A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier. A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi Int. J. Netw. Secur. 21 (3), 438-450, 2019 | 47 | 2019 |
IaaS cloud model security issues on behalf cloud provider and user security behaviors A Ahmed, T Zakariae Procedia computer science 134, 328-333, 2018 | 33 | 2018 |
A multilayer perceptron classifier for monitoring network traffic A Guezzaz, A Asimi, A Mourade, Z Tbatou, Y Asimi Big Data and Networks Technologies 3, 262-270, 2020 | 28 | 2020 |
A New Mutuel Kerberos Authentication Protocol for Distributed Systems. Z Tbatou, A Asimi, Y Asimi, Y Sadqi, A Guezzaz Int. J. Netw. Secur. 19 (6), 889-898, 2017 | 22 | 2017 |
A new hybrid network sniffer model based on Pcap language and sockets (Pcapsocks) A Guezzaz, A Asimi, Y Sadqi, Y Asimi, Z Tbatou International Journal of Advanced Computer Science and Applications 7 (2), 2016 | 20 | 2016 |
A lightweight neural classifier for intrusion detection A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi General Letters in Mathematics 2 (2), 57-66, 2017 | 19 | 2017 |
Kerberos V5: Vulnerabilities and perspectives Z Tbatou, A Asimi, Y Asimi, Y Sadqi 2015 Third World Conference on Complex Systems (WCCS), 1-5, 2015 | 12 | 2015 |
Dynamic proof of retrievability based on public auditing for coded secure cloud storage CE Balmany, A Asimi, M Bamarouf, Z Tbatou Multimedia Tools and Applications 81 (27), 39229-39249, 2022 | 7 | 2022 |
Unpredictable cryptographic primitives for the robust wireless network security Y Asimi, A Asimi, A Guezzaz, Z Tbatou, Y Sadqi Procedia computer science 134, 316-321, 2018 | 7 | 2018 |
Secure virtual machine image storage process into a trusted zone-based cloud storage C El Balmany, Z Tbatou, A Asimi, M Bamarouf Computers & Security 120, 102815, 2022 | 6 | 2022 |
Openstack: launch a secure user virtual machine image into a trust public cloud IaaS environment C El Balmany, A Asimi, Z Tbatou, Y Asimi, A Guezzaz 2019 4th World Conference on Complex Systems (WCCS), 1-6, 2019 | 3 | 2019 |
A Novel Architecture of a Strong and Mutual Authentication Protocol for Distributed Systems Z Tbatou, A Asimi, C El Balmany, Y Asimi, A Guezzaz | 2 | 2020 |
Trust in cloud computing challenges: A recent survey Z Tbatou, A Asimi, C El Balmany Big Data and Networks Technologies 3, 349-359, 2020 | 2 | 2020 |
VMITLP: A Security Protocol Towards a Trusted Launch Process of a User Generic Virtual Machine Image on a Public Cloud IaaS Platform C EL BALMANY, A ASIMI, Z TBATOU IAENG International Journal of Computer Science 49 (1), 2022 | 1 | 2022 |
Improvement the Wireless Network Security by Requiring the News Cryptographic Primitives Y Asimi, A Asimi, Z Tbatou, A Guezzaz, Y Sadqi International Journal of Cyber-Security and Digital Forensics 7 (1), 56-63, 2018 | | 2018 |
Implementation and Evaluation of a Secure and Efficient Web Authentication Scheme using Mozilla Firefox and WAMP Y Sadqi, A Asimi, Y Asimi, Z Tbatou, A Guezzaz International Journal of Advanced Computer Science and Applications 7 (2), 2016 | | 2016 |
Depth study and Random balancing function design for One-way Dynamics Hash Functions Y ASIMI, A ASIMI, Z TBATOU, A GUEZZAZ, Y SADQI | | |