Youssef Iraqi
Youssef Iraqi
University Mohammed VI Polytechnic
Verified email at - Homepage
Cited by
Cited by
Phishing Detection: A Literature Survey
M Khonji, Y Iraqi, A Jones
IEEE Communications Surveys & Tutorials, 1-31, 2013
Gateway placement optimization in wireless mesh networks with QoS constraints
B Aoun, R Boutaba, Y Iraqi, G Kenward
IEEE Journal on Selected Areas in Communications 24 (11), 2127-2136, 2006
Routing protocols in wireless mesh networks: challenges and design considerations
S Waharte, R Boutaba, Y Iraqi, B Ishibashi
Multimedia tools and Applications 29, 285-303, 2006
Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey
E Bellini, Y Iraqi, E Damiani
IEEE Access 8, 21127-21151, 2020
Human eye controlled computer mouse interface
H Bhaskar, Y Iraqi, S Al Sharif
US Patent 9,075,453, 2015
A multi-commodity flow based approach to virtual network resource allocation
W Szeto, Y Iraqi, R Boutaba
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
DORA: Efficient routing for MPLS traffic engineering
R Boutaba, W Szeto, Y Iraqi
Journal of Network and Systems Management 10 (3), 309-325, 2002
Adaptive packet video streaming over IP networks: a cross-layer approach
T Ahmed, A Mehaoua, R Boutaba, Y Iraqi
IEEE Journal on selected areas in Communications 23 (2), 385-401, 2005
Peer-to-peer’s most wanted: malicious peers
L Mekouar, Y Iraqi, R Boutaba
Computer Networks 50 (4), 545-562, 2006
A Slightly-modified GI-based Author-verifier with Lots of Features (ASGALF)
M Khonji, Y Iraqi
CLEF2014 Working Notes 1180, 977-983, 2014
On the Performance of IRS-Assisted Multi-Layer UAV Communications with Imperfect Phase Compensation
M Al-Jarrah, A Al-Dweik, E Alsusa, Y Iraqi, MS Alouini
IEEE Transactions on Communications, 2021
Pricing and admission control for QoS-enabled Internet
T Li, Y Iraqi, R Boutaba
Computer Networks 46 (1), 87-110, 2004
Hybrid Automatic Repeat Request (HARQ) in Wireless Communications Systems and Standards: A Contemporary Survey
A Ahmed, A Al-Dweik, Y Iraqi, H Mukhtar, M Naeem, E Hossain
IEEE Communications Surveys & Tutorials 23 (4), 2711-2752, 2021
A state-of-the-art review of cloud forensics
S Almulla, Y Iraqi, A Jones
Journal of Digital Forensics, Security and Law 9 (4), 2, 2014
Sliding contention window (SCW): Towards backoff range-based service differentiation over IEEE 802.11 wireless LAN networks
A Nafaa, A Ksentini, A Mehaoua, Y Iraqi, R Boutaba
IEEE network 19 (4), 45-51, 2005
Lightpaths on demand: a Web-services-based management system
R Boutaba, W Golab, Y Iraqi
IEEE Communications magazine 42 (7), 101-107, 2004
Enhancing phishing e-mail classifiers: A lexical url analysis approach
M Khonji, Y Iraqi, A Jones
International Journal for Information Security Research (IJISR) 2 (1/2), 40, 2012
One-shot blind channel estimation for OFDM systems over frequency-selective fading channels
A Saci, A Al-Dweik, A Shami, Y Iraqi
IEEE Transactions on Communications 65 (12), 5445-5458, 2017
Emotion recognition from speech using wavelet packet transform cochlear filter bank and random forest classifier
S Hamsa, I Shahin, Y Iraqi, N Werghi
IEEE Access 8, 96994-97006, 2020
Cloud forensics: A research perspective
S Almulla, Y Iraqi, A Jones
International Conference on Innovations in Information Technology (IIT), 66-71, 2013
The system can't perform the operation now. Try again later.
Articles 1–20