Follow
Yassine Sadqi
Title
Cited by
Cited by
Year
A comprehensive survey on SDN security: threats, mitigations, and future directions
Y Maleh, Y Qasmaoui, K El Gholami, Y Sadqi, S Mounir
Journal of Reliable Intelligent Environments 9 (2), 201-239, 2023
662023
A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier.
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
Int. J. Netw. Secur. 21 (3), 438-450, 2019
352019
A systematic review and taxonomy of web applications threats
Y Sadqi, Y Maleh
Information Security Journal: A Global Perspective 31 (1), 1-27, 2022
342022
An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
O Chakir, A Rehaimi, Y Sadqi, M Krichen, GS Gaba, A Gurtov
Journal of King Saud University-Computer and Information Sciences 35 (3 …, 2023
252023
A New Mutuel Kerberos Authentication Protocol for Distributed Systems.
Z Tbatou, A Asimi, Y Asimi, Y Sadqi, A Guezzaz
Int. J. Netw. Secur. 19 (6), 889-898, 2017
232017
A new hybrid network sniffer model based on Pcap language and sockets (Pcapsocks)
A Guezzaz, A Asimi, Y Sadqi, Y Asimi, Z Tbatou
International Journal of Advanced Computer Science and Applications 7 (2), 2016
192016
A lightweight neural classifier for intrusion detection
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
General Letters in Mathematics 2 (2), 57-66, 2017
172017
Web oauth-based sso systems security
Y Sadqi, Y Belfaik, S Safi
Proceedings of the 3rd International Conference on Networking, Information …, 2020
152020
Strong zero-knowledge Authentication based on the Virtual Passwords (SAVP)
Y ASIMI, A AMGHAR, A ASIMI, Y SADQI
International Journal of Network Security 18 (4), 601-616, 2016
132016
New Random Generator of a Safe Cryptographic Salt per session (RGSCS)
Y ASIMI, A AMGHAR, A ASIMI, Y SADQI
International Journal of Network Security 18 (3), 445-453, 2016
122016
Kerberos V5: Vulnerabilities and perspectives
Z Tbatou, A Asimi, Y Asimi, Y Sadqi
2015 Third World Conference on Complex Systems (WCCS), 1-5, 2015
112015
Short: A lightweight and secure session management protocol
Y Sadqi, A Asimi, Y Asimi
International Conference on Networked Systems, 319-323, 2014
92014
Strong zero-knowledge Authentication based on the Session Keys (SASK)
Y Asimi, A Amghar, A Asimi, Y Sadqi
International Journal of Network Security & Its Applications 7 (1), 51, 2015
82015
Experimental study on the effectiveness of machine learning methods in web intrusion detection
C Oumaima, R Abdeslam, S Yassine, F Abderrazek
Advances in Information, Communication and Cybersecurity: Proceedings of …, 2022
72022
Unpredictable cryptographic primitives for the robust wireless network security
Y Asimi, A Asimi, A Guezzaz, Z Tbatou, Y Sadqi
Procedia computer science 134, 316-321, 2018
72018
A Secure and Efficient User Authentication Scheme for the Web
YA Yassine sadqi, Ahmed Asimi
International Journal of Internet Technology and Secured Transactions, 2015
72015
A cryptographic mutual authentication scheme for web applications
Y Sadqi, A Asimi, Y Asimi
arXiv preprint arXiv:1412.2908, 2014
72014
Evaluation of open-source web application firewalls for cyber threat intelligence
O Chakir, Y Sadqi, Y Maleh
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence, 35-48, 2023
52023
Design challenges and assessment of modern web applications intrusion detection and prevention systems (IDPS)
Y Sadqi, M Mekkaoui
Innovations in Smart Cities Applications Volume 4: The Proceedings of the …, 2021
42021
A novel secure and privacy-preserving model for OpenID connect based on blockchain
B Yousra, S Yassine, M Yassine, S Said, T Lo’ai, K Salah
IEEE Access, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20