Follow
Asimi Ahmed
Asimi Ahmed
Professeur, Département de Maths, FSA, université Ibn Zohr
Verified email at uiz.ac.ma
Title
Cited by
Cited by
Year
Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection
A Guezzaz, Y Asimi, M Azrour, A Asimi
Big Data Mining and Analytics 4 (1), 18-24, 2021
982021
A comparative study of the four well-known classification algorithms in data mining
S Sossi Alaoui, Y Farhaoui, B Aksasse
Advanced Information Technology, Services and Systems: Proceedings of the …, 2018
392018
A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier.
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
Int. J. Netw. Secur. 21 (3), 438-450, 2019
352019
IaaS cloud model security issues on behalf cloud provider and user security behaviors
A Ahmed, T Zakariae
Procedia computer science 134, 328-333, 2018
292018
A distributed intrusion detection approach based on machine leaning techniques for a cloud security
A Guezzaz, A Asimi, Y Asimi, M Azrour, S Benkirane
Intelligent Systems in Big Data, Semantic Web and Machine Learning, 85-94, 2021
232021
A Multilayer Perceptron Classifier for Monitoring Network Traffic
Azidine Guezzaz, Ahmed Asimi, Azrour Mourade, Zakariae Tbatou, and Younes Asimi
LNNS 81, 262–270, 2020
23*2020
A New Mutuel Kerberos Authentication Protocol for Distributed Systems.
Z Tbatou, A Asimi, Y Asimi, Y Sadqi, A Guezzaz
Int. J. Netw. Secur. 19 (6), 889-898, 2017
232017
Performance method of assessment of the intrusion detection and prevention systems
Y Farhaoui, A Asimi
International Journal of Engineering Science and Technology 3 (7), 5916-28, 2011
202011
A new hybrid network sniffer model based on Pcap language and sockets (Pcapsocks)
A Guezzaz, A Asimi, Y Sadqi, Y Asimi, Z Tbatou
International Journal of Advanced Computer Science and Applications 7 (2), 2016
192016
A lightweight neural classifier for intrusion detection
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
General Letters in Mathematics 2 (2), 57-66, 2017
172017
Performance Assessment of Tools of the intrusionDetection/Prevention Systems
Y Farhaoui, A Asimi
International Journal of Computer Science and Information Security 10 (1), 7-13, 2012
162012
Strong Zero-knowledge Authentication Based on Virtual Passwords.
A Asimi, Y Asimi, A Amghar, Y Sadqi
Int. J. Netw. Secur. 18 (4), 601-616, 2016
132016
New Random Generator of a Safe Cryptographic Salt Per Session.
Y Asimi, A Amghar, A Asimi, Y Sadqi
Int. J. Netw. Secur. 18 (3), 445-453, 2016
122016
Determination of irreducible and primitive polynomials over a binary finite field
A Ahmed
International J. of Pure & Engg. Mathematics (IJPEM) 4 (1), 45-59, 2016
12*2016
Kerberos V5: Vulnerabilities and perspectives
Z Tbatou, A Asimi, Y Asimi, Y Sadqi
2015 Third World Conference on Complex Systems (WCCS), 1-5, 2015
112015
Short: A lightweight and secure session management protocol
Y Sadqi, A Asimi, Y Asimi
International Conference on Networked Systems, 319-323, 2014
92014
Creating a Complete Model of an Intrusion Detection System effective on the LAN
Y Farhaoui, A Asimi
International Journal of Advanced Computer Science and Applications 3 (5), 2012
92012
Strong zero-knowledge Authentication based on the Session Keys (SASK)
Y Asimi, A Amghar, A Asimi, Y Sadqi
International Journal of Network Security & Its Applications 7 (1), 51, 2015
82015
Genetic Regenerator of pseudo-random sequences RA NMJ
A Sabour, A Asimi, A Lbekkouri
International Symposium on AI 50, 1-3, 2007
82007
Unpredictable cryptographic primitives for the robust wireless network security
Y Asimi, A Asimi, A Guezzaz, Z Tbatou, Y Sadqi
Procedia computer science 134, 316-321, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20