Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection A Guezzaz, Y Asimi, M Azrour, A Asimi Big Data Mining and Analytics 4 (1), 18-24, 2021 | 101 | 2021 |
A comparative study of the four well-known classification algorithms in data mining S Sossi Alaoui, Y Farhaoui, B Aksasse Advanced Information Technology, Services and Systems: Proceedings of the …, 2018 | 40 | 2018 |
A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier. A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi Int. J. Netw. Secur. 21 (3), 438-450, 2019 | 39 | 2019 |
IaaS cloud model security issues on behalf cloud provider and user security behaviors A Ahmed, T Zakariae Procedia computer science 134, 328-333, 2018 | 31 | 2018 |
A Multilayer Perceptron Classifier for Monitoring Network Traffic Azidine Guezzaz, Ahmed Asimi, Azrour Mourade, Zakariae Tbatou, and Younes Asimi LNNS 81, 262–270, 2020 | 26* | 2020 |
A distributed intrusion detection approach based on machine leaning techniques for a cloud security A Guezzaz, A Asimi, Y Asimi, M Azrour, S Benkirane Intelligent Systems in Big Data, Semantic Web and Machine Learning, 85-94, 2021 | 24 | 2021 |
A New Mutuel Kerberos Authentication Protocol for Distributed Systems. Z Tbatou, A Asimi, Y Asimi, Y Sadqi, A Guezzaz Int. J. Netw. Secur. 19 (6), 889-898, 2017 | 22 | 2017 |
Performance method of assessment of the intrusion detection and prevention systems Y Farhaoui, A Asimi International Journal of Engineering Science and Technology 3 (7), 5916-28, 2011 | 20 | 2011 |
A new hybrid network sniffer model based on Pcap language and sockets (Pcapsocks) A Guezzaz, A Asimi, Y Sadqi, Y Asimi, Z Tbatou International Journal of Advanced Computer Science and Applications 7 (2), 2016 | 19 | 2016 |
A lightweight neural classifier for intrusion detection A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi General Letters in Mathematics 2 (2), 57-66, 2017 | 17 | 2017 |
Performance Assessment of Tools of the intrusionDetection/Prevention Systems Y Farhaoui, A Asimi The 3rd IEEE International Conference on MultimediaComputing and Systems …, 2012 | 16 | 2012 |
Strong Zero-knowledge Authentication Based on Virtual Passwords. A Asimi, Y Asimi, A Amghar, Y Sadqi Int. J. Netw. Secur. 18 (4), 601-616, 2016 | 13 | 2016 |
New Random Generator of a Safe Cryptographic Salt Per Session. Y Asimi, A Amghar, A Asimi, Y Sadqi Int. J. Netw. Secur. 18 (3), 445-453, 2016 | 12 | 2016 |
Determination of irreducible and primitive polynomials over a binary finite field A Ahmed International J. of Pure & Engg. Mathematics (IJPEM) 4 (1), 45-59, 2016 | 12* | 2016 |
Kerberos V5: Vulnerabilities and perspectives Z Tbatou, A Asimi, Y Asimi, Y Sadqi 2015 Third World Conference on Complex Systems (WCCS), 1-5, 2015 | 12 | 2015 |
Short: A lightweight and secure session management protocol Y Sadqi, A Asimi, Y Asimi International Conference on Networked Systems, 319-323, 2014 | 9 | 2014 |
Creating a Complete Model of an Intrusion Detection System effective on the LAN Y Farhaoui, A Asimi International Journal of Advanced Computer Science and Applications 3 (5), 2012 | 9 | 2012 |
Strong zero-knowledge Authentication based on the Session Keys (SASK) Y Asimi, A Amghar, A Asimi, Y Sadqi International Journal of Network Security & Its Applications 7 (1), 51, 2015 | 8 | 2015 |
Genetic Regenerator of pseudo-random sequences RA NMJ A Sabour, A Asimi, A Lbekkouri International Symposium on AI 50, 1-3, 2007 | 8 | 2007 |
Dynamic proof of retrievability based on public auditing for coded secure cloud storage Chawki El Balmany, Ahmed Asimi, B.Mohamed, Z.Tbatou Multimedia Tools and Applications 81 (27), 39229-39249, 2022 | 7 | 2022 |