Proposed GA-BFSS and logistic regression based intrusion detection system P Ghosh, R Mitra Proceedings of the 2015 third international conference on computer …, 2015 | 43 | 2015 |
A survey of intrusion detection system L Dali, A Bentajer, E Abdelmajid, K Abouelmehdi, H Elsayed, E Fatiha, ... 2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1-6, 2015 | 40 | 2015 |
CS-IBE: a data confidentiality system in public cloud storage system A Bentajer, M Hedabou, K Abouelmehdi, S Elfezazi Procedia computer science 141, 559-564, 2018 | 33 | 2018 |
An IBE-based design for assured deletion in cloud storage A Bentajer, M Hedabou, K Abouelmehdi, Z Igarramen, S El Fezazi Cryptologia 43 (3), 254-265, 2019 | 31 | 2019 |
Classifying Arabic text using deep learning M Galal, MM Madbouly, A El-Zoghby Journal of Theoretical and Applied Information Technology 97 (23), 3412-3422, 2019 | 22 | 2019 |
Cryptographic key management issues in cloud computing A Bentajer, M Hedabou Adv. Eng. Res 34, 78-112, 2020 | 7 | 2020 |
Comparative and analysis study of biometric systems F Ennaama, K Benhida, A Boulahoual, A Bentajer, H Mustapha, ... Journal of Theoretical and Applied Information Technology 97 (12), 3466-3476, 2019 | 5 | 2019 |
Secure Cloud Key Management based on Robust Secret Sharing A Bentajer, M Hedabou, S Ennaama, A Tahiri CS and IT Conference Proceedings 11 (9), 2021 | 3 | 2021 |
TPM based design for enhanced trust in SaaS services M Hedabou, A Azougaghe, A Bentajer CS & IT Conference Proceedings 10 (5), 217-226, 2020 | 2 | 2020 |
TPM based schema for reinforcing security in IBE’s key manager Z Igarramen, A Bentajer, M Hedabou New Trends in Model and Data Engineering: MEDI 2019 International Workshops …, 2019 | 2 | 2019 |
A NEW APPROACH OF WEB ATTACKS CLASSIFICATION FOR TESTING SECURITY TOOLS AT THE APPLICATION LEVEL. K ABOUELMEHDI, A BENTAJER, N SEFIANI Journal of Theoretical & Applied Information Technology 72 (3), 2015 | 2 | 2015 |
Robust Secret Share to Reinforce the Security of IBE’s Master Key A Bentajer, Y Said, Z Igarramen, M Hedabou Advances in Information, Communication and Cybersecurity: Proceedings of …, 2022 | 1 | 2022 |
The behaviour of undrained saturated clay under cyclic loading. H Mustapha, B Ahmed | 1 | 2006 |
Development of Design for Enhancing Trust in Cloud’s SPI Stack A Bentajer, M Hedabou, F Ennaama, S Elfezazi International Journal of Computational and Experimental Science and …, 2020 | | 2020 |
A USER FRIENDLY AND IMPROVED DESIGN FOR SECURE DELETION IN CLOUD STORAGE. B AHMED, E FAOUZIA, H MUSTAPHA, E SAID Journal of Theoretical & Applied Information Technology 95 (6), 2017 | | 2017 |
AN ASSESSING APPROACH BASED ON FMECA METHODOLOGY TO EVALUATE SECURITY OF A THIRD PARTY CLOUD PROVIDER. B Ahmed, AEM Karim, D Loubna, ELF Said, H Mustapha, ... Journal of Theoretical & Applied Information Technology 74 (3), 2015 | | 2015 |
PROTECTION OF VIRTUAL MACHINE D T TPM | | 2015 |
Organisation des attaques web: classes et attributs IILESC EXISTANTES | | |
New approach to enhance security in cloud computing against internal side channel attacks A Bentajer, M Hedabou, SEL Fezazi, I Mouhib | | |