Youssef Iraqi
Youssef Iraqi
Mohammed VI Polytechnic University
Verified email at - Homepage
Cited by
Cited by
Phishing Detection: A Literature Survey
M Khonji, Y Iraqi, A Jones
IEEE Communications Surveys & Tutorials, 1-31, 2013
Gateway placement optimization in wireless mesh networks with QoS constraints
B Aoun, R Boutaba, Y Iraqi, G Kenward
IEEE Journal on Selected Areas in Communications 24 (11), 2127-2136, 2006
Routing protocols in wireless mesh networks: challenges and design considerations
S Waharte, R Boutaba, Y Iraqi, B Ishibashi
Multimedia tools and Applications 29 (3), 285-303, 2006
A multi-commodity flow based approach to virtual network resource allocation
W Szeto, Y Iraqi, R Boutaba
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
Human eye controlled computer mouse interface
H Bhaskar, Y Iraqi, S Al Sharif
US Patent 9,075,453, 2015
Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey
E Bellini, Y Iraqi, E Damiani
IEEE Access 8, 21127-21151, 2020
Adaptive packet video streaming over IP networks: a cross-layer approach
T Ahmed, A Mehaoua, R Boutaba, Y Iraqi
IEEE Journal on selected areas in Communications 23 (2), 385-401, 2005
DORA: Efficient routing for MPLS traffic engineering
R Boutaba, W Szeto, Y Iraqi
Journal of Network and Systems Management 10 (3), 309-325, 2002
Peer-to-peer’s most wanted: malicious peers
L Mekouar, Y Iraqi, R Boutaba
Computer Networks 50 (4), 545-562, 2006
Pricing and admission control for QoS-enabled Internet
T Li, Y Iraqi, R Boutaba
Computer Networks 46 (1), 87-110, 2004
A Slightly-modified GI-based Author-verifier with Lots of Features (ASGALF)
M Khonji, Y Iraqi
CLEF2014 Working Notes 1180, 977-983, 2014
Sliding contention window (SCW): Towards backoff range-based service differentiation over IEEE 802.11 wireless LAN networks
A Nafaa, A Ksentini, A Mehaoua, Y Iraqi, R Boutaba
IEEE network 19 (4), 45-51, 2005
A state-of-the-art review of cloud forensics
S Almulla, Y Iraqi, A Jones
Journal of Digital Forensics, Security and Law 9 (4), 2, 2014
Lightpaths on demand: a Web-services-based management system
R Boutaba, W Golab, Y Iraqi
IEEE Communications magazine 42 (7), 101-107, 2004
Enhancing phishing e-mail classifiers: A lexical url analysis approach
M Khonji, Y Iraqi, A Jones
International Journal for Information Security Research (IJISR) 2 (1/2), 40, 2012
Dynamic Online Routing Algorithm for MPLS Traffic Engineering
W Szeto, R Boutaba, Y Iraqi
Proceedings of the International Conference on Research in Networking …, 2002
One-shot blind channel estimation for OFDM systems over frequency-selective fading channels
A Saci, A Al-Dweik, A Shami, Y Iraqi
IEEE Transactions on Communications 65 (12), 5445-5458, 2017
Lexical URL analysis for discriminating phishing and legitimate websites
M Khonji, Y Iraqi, A Jones
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
OSDA: Open service discovery architecture for efficient cross-domain service provisioning
N Limam, J Ziembicki, R Ahmed, Y Iraqi, DT Li, R Boutaba, F Cuervo
Computer Communications 30 (3), 546-563, 2007
A Novel Phishing Classification Based on URL Features
M Khonji, A Jones, Y Iraqi
IEEE GCC Conference, 221-224, 2011
The system can't perform the operation now. Try again later.
Articles 1–20