{"id":4777,"date":"2022-04-27T21:44:11","date_gmt":"2022-04-27T21:44:11","guid":{"rendered":"http:\/\/ensak.usms.ac.ma\/ensak\/?page_id=4777"},"modified":"2022-06-13T22:01:45","modified_gmt":"2022-06-13T21:01:45","slug":"journaux-scientifiques","status":"publish","type":"page","link":"http:\/\/ensak.usms.ac.ma\/ensak\/journaux-scientifiques\/","title":{"rendered":"Journaux scientifiques"},"content":{"rendered":"<div id=\"pl-4777\"  class=\"panel-layout\" ><div id=\"pg-4777-0\"  class=\"panel-grid panel-has-style\" ><div class=\"container panel-row-style panel-row-style-for-4777-0\" ><div id=\"pgc-4777-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-4777-0-0-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-4777-0-0-0\" >\t\t\t<div class=\"textwidget\"><style>\n@media only screen and (max-width: 420px) {\n  .resha img{\n    width: 600px;\n    margin-bottom: 20px;\n  }\n}\n<\/style>\n\n<p>Afin d\u2019acc\u00e9der aux ressources (revues, articles, ouvrages, bases de donn\u00e9es, etc.), le CNRST-IMIST met \u00e0 disposition de sa communaut\u00e9 un ensemble d\u2019outils et services accessible via ce lien : <a href=\"https:\/\/eressources.imist.ma\" target=\"_blank\" rel=\"noopener\">e-ressources<\/a> <\/p>\n\n<div class=\"resha\"><img src=\"\/ensak\/wp-content\/uploads\/2022\/04\/image1-e1651096623931.png\" width=\"200\" align=\"left\" style=\"margin-right:30px\" \/><\/div><p><h3><a target=\"_blank\"href=\"https:\/\/www.igi-global.com\/journal\/international-journal-information-security-privacy\/1096\">International Journal of Information Security and Privacy (IJISP)<\/a><\/h3>\n<b>Editors-in-Chief:<\/b> <br \/>\n<span style=\"margin-left:30px\"><i class=\"fa fa-arrow-right\" aria-hidden=\"true\"><\/i> Yassine Maleh, ENSA-Khouribga, Sultan Moulay Slimane University, Morocco.<\/span><br \/>\n<span style=\"margin-left:30px\"><i class=\"fa fa-arrow-right\" aria-hidden=\"true\"><\/i> Ahmed A. Abd El-Latif,  Faculty of Science, Menoufia University, Egypt.<\/span><br \/>\n<b>Published:<\/b> Continuous Volume<br \/>\n<b>Established:<\/b> 2007<br \/>\n<b>ISSN:<\/b> 1930-1650 | <b> EISSN:<\/b> 1930-1669<br \/>\n<b>DOI:<\/b> 10.4018\/IJISP<br \/>\n<b>Website:<\/b> <a target=\"_blank\"href=\"https:\/\/www.igi-global.com\/journal\/international-journal-information-security-privacy\/1096\"> Link to the journal<\/a>\n<\/p>\n<hr>\n<div class=\"resha\"><img src=\"\/ensak\/wp-content\/uploads\/2022\/04\/image2-e1651100029448.png\" width=\"200\" align=\"left\" style=\"margin-right:30px\" \/><\/div><p><h3><a target=\"_blank\"href=\"https:\/\/www.igi-global.com\/journal\/international-journal-smart-security-technologies\/233928\">International Journal of Smart Security Technologies (IJSST)<\/a><\/h3>\n<b>Editors-in-Chief:<\/b> <br \/>\n<span style=\"margin-left:30px\"><i class=\"fa fa-arrow-right\" aria-hidden=\"true\"><\/i> Yassine Maleh, ENSA-Khouribga, Sultan Moulay Slimane University, Morocco.<\/span><br \/>\n<span style=\"margin-left:30px\"><i class=\"fa fa-arrow-right\" aria-hidden=\"true\"><\/i> Ahmed A. Abd El-Latif,  Faculty of Science, Menoufia University, Egypt.<\/span><br \/>\n<b>Published:<\/b> Continuous Volume<br \/>\n<b>Established:<\/b> 2019<br \/>\n<b>ISSN:<\/b> 2640-4079 | <b> EISSN:<\/b> 2640-4087<br \/>\n<b>DOI:<\/b> 10.4018\/IJSST<br \/>\n<b>Website:<\/b> <a target=\"_blank\"href=\"https:\/\/www.igi-global.com\/journal\/international-journal-smart-security-technologies\/233928\"> Link to the journal<\/a>\n<\/p>\n<hr>\n<div class=\"resha\"><img src=\"\/ensak\/wp-content\/uploads\/2022\/04\/image3-e1651100813923.png\" width=\"200\" align=\"left\" style=\"margin-right:30px\" \/><\/div><p><h3>\t\n<a target=\"_blank\"href=\"https:\/\/revues.imist.ma\/index.php\/JESA\/index\">Journal of Electrical Systems & Automation (JESA)<\/a><\/h3>\n<b>Editors-in-Chief:<\/b> <br \/>\n<span style=\"margin-left:30px\"><i class=\"fa fa-arrow-right\" aria-hidden=\"true\"><\/i> Mohamed Bendaoud, ENSA-Khouribga, Sultan Moulay Slimane University, Morocco.<\/span><br \/>\n<b>Published:<\/b> Continuous Volume<br \/>\n<b>Established:<\/b> 2019<br \/>\n<b>Website:<\/b> <a target=\"_blank\"href=\"https:\/\/revues.imist.ma\/index.php\/JESA\/index\"> Link to the journal<\/a>\n<\/p><\/div>\n\t\t<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Afin d\u2019acc\u00e9der aux ressources (revues, articles, ouvrages, bases de donn\u00e9es, etc.), le CNRST-IMIST met \u00e0 disposition de sa communaut\u00e9 un ensemble d\u2019outils et services accessible via ce lien : e-ressources International Journal of Information Security and Privacy (IJISP) Editors-in-Chief: Yassine Maleh, ENSA-Khouribga, Sultan Moulay Slimane University, Morocco. Ahmed A. Abd El-Latif, Faculty of Science, Menoufia [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/tpl-pagebuilder.php","meta":{"ngg_post_thumbnail":0,"cybocfi_hide_featured_image":""},"acf":[],"_links":{"self":[{"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/pages\/4777"}],"collection":[{"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/comments?post=4777"}],"version-history":[{"count":29,"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/pages\/4777\/revisions"}],"predecessor-version":[{"id":4987,"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/pages\/4777\/revisions\/4987"}],"wp:attachment":[{"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/media?parent=4777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}