Publications

Export 24 results:
Filters: Keyword is Network security  [Clear All Filters]
Conference Paper
N. Mouchfiq, Habbani, A., Benjbara, C., et Berradi, H., « Blockchain-based Model Against selfish Attacks in Mobile ad hoc Networks », in Proceedings - 4th International Conference on Advanced Communication Technologies and Networking, CommNet 2021, 2021.
K. Mrabet, F. Bouanani, E., et Ben-Azza, H., « Dependable Decentralized Reputation Management System for Vehicular Ad Hoc Networks », in Proceedings - 4th International Conference on Advanced Communication Technologies and Networking, CommNet 2021, 2021.
O. Zaazaa et H. Bakkali, E., « Dynamic vulnerability detection approaches and tools: State of the Art », in 4th International Conference on Intelligent Computing in Data Sciences, ICDS 2020, 2020.
O. Habibi, Chemmakha, M., et Lazaar, M., « Effect of Features Extraction and Selection on the Evaluation of Machine Learning Models », in IFAC-PapersOnLine, 2022, vol. 55, p. 462-467.
O. Cherqi, Hammouchi, H., Ghogho, M., et Benbrahim, H., « Leveraging Open Threat Exchange (OTX) to Understand Spatiooral Trends of Cyber Threats: Covid-19 Case Study », in Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021, 2021.
H. Berradi, Habbani, A., Souidi, M., Elmahdi, F., et Mouchfiq, N., « Optimize the QoS Metrics in Smart Mobile Communication using Multi-Objective Function », in 3rd International Conference on Advanced Communication Technologies and Networking, CommNet 2020, 2020.
J. Elhachimi et Kobbane, A., « Secure Internet of Thing using Blockchain Technology », in 2022 7th International Conference on Smart and Sustainable Technologies, SpliTech 2022, 2022.
Journal Article
E. - S. Azougaghe, Farchane, A., Tazigh, I., et Azougaghe, A., « Comparative Study on the McEliece Public-Key Cryptosystem Based on Goppa and QC-MDPC Codes », Lecture Notes in Business Information Processing, vol. 416 LNBIP, p. 348-360, 2021.
B. Karbal et Romadi, R., « A Comparison of Different Machine Learning Algorithms for Intrusion Detection », Communications in Computer and Information Science, vol. 1264, p. 157-169, 2020.
A. Houmz, Mezzour, G., Zkik, K., Ghogho, M., et Benbrahim, H., « Detecting the impact of software vulnerability on attacks: A case study of network telescope scans », Journal of Network and Computer Applications, vol. 195, 2021.
M. Ezzarii, H. Ghazi, E., H. Ghazi, E., et F. Bouanani, E., « Epigenetic algorithm-based detection technique for network attacks », IEEE Access, vol. 8, 2020.
C. Meshram, Imoize, A. L., Elhassouny, A., Aljaedi, A., Alharbi, A. R., et Jamal, S. S., « IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks », IEEE Access, vol. 9, p. 131336-131347, 2021.
C. Gong, Yue, X., Wang, X., Dai, X., Zou, R., et Essaaidi, M., « Intelligent Reflecting Surface Aided Secure Communications for NOMA Networks », IEEE Transactions on Vehicular Technology, vol. 71, p. 2761-2773, 2022.
A. Hamyani, Bouanani, F. E., et Miftah, Y., « Jamming-Assisted Multi-User Multi-Eavesdropper Broadcast Network: PHY Layer Security Analysis », IEEE Access, vol. 9, p. 118051-118064, 2021.
A. Sebbar, Zkik, K., Baddi, Y., Boulmalf, M., et Kettani, M. D. E. - C. E., « MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context », Journal of Ambient Intelligence and Humanized Computing, vol. 11, p. 5875-5894, 2020.
Y. Baddi, Sebbar, A., Zkik, K., Boulmalf, M., et Kettani, M. D. E. - C. El, « Msnd: Multicast software defined network based solution to multicast tree construction », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12293, p. 245-256, 2020.
A. A. Temghart, D. Omar, A., et Marwan, M., « Optimal Virtual Machine Provisioning in Cloud Computing Using Game Theory », Lecture Notes in Business Information Processing, vol. 416 LNBIP, p. 307-321, 2021.
E. F. Mahdi, Habbani, A., Kartit, Z., et Bouamoud, B., « Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol », Wireless Communications and Mobile Computing, vol. 2020, 2020.
M. Bouabdellah et Bouanani, F. E., « A PHY Layer Security of a Jamming-Based Underlay Cognitive Satellite-Terrestrial Network », IEEE Transactions on Cognitive Communications and Networking, vol. 7, p. 1266-1279, 2021.
F. E. Bouanani, Lahmar, I., Ismaili, Z. E. A. A., et Qaraqe, K. A., « On the Secrecy Analysis of Dual-Hop SWIPT-based Multi-Source Underlay Cognitive Radio Networks », IEEE Transactions on Cognitive Communications and Networking, p. 1-1, 2022.
N. Mouchfiq, Benjbara, C., et Habbani, A., « Security in MANETs: The Blockchain Issue », Communications in Computer and Information Science, vol. 1264, p. 219-232, 2020.
N. Mouchfiq, Habbani, A., et Benjbara, C., « Security issues in manets: A survey », Advances in Intelligent Systems and Computing, vol. 1184, p. 288-295, 2021.
D. E. Majdoubi, Bakkali, H. E., et Sadki, S., « SmartMedChain: A Blockchain-Based Privacy-Preserving Smart Healthcare Framework », Journal of Healthcare Engineering, vol. 2021, 2021.
E. Y. Dari, Bendahmane, A., et Essaaidi, M., « Verification-based data integrity mechanism in smart grid network », International Journal of Security and Networks, vol. 16, p. 1-11, 2021.

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:633,684
    Education - This is a contributing Drupal Theme
    Design by WeebPal.