Clustering-based Approach for Anomaly Detection in XACML Policies M Ait El Hadj, A Meryeme, B Yahya, K Ahmed, E Mohammed Proceedings of the 14th International Joint Conference on e-Business and …, 2017 | 18* | 2017 |
Efficient security policy management using suspicious rules through access log analysis M Ait El Hadj, A Khoumsi, Y Benkaouz, M Erradi Networked Systems: 7th International Conference, NETYS 2019, Marrakech …, 2019 | 9 | 2019 |
Validation and correction of large security policies: A clustering and access log based approach MA El Hadj, M Erradi, A Khoumsi, Y Benkaouz 2018 IEEE international conference on big Data (Big Data), 5330-5332, 2018 | 9 | 2018 |
Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies M Ait El Hadj, A Khoumsi, Y Benkaouz, E Mohammed EAI Endorsed Transactions on Security and Safety 5 (e3), 2018 | 9 | 2018 |
ABAC Rule Reduction via Similarity Computation M Ait El Hadj, Y Benkaouz, B Freisleben, M Erradi International Conference on Networked Systems, 86-100, 2017 | 8 | 2017 |
Hybrid Machine Learning-Based Approach for Anomaly Detection using Apache Spark H Chliah, A Battou, M Ait el hadj, A Laoufi International Journal of Advanced Computer Science and Applications 14 (4), 2023 | 2 | 2023 |
A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies M Ait El Hadj, A Khoumsi, Y Benkaouz, M Erradi International Conference on Soft Computing and Pattern Recognition 1383, 836-846, 2020 | 1 | 2020 |
Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies M Ait El Hadj, B Yahya, K Ahmed, E Mohammed International Conference on Innovations in Bio-Inspired Computing and …, 2017 | 1 | 2017 |
Exploring the Role of Machine Learning in Enhancing Access Control Systems: A Comprehensive Review M Ait el hadj International Journal of Computing and Digital Systems 14 (1), 10361-10379, 2023 | | 2023 |