关注
Youness Idrissi Khamlichi
Youness Idrissi Khamlichi
National School of Applied Sciences, Sidi Mohamed Ben Abdellah University
在 usmba.ac.ma 的电子邮件经过验证
标题
引用次数
引用次数
年份
Improving the use of big data analytics within electronic health records: a case study based OpenEHR
F Khennou, YI Khamlichi, NEH Chaoui
Procedia Computer Science 127, 60-68, 2018
562018
A novel strong password generator for improving cloud authentication
A Abdellaoui, YI Khamlichi, H Chaoui
Procedia Computer Science 85, 293-300, 2016
352016
Real time monitoring of security events for forensic purposes in Cloud environments using SIEM
I Bachane, YIK Adsi, HC Adsi
2016 Third International Conference on Systems of Collaboration (SysCo), 1-3, 2016
232016
Medical image watermarked by simultaneous moment invariants and content-based for privacy and tamper detection
YI Khamlichi, M Machkour, K Afdel, A Moudden
Proceedings of the 6th WSEAS International Conference on Multimedia Systems …, 2006
182006
AN EFFECTIVE INTRUSION DETECTION MODEL BASED ON SVM WITH FEATURE SELECTION AND PARAMETERS OPTIMIZATION.
EM Chakir, M Moughit, YI Khamlichi
Journal of Theoretical & Applied Information Technology 96 (12), 2018
152018
An efficient method for evaluating alerts of Intrusion Detection Systems
EM Chakir, M Moughit, YI Khamlichi
2017 International Conference on Wireless Technologies, Embedded and …, 2017
152017
Out-of-band authentication using image-based one time password in the cloud environment
A Abdellaoui, YI Khamlichi, H Chaoui
International Journal of Security and Its Applications (IJSIA) 9 (12), 35-46, 2015
152015
Designing a health data management system based hadoop-agent
F Khennou, YI Khamlichi, NEH Chaoui
2016 4th IEEE International Colloquium on Information Science and Technology …, 2016
132016
An efficient framework for enhancing user authentication in cloud storage using digital watermark
A Abdellaoui, YI Khamlichi, H Chaoui
International Review on Computers and Software (IRECOS) 10 (2), 130-136, 2015
132015
Multiple watermark for tamper detection in mammographyimage.
YI Khamlichi, M MacHkour, K Afdel, A Moudden
WSEAS Transactions on Computers 5 (6), 1222-1226, 2006
132006
A robust authentication scheme for telecare medicine information system
A Abdellaoui, YI Khamlichi, H Chaoui
Procedia Computer Science 98, 584-589, 2016
122016
A migration methodology from legacy to new electronic health record based openehr
F Khennou, NEH Chaoui, YI Khamlichi
International Journal of E-Health and Medical Communications (IJEHMC) 10 (1 …, 2019
102019
Authentication system for medical watermarked content based image
YI Khamlichi, Y Zaz, K Afdel
Wseas Trans Signal Process 5, 826-830, 2006
102006
WITS 2020: Proceedings of the 6th International Conference on Wireless Technologies, Embedded, and Intelligent Systems
S Bennani, Y Lakhrissi, G Khaissidi, A Mansouri, Y Khamlichi
Springer Nature, 2021
92021
Handling alerts for intrusion detection system using stateful pattern matching
EM Chakir, YI Khamlichi, M Moughit
2016 4th IEEE International Colloquium on Information Science and Technology …, 2016
92016
A real-time risk assessment model for intrusion detection systems using pattern matching
EM Chakir, M Moughit, YI Khamlichi
International Conference on Information Technology and Communication Systems …, 2018
62018
A reversible conversion methodology: between XML and object-relational models
M Machkour, K Afdel, YI Khamlichi
2016 7th International Conference on Information and Communication Systems …, 2016
62016
Authentication watermarked system for content based medical image
YI Khamlichi, Y Zaz, M Machkour, K Afdel
WSEAS Transactions on Signal Processing 2 (5), 826-830, 2006
62006
A real-time risk assessment model for intrusion detection systems
EM Chakir, M Moughit, YI Khamlichi
2017 International Symposium on Networks, Computers and Communications …, 2017
52017
A BYOD method for enhancing authentication in the cloud environment using elliptic curves
A Abdellaoui, YI Khamlichi, H Chaoui
International Journal of Computer Science and Information Security 14 (5), 63, 2016
52016
系统目前无法执行此操作,请稍后再试。
文章 1–20