Modeling the owasp most critical web attacks Y Ayachi, EH Ettifouri, J Berrich, B Toumi Information Systems and Technologies to Support Learning: Proceedings of …, 2019 | 7 | 2019 |
Increasing the Performance of an IDS using ANN model on the realistic cyber dataset CSE-CIC-IDS2018 Y Ayachi, Y Mellah, J Berrich, T Bouchentouf 2020 International Symposium on Advanced Electrical and Communication …, 2020 | 4 | 2020 |
A survey and analysis of intrusion detection models based on information security and object technology-cloud intrusion dataset Y Ayachi, Y Mellah, M Saber, N Rahmoun, I Kerrakchou, T Bouchentouf IAES International Journal of Artificial Intelligence 11 (4), 1607, 2022 | 2 | 2022 |
Modeling the impact of jamming attacks in the internet of things I Kerrakchou, S Chadli, Y Ayachi, M Saber Indones. J. Electr. Eng. Comput. Sci 26 (2), 1206-1215, 2022 | 1 | 2022 |
New Improvement of Malware-Attack Scenarios Modeling N Rahmoun, Y Ayachi, J Berrich, M Saber, T Bouchentouf International conference on smart Information & communication Technologies …, 2019 | | 2019 |
Setting up an Intelligent IDS Based on Markov Chains Theory N Rahmoun, Y Ayachi, EH Ettifouri, J Berrich, B Toumi Europe and MENA Cooperation Advances in Information and Communication …, 2017 | | 2017 |
Detecting xebsite vulnerabilities based on Markov chains theory A Yassine, R Noureddine, EH Ettifouri, J Berrich, B Toumi 2016 5th International Conference on Multimedia Computing and Systems (ICMCS …, 2016 | | 2016 |
Setting up a self-learning IDS based on Markov chains theory A Yassine, R Noureddine, EH Ettifouri, J Berrich, B Toumi 2016 5th International Conference on Multimedia Computing and Systems (ICMCS …, 2016 | | 2016 |