Fast correlation based filter combined with genetic algorithm and particle swarm on feature selection H Djellali, S Guessoum, N Ghoualmi-Zine, S Layachi 2017 5th International conference on electrical engineering-boumerdes (ICEE …, 2017 | 41 | 2017 |
VANET: A novel service for predicting and disseminating vehicle traffic information S Abdelatif, M Derdour, N Ghoualmi‐Zine, B Marzak International Journal of Communication Systems 33 (6), e4288, 2020 | 32 | 2020 |
Hybrid artificial bees colony and particle swarm on feature selection H Djellali, A Djebbar, NG Zine, N Azizi Computational Intelligence and Its Applications: 6th IFIP TC 5 International …, 2018 | 26 | 2018 |
Intrusion detection using principal component analysis L Mechtri, FD Tolba, N Ghoualmi 2010 second international conference on engineering system management and …, 2010 | 25 | 2010 |
A new adaptive intrusion detection system based on the intersection of two different classifiers A Ahmim, N Ghoualmi–Zine International Journal of Security and Networks 9 (3), 125-132, 2014 | 21 | 2014 |
Two stages feature selection based on filter ranking methods and SVMRFE on medical applications H Djellali, NG Zine, N Azizi Modelling and Implementation of Complex Systems: Proceedings of the 4th …, 2016 | 19 | 2016 |
An adaptation platform for multimedia applications CSC (component, service, connector) M Derdour, P Roose, M Dalmau, N Ghoualmi‐Zine Journal of Systems and Information Technology 14 (1), 4-22, 2012 | 19 | 2012 |
Key management protocol in WIMAX revisited N Kahya, N Ghoualmi, P Lafourcade Advances in Computer Science, Engineering & Applications: Proceedings of the …, 2012 | 18 | 2012 |
A new hierarchical intrusion detection system based on a binary tree of classifiers A Ahmim, N Ghoualmi Zine Information & Computer Security 23 (1), 31-57, 2015 | 16 | 2015 |
HaMA: a handicap-based architecture for multimedia document adaptation A Saighi, R Philippe, N Ghoualmi, S Laborie, Z Laboudi International Journal of Multimedia Data Engineering and Management (IJMDEM …, 2017 | 14 | 2017 |
A new approach for adaptive intrusion detection H Bensefia, N Ghoualmi 2011 Seventh International Conference on Computational Intelligence and …, 2011 | 14 | 2011 |
A new fast and high performance intrusion detection system A Ahmim, N Ghoualmi-Zine International Journal of Security and Its Applications 7 (5), 67-80, 2013 | 12 | 2013 |
Secure key management protocol in wimax N Kahya, N Ghoualmi, P Lafourcade International Journal of Network Security & Its Applications 4 (6), 119, 2012 | 12 | 2012 |
MMSA: metamodel multimedia software architecture M Derdour, P Roose, M Dalmau, N Ghoualmi Zine, A Alti Advances in Multimedia 2010 (1), 386035, 2010 | 12 | 2010 |
Formal analysis of PKM using scyther tool N Kahya, N Ghoualmi, P Lafourcade 2012 International Conference on Information Technology and e-Services, 1-6, 2012 | 11 | 2012 |
Typing of adaptation connectors in MMSA approach case study: sending MMS M Derdour, M Dalmau, P Roose, N Ghoualmi-Zine International Journal of Research and Reviews in Computer Science 1 (4), 39-49, 2010 | 11 | 2010 |
Ipsec/firewall security policy analysis: A survey R Khelf, N Ghoualmi-Zine 2018 International Conference on Signal, Image, Vision and their …, 2018 | 10 | 2018 |
Forecasting approach in VANET based on vehicle kinematics for road safety D Bektache, C Tolba, N Ghoualmi-Zine International Journal of Vehicle Safety 7 (2), 147-167, 2014 | 10 | 2014 |
Forecasting Approach in VANET based on vehicle collision alert B Djamel, GZ Nacira, T Cherif 2012 International Conference on Multimedia Computing and Systems, 573-577, 2012 | 10 | 2012 |
Intra and inter policy conflicts dynamic detection algorithm R Khelf, N Ghoualmi 2017 Seminar on Detection Systems Architectures and Technologies (DAT), 1-6, 2017 | 8 | 2017 |