Intrusion detection system in Wireless Sensor Network based on mobile agent YEL Mourabit, A Toumanari, A Bouirden, H Zougagh, R Latif 2014 Second World Conference on Complex Systems (WCCS), 248-251, 2014 | 25 | 2014 |
Predictive system of semiconductor failures based on machine learning approach Y El Mourabit, Y El Habouz, H Zougagh, Y Wadiai International journal of advanced computer science and applications (IJACSA …, 2020 | 13 | 2020 |
A mobile agent approach for IDS in Mobile Ad Hoc Network Y El Mourabit, A Toumanari, H Zougagh IJCSI International Journal of Computer Science Issues 11 (1), 148-152, 2014 | 13 | 2014 |
Modified olsr protocol for detection and prevention of packet dropping attack in manet H Zougagh, A Toumanari, R Latif, Y Elmourabit, N Idboufker International Journal of Computer Applications 100 (17), 2014 | 12 | 2014 |
A novel security approach for struggling black hole attack in optimised link state routing protocol H Zougagh, A Toumanari, R Latif, N Idboufker International Journal of Sensor Networks 18 (1-2), 101-110, 2015 | 11 | 2015 |
Filtering and analyzing normal and abnormal electromyogram signals S Elouaham, A Dliou, M Laaboubi, R Latif, N Elkamoun, H Zougagh Indones. J. Electr. Eng. Comput. Sci 20 (1), 176-184, 2020 | 10 | 2020 |
Denoising electromyogram and electroencephalogram signals using improved complete ensemble empirical mode decomposition with adaptive noise S Elouaham, A Dliou, N Elkamoun, R Latif, S Said, H Zougagh, K Khadiri Indonesian Journal of Electrical Engineering and Computer Science 23 (2), 829, 2021 | 8 | 2021 |
Denoising Ventricular tachyarrhythmia Signal A Dliou, S Elouaham, M Laaboubi, H Zougagh, A Saddik 2018 9th International Symposium on Signal, Image, Video and Communications …, 2018 | 7 | 2018 |
A performance comparison of routing protocols for ad hoc networks H Zougagh, A Toumanari, R Latif, N Idboufker, Y Elmourabit International Journal of Engineering Research and Applications (IJERA), 124-131, 2014 | 7 | 2014 |
Evaluating and comparison of intrusion in mobile ad hoc networks Z Hicham, T Ahmed, L Rachid, I Noureddin International Journal of Distributed and Parallel Systems 3 (2), 243, 2012 | 7 | 2012 |
Combination time-frequency and empirical wavelet transform methods for removal of composite noise in EMG signals S Elouaham, B Nassiri, A Dliou, H Zougagh, N El Kamoun, K El Khadiri, ... TELKOMNIKA (Telecommunication Computing Electronics and Control) 21 (6 …, 2023 | 6 | 2023 |
Reducing energy footprint in cloud computing: a study on the impact of clustering techniques and scheduling algorithms for scientific workflows Y Saadi, S Jounaidi, S El Kafhali, H Zougagh Computing 105 (10), 2231-2261, 2023 | 4 | 2023 |
Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems H Zougagh, N Idboufker, R Zoubairi, R El Ayachi International Journal of Business Data Communications and Networking (IJBDCN …, 2019 | 4 | 2019 |
Business Intelligence: 6th International Conference, CBI 2021, Beni Mellal, Morocco, May 27–29, 2021, Proceedings M Fakir, M Baslam, R El Ayachi Springer Nature, 2021 | 3 | 2021 |
Hicham zougagh, Rachid Latif,” Intrusion Detection System In wireless Sensor network Based On Mobile Agent” YEL Mourabit, A Toumanari, A Bouirden Second World Conference on Complex Systems (WCCS), IEEE DOI 10, 0 | 3 | |
A Comparison of the Denoising Performance Using Capon Time-Frequency and Empirical Wavelet Transform Applied on Biomedical Signal. K El Khadiri, S Elouaham, B Nassiri, O El Melhaoui, S Said, N El Kamoun, ... International Journal on Engineering Applications 11 (5), 2023 | 2 | 2023 |
Sentiment analysis decision system for tracking climate change opinion in twitter M Lydiri, Y El Habouz, H Zougagh International Conference on Business Intelligence, 188-196, 2022 | 2 | 2022 |
Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge H Zougagh, N Idboufker, Y El Mourabit, Y Saadi, S Elouaham Innovations in Bio-Inspired Computing and Applications: Proceedings of the …, 2021 | 2 | 2021 |
A new sentiment analysis system of tweets based on machine learning approach Y El Mourabit, Y El Habouz, MLH Zougagh | 2 | 2020 |
A New Solution to Defend Against Cooperative Black Hole Attack in Optimized Link State Routing Protocol H Zougagh, A Toumanari, R Latif, N Idboufker International Review on Computers and Software (IRECOS) 8 (2), 519-526, 2013 | 2 | 2013 |