Improving the use of big data analytics within electronic health records: a case study based OpenEHR F Khennou, YI Khamlichi, NEH Chaoui Procedia Computer Science 127, 60-68, 2018 | 56 | 2018 |
A novel strong password generator for improving cloud authentication A Abdellaoui, YI Khamlichi, H Chaoui Procedia Computer Science 85, 293-300, 2016 | 35 | 2016 |
Real time monitoring of security events for forensic purposes in Cloud environments using SIEM I Bachane, YIK Adsi, HC Adsi 2016 Third International Conference on Systems of Collaboration (SysCo), 1-3, 2016 | 23 | 2016 |
Medical image watermarked by simultaneous moment invariants and content-based for privacy and tamper detection YI Khamlichi, M Machkour, K Afdel, A Moudden Proceedings of the 6th WSEAS International Conference on Multimedia Systems …, 2006 | 18 | 2006 |
AN EFFECTIVE INTRUSION DETECTION MODEL BASED ON SVM WITH FEATURE SELECTION AND PARAMETERS OPTIMIZATION. EM Chakir, M Moughit, YI Khamlichi Journal of Theoretical & Applied Information Technology 96 (12), 2018 | 15 | 2018 |
An efficient method for evaluating alerts of Intrusion Detection Systems EM Chakir, M Moughit, YI Khamlichi 2017 International Conference on Wireless Technologies, Embedded and …, 2017 | 15 | 2017 |
Out-of-band authentication using image-based one time password in the cloud environment A Abdellaoui, YI Khamlichi, H Chaoui International Journal of Security and Its Applications (IJSIA) 9 (12), 35-46, 2015 | 15 | 2015 |
Designing a health data management system based hadoop-agent F Khennou, YI Khamlichi, NEH Chaoui 2016 4th IEEE International Colloquium on Information Science and Technology …, 2016 | 13 | 2016 |
An efficient framework for enhancing user authentication in cloud storage using digital watermark A Abdellaoui, YI Khamlichi, H Chaoui International Review on Computers and Software (IRECOS) 10 (2), 130-136, 2015 | 13 | 2015 |
Multiple watermark for tamper detection in mammographyimage. YI Khamlichi, M MacHkour, K Afdel, A Moudden WSEAS Transactions on Computers 5 (6), 1222-1226, 2006 | 13 | 2006 |
A robust authentication scheme for telecare medicine information system A Abdellaoui, YI Khamlichi, H Chaoui Procedia Computer Science 98, 584-589, 2016 | 12 | 2016 |
A migration methodology from legacy to new electronic health record based openehr F Khennou, NEH Chaoui, YI Khamlichi International Journal of E-Health and Medical Communications (IJEHMC) 10 (1 …, 2019 | 10 | 2019 |
Authentication system for medical watermarked content based image YI Khamlichi, Y Zaz, K Afdel Wseas Trans Signal Process 5, 826-830, 2006 | 10 | 2006 |
WITS 2020: Proceedings of the 6th International Conference on Wireless Technologies, Embedded, and Intelligent Systems S Bennani, Y Lakhrissi, G Khaissidi, A Mansouri, Y Khamlichi Springer Nature, 2021 | 9 | 2021 |
Handling alerts for intrusion detection system using stateful pattern matching EM Chakir, YI Khamlichi, M Moughit 2016 4th IEEE International Colloquium on Information Science and Technology …, 2016 | 9 | 2016 |
A real-time risk assessment model for intrusion detection systems using pattern matching EM Chakir, M Moughit, YI Khamlichi International Conference on Information Technology and Communication Systems …, 2018 | 6 | 2018 |
A reversible conversion methodology: between XML and object-relational models M Machkour, K Afdel, YI Khamlichi 2016 7th International Conference on Information and Communication Systems …, 2016 | 6 | 2016 |
Authentication watermarked system for content based medical image YI Khamlichi, Y Zaz, M Machkour, K Afdel WSEAS Transactions on Signal Processing 2 (5), 826-830, 2006 | 6 | 2006 |
A real-time risk assessment model for intrusion detection systems EM Chakir, M Moughit, YI Khamlichi 2017 International Symposium on Networks, Computers and Communications …, 2017 | 5 | 2017 |
A BYOD method for enhancing authentication in the cloud environment using elliptic curves A Abdellaoui, YI Khamlichi, H Chaoui International Journal of Computer Science and Information Security 14 (5), 63, 2016 | 5 | 2016 |