Suivre
Asimi Ahmed
Asimi Ahmed
Professeur, Département de Maths, FSA, université Ibn Zohr
Adresse e-mail validée de uiz.ac.ma
Titre
Citée par
Citée par
Année
Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection
A Guezzaz, Y Asimi, M Azrour, A Asimi
Big Data Mining and Analytics 4 (1), 18-24, 2021
1012021
A comparative study of the four well-known classification algorithms in data mining
S Sossi Alaoui, Y Farhaoui, B Aksasse
Advanced Information Technology, Services and Systems: Proceedings of the …, 2018
392018
A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier.
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
Int. J. Netw. Secur. 21 (3), 438-450, 2019
382019
IaaS cloud model security issues on behalf cloud provider and user security behaviors
A Ahmed, T Zakariae
Procedia computer science 134, 328-333, 2018
292018
A Multilayer Perceptron Classifier for Monitoring Network Traffic
Azidine Guezzaz, Ahmed Asimi, Azrour Mourade, Zakariae Tbatou, and Younes Asimi
LNNS 81, 262–270, 2020
25*2020
A distributed intrusion detection approach based on machine leaning techniques for a cloud security
A Guezzaz, A Asimi, Y Asimi, M Azrour, S Benkirane
Intelligent Systems in Big Data, Semantic Web and Machine Learning, 85-94, 2021
232021
A New Mutuel Kerberos Authentication Protocol for Distributed Systems.
Z Tbatou, A Asimi, Y Asimi, Y Sadqi, A Guezzaz
Int. J. Netw. Secur. 19 (6), 889-898, 2017
232017
Performance method of assessment of the intrusion detection and prevention systems
Y Farhaoui, A Asimi
International Journal of Engineering Science and Technology 3 (7), 5916-28, 2011
202011
A new hybrid network sniffer model based on Pcap language and sockets (Pcapsocks)
A Guezzaz, A Asimi, Y Sadqi, Y Asimi, Z Tbatou
International Journal of Advanced Computer Science and Applications 7 (2), 2016
192016
A lightweight neural classifier for intrusion detection
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
General Letters in Mathematics 2 (2), 57-66, 2017
172017
Performance Assessment of Tools of the intrusionDetection/Prevention Systems
Y Farhaoui, A Asimi
International Journal of Computer Science and Information Security 10 (1), 7-13, 2012
162012
Strong Zero-knowledge Authentication Based on Virtual Passwords.
A Asimi, Y Asimi, A Amghar, Y Sadqi
Int. J. Netw. Secur. 18 (4), 601-616, 2016
132016
New Random Generator of a Safe Cryptographic Salt Per Session.
Y Asimi, A Amghar, A Asimi, Y Sadqi
Int. J. Netw. Secur. 18 (3), 445-453, 2016
122016
Determination of irreducible and primitive polynomials over a binary finite field
A Ahmed
International J. of Pure & Engg. Mathematics (IJPEM) 4 (1), 45-59, 2016
12*2016
Kerberos V5: Vulnerabilities and perspectives
Z Tbatou, A Asimi, Y Asimi, Y Sadqi
2015 Third World Conference on Complex Systems (WCCS), 1-5, 2015
112015
Short: A lightweight and secure session management protocol
Y Sadqi, A Asimi, Y Asimi
International Conference on Networked Systems, 319-323, 2014
92014
Creating a Complete Model of an Intrusion Detection System effective on the LAN
Y Farhaoui, A Asimi
International Journal of Advanced Computer Science and Applications 3 (5), 2012
92012
Strong zero-knowledge Authentication based on the Session Keys (SASK)
Y Asimi, A Amghar, A Asimi, Y Sadqi
International Journal of Network Security & Its Applications 7 (1), 51, 2015
82015
Genetic Regenerator of pseudo-random sequences RA NMJ
A Sabour, A Asimi, A Lbekkouri
International Symposium on AI 50, 1-3, 2007
82007
Unpredictable cryptographic primitives for the robust wireless network security
Y Asimi, A Asimi, A Guezzaz, Z Tbatou, Y Sadqi
Procedia computer science 134, 316-321, 2018
72018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20