makhlouf derdour
makhlouf derdour
university of Oum El Bouaghi
Verified email at - Homepage
Cited by
Cited by
Blockchain technologies for the internet of things: Research issues and challenges
MA Ferrag, M Derdour, M Mukherjee, A Derhab, L Maglaras, H Janicke
IEEE Internet of Things Journal 6 (2), 2188-2204, 2018
A novel hierarchical intrusion detection system based on decision tree and rules-based models
A Ahmim, L Maglaras, MA Ferrag, M Derdour, H Janicke
2019 15th International Conference on Distributed Computing in Sensorá…, 2019
Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks
MA Ferrag, L Maglaras, A Ahmim, M Derdour, H Janicke
Future internet 12 (3), 44, 2020
An intrusion detection system based on combining probability predictions of a tree of classifiers
A Ahmim, M Derdour, MA Ferrag
International Journal of Communication Systems 31 (9), e3547, 2018
An adaptation platform for multimedia applications CSC (component, service, connector)
M Derdour, P Roose, M Dalmau, N Ghoualmi‐Zine
Journal of Systems and Information Technology, 2012
MMSA: metamodel multimedia software architecture
M Derdour, P Roose, M Dalmau, N Ghoualmi Zine, A Alti
Advances in Multimedia 2010, 2010
Typing of adaptation connectors in MMSA approach case study: sending MMS
M Derdour, M Dalmau, P Roose, N Ghoualmi-Zine
International Journal of Research and Reviews in Computer Science 1 (4), 39-49, 2010
Intrusion Detection using Data Mining: A contemporary comparative study
I Bouteraa, M Derdour, A Ahmim
2018 3rd International Conference on Pattern Analysis and Intelligentá…, 2018
VANET: A novel service for predicting and disseminating vehicle traffic information
S Abdelatif, M Derdour, N Ghoualmi‐Zine, B Marzak
International Journal of Communication Systems 33 (6), e4288, 2020
A detailed analysis of using supervised machine learning for intrusion detection
A Ahmim, MA Ferrag, L Maglaras, M Derdour, H Janicke
Strategic Innovative Marketing and Tourism, 629-639, 2020
Using a fine-tuning method for a deep authentication in mobile cloud computing based on Tensorflow Lite framework
A Zeroual, M Derdour, M Amroune, A Bentahar
2019 International Conference on Networking and Advanced Systems (ICNAS), 1-5, 2019
UML-profile for multimedia software architectures
M Derdour, G Zine, P Roose, M Dalmau, A Alti
International Journal of Multimedia Intelligence and Security 1 (3), 209-231, 2010
Maximizing WSN life using power efficient grid-chain routing protocol (PEGCP)
F Bouakkaz, M Derdour
Wireless Personal Communications 117 (2), 1007-1023, 2021
Marc Dalmau-Toward a dynamic system for the adaptation multimedia fluxes in the P2P architectures-FINA, helded in AINA-09, ISSN: 978-0-7695-3639-2/09
M Derdour, N Ghoualmi-Zine, P Roose
DOI 10, 67-72, 0
Deep authentication model in Mobile Cloud Computing
A Zeroual, M Amroune, M Derdour, A Meraoumia, A Bentahar
2018 3rd International Conference on Pattern Analysis and Intelligentá…, 2018
Smart fog computing for efficient situations management in smart health environments
M Achouri, A Alti, M Derdour, S Laborie, P Roose
Journal of Information and Communication Technology 17 (4), 537-567, 2018
Loop speed trap data collection method for an accurate short-term traffic flow forecasting
S Abdelatif, D Makhlouf, P Roose, D Becktache
International Conference on Mobile Web and Information Systems, 56-64, 2016
Security architecture metamodel for Model Driven security
M Derdour, A Alti, M Gasmi, P Roose
Journal of Innovation in Digital Ecosystems 2 (1-2), 55-70, 2015
Improved vitality of wireless sensor network using grid clustering with multi-hop transmission protocol routing
F Bouakkaz, M Derdour, W Ali
Telecommunications and Radio Engineering 79 (6), 2020
Taxonomy of Supervised Machine Learning for Intrusion Detection Systems
A Ahmim, MA Ferrag, L Maglaras, M Derdour, H Janicke, G Drivas
Strategic Innovative Marketing and Tourism, 619-628, 2020
The system can't perform the operation now. Try again later.
Articles 1–20