A novel hierarchical intrusion detection system based on decision tree and rules-based models A Ahmim, L Maglaras, MA Ferrag, M Derdour, H Janicke 2019 15th International Conference on Distributed Computing in Sensor …, 2019 | 298 | 2019 |
Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks MA Ferrag, L Maglaras, A Ahmim, M Derdour, H Janicke Future internet 12 (3), 44, 2020 | 208 | 2020 |
Privacy-preserving schemes for ad hoc social networks: A survey MA Ferrag, L Maglaras, A Ahmim IEEE Communications Surveys & Tutorials 19 (4), 3015-3045, 2017 | 150 | 2017 |
An intrusion detection system based on combining probability predictions of a tree of classifiers A Ahmim, M Derdour, MA Ferrag International Journal of Communication Systems 31 (9), e3547, 2018 | 78 | 2018 |
ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network MA Ferrag, A Ahmim Telecommunication Systems 66 (3), 481-503, 2017 | 35 | 2017 |
A detailed analysis of using supervised machine learning for intrusion detection A Ahmim, MA Ferrag, L Maglaras, M Derdour, H Janicke Strategic Innovative Marketing and Tourism: 8th ICSIMAT, Northern Aegean …, 2020 | 26 | 2020 |
Security solutions and applied cryptography in smart grid communications MA Ferrag, A Ahmim IGI Global, 2016 | 24 | 2016 |
Distributed denial of service attack detection for the Internet of Things using hybrid deep learning model A Ahmim, F Maazouzi, M Ahmim, S Namane, IB Dhaou IEEE Access 11, 119862-119875, 2023 | 21 | 2023 |
A new adaptive intrusion detection system based on the intersection of two different classifiers A Ahmim, N Ghoualmi–Zine International Journal of Security and Networks 9 (3), 125-132, 2014 | 21 | 2014 |
Intrusion Detection using Data Mining: A contemporary comparative study I Bouteraa, M Derdour, A Ahmim 2018 3rd International Conference on Pattern Analysis and Intelligent …, 2018 | 17 | 2018 |
Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV” I Ahmim, N Ghoualmi-Zine, A Ahmim, M Ahmim International Journal of Information Security 21 (5), 1019-1026, 2022 | 16 | 2022 |
A new hierarchical intrusion detection system based on a binary tree of classifiers A Ahmim, N Ghoualmi Zine Information & Computer Security 23 (1), 31-57, 2015 | 16 | 2015 |
Vehicular-cloud simulation framework for predicting traffic flow data S Abdelatif, D Makhlouf, A Ahmim, P Roose International Journal of Internet Technology and Secured Transactions 10 (1 …, 2020 | 13 | 2020 |
A new fast and high performance intrusion detection system A Ahmim, N Ghoualmi-Zine International Journal of Security and Its Applications 7 (5), 67-80, 2013 | 13 | 2013 |
Intrusion detection using classification techniques: a comparative study I Bouteraa, M Derdour, A Ahmim International Journal of Data Mining, Modelling and Management 12 (1), 65-86, 2020 | 10 | 2020 |
6g-secureids: Blockchain-enhanced secure knowledge transfer for distributed intrusion detection systems in advanced networks S Sakraoui, M Derdour, A Ahmim 2023 International Conference on Networking and Advanced Systems (ICNAS), 1-6, 2023 | 6 | 2023 |
Taxonomy of supervised machine learning for intrusion detection systems A Ahmim, MA Ferrag, L Maglaras, M Derdour, H Janicke, G Drivas Strategic Innovative Marketing and Tourism: 8th ICSIMAT, Northern Aegean …, 2020 | 6 | 2020 |
Système de détection d’intrusion adaptatif et distribué A Ahmim Thèse de doct. Université Badji Mokhtar Annaba, 2014 | 6 | 2014 |
Improved off-line intrusion detection using a genetic algorithm and RMI A AHMIM, N GHOUALMI, N KAHYA International Journal of Advanced Computer Science and Applications 2 (1), 2011 | 6 | 2011 |
ESIKE: An Efficient and Secure Internet Key Exchange Protocol M Ahmim, A Ahmim, MA Ferrag, et al. Wireless Personal Communications, 2022 | 1 | 2022 |