (2025). A novel feature engineering framework for cyber fraud detection using machine learning and deep learning algorithms. Information Security Journal: A Global Perspective, 1–21. https://doi.org/10.1080/19393555.2025.2528067
Fartitchou, M., Lamaakal, I., El Makkaoui, K., El Allali, Z., & Maleh, Y. (2025). BlockMEDC: Blockchain Smart Contracts for Securing Moroccan Higher Education Digital Certificates. IEEE Access. 10.1109/ACCESS.2025.3546177
Lamaakal, I., Maleh, Y., El Makkaoui, K., Ouahbi, I., Pławiak, P., Alfarraj, O., Almousa, M., & Abd El-Latif, A. A. (2025). Tiny Language Models for Automation and Control: Overview, Potential Applications, and Future Research Directions. Sensors, 25(5), 1318. https://doi.org/10.3390/s25051318
Moussaoui, J.-E., Kmiti, M., El Gholami, K., & Maleh, Y. (2025). A Systematic Review on Hybrid AI Models Integrating Machine Learning and Federated Learning. Journal of Cybersecurity and Privacy, 5(3), 41. https://doi.org/10.3390/jcp5030041
Essahraui, S., Lamaakal, I., Hamly, I. E., Maleh, Y., Ouahbi, I., Makkaoui, K. E., Filali Bouami, M., Pławiak, P., Alfarraj, O., & El-Latif, A. A. A. (2025). Real-Time Driver Drowsiness Detection Using Facial Analysis and Machine Learning Techniques. Sensors, 25(3), 812. https://doi.org/10.3390/s25030812
Essahraui, S., Lamaakal, I., Maleh, Y., El Makkaoui, K., Bouami, M. F., Ouahbi, I., ... & Abd El-Latif, A. A. (2025). FastKAN-DDD: A novel fast Kolmogorov-Arnold network-based approach for driver drowsiness detection optimized for TinyML deployment. PLoS One, 20(11), e0332577.
Filali, A., Abdellaoui Alaoui, E. A., Sallah, A., Merras, M., & Yassine, M. (2025). A multi-objective approach to spam image detection: Balancing performance and resource constraints using lightweight models. Information Security Journal: A Global Perspective, 1-42. 10.1080/19393555.2025.2562102
Sahid, A., Maleh, Y. & Ouazzane, K. Changing landscape of fake news research on social media: a bibliometric analysis. Quality & Quantity (2025). https://doi.org/10.1007/s11135-024-02048-9
Essahraui, S., Lamaakal, I., Maleh, Y., El Makkaoui, K., Bouami, M. F., Ouahbi, I., ... & Abd El-Latif, A. A. (2025). Deep Learning Models for Detecting Cheating in Online Exams. CMC-COMPUTERS MATERIALS & CONTINUA, 85(2), 3151-3183. 10.32604/cmc.2025.067359
Chamkar, S. A., Zaydi, M., Maleh, Y., & Gherabi, N. (2025). Improving Threat Detection in Wazuh Using Machine Learning Techniques. Journal of Cybersecurity and Privacy, 5(2), 34. https://doi.org/10.3390/jcp5020034
Ennaji, E. M., El Hajla, S., Maleh, Y., & Mounir, S. (2025). Adversarially robust federated deep learning models for intrusion detection in IoT. Indonesian Journal of Electrical Engineering and Computer Science, 37(2), 937–947. https://doi.org/10.11591/ijeecs.v37.i2.pp937-947
Fares, H., Zeroual, M., Karim, A., Maleh, Y., Baddi, Y., & Aknin, N. (2024). MACHINE LEARNING, DEEP LEARNING AND ENSEMBLE LEARNING BASED APPROACHES FOR INTRUSION DETECTION ENHANCEMENT. EDPACS, 70(1), 31–51. https://doi.org/10.1080/07366981.2024.2422645
El Mouhtadi, W., Maleh, Y., & Mounir, S. (2025). Enhancing malware detection capabilities using deep learning with advanced hyperparameter tuning. Indonesian Journal of Electrical Engineering and Computer Science, 37(2), 985–994. https://doi.org/10.11591/ijeecs.v37.i2.pp985-994
Zaydi, M., & Maleh, Y. (2025). Empowering Red Teams with Generative AI: Transforming Penetration Testing through Adaptive Intelligence. EDPACS, 70(2), 41–66. https://doi.org/10.1080/07366981.2024.2439628
Elmahfoud, E., El Hajla, S., Maleh, Y., Mounir, S., & Ouazzane, K. (2024). Label flipping attacks in hierarchical federated learning for intrusion detection in IoT. Information Security Journal: A Global Perspective, 1–16. https://doi.org/10.1080/19393555.2024.2434586
Boussihmed, A., El Makkaoui, K., Ouahbi, I., Maleh, Y., Chetouani, A.,. A TinyML model for sidewalk obstacle detection: aiding the blind and visually impaired people. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-20070-9
Fares, H., Zeroual, M., Karim, A., Maleh, Y., Baddi, Y., & Aknin, N. (2024). MACHINE LEARNING, DEEP LEARNING AND ENSEMBLE LEARNING BASED APPROACHES FOR INTRUSION DETECTION ENHANCEMENT. EDPACS, 1–21. https://doi.org/10.1080/07366981.2024.2422645
Kmiti, M., Moussaoui, J. E., El Gholami, K., & Maleh, Y. (2025). Shared API Call Insights for Optimized Malware Detection in Portable Executable Files. International Journal of Advanced Computer Science & Applications, 16(8).
Chamkar SA, Maleh Y, Gherabi N. Security Operations Centers: Use Case Best Practices, Coverage, and Gap Analysis Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge. Journal of Cybersecurity and Privacy. 2024; 4(4):777-793. https://doi.org/10.3390/jcp4040036
Fartitchou, M.; Lamaakal, I.; Maleh, Y.; El Makkaoui, K.; El Allali, Z.; Pławiak, P.; Alblehai, F.; A. Abd El-Latif, A. IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem. Sensors 2024, 24, 5716. https://doi.org/10.3390/s24175716
A. Sallah, E.A. Alaoui, S. Agoujil, M.A. Wani, M. Hammad, A.A.A. El-Latif and Y. Maleh, "Fine-Tuned Understanding: Enhancing Social Bot Detection with Transformer-based Classification," in IEEE Access, https://10.0.4.85/ACCESS.2024.3440657
I. Lamaakal, I. Ouahbi, Kh. EL Makkaoui, Y. MALEH, P. , F. Alblehai (2024), "A TinyDL Model for Gesture-Based Air Handwriting Arabic Numbers and Simple Arabic Letters Recognition," in IEEE Access. https://10.0.4.85/ACCESS.2024.3406631
M. Zaoui, B. Yousra, S. Yassine, M. Yassine and O. Karim (2024), "A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Towards Effective Mitigation Strategies," in IEEE Access. https://10.0.4.85/ACCESS.2024.3403197
A. Rehaimi, Y. Sadqi, Y. Maleh et al., Towards a federated and hybrid cloud computing environment for sustainable and effective provisioning of cyber security virtual laboratories. Expert Systems With Applications (2024), https://doi.org/10.1016/j.eswa.2024.124267
Zineddine, A., Chakir, O., Sadqi, Y., Maleh, Y., Singh Gaba, G., Gurtov, A., & Dev, K. (2024). A systematic review of cybersecurity assessment methods for HTTPS. Computers and Electrical Engineering, 115, 109137. https://doi.org/https://doi.org/10.1016/j.compeleceng.2024.109137
Boukraa, L., Essahraui, S., Maleh, Y., El Makkaoui, K., Ouahbi, I., & Esbai, R. (2024). MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEMS FOR SDN: AN EMPIRICAL STUDY USING KNIME. EDPACS, 69(6), 46–59. https://doi.org/10.1080/07366981.2024.2360840
Aouichaty, S., Maleh, Y., Mohtadi, M. T., Hajami, A., & Allali, H. (2024). Sustainable Topic Modeling for Legal Moroccan Arabic Language: A Challenging Study on BERTopic Technique. Procedia Computer Science, 236, 582–588. https://doi.org/https://doi.org/10.1016/j.procs.2024.05.069
Zainabi, B., Maleh, Y., & Belaissaoui, M. (2024). Security risks of chatbots in customer service: a comprehensive literature review. EDPACS, 1–16. https://doi.org/10.1080/07366981.2024.2378934
Elmahfoud, E., Elhajla, S., Maleh, Y., & Mounir, S. (2024). Machine Learning Algorithms for Intrusion Detection in IoT Prediction and Performance Analysis. Procedia Computer Science, 236, 460–467. https://doi.org/https://doi.org/10.1016/j.procs.2024.05.054
Lamaakal, I., Makkaoui, K. El, Ouahbi, I., & Maleh, Y. (2024). A TinyML Model for Gesture-Based Air Handwriting Arabic Numbers Recognition. Procedia Computer Science, 236, 589–596. https://doi.org/https://doi.org/10.1016/j.procs.2024.05.070
Sahid A, Maleh Y, Asemanjerdi SA, Martín-Cervantes PA. A Bibliometric Analysis of the FinTech Agility Literature: Evolution and Review. International Journal of Financial Studies. 2023; 11(4):123. https://doi.org/10.3390/ijfs11040123
Fartitchou, M., Boussouf, J., El Makkaoui, K., Maleh, Y., & El Allali, Z. (2023). IOTA TANGLE 2.0: AN OVERVIEW. EDPACS, 68(5), 15-26, DOI: 10.1080/07366981.2023.2293322
Yousra, B., Yassine, S., Maleh, y., Said, S., Lo’ai, T., & Salah, K. (2023). A Novel secure and privacy-preserving model for OpenID Connect based on Blockchain. IEEE Access. DOI: 10.1109/ACCESS.2023.3292143
Rguibi, Z., Hajami, A., Zitouni, D., Maleh, Y., Elqaraoui, A.. (2023). Medical variational autoencoder and generative adversarial network for medical imaging. Indonesian Journal of Electrical Engineering and Computer Science, 32(1), 494-505.
Ateya, A. A., Muthanna, A., Koucheryavy, A., Maleh, Y., & El-Latif, A. A. A. (2023). Energy efficient offloading scheme for MEC-based augmented reality system. Cluster Computing, 1-18. https://doi.org/10.1007/s10586-022-03914-7
Chamkar, S. A., Maleh, Y., & Gherabi, N. (2023). SOC Analyst Performance Metrics: Towards an optimal performance model. EDPACS, 1-14.
Aouichaty, S., Maleh, Y., Hajami, A., & Allali, H. (2023). Automated decision classification model for tax appeals commission in Morocco using latent dirichlet allocation. Indonesian Journal of Electrical Engineering and Computer Science, 31(3), 1811-1820.
Oualid, A., Maleh, Y., & Moumoun, L. (2023). FEDERATED LEARNING TECHNIQUES APPLIED TO CREDIT RISK MANAGEMENT: A SYSTEMATIC LITERATURE REVIEW. EDPACS, 1-15.
Baddi, Y., Sebbar, A., Zkik, K., Maleh, Y., Bensalah, F., & Boulmalf, M. (2023). MSDN-IoT multicast group communication in IoT based on software defined networking. Journal of Reliable Intelligent Environments, 1-12.
Aouichaty, S., Maleh, Y., Hajami, A., & Allali, H. (2023). Automated decision classification model for tax appeals commission in Morocco using latent dirichlet allocation. Indonesian Journal of Electrical Engineering and Computer Science, 31(3), 1811-1820.
Youssef Lamriji, Khalid El Makkaoui, Yassine Maleh, Abderrahim Beni-Hssane & Ibrahim Ouahbi (2023) A LIGHTWEIGHT WHATSAPP END-TO-END ENCRYPTION, EDPACS, DOI: 10.1080/07366981.2023.2212491
Khalid El Makkaoui, Youssef Lamriji, Abderrahim Beni-Hssane, Yassine Maleh & Ibrahim Ouahbi (2023) AN OVERVIEW OF FAST VARIANTS OF THE RSA CRYPTOSYSTEM FOR MODERN CRYPTOGRAPHY APPLICATIONS, EDPACS, DOI: 10.1080/07366981.2023.2214995
Alsulami, H., Serbaya, S.H., Rizwan, A., Saleem, M., Maleh, Y. and Alamgir, Z. (2023), "Impact of emotional intelligence on the stress and safety of construction workers' in Saudi Arabia", Engineering, Construction and Architectural Management, Vol. 30 No. 4, pp. 1365-1378. https://doi.org/10.1108/ECAM-06-2021-0481
Ciaburro G, Padmanabhan S, Maleh Y, Puyana-Romero V. Fan Fault Diagnosis Using Acoustic Emission and Deep Learning Methods. Informatics. 2023; 10(1):24. https://doi.org/10.3390/informatics10010024
Elmay, F. K., Salah, K., Yaqoob, I., Jayaraman, R., Battah, A., & Maleh, Y. (2022). Blockchain-based Traceability for Shipping Containers in Unimodal and Multimodal Logistics. IEEE Access. https://doi.org/10.1109/ACCESS.2022.3231689
Elafri N., Rose B., Maleh Y., Gabriela F., Majed A., Sassi S., (2022), "Lean 4.0 tools and technologies to improve companies’ maturity level: the COVID-19 context", Procedia Computer Science, Volume 196, 2022, Pages 207-216, https://doi.org/10.1016/j.procs.2021.12.007.
El Arbi A., Stephane C., Maleh, Y., Nayyar, A,. (2022). "Towards to intelligent routing for DTN protocols using machine learning techniques", Simulation Modelling Practice and Theory, https://doi.org/10.1016/j.simpat.2021.102475
Maleh, Y., Qasmaoui, Y., El Gholami, K. et al. A comprehensive survey on SDN security: threats, mitigations, and future directions. J Reliable Intell Environ (2022). https://doi.org/10.1007/s40860-022-00171-8
Ahmed Seddik, Yassine Maleh, Ghada M. El Banby, Ashraf A.M. Khalaf, Fathi E. Abd El-Samie, Brij B Gupta, Konstantinos Psannis, Ahmed A. Abd El-Latif, '2022), "AI-enabled digital forgery analysis and crucial interactions monitoring in smart communities", Technological Forecasting and Social Change, https://doi.org/10.1016/j.techfore.2022.121555
Taqafi, I., Maleh, Y., & Ouazzane, K. (2022). A maturity capability framework for security operation center. EDPACS, 1-18. https://doi.org/10.1080/07366981.2023.2159047
Abdelkebir Sahid, Yassine Maleh & Soufyane Mounir (2022): TOWARDS AN AGILE ITSM MATURITY FRAMEWORK FOR ORGANIZATIONS : A CASE STUDY, EDPACS, DOI: 10.1080/07366981.2022.2045541
Gabriel, PE., Butt, S.A., Francisco, EO. and Y. Maleh (2022). Performance analysis of 6LoWPAN protocol for a flood monitoring system. J Wireless Com Network, Springer, https://doi.org/10.1186/s13638-022-02098-3
Maleh, Y., Lakkineni, S., Tawalbeh, L., AbdEl-Latif, A.A. (2022). Blockchain for Cyber-Physical Systems: Challenges and Applications. In Advances in Blockchain Technology for Cyber Physical Systems. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-93646-4_2
ELAFRI, N., Tappert, J., Bertrand, R. O. S. E., & Yassine, M. (2022). Lean 4.0: Synergies between Lean Management tools and Industry 4.0 technologies. IFAC-PapersOnLine, 55(10), 2060-2066.
Youssef, Q., Yassine, M., & Haqiq, A. (2021). Secure Software Defined Networks Controller Storage using Intel Software Guard Extensions. International Journal of Advanced Computer Science and Applications (IJACSA), 11(10).
Sadqi, Y., & Maleh, Y. (2021). A systematic review and taxonomy of web applications threats. Information Security Journal: A Global Perspective, 1-27.
EL Gholami K., Maleh, Y, Fatani I. F. (2021). "THE IEEE 802.15.4 STANDARD IN INDUSTRIAL APPLICATIONS: A SURVEY", Journal of Theoretical and Applied Information Technology, Vol.99. No 15.
Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). A Maturity Framework for Cybersecurity Governance in Organizations. EDPACS, 63(06), 1–22. https://doi.org/10.1080/07366981.2020.1815354. Taylor & Francis.
Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). A Practical Maturity For Information Security Policy in Organizations. EDPACS, 64(02), 1–12. https://doi.org/10.1080/07366981.2021.1885590. Taylor & Francis.
Belaissaoui, M and Maleh, Y. (2021). Machine Learning techniques optimized by Practical Swarm optimization for Intrusions Detection in IoT. Journal of Information Assurance & Security, Vol. 16 Issue 3, pp. 105-116.
Alexander Paramonov, Jialiang Peng, Dmitry Kashkarov, Ammar Muthanna, Ibrahim A. Elgendy, Andrey Koucheryavy, Yassine Maleh, Ahmed A. Abd El-Latif (2021). "Study and Analysis of Multiconnectivity for Ultrareliable and Low-Latency Features in Networks and V2X Communications", Wireless Communications and Mobile Computing, vol. 2021, Article ID 1718099, 10 pages, 2021. https://doi.org/10.1155/2021/1718099.
Abdukodir Khakimov, Ibrahim A. Elgendy, Ammar Muthanna, Evgeny Mokrov, Konstantin Samouylov, Yassine Maleh, Ahmed A.Abd El-Latif (2021). "Flexible architecture for deployment of edge computing applications", Simulation Modelling Practice and Theory, https://doi.org/10.1016/j.simpat.2021.102402
Chamkar, S. A., Maleh, Y., & Gherabi, N. (2021). THE HUMAN FACTOR CAPABILITIES IN SECURITY OPERATION CENTER (SOC). EDPACS, 1-14. https://doi.org/10.1080/07366981.2021.1977026
Yassine Maleh (2021), IT/OT convergence and cyber security, Computer Fraud & Security, Vol 2021, Issue 12, December 2021, Pages 13-16. https://doi.org/10.1016/S1361-3723(21)00129-9
Alsulami, H., Serbaya, S.H., Rizwan, A., Saleem, M., Maleh, Y. and Alamgir, Z. (2021), "Impact of emotional intelligence on the stress and safety of construction workers' in Saudi Arabia", Engineering, Construction and Architectural Management, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/ECAM-06-2021-0481
Maleh, Y. (2020). Machine Learning Techniques for IoT Intrusions Detection in Aerospace Cyber-Physical Systems. In: Hassanien, A., Darwish, A., El-Askary, H. (eds) Machine Learning and Data Mining in Aerospace Technology. Studies in Computational Intelligence, vol 836. Springer, Cham. https://doi.org/10.1007/978-3-030-20212-5_11
Sahid, A., Maleh, Y., Belaissaoui, M. (2018). A Practical Agile Framework for IT Service and Asset Management ITSM/ITAM Through a Case Study. Journal of Cases on Information Technology (JCIT), JCIT vol.20, no.4 2018: pp.71-92. http://doi.org/10.4018/JCIT.2018100105
Maleh, Y., Sahid, A., Ezzati, A., & Belaissaoui, M. (2017). A Capability Maturity Framework for IT Security Governance in Organizations. Advances in Intelligent Systems and Computing, Springer, Cham, 735, pp. 221-233. https://doi.org/10.1007/978-3-319-76354-5_20
Maleh, Y., Sahid, A., Ezzati, A., & Belaissaoui, M. (2017). CAFISGO: A Capability Assessment Framework for Information Security Governance in Organizations. Journal of Information Assurance & Security, Vol. 12 Issue 6, p209-217. 9p.
Maleh, Y., Ezzati, A. (2016). Towards an Efficient Datagram Transport Layer Security for Constrained Applications in Internet of Things. International Review on Computers and Software (IRECOS), 11(7). https://doi.org/10.15866/irecos.v11i7.9438
Maleh, Y., Ezzati, A. (2016). A lightweight symmetric cryptography scheme for identifying compromised node in WSN. Indonesian Journal of Electrical Engineering and Computer Science 2(2), pp. 431-451. http://doi.org/10.11591/ijeecs.v2.i2.pp431-451
Maleh, Y., Ezzati, A. (2016) LEAP enhanced: A lightweight symmetric cryptography scheme for identifying compromised node in WSN. International Journal of Mobile Computing and Multimedia Communications 7(3), pp. 42-66. http://doi.org/10.4018/IJMCMC.2016070104
Maleh, Y., Ezzati, A., Qasmaoui, Y., Mbida, M. (2015). A global hybrid intrusion detection system for wireless sensor networks. Procedia Computer Science, 52, 1047-1052. https://doi.org/10.1016/j.procs.2015.05.108
Maleh, Y., Ezzati, A. (2015). An efficient key establishment protocol for wireless sensor networks. Lecture Notes in Electrical Engineering, 366, Springer, Singapore. pp. 339-352. https://doi.org/10.1007/978-981-287-990-5_27
Maleh, Y., Ezzati, A. (2015). Lightweight Intrusion Detection Scheme for Wireless Sensor Networks. IAENG International Journal of Computer Science, 42(4).
Lamaakal, I., Charroud, Z., Maleh, Y., Ouahbi, I., Makkaoui, K.E. (2025). Optimizing Breast Calcification Detection in Mammography Using PySpark: A Big Data and Machine Learning Approach. In: Swaroop, A., Virdee, B., Correia, S.D., Polkowski, Z. (eds) Proceedings of Data Analytics and Management. ICDAM 2024. Lecture Notes in Networks and Systems, vol 1301. Springer, Singapore. https://doi.org/10.1007/978-981-96-3372-2_41
El Mouhtadi, W., Maleh, Y., Mounir, S. (2025). Machine Learning Techniques for Enhanced Malware Detection in Portable Executable Files. In: Ben Ahmed, M., Abdelhakim, B.A., Karaș, İ.R., Ben Ahmed, K. (eds) Innovations in Smart Cities Applications Volume 8. SCA 2024. Lecture Notes in Networks and Systems, vol 1310. Springer, Cham. https://doi.org/10.1007/978-3-031-88653-9_74
Zaydi, M., & Maleh, Y. (2025). Enhancing Cyber Resilience: A Study of Red Teaming within Operational Technology. Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications, 187.
Maleh, Y., & Zaydi, M. (2025). Penetration Testing in Operations Technology and SCADA Environments. Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications, 125.
Lamaakal, I., Maleh, Y., Ouahbi, I., El Makkaoui, K., Abd El-Latif, A.A. (2024). A Deep Learning-Powered TinyML Model for Gesture-Based Air Handwriting Simple Arabic Letters Recognition. In: Motahhir, S., Bossoufi, B. (eds) Digital Technologies and Applications. ICDTA 2024. Lecture Notes in Networks and Systems, vol 1101. Springer, Cham. https://doi.org/10.1007/978-3-031-68675-7_4
Fadili, Y., Baddi, Y., Maleh, Y. (2024). A Survey on Cybersecurity Techniques Toward Convolutional Neural Network. In: Gherabi, N., Awad, A.I., Nayyar, A., Bahaj, M. (eds) Advances in Intelligent System and Smart Technologies. I2ST 2023. Lecture Notes in Networks and Systems, vol 826. Springer, Cham. https://doi.org/10.1007/978-3-031-47672-3_8
Maleh, Y., Sahid, A., Abd El-Latif, A.A., Ouazzane, K. (2024). Machine Learning Techniques for Secure Edge SDN. In: Abd El-Latif, A.A., Tawalbeh, L., Maleh, Y., Gupta, B.B. (eds) Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities . EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-51097-7_14
Boussihmed, A., El Makkaoui, K., Chetouani, A., Ouahbi, I., Maleh, Y. (2024). An Intelligent Model for Detecting Obstacles on Sidewalks for Visually Impaired People. In: Farhaoui, Y., Hussain, A., Saba, T., Taherdoost, H., Verma, A. (eds) Artificial Intelligence, Data Science and Applications. ICAISE 2023. Lecture Notes in Networks and Systems, vol 838. Springer, Cham. https://doi.org/10.1007/978-3-031-48573-2_57
Rehaimi, A., Sadqi, Y., Maleh, Y. (2024). A Comparative Study of Online Cybersecurity Training Platforms. In: Ben Hedia, B., Maleh, Y., Krichen, M. (eds) Verification and Evaluation of Computer and Communication Systems. VECoS 2023. Lecture Notes in Computer Science, vol 14368. Springer, Cham. https://doi.org/10.1007/978-3-031-49737-7_9
Maleh, Y. (2023). Enhancing E-Learning Security in Cloud Environments: Risk Assessment and Penetration Testing. Cybersecurity Management in Education Technologies: Risks and Countermeasures for Advancements in E-learning.
Sahid, A., & Maleh, Y. (2023). Enhancing Cybersecurity Education. Cybersecurity Management in Education Technologies: Risks and Countermeasures for Advancements in E-learning.
Sigdel, A., Yeo, K. C., Maleh, Y, Alazab, M. (2023). Intelligent authentication system using graphical one-time passwords. In Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications,2023. DOI: 10.1049/pbse020e_ch9
Maleh, Y. (2023). Deep Learning Fusion for Multimedia Malware Classification. In Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques (pp. 46-73). IGI Global.
Abderrahman, R., Bensalah, F., Maleh, Y., Youssef, B., & Bouzekri, Y. (2022, November). Software Defined Networking Concept (SDN) Based on Artificial Intelligence: Taxonomy of Methods and Future Directions. In The International Conference of Advanced Computing and Informatics (pp. 233-241). Cham: Springer International Publishing.
Maleh, Y., Mounir, S., Ouazzane, K. (2023). Cybersecurity-Based Blockchain for Cyber-Physical Systems: Challenges and Applications. In: Maleh, Y., Alazab, M., Romdhani, I. (eds) Blockchain for Cybersecurity in Cyber-Physical Systems. Advances in Information Security, vol 102. Springer, Cham. https://doi.org/10.1007/978-3-031-25506-9_3
Chakir, O., Sadqi, Y., & Maleh, Y. (2023). Evaluation of Open-source Web Application Firewalls for Cyber Threat Intelligence. Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence, 9781003373384-3.
Belaissaoui, M., Maleh, Y., & Mounir, S. (2023). 3 Deep Learning Techniques for Malware. Computational Intelligence for Cybersecurity Management and Applications, 49. Taylor & Francis.
Mounir, S., & Maleh, Y. (2023). 11 Cybersecurity Management in Cyber-Physical Systems Using Blockchain. Computational Intelligence for Cybersecurity Management and Applications, 209. Taylor & Francis.
Maleh, Y., Maleh, Y. (2022). Morocco National Cybersecurity Strategy. In: Cybersecurity in Morocco. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8_5
Maleh, Y., Maleh, Y. (2022). The African View on Cybersecurity. In: Cybersecurity in Morocco SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8_3
Maleh, Y., Maleh, Y. (2022). National Cyber Resilience Strategy in a Post-COVID-19 World. In: Cybersecurity in Morocco. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8_6
Maleh, Y., Maleh, Y. (2022). Cyber Sovereignty in Morocco. In: Cybersecurity in Morocco SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8_7
Maleh, Y., Maleh, Y. (2022). Understanding Cybersecurity Standards. In: Cybersecurity in Morocco. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8_2
Maleh, Y., Abd El-Latif, A. A., & Motahhir, S. (2022). Cybersecurity-Based Blockchain for Cyber-Physical Systems. In Security Engineering for Embedded and Cyber-Physical Systems (pp. 109-142). CRC Press.
Belaissaoui, M., & Youssef Qasmaoui, S. (2022). Cybersecurity-Based Machine Learning for Cyber-Physical Systems. In Security Engineering for Embedded and Cyber-Physical Systems (pp. 161-192). CRC Press.
Maleh, Y., & Belaissaoui, M. (2021). Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework. In Encyclopedia of Organizational Knowledge, Administration, and Technology (pp. 1176-1193). IGI Global.
Maleh, Y., Zaydi, M., Sahid, A., & Ezzati, A. (2021). Building a Maturity Framework for Information Security Governance Through an Empirical Study in Organizations. In Research Anthology on Artificial Intelligence Applications in Security (pp. 143-173). IGI Global.
Baddi, Y., Anass, S., Zkik, K., Maleh, Y., Mohammed, B., & Dafir, E. C. E. K. M. (2021). MSDN-GKM: Software Defined Networks Based Solution for Multicast Transmission with Group Key Management. In Machine Intelligence and Big Data Analytics for Cybersecurity Applications (pp. 373-396). Springer, Cham.
Sönmez, F. Ö., & Maleh, Y. (2021). Prediction of Satisfaction with Life Scale Using Linguistic Features from Facebook Status Updates: Smart Life. In Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (pp. 119-144). Springer, Cham.
Maleh, Y. (2020). Machine Learning Techniques for IoT Intrusions Detection in Aerospace Cyber-Physical Systems. In Machine Learning and Data Mining in Aerospace Technology (pp. 205-232). Springer, Cham.
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "Understanding Agility Concept", Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, Bingley, pp. 9-27. https://doi.org/10.1108/978-1-80043-810-120211003
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "Information System Evolution", Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, Bingley, pp. 29-66. https://doi.org/10.1108/978-1-80043-810-120211004
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "The Conceptual Model for IS Agility", Strategic Information System Agility: From Theory to Practices,Emerald Publishing Limited, Bingley, pp. 67-91. https://doi.org/10.1108/978-1-80043-810-120211005
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "The Conceptual Model for IS Agility", Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, Bingley, pp. 67-91. https://doi.org/10.1108/978-1-80043-810-120211005
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "Strategic Agility for IT Service Management: A Case Study", Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, Bingley, pp. 93-116. https://doi.org/10.1108/978-1-80043-810-120211006
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "Cloud Computing as a Drive for Strategic Agility in Organizations", Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, Bingley, pp. 117-151. https://doi.org/10.1108/978-1-80043-810-120211007
Maleh, Y., Sahid, A., Ezzati, A., Belaissaoui, M. (2018). Key Management Protocols for Smart Sensor Networks. In Security and Privacy in Smart Sensor Networks (pp. 1-23). IGI Global.
Maleh, Y., Zaydi, M., Sahid, A., Ezzati, A. (2018). Building a Maturity Framework for Information Security Governance Through an Empirical Study in Organizations. In Security and Privacy Management, Techniques, and Protocols (pp. 96-127). IGI Global.
Abdelkebir, S., Maleh, Y., & Belaissaoui, M. (2019). Towards an Agile and Secure IT Service Management. In Global Information Diffusion and Management in Contemporary Society (pp. 125-152). IGI Global.
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). From Information Governance to IT Governance: An Overview of Issues and Frameworks for Large Organizations. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch001
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). A Deep Overview of Information Technology Governance Standards. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch002
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Evaluation of IT Governance in Middle East and North African Large Organizations. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch003
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Strategic Agility Frameworks for Information System Governance. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch004
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). IT Management Agility in Large Organizations: A Case Study. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch005
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Managing the Cloud for Information System Agility in Organizations. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch006
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Information Security Governance Practices and Commitments in Organizations. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch007
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Information Security Governance in Large Organizations: A Maturity Framework. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch008
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch009
Maleh, Y. (2019). Malware Classification and Analysis Using Convolutional and Recurrent Neural Network. In Handbook of Research on Deep Learning Innovations and Trends (pp. 233-255). IGI Global.
Indexed Conferences (Scopus/WoS)
Zaydi, M., & Maleh, Y. (2025). GAI-Driven Offensive Cybersecurity: Transforming Pentesting for Proactive Defence. 11 International Conference on Information Systems Security and Privacy , 1, pp. 426–433, Porto. https://doi.org/10.5220/0013378700003899
Lamaakal, I., Maleh, Y., Ouahbi, I., El Makkaoui, K., Abd El-Latif, A.A. (2024). A Deep Learning-Powered TinyML Model for Gesture-Based Air Handwriting Simple Arabic Letters Recognition. In: Motahhir, S., Bossoufi, B. (eds) Digital Technologies and Applications. ICDTA 2024. Lecture Notes in Networks and Systems, vol 1101. Springer, Cham. https://doi.org/10.1007/978-3-031-68675-7_4
I. Lamaakal, N. El Mourabit, K. El Makkaoui, I. Ouahbi and Y. Maleh, "Efficient Gesture-Based Recognition of Tifinagh Characters in Air Handwriting with a TinyDL Model," 2024 Sixth International Conference on Intelligent Computing in Data Sciences (ICDS), Marrakech, Morocco, 2024, pp. 1-8, https://doi.org/10.1109/ICDS62089.2024.10756483
Roy, U., Tahosin, M.S., Hasan, M.M., Islam, T., Imtiaz, F., Sadik, M.R., Maleh, Y., Sulaiman, R.B., and Talukder, M.S.H. (2024). Enhancing Bangla Fake News Detection Using Bidirectional Gated Recurrent Units and Deep Learning Techniques. In Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security (NISS '24). Association for Computing Machinery, New York, NY, USA, Article 14, 1–10. https://doi.org/10.1145/3659677.3659703
El Hajla, S., Ennaji, E., Maleh, Y. and Mounir, S. (2024). Enhancing Internet of Things Network Security Through an Ensemble-Learning Approach. In Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security (NISS '24). Association for Computing Machinery, New York, NY, USA, Article 55, 1–7. https://doi.org/10.1145/3659677.3659835
Ennaji, A., El Hajla, S., Maleh, Y. and Mounir, S. (2024). Federated Deep Learning Models for Intrusion Detection in IoT. In Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security (NISS '24). Association for Computing Machinery, New York, NY, USA, Article 57, 1–5. https://doi.org/10.1145/3659677.3659837
Aouichaty, S., Maleh, Y., Mohtadi, M. T., Hajami, A., & Allali, H. (2024). Sustainable Topic Modeling for Legal Moroccan Arabic Language: A Challenging Study on BERTopic Technique. Procedia Computer Science, 236, 582–588. https://doi.org/https://doi.org/10.1016/j.procs.2024.05.069
Elmahfoud, E., Elhajla, S., Maleh, Y., & Mounir, S. (2024). Machine Learning Algorithms for Intrusion Detection in IoT Prediction and Performance Analysis. Procedia Computer Science, 236, 460–467. https://doi.org/https://doi.org/10.1016/j.procs.2024.05.054
Lamaakal, I., Makkaoui, K. El, Ouahbi, I., & Maleh, Y. (2024). A TinyML Model for Gesture-Based Air Handwriting Arabic Numbers Recognition. Procedia Computer Science, 236, 589–596. https://doi.org/https://doi.org/10.1016/j.procs.2024.05.070
Fadili, Y., Baddi, Y., Maleh, Y. (2024). A Survey on Cybersecurity Techniques Toward Convolutional Neural Network. In: Gherabi, N., Awad, A.I., Nayyar, A., Bahaj, M. (eds) Advances in Intelligent System and Smart Technologies. I2ST 2023. Lecture Notes in Networks and Systems, vol 826. Springer, Cham. https://doi.org/10.1007/978-3-031-47672-3_8
Boussihmed, A., El Makkaoui, K., Chetouani, A., Ouahbi, I., Maleh, Y. (2024). An Intelligent Model for Detecting Obstacles on Sidewalks for Visually Impaired People. In: Farhaoui, Y., Hussain, A., Saba, T., Taherdoost, H., Verma, A. (eds) Artificial Intelligence, Data Science and Applications. ICAISE 2023. Lecture Notes in Networks and Systems, vol 838. Springer, Cham. https://doi.org/10.1007/978-3-031-48573-2_57
El Hassak, I., Oughannou, Z., Mounir, S., & Maleh, Y. (2024). Safeguarding Industry 4.0: A Machine Learning Approach for Cyber-Physical Systems Security and Sustainability. In E3S Web of Conferences (Vol. 477, p. 00092). EDP Sciences.
Rehaimi, A., Sadqi, Y., Maleh, Y. (2024). A Comparative Study of Online Cybersecurity Training Platforms. In: Ben Hedia, B., Maleh, Y., Krichen, M. (eds) Verification and Evaluation of Computer and Communication Systems. VECoS 2023. Lecture Notes in Computer Science, vol 14368. Springer, Cham. https://doi.org/10.1007/978-3-031-49737-7_9
S. E. Hajla, E. Mahfoud, Y. Maleh and S. Mounir, "Attack and anomaly detection in IoT Networks using machine learning approaches," 2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM), Istanbul, Turkiye, 2023, pp. 1-7, doi: 10.1109/WINCOM59760.2023.10322991
Abderrahman, R., Bensalah, F., Maleh, Y., Youssef, B., & Bouzekri, Y. (2022, November). Software Defined Networking Concept (SDN) Based on Artificial Intelligence: Taxonomy of Methods and Future Directions. In The International Conference of Advanced Computing and Informatics (pp. 233-241). Cham: Springer International Publishing.
Elafri N., Rose B., Maleh Y., Gabriela F., Majed A., Sassi S., (2022), "Lean 4.0 tools and technologies to improve companies’ maturity level: the COVID-19 context", CENTERIS - The 13th International Conference on ENTERprise Information Systems. Braga, Portugal, 13-15 October 2021.
Maleh Y., Fatani I.F.E., Gholami K.E. (2022) A Systematic Review on Software Defined Networks Security: Threats and Mitigations. In: Maleh Y., Alazab M., Gherabi N., Tawalbeh L., Abd El-Latif A.A. (eds) Advances in Information, Communication and Cybersecurity. ICI2C 2021. Lecture Notes in Networks and Systems, vol 357. Springer, Cham. https://doi.org/10.1007/978-3-030-91738-8_54
Adamou Djergou A., Maleh Y., Mounir S. (2022) Machine Learning Techniques for Intrusion Detection in SDN: A Survey. In: Maleh Y., Alazab M., Gherabi N., Tawalbeh L., Abd El-Latif A.A. (eds) Advances in Information, Communication and Cybersecurity. ICI2C 2021. Lecture Notes in Networks and Systems, vol 357. Springer, Cham. https://doi.org/10.1007/978-3-030-91738-8_42
Sabouri Z., Maleh Y., Gherabi N. (2022) Benchmarking Classification Algorithms for Measuring the Performance on Maintainable Applications. In: Maleh Y., Alazab M., Gherabi N., Tawalbeh L., Abd El-Latif A.A. (eds) Advances in Information, Communication and Cybersecurity. ICI2C 2021. Lecture Notes in Networks and Systems, vol 357. Springer, Cham. https://doi.org/10.1007/978-3-030-91738-8_17
Chamkar S.A., Maleh Y., Gherabi N. (2022) The Human Factor Capabilities in Security Operation Center (SOC). In: Maleh Y., Alazab M., Gherabi N., Tawalbeh L., Abd El-Latif A.A. (eds) Advances in Information, Communication and Cybersecurity. ICI2C 2021. Lecture Notes in Networks and Systems, vol 357. Springer, Cham. https://doi.org/10.1007/978-3-030-91738-8_53
Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). Optimized Machine Learning Techniques for IoT 6LoWPAN Cyber Attacks Detection. In Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (pp. 669–677). Springer.
Maleh, Y., Sahid, A., Ezzati, A., Belaissaoui, M. (2017, November). Building open virtual cloud lab for advanced education in networks and security. In 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM) (pp. 1-6). IEEE.
Abdelkebir, S., Maleh, Y., Belaissaoui, M. (2017, November). An Agile Framework for ITS Management in Organizations: A Case Study Based on DevOps. In Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems (p. 67). ACM.
Maleh, Y., Sahid, A., Ezzati, A., & Belaissaoui, M. (2017, December). A Capability Maturity Framework for IT Security Governance in Organizations. In International Conference on Innovations in Bio-Inspired Computing and Applications (pp. 221-233). Springer.
Maleh, Y., Ezzati, A., Belaissaoui, M. (2016, November). Dos attacks analysis and improvement in DTLS protocol for internet of things. In Proceedings of the International Conference on Big Data and Advanced Wireless Technologies (p. 54). ACM.
Maleh, Y., Ezzati, A., & Belaissaoui, M. (2016, October). An enhanced DTLS protocol for Internet of Things applications. In 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM) (pp. 168-173). IEEE.
Maleh, Y., Ezzati, A., Qasmaoui, Y., Mbida, M. (2015). A global hybrid intrusion detection system for wireless sensor networks. Procedia Computer Science, 52, 1047-1052. https://doi.org/10.1016/j.procs.2015.05.108
Maleh, Y., Ezzati, A. (2015). An efficient key establishment protocol for wireless sensor networks. Lecture Notes in Electrical Engineering, 366, Springer, Singapore. pp. 339-352. https://doi.org/10.1007/978-981-287-990-5_27
Maleh, Y., Ezzati, A. (2014). Performance analysis of routing protocols for wireless sensor networks. In 2014 Third IEEE International Colloquium in Information Science and Technology (CIST) (pp. 420-424). IEEE.