[HTML][HTML] An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0

O Chakir, A Rehaimi, Y Sadqi, M Krichen… - Journal of King Saud …, 2023 - Elsevier
Cybersecurity attacks that target software have become profitable and popular targets for
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …

SWAF: a smart web application firewall based on convolutional neural network

I Jemal, MA Haddar, O Cheikhrouhou… - … on Security of …, 2022 - ieeexplore.ieee.org
Internet network carries a huge stream of HTTP requests and responses between users and
servers. Securing server data access is primordial for internet users to enhance confidence …

An explainable machine learning-based web attack detection system for industrial IoT web application security

O Chakir, Y Sadqi… - … Security Journal: A Global …, 2024 - Taylor & Francis
ABSTRACT Within Industry 4.0, the integration of Industrial IoT (IIoT) marks a transformative
phase for modern industries, fostering the development of smart factories and intelligent …

Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management

B Gunawan, B Ratmono, D Kurniasih… - … Journal of Data and …, 2023 - growingscience.com
This study aims to analyze and examine the influence of internal auditor certification, risk
assessment, and the role of senior management on the effectiveness of cybersecurity for …

Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks

M Ismail, S Alrabaee, S Harous, KKR Choo - International Conference on …, 2023 - Springer
Web applications remain a significant attack vector for cybercriminals seeking to exploit
application vulnerabilities and gain unauthorized access to privileged data. In this research …

Comparative analysis of machine learning classifiers for enhancing business revenue and customer satisfaction: An empirical study

N Pol, S Daveshar, T Madhavi, NKK Rao… - AIP Conference …, 2024 - pubs.aip.org
Maximizing profits while maintaining a strong position in the market is the primary goal of
every business. High revenue and market dominance can only be achieved with an in-depth …

MULTI-KEY FULLY HOMOMORPHIC ENCRYPTION FOR PRIVACY-PRESERVATION WITHIN FEDERATED LEARNING ENVIRONMENTS

O Chakir, Y Belfaik, Y Sadqi - EDPACS, 2023 - Taylor & Francis
Despite the need for data from multiple sources in machine learning, privacy constraints limit
data sharing. Federated Learning (FL) addresses this by allowing clients to share locally …

Detection of web-based attacks using tree-based learning models: An evaluation study

O Chakir, Y Sadqi - International Conference on Artificial Intelligence and …, 2023 - Springer
Due to the increasing complexity of web-based attacks, their detection has become more
challenging in recent years. Relying solely on traditional intrusion detection systems may no …

Laboratory LIMATI, FPBM, USMS, Beni Mellal, Morocco oumaima. chakirfpb@ usms. ac. ma, y. sadqi@ usms. ma

O Chakir - … Intelligence and Green Computing: Proceedings of …, 2023 - books.google.com
Due to the increasing complexity of web-based attacks, their detection has become more
challenging in recent years. Relying solely on traditional intrusion detection systems may no …

[CITATION][C] Develo** an Innovative Network Security Attack Detection Model Through Artificial Intelligence and Edge Computing

Y Zhuang - SPIN, 2024 - World Scientific
Securing a network at its edge, that is, the location where a user creates and stores data
within a larger network is defined as edge security. It is essential to have this type of …