Enhanced credit card fraud detection based on attention mechanism and LSTM deep model I Benchaji, S Douzi, B El Ouahidi, J Jaafari Journal of Big Data 8, 1-21, 2021 | 124 | 2021 |
Hybrid intrusion detection system using machine learning A Meryem, BEL Ouahidi Network Security 2020 (5), 8-19, 2020 | 97 | 2020 |
Credit card fraud detection model based on LSTM recurrent neural networks I Benchaji, S Douzi, B El Ouahidi Journal of Advances in Information Technology 12 (2), 2021 | 84 | 2021 |
Using genetic algorithm to improve classification of imbalanced datasets for credit card fraud detection I Benchaji, S Douzi, B El Ouahidi Smart Data and Computational Intelligence: Proceedings of the International …, 2019 | 73 | 2019 |
Hybrid email spam detection model using artificial intelligence S Douzi, FA AlShahwan, M Lemoudden, B El Ouahidi International Journal of Machine Learning and Computing 10 (2), 2020 | 63 | 2020 |
Identification of cardiovascular diseases using machine learning N Louridi, M Amar, B El Ouahidi 2019 7th mediterranean congress of telecommunications (CMT), 1-6, 2019 | 63 | 2019 |
Machine learning approaches in Covid-19 severity risk prediction in Morocco M Laatifi, S Douzi, A Bouklouz, H Ezzine, J Jaafari, Y Zaid, B El Ouahidi, ... Journal of big Data 9 (1), 5, 2022 | 57 | 2022 |
Machine learning-based identification of patients with a cardiovascular defect N Louridi, S Douzi, B El Ouahidi Journal of Big Data 8 (1), 133, 2021 | 47 | 2021 |
A review and classification of various VANET Intrusion Detection Systems M Erritali, B El Ouahidi 2013 National Security Days (JNS3), 1-6, 2013 | 41 | 2013 |
Managing cloud-generated logs using big data technologies M Lemoudden, B El Ouahidi 2015 International Conference on Wireless Networks and Mobile Communications …, 2015 | 35 | 2015 |
A survey on VANET intrusion detection systems M Erritali, B El Ouahidi Proceedings of the 2013 International Conference on Systems, Control, Signal …, 2013 | 32 | 2013 |
An UML-based Meta-language for the QoS-aware Enterprise Specification of Open Distributed Systems BE Ouahidi, M Bouhdadi, D Bourget Proceedings of the IFIP TC5/WG5. 5 Third Working Conference on …, 2002 | 24 | 2002 |
Advanced phishing filter using autoencoder and denoising autoencoder S Douzi, M Amar, B El Ouahidi Proceedings of the International Conference on Big Data and Internet of …, 2017 | 21 | 2017 |
A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms. M Lemoudden, N Bouazza, B El Ouahidi, D Bourget Journal of Theoretical & Applied Information Technology 54 (2), 2013 | 21 | 2013 |
Towards a new spam filter based on PV-DM (paragraph vector-distributed memory approach) S Douzi, M Amar, B El Ouahidi, H Laanaya Procedia Computer Science 110, 486-491, 2017 | 17 | 2017 |
Performance evaluation of ad hoc routing protocols in VANETs M Erritali, B El Ouahidi International Journal of Advanced Computer Science and Applications 3 (2), 2013 | 16 | 2013 |
A novel approach in detecting intrusions using NSLKDD database and MapReduce programming A Meryem, D Samira, L Mouad Procedia Computer Science 110, 230-235, 2017 | 14 | 2017 |
Log file's centralization to improve cloud security M Amar, M Lemoudden, B El Ouahidi 2016 2nd International Conference on Cloud Computing Technologies and …, 2016 | 13 | 2016 |
Enhancing Cloud Security using advanced MapReduce k-means on log files A Meryem, D Samira, EO Bouabid Proceedings of the 2018 International Conference on Software Engineering and …, 2018 | 12 | 2018 |
A binary-based mapreduce analysis for cloud logs M Lemoudden, M Amar, B El Ouahidi Procedia Computer Science 83, 1213-1218, 2016 | 12 | 2016 |