Publications
Authored Books
Maleh, Y., Pentesting: Le Guide pratique pour devenir un Pentester Professionnel (2023). ISBN: 978-9920975346
Maleh, Y., Maleh, Y. (2022). Cybersecurity in Morocco. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8
Maleh, Y., Sahid, A., Alazab, M., Belaissaoui, M., (2021). IT Governance and Information Security Guides, Standards and Frameworks, CRC Taylor & Francis Group, ISBN: 9780367753245.
Sahid, A., Maleh, Y., Belaissaoui, M., (2020). Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, ISBN:9781800438118, Doi:10.1108/978-1-80043-810-120211002.
Maleh, Y., Sahid, A., & Belaissaoui, M. (Eds.). (2019). Strategic IT Governance and Performance Frameworks in Large Organizations (pp. 1-426). IGI Global, ISBN: 9781522578260.
Edited Books
Baddi, Y., Almaiah, M.A., Almomani, O., & Maleh, Y. (Eds.). (2024). The Art of Cyber Defense: From Risk Assessment to Threat Intelligence (1st ed.). CRC Press. https://doi.org/10.1201/9781032714806
Maleh, Y., Zhang, J., & Hansali, A. (Eds.). (2024). Advances in Emerging Financial Technology and Digital Money (1st ed.). CRC Press. https://doi.org/10.1201/9781032667478, ISBN: 9781032667478
Abd El-Latif, A. A., Tawalbeh, L., Maleh, Y. & Gupta, B. B. (Eds.). (2024). Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities. EAI Springer, ISBN: 978-3-031-51096-0
Kumar, A.S., Dhanraj, R.K., Maleh, Y., & Arockiam, D. (Eds.). (2024). Ubiquitous and Transparent Security: Challenges and Applications (1st ed.). CRC Press. https://doi.org/10.1201/9781003362685
Hedia, B. B., Krichen, M. & Maleh, Y. (Eds.). (2024). Verification and Evaluation of Computer and Communication Systems, Proceedings of the 16th International Conference, VECoS 2023, Marrakech, Morocco, October 18–20, 2023, Proceedings. LNCS Springer, ISBN: 978-3-031-49736-0
Abd El-Latif, A. A., Hammad, M., Maleh, Y., Gupta, B. B. & Mazurczyk, (Eds.). (2023). Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications. IET, ISBN: 978-1-83953-547-5
Lahby, M., Pathan, A.-S.K., Maleh, Y. (2023). Combatting Cyberbullying in Digital Media with Artificial Intelligence, Springer Studies in Computational Intelligence, CRC Taylor & Francis Group, ISBN: 9781032491882.
Abd El-Latif, A. A. Maleh, Y., El-Affendi, M. A. and Sadiq, A. (Eds.). (2023).Cybersecurity Management in Education Technologies Risks and Countermeasures for Advancements in E-learning. CRC Taylor & Francis Group, Edited book, ISBN: 9781032438320
Abd El-Latif, A. A., Ahmad Wani, M., Maleh, Y., & El-Affendi, M. A. (Eds.). (2023). Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques. IGI Global. https://doi.org/10.4018/978-1-6684-7216-3
Maleh, Y., Alazab, M., and Romdhani, I., (Eds.). (2023). Blockchain for Cybersecurity in Cyber-Physical Systems. Advances in Information Security. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8
Abd El-Latif, A. A., Maleh, Y., Mazurczyk, W., ELAffendi, M., & Alkanhal, M. I. (Eds.). (2023). Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Vol. 4). Springer Nature, ISBN: 978-3-031-21100-3
Bendaoud, M., Maleh, Y., & Padmanaban, S. (Eds.). (2023). Intelligent Control of Medium and High Power Converters. IET, ISBN: 978-1-83953-740-0.
Maleh, Y., A. Abd El-Latif, A., Curran, K., Siarry, P. (2023) Computational Intelligence for Medical Internet of Things (MIoT) Applications, Edited Book, Elsevier, ISBN: 9780323994217
Maleh, Y., Alazab, M., Tawalbeh, L., and Romdhani, I., (Eds.), (2023). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Edited book, River Publishers Series in Digital Security and Forensics, ISBN: 9788770227780
Maleh, Y., Mounir, S., Alazab, M., (Eds.), (2023).Computational Intelligence for Cybersecurity Management and Applications. Edited book, ISBN: 978103233503
Maleh, Y., Motahhir, S., Senhaji Hafid, A., (Eds.), (2022). Advances in Blockchain Technology for Cyber Physical Systems. Edited book, Springer Internet of Things Series, ISBN: 9783030936457
Keshav, K., Susheela, D., Akashdeep, B., Maleh, Y., (Eds.), (2022). Internet of Things and Cyber Physical Systems Security and Forensics. Edited book, CRC Taylor & Francis Grou, ISBN: 9781032254067
Lahby, Al-Fuqaha, Maleh, Y., (Eds.), (2022). Computational Intelligence Techniques for Green Smart Cities. Edited book, Springer Green Energy and Technology Series, ISBN: 9783030336452
Motahhir, S., and Maleh, Y., (2022). Security Engineering for Embedded and Cyber-Physical Systems, CRC Taylor & Francis Group, ISBN: 9781032235462.
Ouaissa, Mariyam, Boulouard, Zakaria, Ouaissa, Mariya and Maleh, Yassine., (Eds.), (2022). Artificial Intelligence of Things in Smart Environments: Applications in Transportation and Logistics, De Gruyter. ISBN: 9783110760477
SAIDI, R., EL BHIRI, B., MALEH, Y., MOSALLAM, A., ESSAAIDI, M., (Eds.), (2022). Advanced Technologies for Humanity. Proceedings of International Conference on Advanced Technologies for Humanity (ICATH'2021), Springer Lecture Notes on Data Engineering and Communications Technologies, ISBN: 9783030936457
Maleh, Y., Alazab, M., Gherabi, N., M., Tawalbeh, L., A. Abd El-Latif, A, . (Eds.), (2022). Advances in Information, Communication and Cybersecurity. Edited book, Springer Lecture Notes in Networks and Systems, Vol 353, ISBN: 978-3-030-917-371.
Baddi, Y., Gahi, Y., Maleh, Y., Alazab, M., Tawalbeh, L., (2022). Big Data Intelligence for Smart Applications, Springer Studies in Computational Intelligence, vol 994, ISBN: 978-3-030-87954-9.
Lahby, M., Pathan, A.-S.K., Maleh, Y., Yafooz, W.M.S. (2021). Combating Fake News With Computational Intelligence Techniques, Springer Studies in Computational Intelligence, vol 1001, ISBN: 978-3-030-90087-8.
Ghosh, U., Maleh, Y., Alazab, M., Khan Pathan, A.-S. (Eds.), (2021). Machine Intelligence and Data Analytics for Sustainable Future Smart Cities. Edited book, Springer Studies in Computational Intelligence, Vol 971, 978-3-030-72064-3.
Maleh, Baddi, Y., M., Alazab, M., Tawalbeh, L., Romdhani, I. (Eds.), (2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Edited book, Springer Studies in Big Data, Vol 90, 978-3-030-74574-5.
Maleh, Y., Shojafar, M., Alazab, M., Baddi, Y., (2021) (Eds.). Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Edited book, Springer Studies in Computational Intelligence, Vol 919, ISBN 978-3-030-57024-8.
Maleh, Y., Shojafar, M., Alazab, M., Romdhani, I., (2020). Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications. Edited book, CRC Taylor & Francis. ISBN 9780367343101.
Maleh, Y., Mohammad, S., Ashraf, D., & Abdelkrim, H. (2019). Cybersecurity and Privacy in Cyber-Physical Systems (pp. 1-434). CRC Taylor and Francis, ISBN: 9781138346673.
Maleh, Y., Ezzati, A., & Belaissaoui, M. (Eds.). (2018). Security and Privacy in Smart Sensor Networks (pp. 1-446). IGI Global, ISBN: 9781522557364.
Maleh, Y. (Ed.). (2018). Security and Privacy Management, Techniques, and Protocols (pp. 1-426). IGI Global, ISBN: 9781522557364.
Book Proceedings
Abd El-Latif, A. A., Tawalbeh, L., Maleh, Y. & Gupta, B. B. (Eds.). (2024). Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities, Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022), EAI Springer, ISBN: 978-3-031-51096-0
Hedia, B. B., Krichen, M. & Maleh, Y. (Eds.). (2024). Verification and Evaluation of Computer and Communication Systems, Proceedings of the 16th International Conference, VECoS 2023, Marrakech, Morocco, October 18–20, 2023, Proceedings. LNCS Springer, ISBN: 978-3-031-49736-0
Abd El-Latif, A. A., Maleh, Y., Mazurczyk, W., ELAffendi, M., & Alkanhal, M. I. (Eds.). (2023). Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Vol. 4). Springer Nature, ISBN: 978-3-031-21100-3
SAIDI, R., EL BHIRI, B., MALEH, Y., MOSALLAM, A., ESSAAIDI, M., (Eds.), (2022). Advanced Technologies for Humanity. Proceedings of International Conference on Advanced Technologies for Humanity (ICATH'2021), Springer Lecture Notes on Data Engineering and Communications Technologies, ISBN: 9783030936457
Maleh, Y., Alazab, M., Gherabi, N., M., Tawalbeh, L., A. Abd El-Latif, A, . (Eds.), (2022). Advances in Information, Communication and Cybersecurity. Edited book, Springer Lecture Notes in Networks and Systems, Vol 353, ISBN: 978-3-030-917-371.
Peer-reviewed Journals
Zineddine, A., Chakir, O., Sadqi, Y., Maleh, Y., Singh Gaba, G., Gurtov, A., & Dev, K. (2024). A systematic review of cybersecurity assessment methods for HTTPS. Computers and Electrical Engineering, 115, 109137. https://doi.org/https://doi.org/10.1016/j.compeleceng.2024.109137
Sahid A, Maleh Y, Asemanjerdi SA, Martín-Cervantes PA. A Bibliometric Analysis of the FinTech Agility Literature: Evolution and Review. International Journal of Financial Studies. 2023; 11(4):123. https://doi.org/10.3390/ijfs11040123
Fartitchou, M., Boussouf, J., El Makkaoui, K., Maleh, Y., & El Allali, Z. (2023). IOTA TANGLE 2.0: AN OVERVIEW. EDPACS, 68(5), 15-26, DOI: 10.1080/07366981.2023.2293322
Yousra, B., Yassine, S., Maleh, y., Said, S., Lo’ai, T., & Salah, K. (2023). A Novel secure and privacy-preserving model for OpenID Connect based on Blockchain. IEEE Access. DOI: 10.1109/ACCESS.2023.3292143
Rguibi, Z., Hajami, A., Zitouni, D., Maleh, Y., Elqaraoui, A.. (2023). Medical variational autoencoder and generative adversarial network for medical imaging. Indonesian Journal of Electrical Engineering and Computer Science, 32(1), 494-505.
Ateya, A. A., Muthanna, A., Koucheryavy, A., Maleh, Y., & El-Latif, A. A. A. (2023). Energy efficient offloading scheme for MEC-based augmented reality system. Cluster Computing, 1-18. https://doi.org/10.1007/s10586-022-03914-7
Chamkar, S. A., Maleh, Y., & Gherabi, N. (2023). SOC Analyst Performance Metrics: Towards an optimal performance model. EDPACS, 1-14.
Aouichaty, S., Maleh, Y., Hajami, A., & Allali, H. (2023). Automated decision classification model for tax appeals commission in Morocco using latent dirichlet allocation. Indonesian Journal of Electrical Engineering and Computer Science, 31(3), 1811-1820.
Oualid, A., Maleh, Y., & Moumoun, L. (2023). FEDERATED LEARNING TECHNIQUES APPLIED TO CREDIT RISK MANAGEMENT: A SYSTEMATIC LITERATURE REVIEW. EDPACS, 1-15.
Baddi, Y., Sebbar, A., Zkik, K., Maleh, Y., Bensalah, F., & Boulmalf, M. (2023). MSDN-IoT multicast group communication in IoT based on software defined networking. Journal of Reliable Intelligent Environments, 1-12.
Aouichaty, S., Maleh, Y., Hajami, A., & Allali, H. (2023). Automated decision classification model for tax appeals commission in Morocco using latent dirichlet allocation. Indonesian Journal of Electrical Engineering and Computer Science, 31(3), 1811-1820.
Youssef Lamriji, Khalid El Makkaoui, Yassine Maleh, Abderrahim Beni-Hssane & Ibrahim Ouahbi (2023) A LIGHTWEIGHT WHATSAPP END-TO-END ENCRYPTION, EDPACS, DOI: 10.1080/07366981.2023.2212491
Khalid El Makkaoui, Youssef Lamriji, Abderrahim Beni-Hssane, Yassine Maleh & Ibrahim Ouahbi (2023) AN OVERVIEW OF FAST VARIANTS OF THE RSA CRYPTOSYSTEM FOR MODERN CRYPTOGRAPHY APPLICATIONS, EDPACS, DOI: 10.1080/07366981.2023.2214995
Alsulami, H., Serbaya, S.H., Rizwan, A., Saleem, M., Maleh, Y. and Alamgir, Z. (2023), "Impact of emotional intelligence on the stress and safety of construction workers' in Saudi Arabia", Engineering, Construction and Architectural Management, Vol. 30 No. 4, pp. 1365-1378. https://doi.org/10.1108/ECAM-06-2021-0481
Ciaburro G, Padmanabhan S, Maleh Y, Puyana-Romero V. Fan Fault Diagnosis Using Acoustic Emission and Deep Learning Methods. Informatics. 2023; 10(1):24. https://doi.org/10.3390/informatics10010024
Elmay, F. K., Salah, K., Yaqoob, I., Jayaraman, R., Battah, A., & Maleh, Y. (2022). Blockchain-based Traceability for Shipping Containers in Unimodal and Multimodal Logistics. IEEE Access. https://doi.org/10.1109/ACCESS.2022.3231689
Elafri N., Rose B., Maleh Y., Gabriela F., Majed A., Sassi S., (2022), "Lean 4.0 tools and technologies to improve companies’ maturity level: the COVID-19 context", Procedia Computer Science, Volume 196, 2022, Pages 207-216, https://doi.org/10.1016/j.procs.2021.12.007.
El Arbi A., Stephane C., Maleh, Y., Nayyar, A,. (2022). "Towards to intelligent routing for DTN protocols using machine learning techniques", Simulation Modelling Practice and Theory, https://doi.org/10.1016/j.simpat.2021.102475
Maleh, Y., Qasmaoui, Y., El Gholami, K. et al. A comprehensive survey on SDN security: threats, mitigations, and future directions. J Reliable Intell Environ (2022). https://doi.org/10.1007/s40860-022-00171-8
Ahmed Seddik, Yassine Maleh, Ghada M. El Banby, Ashraf A.M. Khalaf, Fathi E. Abd El-Samie, Brij B Gupta, Konstantinos Psannis, Ahmed A. Abd El-Latif, '2022), "AI-enabled digital forgery analysis and crucial interactions monitoring in smart communities", Technological Forecasting and Social Change, https://doi.org/10.1016/j.techfore.2022.121555
Taqafi, I., Maleh, Y., & Ouazzane, K. (2022). A maturity capability framework for security operation center. EDPACS, 1-18. https://doi.org/10.1080/07366981.2023.2159047
Abdelkebir Sahid, Yassine Maleh & Soufyane Mounir (2022): TOWARDS AN AGILE ITSM MATURITY FRAMEWORK FOR ORGANIZATIONS : A CASE STUDY, EDPACS, DOI: 10.1080/07366981.2022.2045541
Gabriel, PE., Butt, S.A., Francisco, EO. and Y. Maleh (2022). Performance analysis of 6LoWPAN protocol for a flood monitoring system. J Wireless Com Network, Springer, https://doi.org/10.1186/s13638-022-02098-3
Maleh, Y., Lakkineni, S., Tawalbeh, L., AbdEl-Latif, A.A. (2022). Blockchain for Cyber-Physical Systems: Challenges and Applications. In Advances in Blockchain Technology for Cyber Physical Systems. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-93646-4_2
ELAFRI, N., Tappert, J., Bertrand, R. O. S. E., & Yassine, M. (2022). Lean 4.0: Synergies between Lean Management tools and Industry 4.0 technologies. IFAC-PapersOnLine, 55(10), 2060-2066.
Youssef, Q., Yassine, M., & Haqiq, A. (2021). Secure Software Defined Networks Controller Storage using Intel Software Guard Extensions. International Journal of Advanced Computer Science and Applications (IJACSA), 11(10).
Sadqi, Y., & Maleh, Y. (2021). A systematic review and taxonomy of web applications threats. Information Security Journal: A Global Perspective, 1-27.
EL Gholami K., Maleh, Y, Fatani I. F. (2021). "THE IEEE 802.15.4 STANDARD IN INDUSTRIAL APPLICATIONS: A SURVEY", Journal of Theoretical and Applied Information Technology, Vol.99. No 15.
Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). A Maturity Framework for Cybersecurity Governance in Organizations. EDPACS, 63(06), 1–22. https://doi.org/10.1080/07366981.2020.1815354. Taylor & Francis.
Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). A Practical Maturity For Information Security Policy in Organizations. EDPACS, 64(02), 1–12. https://doi.org/10.1080/07366981.2021.1885590. Taylor & Francis.
Belaissaoui, M and Maleh, Y. (2021). Machine Learning techniques optimized by Practical Swarm optimization for Intrusions Detection in IoT. Journal of Information Assurance & Security, Vol. 16 Issue 3, pp. 105-116.
Alexander Paramonov, Jialiang Peng, Dmitry Kashkarov, Ammar Muthanna, Ibrahim A. Elgendy, Andrey Koucheryavy, Yassine Maleh, Ahmed A. Abd El-Latif (2021). "Study and Analysis of Multiconnectivity for Ultrareliable and Low-Latency Features in Networks and V2X Communications", Wireless Communications and Mobile Computing, vol. 2021, Article ID 1718099, 10 pages, 2021. https://doi.org/10.1155/2021/1718099.
Abdukodir Khakimov, Ibrahim A. Elgendy, Ammar Muthanna, Evgeny Mokrov, Konstantin Samouylov, Yassine Maleh, Ahmed A.Abd El-Latif (2021). "Flexible architecture for deployment of edge computing applications", Simulation Modelling Practice and Theory, https://doi.org/10.1016/j.simpat.2021.102402
Chamkar, S. A., Maleh, Y., & Gherabi, N. (2021). THE HUMAN FACTOR CAPABILITIES IN SECURITY OPERATION CENTER (SOC). EDPACS, 1-14. https://doi.org/10.1080/07366981.2021.1977026
Yassine Maleh (2021), IT/OT convergence and cyber security, Computer Fraud & Security, Vol 2021, Issue 12, December 2021, Pages 13-16. https://doi.org/10.1016/S1361-3723(21)00129-9
Alsulami, H., Serbaya, S.H., Rizwan, A., Saleem, M., Maleh, Y. and Alamgir, Z. (2021), "Impact of emotional intelligence on the stress and safety of construction workers' in Saudi Arabia", Engineering, Construction and Architectural Management, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/ECAM-06-2021-0481
Maleh, Y. (2020). Machine Learning Techniques for IoT Intrusions Detection in Aerospace Cyber-Physical Systems. In: Hassanien, A., Darwish, A., El-Askary, H. (eds) Machine Learning and Data Mining in Aerospace Technology. Studies in Computational Intelligence, vol 836. Springer, Cham. https://doi.org/10.1007/978-3-030-20212-5_11
Sahid, A., Maleh, Y., Belaissaoui, M. (2018). A Practical Agile Framework for IT Service and Asset Management ITSM/ITAM Through a Case Study. Journal of Cases on Information Technology (JCIT), JCIT vol.20, no.4 2018: pp.71-92. http://doi.org/10.4018/JCIT.2018100105
Maleh, Y., Sahid, A., Ezzati, A., & Belaissaoui, M. (2017). A Capability Maturity Framework for IT Security Governance in Organizations. Advances in Intelligent Systems and Computing, Springer, Cham, 735, pp. 221-233. https://doi.org/10.1007/978-3-319-76354-5_20
Maleh, Y., Sahid, A., Ezzati, A., & Belaissaoui, M. (2017). CAFISGO: A Capability Assessment Framework for Information Security Governance in Organizations. Journal of Information Assurance & Security, Vol. 12 Issue 6, p209-217. 9p.
Maleh, Y., Ezzati, A. (2016). Towards an Efficient Datagram Transport Layer Security for Constrained Applications in Internet of Things. International Review on Computers and Software (IRECOS), 11(7). https://doi.org/10.15866/irecos.v11i7.9438
Maleh, Y., Ezzati, A. (2016). A lightweight symmetric cryptography scheme for identifying compromised node in WSN. Indonesian Journal of Electrical Engineering and Computer Science 2(2), pp. 431-451. http://doi.org/10.11591/ijeecs.v2.i2.pp431-451
Maleh, Y., Ezzati, A. (2016) LEAP enhanced: A lightweight symmetric cryptography scheme for identifying compromised node in WSN. International Journal of Mobile Computing and Multimedia Communications 7(3), pp. 42-66. http://doi.org/10.4018/IJMCMC.2016070104
Maleh, Y., Ezzati, A. (2015). Lightweight Intrusion Detection Scheme for Wireless Sensor Networks. IAENG International Journal of Computer Science, 42(4).
Maleh, Y., Ezzati, A., Qasmaoui, Y., Mbida, M. (2015). A global hybrid intrusion detection system for wireless sensor networks. Procedia Computer Science, 52, 1047-1052. https://doi.org/10.1016/j.procs.2015.05.108
Maleh, Y., Ezzati, A. (2015). An efficient key establishment protocol for wireless sensor networks. Lecture Notes in Electrical Engineering, 366, Springer, Singapore. pp. 339-352. https://doi.org/10.1007/978-981-287-990-5_27
Book Chapters
Fadili, Y., Baddi, Y., Maleh, Y. (2024). A Survey on Cybersecurity Techniques Toward Convolutional Neural Network. In: Gherabi, N., Awad, A.I., Nayyar, A., Bahaj, M. (eds) Advances in Intelligent System and Smart Technologies. I2ST 2023. Lecture Notes in Networks and Systems, vol 826. Springer, Cham. https://doi.org/10.1007/978-3-031-47672-3_8
Maleh, Y., Sahid, A., Abd El-Latif, A.A., Ouazzane, K. (2024). Machine Learning Techniques for Secure Edge SDN. In: Abd El-Latif, A.A., Tawalbeh, L., Maleh, Y., Gupta, B.B. (eds) Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities . EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-51097-7_14
Boussihmed, A., El Makkaoui, K., Chetouani, A., Ouahbi, I., Maleh, Y. (2024). An Intelligent Model for Detecting Obstacles on Sidewalks for Visually Impaired People. In: Farhaoui, Y., Hussain, A., Saba, T., Taherdoost, H., Verma, A. (eds) Artificial Intelligence, Data Science and Applications. ICAISE 2023. Lecture Notes in Networks and Systems, vol 838. Springer, Cham. https://doi.org/10.1007/978-3-031-48573-2_57
Rehaimi, A., Sadqi, Y., Maleh, Y. (2024). A Comparative Study of Online Cybersecurity Training Platforms. In: Ben Hedia, B., Maleh, Y., Krichen, M. (eds) Verification and Evaluation of Computer and Communication Systems. VECoS 2023. Lecture Notes in Computer Science, vol 14368. Springer, Cham. https://doi.org/10.1007/978-3-031-49737-7_9
Maleh, Y. (2023). Enhancing E-Learning Security in Cloud Environments: Risk Assessment and Penetration Testing. Cybersecurity Management in Education Technologies: Risks and Countermeasures for Advancements in E-learning.
Sahid, A., & Maleh, Y. (2023). Enhancing Cybersecurity Education. Cybersecurity Management in Education Technologies: Risks and Countermeasures for Advancements in E-learning.
Sigdel, A., Yeo, K. C., Maleh, Y, Alazab, M. (2023). Intelligent authentication system using graphical one-time passwords. In Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications,2023. DOI: 10.1049/pbse020e_ch9
Maleh, Y. (2023). Deep Learning Fusion for Multimedia Malware Classification. In Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques (pp. 46-73). IGI Global.
Abderrahman, R., Bensalah, F., Maleh, Y., Youssef, B., & Bouzekri, Y. (2022, November). Software Defined Networking Concept (SDN) Based on Artificial Intelligence: Taxonomy of Methods and Future Directions. In The International Conference of Advanced Computing and Informatics (pp. 233-241). Cham: Springer International Publishing.
Maleh, Y., Mounir, S., Ouazzane, K. (2023). Cybersecurity-Based Blockchain for Cyber-Physical Systems: Challenges and Applications. In: Maleh, Y., Alazab, M., Romdhani, I. (eds) Blockchain for Cybersecurity in Cyber-Physical Systems. Advances in Information Security, vol 102. Springer, Cham. https://doi.org/10.1007/978-3-031-25506-9_3
Chakir, O., Sadqi, Y., & Maleh, Y. (2023). Evaluation of Open-source Web Application Firewalls for Cyber Threat Intelligence. Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence, 9781003373384-3.
Belaissaoui, M., Maleh, Y., & Mounir, S. (2023). 3 Deep Learning Techniques for Malware. Computational Intelligence for Cybersecurity Management and Applications, 49. Taylor & Francis.
Mounir, S., & Maleh, Y. (2023). 11 Cybersecurity Management in Cyber-Physical Systems Using Blockchain. Computational Intelligence for Cybersecurity Management and Applications, 209. Taylor & Francis.
Maleh, Y., Maleh, Y. (2022). Morocco National Cybersecurity Strategy. In: Cybersecurity in Morocco. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8_5
Maleh, Y., Maleh, Y. (2022). The African View on Cybersecurity. In: Cybersecurity in Morocco SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8_3
Maleh, Y., Maleh, Y. (2022). National Cyber Resilience Strategy in a Post-COVID-19 World. In: Cybersecurity in Morocco. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8_6
Maleh, Y., Maleh, Y. (2022). Cyber Sovereignty in Morocco. In: Cybersecurity in Morocco SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8_7
Maleh, Y., Maleh, Y. (2022). Understanding Cybersecurity Standards. In: Cybersecurity in Morocco. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-18475-8_2
Maleh, Y., Abd El-Latif, A. A., & Motahhir, S. (2022). Cybersecurity-Based Blockchain for Cyber-Physical Systems. In Security Engineering for Embedded and Cyber-Physical Systems (pp. 109-142). CRC Press.
Belaissaoui, M., & Youssef Qasmaoui, S. (2022). Cybersecurity-Based Machine Learning for Cyber-Physical Systems. In Security Engineering for Embedded and Cyber-Physical Systems (pp. 161-192). CRC Press.
Maleh, Y., & Belaissaoui, M. (2021). Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework. In Encyclopedia of Organizational Knowledge, Administration, and Technology (pp. 1176-1193). IGI Global.
Maleh, Y., Zaydi, M., Sahid, A., & Ezzati, A. (2021). Building a Maturity Framework for Information Security Governance Through an Empirical Study in Organizations. In Research Anthology on Artificial Intelligence Applications in Security (pp. 143-173). IGI Global.
Baddi, Y., Anass, S., Zkik, K., Maleh, Y., Mohammed, B., & Dafir, E. C. E. K. M. (2021). MSDN-GKM: Software Defined Networks Based Solution for Multicast Transmission with Group Key Management. In Machine Intelligence and Big Data Analytics for Cybersecurity Applications (pp. 373-396). Springer, Cham.
Sönmez, F. Ö., & Maleh, Y. (2021). Prediction of Satisfaction with Life Scale Using Linguistic Features from Facebook Status Updates: Smart Life. In Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (pp. 119-144). Springer, Cham.
Maleh, Y. (2020). Machine Learning Techniques for IoT Intrusions Detection in Aerospace Cyber-Physical Systems. In Machine Learning and Data Mining in Aerospace Technology (pp. 205-232). Springer, Cham.
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "Understanding Agility Concept", Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, Bingley, pp. 9-27. https://doi.org/10.1108/978-1-80043-810-120211003
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "Information System Evolution", Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, Bingley, pp. 29-66. https://doi.org/10.1108/978-1-80043-810-120211004
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "The Conceptual Model for IS Agility", Strategic Information System Agility: From Theory to Practices,Emerald Publishing Limited, Bingley, pp. 67-91. https://doi.org/10.1108/978-1-80043-810-120211005
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "The Conceptual Model for IS Agility", Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, Bingley, pp. 67-91. https://doi.org/10.1108/978-1-80043-810-120211005
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "Strategic Agility for IT Service Management: A Case Study", Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, Bingley, pp. 93-116. https://doi.org/10.1108/978-1-80043-810-120211006
Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), "Cloud Computing as a Drive for Strategic Agility in Organizations", Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, Bingley, pp. 117-151. https://doi.org/10.1108/978-1-80043-810-120211007
Maleh, Y., Sahid, A., Ezzati, A., Belaissaoui, M. (2018). Key Management Protocols for Smart Sensor Networks. In Security and Privacy in Smart Sensor Networks (pp. 1-23). IGI Global.
Maleh, Y., Zaydi, M., Sahid, A., Ezzati, A. (2018). Building a Maturity Framework for Information Security Governance Through an Empirical Study in Organizations. In Security and Privacy Management, Techniques, and Protocols (pp. 96-127). IGI Global.
Abdelkebir, S., Maleh, Y., & Belaissaoui, M. (2019). Towards an Agile and Secure IT Service Management. In Global Information Diffusion and Management in Contemporary Society (pp. 125-152). IGI Global.
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). From Information Governance to IT Governance: An Overview of Issues and Frameworks for Large Organizations. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch001
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). A Deep Overview of Information Technology Governance Standards. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch002
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Evaluation of IT Governance in Middle East and North African Large Organizations. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch003
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Strategic Agility Frameworks for Information System Governance. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch004
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). IT Management Agility in Large Organizations: A Case Study. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch005
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Managing the Cloud for Information System Agility in Organizations. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch006
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Information Security Governance Practices and Commitments in Organizations. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch007
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Information Security Governance in Large Organizations: A Maturity Framework. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch008
Y. Maleh, A. Sahid, & M. Belaissaoui (2019). Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002. IGI Global. https://doi.org/10.4018/978-1-5225-7826-0.ch009
Maleh, Y. (2019). Malware Classification and Analysis Using Convolutional and Recurrent Neural Network. In Handbook of Research on Deep Learning Innovations and Trends (pp. 233-255). IGI Global.
Peer-reviewed Conferences
Fadili, Y., Baddi, Y., Maleh, Y. (2024). A Survey on Cybersecurity Techniques Toward Convolutional Neural Network. In: Gherabi, N., Awad, A.I., Nayyar, A., Bahaj, M. (eds) Advances in Intelligent System and Smart Technologies. I2ST 2023. Lecture Notes in Networks and Systems, vol 826. Springer, Cham. https://doi.org/10.1007/978-3-031-47672-3_8
Boussihmed, A., El Makkaoui, K., Chetouani, A., Ouahbi, I., Maleh, Y. (2024). An Intelligent Model for Detecting Obstacles on Sidewalks for Visually Impaired People. In: Farhaoui, Y., Hussain, A., Saba, T., Taherdoost, H., Verma, A. (eds) Artificial Intelligence, Data Science and Applications. ICAISE 2023. Lecture Notes in Networks and Systems, vol 838. Springer, Cham. https://doi.org/10.1007/978-3-031-48573-2_57
El Hassak, I., Oughannou, Z., Mounir, S., & Maleh, Y. (2024). Safeguarding Industry 4.0: A Machine Learning Approach for Cyber-Physical Systems Security and Sustainability. In E3S Web of Conferences (Vol. 477, p. 00092). EDP Sciences.
Rehaimi, A., Sadqi, Y., Maleh, Y. (2024). A Comparative Study of Online Cybersecurity Training Platforms. In: Ben Hedia, B., Maleh, Y., Krichen, M. (eds) Verification and Evaluation of Computer and Communication Systems. VECoS 2023. Lecture Notes in Computer Science, vol 14368. Springer, Cham. https://doi.org/10.1007/978-3-031-49737-7_9
S. E. Hajla, E. Mahfoud, Y. Maleh and S. Mounir, "Attack and anomaly detection in IoT Networks using machine learning approaches," 2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM), Istanbul, Turkiye, 2023, pp. 1-7, doi: 10.1109/WINCOM59760.2023.10322991.
Abderrahman, R., Bensalah, F., Maleh, Y., Youssef, B., & Bouzekri, Y. (2022, November). Software Defined Networking Concept (SDN) Based on Artificial Intelligence: Taxonomy of Methods and Future Directions. In The International Conference of Advanced Computing and Informatics (pp. 233-241). Cham: Springer International Publishing.
Elafri N., Rose B., Maleh Y., Gabriela F., Majed A., Sassi S., (2022), "Lean 4.0 tools and technologies to improve companies’ maturity level: the COVID-19 context", CENTERIS - The 13th International Conference on ENTERprise Information Systems. Braga, Portugal, 13-15 October 2021.
Maleh Y., Fatani I.F.E., Gholami K.E. (2022) A Systematic Review on Software Defined Networks Security: Threats and Mitigations. In: Maleh Y., Alazab M., Gherabi N., Tawalbeh L., Abd El-Latif A.A. (eds) Advances in Information, Communication and Cybersecurity. ICI2C 2021. Lecture Notes in Networks and Systems, vol 357. Springer, Cham. https://doi.org/10.1007/978-3-030-91738-8_54
Adamou Djergou A., Maleh Y., Mounir S. (2022) Machine Learning Techniques for Intrusion Detection in SDN: A Survey. In: Maleh Y., Alazab M., Gherabi N., Tawalbeh L., Abd El-Latif A.A. (eds) Advances in Information, Communication and Cybersecurity. ICI2C 2021. Lecture Notes in Networks and Systems, vol 357. Springer, Cham. https://doi.org/10.1007/978-3-030-91738-8_42
Sabouri Z., Maleh Y., Gherabi N. (2022) Benchmarking Classification Algorithms for Measuring the Performance on Maintainable Applications. In: Maleh Y., Alazab M., Gherabi N., Tawalbeh L., Abd El-Latif A.A. (eds) Advances in Information, Communication and Cybersecurity. ICI2C 2021. Lecture Notes in Networks and Systems, vol 357. Springer, Cham. https://doi.org/10.1007/978-3-030-91738-8_17
Chamkar S.A., Maleh Y., Gherabi N. (2022) The Human Factor Capabilities in Security Operation Center (SOC). In: Maleh Y., Alazab M., Gherabi N., Tawalbeh L., Abd El-Latif A.A. (eds) Advances in Information, Communication and Cybersecurity. ICI2C 2021. Lecture Notes in Networks and Systems, vol 357. Springer, Cham. https://doi.org/10.1007/978-3-030-91738-8_53
Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). Optimized Machine Learning Techniques for IoT 6LoWPAN Cyber Attacks Detection. In Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (pp. 669–677). Springer.
Maleh, Y., Sahid, A., Ezzati, A., Belaissaoui, M. (2017, November). Building open virtual cloud lab for advanced education in networks and security. In 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM) (pp. 1-6). IEEE.
Abdelkebir, S., Maleh, Y., Belaissaoui, M. (2017, November). An Agile Framework for ITS Management in Organizations: A Case Study Based on DevOps. In Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems (p. 67). ACM.
Maleh, Y., Sahid, A., Ezzati, A., & Belaissaoui, M. (2017, December). A Capability Maturity Framework for IT Security Governance in Organizations. In International Conference on Innovations in Bio-Inspired Computing and Applications (pp. 221-233). Springer.
Maleh, Y., Ezzati, A., Belaissaoui, M. (2016, November). Dos attacks analysis and improvement in DTLS protocol for internet of things. In Proceedings of the International Conference on Big Data and Advanced Wireless Technologies (p. 54). ACM.
Maleh, Y., Ezzati, A., & Belaissaoui, M. (2016, October). An enhanced DTLS protocol for Internet of Things applications. In 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM) (pp. 168-173). IEEE.
Maleh, Y., Ezzati, A. (2014). Performance analysis of routing protocols for wireless sensor networks. In 2014 Third IEEE International Colloquium in Information Science and Technology (CIST) (pp. 420-424). IEEE.