Follow
zakariae tbatou
zakariae tbatou
IBN ZOHR university
Verified email at e-polytechnique.ma
Title
Cited by
Cited by
Year
A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier.
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
Int. J. Netw. Secur. 21 (3), 438-450, 2019
352019
IaaS cloud model security issues on behalf cloud provider and user security behaviors
A Ahmed, T Zakariae
Procedia computer science 134, 328-333, 2018
292018
A multilayer perceptron classifier for monitoring network traffic
A Guezzaz, A Asimi, A Mourade, Z Tbatou, Y Asimi
Big Data and Networks Technologies 3, 262-270, 2020
232020
A New Mutuel Kerberos Authentication Protocol for Distributed Systems.
Z Tbatou, A Asimi, Y Asimi, Y Sadqi, A Guezzaz
Int. J. Netw. Secur. 19 (6), 889-898, 2017
232017
A new hybrid network sniffer model based on Pcap language and sockets (Pcapsocks)
A Guezzaz, A Asimi, Y Sadqi, Y Asimi, Z Tbatou
International Journal of Advanced Computer Science and Applications 7 (2), 2016
192016
A lightweight neural classifier for intrusion detection
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
General Letters in Mathematics 2 (2), 57-66, 2017
172017
Kerberos V5: Vulnerabilities and perspectives
Z Tbatou, A Asimi, Y Asimi, Y Sadqi
2015 Third World Conference on Complex Systems (WCCS), 1-5, 2015
112015
Unpredictable cryptographic primitives for the robust wireless network security
Y Asimi, A Asimi, A Guezzaz, Z Tbatou, Y Sadqi
Procedia computer science 134, 316-321, 2018
72018
Dynamic proof of retrievability based on public auditing for coded secure cloud storage
CE Balmany, A Asimi, M Bamarouf, Z Tbatou
Multimedia Tools and Applications 81 (27), 39229-39249, 2022
62022
Secure virtual machine image storage process into a trusted zone-based cloud storage
C El Balmany, Z Tbatou, A Asimi, M Bamarouf
Computers & Security 120, 102815, 2022
32022
A Novel Architecture of a Strong and Mutual Authentication Protocol for Distributed Systems
Z Tbatou, A Asimi, C El Balmany, Y Asimi, A Guezzaz
32020
Trust in cloud computing challenges: A recent survey
Z Tbatou, A Asimi, C El Balmany
Big Data and Networks Technologies 3, 349-359, 2020
22020
Openstack: launch a secure user virtual machine image into a trust public cloud IaaS environment
C El Balmany, A Asimi, Z Tbatou, Y Asimi, A Guezzaz
2019 4th World Conference on Complex Systems (WCCS), 1-6, 2019
22019
VMITLP: A Security Protocol Towards a Trusted Launch Process of a User Generic Virtual Machine Image on a Public Cloud IaaS Platform
C EL BALMANY, A ASIMI, Z TBATOU
IAENG International Journal of Computer Science 49 (1), 2022
2022
Improvement the Wireless Network Security by Requiring the News Cryptographic Primitives
Y Asimi, A Asimi, Z Tbatou, A Guezzaz, Y Sadqi
International Journal of Cyber-Security and Digital Forensics 7 (1), 56-63, 2018
2018
Implementation and Evaluation of a Secure and Efficient Web Authentication Scheme using Mozilla Firefox and WAMP
Y Sadqi, A Asimi, Y Asimi, Z Tbatou, A Guezzaz
International Journal of Advanced Computer Science and Applications 7 (2), 2016
2016
Depth study and Random balancing function design for One-way Dynamics Hash Functions
Y ASIMI, A ASIMI, Z TBATOU, A GUEZZAZ, Y SADQI
The system can't perform the operation now. Try again later.
Articles 1–17