Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection A Guezzaz, Y Asimi, M Azrour, A Asimi Big Data Mining and Analytics 4 (1), 18-24, 2021 | 98 | 2021 |
A comparative study of the four well-known classification algorithms in data mining S Sossi Alaoui, Y Farhaoui, B Aksasse Advanced Information Technology, Services and Systems: Proceedings of the …, 2018 | 39 | 2018 |
A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier. A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi Int. J. Netw. Secur. 21 (3), 438-450, 2019 | 35 | 2019 |
IaaS cloud model security issues on behalf cloud provider and user security behaviors A Ahmed, T Zakariae Procedia computer science 134, 328-333, 2018 | 29 | 2018 |
A distributed intrusion detection approach based on machine leaning techniques for a cloud security A Guezzaz, A Asimi, Y Asimi, M Azrour, S Benkirane Intelligent Systems in Big Data, Semantic Web and Machine Learning, 85-94, 2021 | 23 | 2021 |
A Multilayer Perceptron Classifier for Monitoring Network Traffic Azidine Guezzaz, Ahmed Asimi, Azrour Mourade, Zakariae Tbatou, and Younes Asimi LNNS 81, 262–270, 2020 | 23* | 2020 |
A New Mutuel Kerberos Authentication Protocol for Distributed Systems. Z Tbatou, A Asimi, Y Asimi, Y Sadqi, A Guezzaz Int. J. Netw. Secur. 19 (6), 889-898, 2017 | 23 | 2017 |
Performance method of assessment of the intrusion detection and prevention systems Y Farhaoui, A Asimi International Journal of Engineering Science and Technology 3 (7), 5916-28, 2011 | 20 | 2011 |
A new hybrid network sniffer model based on Pcap language and sockets (Pcapsocks) A Guezzaz, A Asimi, Y Sadqi, Y Asimi, Z Tbatou International Journal of Advanced Computer Science and Applications 7 (2), 2016 | 19 | 2016 |
A lightweight neural classifier for intrusion detection A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi General Letters in Mathematics 2 (2), 57-66, 2017 | 17 | 2017 |
Performance Assessment of Tools of the intrusionDetection/Prevention Systems Y Farhaoui, A Asimi International Journal of Computer Science and Information Security 10 (1), 7-13, 2012 | 16 | 2012 |
Strong Zero-knowledge Authentication Based on Virtual Passwords. A Asimi, Y Asimi, A Amghar, Y Sadqi Int. J. Netw. Secur. 18 (4), 601-616, 2016 | 13 | 2016 |
New Random Generator of a Safe Cryptographic Salt Per Session. Y Asimi, A Amghar, A Asimi, Y Sadqi Int. J. Netw. Secur. 18 (3), 445-453, 2016 | 12 | 2016 |
Determination of irreducible and primitive polynomials over a binary finite field A Ahmed International J. of Pure & Engg. Mathematics (IJPEM) 4 (1), 45-59, 2016 | 12* | 2016 |
Kerberos V5: Vulnerabilities and perspectives Z Tbatou, A Asimi, Y Asimi, Y Sadqi 2015 Third World Conference on Complex Systems (WCCS), 1-5, 2015 | 11 | 2015 |
Short: A lightweight and secure session management protocol Y Sadqi, A Asimi, Y Asimi International Conference on Networked Systems, 319-323, 2014 | 9 | 2014 |
Creating a Complete Model of an Intrusion Detection System effective on the LAN Y Farhaoui, A Asimi International Journal of Advanced Computer Science and Applications 3 (5), 2012 | 9 | 2012 |
Strong zero-knowledge Authentication based on the Session Keys (SASK) Y Asimi, A Amghar, A Asimi, Y Sadqi International Journal of Network Security & Its Applications 7 (1), 51, 2015 | 8 | 2015 |
Genetic Regenerator of pseudo-random sequences RA NMJ A Sabour, A Asimi, A Lbekkouri International Symposium on AI 50, 1-3, 2007 | 8 | 2007 |
Unpredictable cryptographic primitives for the robust wireless network security Y Asimi, A Asimi, A Guezzaz, Z Tbatou, Y Sadqi Procedia computer science 134, 316-321, 2018 | 7 | 2018 |