Books
    1. Maleh, Y., Motahhir, S., Senhaji Hafid, A., (Eds.), (2021). Advances in Blockchain Technology for Cyber Physical Systems. Edited book, Springer Internet of Things Series, ISBN: 9783030936457

    2. Maleh, Y., Alazab, M., Gherabi, N., M., Tawalbeh, L., A. Abd El-Latif, A, . (Eds.), (2021). Advances in Information, Communication and Cybersecurity. Edited book, Springer Lecture Notes in Networks and Systems, Vol 353, ISBN: 978-3-030-917-371.

    3. Baddi, Y., Gahi, Y., Maleh, Y., Alazab, M., Tawalbeh, L., (2021). Big Data Intelligence for Smart Applications, Springer Studies in Computational Intelligence, vol 994, ISBN: 978-3-030-87954-9.

    4. Maleh, Y., Sahid, A., Alazab, M., Belaissaoui, M., (2021). IT Governance and Information Security Guides, Standards and Frameworks, CRC Taylor & Francis GroupISBN: 9780367753245.

    5. Lahby, M., Pathan, A.-S.K., Maleh, Y., Yafooz, W.M.S. (2021). Combating Fake News With Computational Intelligence Techniques, Springer Studies in Computational Intelligence, vol 1001, ISBN: 978-3-030-90087-8.

    6. Ghosh, U., Maleh, Y., Alazab, M., Khan Pathan, A.-S. (Eds.), (2021). Machine Intelligence and Data Analytics for Sustainable Future Smart Cities. Edited book, Springer Studies in Computational Intelligence, Vol 971, 978-3-030-72064-3.

    7. Maleh, Baddi, Y., M., Alazab, M., Tawalbeh, L., Romdhani, I. (Eds.), (2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Edited book, Springer Studies in Big Data, Vol 90, 978-3-030-74574-5.

    8. Maleh, Y., Shojafar, M., Alazab, M., Baddi, Y., (2021) (Eds.). Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Edited book, Springer Studies in Computational Intelligence, Vol 919, ISBN 978-3-030-57024-8.

    9. Sahid, A., Maleh, Y., Belaissaoui, M., (2020). Strategic Information System Agility: From Theory to Practices, Emerald Publishing Limited, ISBN:9781800438118, Doi:10.1108/978-1-80043-810-120211002.

    10. Maleh, Y., Shojafar, M., Alazab, M., Romdhani, I., (2020). Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications. Edited book, CRC Taylor & Francis. ISBN 9780367343101.

    11. Maleh, Y., Mohammad, S., Ashraf, D., & Abdelkrim, H. (2019). Cybersecurity and Privacy in Cyber-Physical Systems (pp. 1-434)CRC Taylor and Francis, ISBN: 9781138346673.

    12. Maleh, Y., Sahid, A., & Belaissaoui, M. (Eds.). (2019). Strategic IT Governance and Performance Frameworks in Large Organizations (pp. 1-426)IGI Global, ISBN: 9781522578260.

    13. Maleh, Y., Ezzati, A., & Belaissaoui, M. (Eds.). (2018). Security and Privacy in Smart Sensor Networks (pp. 1-446)IGI Global, ISBN: 9781522557364.

    14. Maleh, Y. (Ed.). (2018). Security and Privacy Management, Techniques, and Protocols (pp. 1-426)IGI Global, ISBN: 9781522557364.

 

Peer-reviewed Journals

    1. Maleh, Y., Ezzati, A. (2015). Lightweight Intrusion Detection Scheme for Wireless Sensor Networks. IAENG International Journal of Computer Science, 42(4).

    2. Maleh, Y., Ezzati, A., Qasmaoui, Y., Mbida, M. (2015). A global hybrid intrusion detection system for wireless sensor networks. Procedia Computer Science, 52, 1047-1052.

    3. Maleh, Y., Ezzati, A. (2015). An efficient key establishment protocol for wireless sensor networks. Lecture Notes in Electrical Engineering, 366, Springer, Singapore. pp. 339-352.

    4. Maleh, Y., Ezzati, A. (2016). Towards an Efficient Datagram Transport Layer Security for Constrained Applications in Internet of Things. International Review on Computers and Software (IRECOS), 11(7).

    5. Maleh, Y., Ezzati, A. (2016). A lightweight symmetric cryptography scheme for identifying compromised node in WSN. Indonesian Journal of Electrical Engineering and Computer Science 2(2), pp. 431-451

    6. Maleh, Y., Ezzati, A. (2016) LEAP enhanced: A lightweight symmetric cryptography scheme for identifying compromised node in WSN. International Journal of Mobile Computing and Multimedia Communications 7(3), pp. 42-66.

    7. Maleh, Y., Sahid, A., Ezzati, A., & Belaissaoui, M. (2017). A Capability Maturity Framework for IT Security Governance in Organizations. Advances in Intelligent Systems and Computing, Springer, Cham, 735, pp. 221-233.

    8. Maleh, Y., Sahid, A., Ezzati, A., & Belaissaoui, M. (2017). CAFISGO: A Capability Assessment Framework for Information Security Governance in Organizations. Journal of Information Assurance & SecurityVol. 12 Issue 6, p209-217. 9p.

    9. Sahid, A., Maleh, Y., Belaissaoui, M. (2018). A Practical Agile Framework for IT Service and Asset Management ITSM/ITAM Through a Case Study. Journal of Cases on Information Technology (JCIT), 20(4), 71-92.

    10. Maleh, Y. (2020). Machine Learning Techniques for IoT Intrusions Detection in Aerospace Cyber-Physical Systems. In Machine Learning and Data Mining in Aerospace Technology (pp. 205-232). Springer.

    11. Youssef, Q., Yassine, M., & Haqiq, A. (2021). Secure Software Defined Networks Controller Storage using Intel Software Guard Extensions. International Journal of Advanced Computer Science and Applications (IJACSA), 11(10).

    12. Sadqi, Y., & Maleh, Y. (2021). A systematic review and taxonomy of web applications threats. Information Security Journal: A Global Perspective, 1-27.

    13. EL Gholami K., Maleh, Y, Fatani I. F. (2021). “THE IEEE 802.15.4 STANDARD IN INDUSTRIAL APPLICATIONS: A SURVEY”, Journal of Theoretical and Applied Information Technology, Vol.99. No 15.

    14. Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). A Maturity Framework for Cybersecurity Governance in Organizations. EDPACS63(06), 1–22. https://doi.org/10.1080/07366981.2020.1815354. Taylor & Francis.

    15. Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). A Practical Maturity For Information Security Policy in Organizations. EDPACS64(02), 1–12. https://doi.org/10.1080/07366981.2021.1885590. Taylor & Francis.

    16. Belaissaoui, M and Maleh, Y. (2021). Machine Learning techniques optimized by Practical Swarm optimization for Intrusions Detection in IoT. Journal of Information Assurance & SecurityVol. 16 Issue 3, pp. 105-116.

    17. Alexander Paramonov, Jialiang Peng, Dmitry Kashkarov, Ammar Muthanna, Ibrahim A. Elgendy, Andrey Koucheryavy, Yassine Maleh, Ahmed A. Abd El-Latif (2021). “Study and Analysis of Multiconnectivity for Ultrareliable and Low-Latency Features in Networks and V2X Communications”, Wireless Communications and Mobile Computing, vol. 2021, Article ID 1718099, 10 pages, 2021. https://doi.org/10.1155/2021/1718099.

    18. Abdukodir Khakimov, Ibrahim A. Elgendy, Ammar Muthanna, Evgeny Mokrov, Konstantin Samouylov, Yassine Maleh, Ahmed A.Abd El-Latif (2021). “Flexible architecture for deployment of edge computing applications”, Simulation Modelling Practice and Theoryhttps://doi.org/10.1016/j.simpat.2021.102402

    19. Chamkar, S. A., Maleh, Y., & Gherabi, N. (2021). THE HUMAN FACTOR CAPABILITIES IN SECURITY OPERATION CENTER (SOC). EDPACS, 1-14.

 

Book Chapters

    1. Maleh, Y., Sahid, A., Ezzati, A., Belaissaoui, M. (2018). Key Management Protocols for Smart Sensor Networks. In Security and Privacy in Smart Sensor Networks (pp. 1-23). IGI Global.

    2. Maleh, Y., Zaydi, M., Sahid, A., Ezzati, A. (2018). Building a Maturity Framework for Information Security Governance Through an Empirical Study in Organizations. In Security and Privacy Management, Techniques, and Protocols (pp. 96-127). IGI Global.

    3. Abdelkebir, S., Maleh, Y., & Belaissaoui, M. (2019). Towards an Agile and Secure IT Service Management. In Global Information Diffusion and Management in Contemporary Society (pp. 125-152). IGI Global.

    4. Maleh, Y. (2019). Malware Classification and Analysis Using Convolutional and Recurrent Neural Network. In Handbook of Research on Deep Learning Innovations and Trends (pp. 233-255). IGI Global.

    5. Maleh, Y. (2020). Machine Learning Techniques for IoT Intrusions Detection in Aerospace Cyber-Physical Systems. In Machine Learning and Data Mining in Aerospace Technology (pp. 205-232). Springer, Cham.

    6. Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), “Understanding Agility Concept”, Strategic Information System Agility: From Theory to PracticesEmerald Publishing Limited, Bingley, pp. 9-27. https://doi.org/10.1108/978-1-80043-810-120211003

    7. Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), “Information System Evolution”, Strategic Information System Agility: From Theory to PracticesEmerald Publishing Limited, Bingley, pp. 29-66. https://doi.org/10.1108/978-1-80043-810-120211004

    8. Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), “The Conceptual Model for IS Agility”, Strategic Information System Agility: From Theory to Practices,Emerald Publishing Limited, Bingley, pp. 67-91. https://doi.org/10.1108/978-1-80043-810-120211005

    9. Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), “The Conceptual Model for IS Agility”, Strategic Information System Agility: From Theory to PracticesEmerald Publishing Limited, Bingley, pp. 67-91. https://doi.org/10.1108/978-1-80043-810-120211005

    10. Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), “Strategic Agility for IT Service Management: A Case Study”, Strategic Information System Agility: From Theory to PracticesEmerald Publishing Limited, Bingley, pp. 93-116. https://doi.org/10.1108/978-1-80043-810-120211006

    11. Sahid, A., Maleh, Y. and Belaissaoui, M. (2020), “Cloud Computing as a Drive for Strategic Agility in Organizations”, Strategic Information System Agility: From Theory to PracticesEmerald Publishing Limited, Bingley, pp. 117-151. https://doi.org/10.1108/978-1-80043-810-120211007

    12. Maleh, Y., & Belaissaoui, M. (2021). Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework. In Encyclopedia of Organizational Knowledge, Administration, and Technology (pp. 1176-1193). IGI Global.

    13. Maleh, Y., Zaydi, M., Sahid, A., & Ezzati, A. (2021). Building a Maturity Framework for Information Security Governance Through an Empirical Study in Organizations. In Research Anthology on Artificial Intelligence Applications in Security (pp. 143-173). IGI Global.

    14. Baddi, Y., Anass, S., Zkik, K., Maleh, Y., Mohammed, B., & Dafir, E. C. E. K. M. (2021). MSDN-GKM: Software Defined Networks Based Solution for Multicast Transmission with Group Key Management. In Machine Intelligence and Big Data Analytics for Cybersecurity Applications (pp. 373-396). Springer, Cham.

    15. Sönmez, F. Ö., & Maleh, Y. (2021). Prediction of Satisfaction with Life Scale Using Linguistic Features from Facebook Status Updates: Smart Life. In Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (pp. 119-144). Springer, Cham.

 

Peer-reviewed Conferences

    1. Maleh, Y., Fatani, I., El Gholami, K.,(2021). A Systematic Review on Software Defined Networks Security: Threats and Mitigations. In Proceedings of the International Conference on Information, Communication & Cybersecurity (ICI2C2021). Springer.

    2. Adamou A. D., Maleh, Y., Mounir, S., (2021). Machine learning techniques for intrusion detection in SDN: A Survey. In Proceedings of the International Conference on Information, Communication & Cybersecurity (ICI2C2021). Springer.

    3. Sabouri Z., Maleh, Y., Gherabi, N., (2021). Benchmarking Classification Algorithms for measuring the performance on Maintainable Applications. In Proceedings of the International Conference on Information, Communication & Cybersecurity (ICI2C2021). Springer.

    4. Samir, Achraf C., Maleh, Y., Gherabi, N., (2021). Human Factor in Security Operation Center. In Proceedings of the International Conference on Information, Communication & Cybersecurity (ICI2C2021). Springer.

    5. Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). Optimized Machine Learning Techniques for IoT 6LoWPAN Cyber Attacks Detection. In Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (pp. 669–677). Springer.

    6. Maleh, Y., Sahid, A., Ezzati, A., Belaissaoui, M. (2017, November). Building open virtual cloud lab for advanced education in networks and security. In 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM) (pp. 1-6). IEEE.

    7. Abdelkebir, S., Maleh, Y., Belaissaoui, M. (2017, November). An Agile Framework for ITS Management in Organizations: A Case Study Based on DevOps. In Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems (p. 67). ACM.

    8. Maleh, Y., Sahid, A., Ezzati, A., & Belaissaoui, M. (2017, December). A Capability Maturity Framework for IT Security Governance in Organizations. In International Conference on Innovations in Bio-Inspired Computing and Applications (pp. 221-233). Springer.

    9. Maleh, Y., Ezzati, A., Belaissaoui, M. (2016, November). Dos attacks analysis and improvement in DTLS protocol for internet of things. In Proceedings of the International Conference on Big Data and Advanced Wireless Technologies (p. 54). ACM.

    10. Maleh, Y., Ezzati, A., & Belaissaoui, M. (2016, October). An enhanced DTLS protocol for Internet of Things applications. In 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM) (pp. 168-173). IEEE.

    11. Maleh, Y., Ezzati, A. (2014). Performance analysis of routing protocols for wireless sensor networks. In 2014 Third IEEE International Colloquium in Information Science and Technology (CIST) (pp. 420-424). IEEE