关注
Asimi Ahmed
Asimi Ahmed
Professeur, Département de Maths, FSA, université Ibn Zohr
在 uiz.ac.ma 的电子邮件经过验证
标题
引用次数
引用次数
年份
Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection
A Guezzaz, Y Asimi, M Azrour, A Asimi
Big Data Mining and Analytics 4 (1), 18-24, 2021
1012021
A comparative study of the four well-known classification algorithms in data mining
S Sossi Alaoui, Y Farhaoui, B Aksasse
Advanced Information Technology, Services and Systems: Proceedings of the …, 2018
402018
A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier.
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
Int. J. Netw. Secur. 21 (3), 438-450, 2019
392019
IaaS cloud model security issues on behalf cloud provider and user security behaviors
A Ahmed, T Zakariae
Procedia computer science 134, 328-333, 2018
312018
A Multilayer Perceptron Classifier for Monitoring Network Traffic
Azidine Guezzaz, Ahmed Asimi, Azrour Mourade, Zakariae Tbatou, and Younes Asimi
LNNS 81, 262–270, 2020
26*2020
A distributed intrusion detection approach based on machine leaning techniques for a cloud security
A Guezzaz, A Asimi, Y Asimi, M Azrour, S Benkirane
Intelligent Systems in Big Data, Semantic Web and Machine Learning, 85-94, 2021
242021
A New Mutuel Kerberos Authentication Protocol for Distributed Systems.
Z Tbatou, A Asimi, Y Asimi, Y Sadqi, A Guezzaz
Int. J. Netw. Secur. 19 (6), 889-898, 2017
222017
Performance method of assessment of the intrusion detection and prevention systems
Y Farhaoui, A Asimi
International Journal of Engineering Science and Technology 3 (7), 5916-28, 2011
202011
A new hybrid network sniffer model based on Pcap language and sockets (Pcapsocks)
A Guezzaz, A Asimi, Y Sadqi, Y Asimi, Z Tbatou
International Journal of Advanced Computer Science and Applications 7 (2), 2016
192016
A lightweight neural classifier for intrusion detection
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
General Letters in Mathematics 2 (2), 57-66, 2017
172017
Performance Assessment of Tools of the intrusionDetection/Prevention Systems
Y Farhaoui, A Asimi
The 3rd IEEE International Conference on MultimediaComputing and Systems …, 2012
162012
Strong Zero-knowledge Authentication Based on Virtual Passwords.
A Asimi, Y Asimi, A Amghar, Y Sadqi
Int. J. Netw. Secur. 18 (4), 601-616, 2016
132016
New Random Generator of a Safe Cryptographic Salt Per Session.
Y Asimi, A Amghar, A Asimi, Y Sadqi
Int. J. Netw. Secur. 18 (3), 445-453, 2016
122016
Determination of irreducible and primitive polynomials over a binary finite field
A Ahmed
International J. of Pure & Engg. Mathematics (IJPEM) 4 (1), 45-59, 2016
12*2016
Kerberos V5: Vulnerabilities and perspectives
Z Tbatou, A Asimi, Y Asimi, Y Sadqi
2015 Third World Conference on Complex Systems (WCCS), 1-5, 2015
122015
Short: A lightweight and secure session management protocol
Y Sadqi, A Asimi, Y Asimi
International Conference on Networked Systems, 319-323, 2014
92014
Creating a Complete Model of an Intrusion Detection System effective on the LAN
Y Farhaoui, A Asimi
International Journal of Advanced Computer Science and Applications 3 (5), 2012
92012
Strong zero-knowledge Authentication based on the Session Keys (SASK)
Y Asimi, A Amghar, A Asimi, Y Sadqi
International Journal of Network Security & Its Applications 7 (1), 51, 2015
82015
Genetic Regenerator of pseudo-random sequences RA NMJ
A Sabour, A Asimi, A Lbekkouri
International Symposium on AI 50, 1-3, 2007
82007
Dynamic proof of retrievability based on public auditing for coded secure cloud storage
Chawki El Balmany, Ahmed Asimi, B.Mohamed, Z.Tbatou
Multimedia Tools and Applications 81 (27), 39229-39249, 2022
72022
系统目前无法执行此操作,请稍后再试。
文章 1–20