Photo

CHAOUI Habiba

Email : habiba.chaoui@uit.ac.ma

Établissement : Ecole Supérieure de Technologie

Laboratoire : Recherche Scientifique et Innovation

← Retour au laboratoire
📚 Publications Scopus — Total : 83
Titre Année 🔗 Voir
Chain-of-Thought Augmented Fine‑Tuning of a Distilled Llama‑8B Model for SIEM Detection Query Generation 2025 🔗 Voir
Predictive Analytics Leveraging a Machine Learning Approach to Identify Students’ Reasons for Dropping out of University 2025 🔗 Voir
Global Research Trends in AI and Blockchain for Smart Grids: A Bibliometric Analysis with a Focus on Morocco (2014–2024) 2025 🔗 Voir
Enhanced Network Security by Implementing SDN and NFV and New Routing Algorithm 2025 🔗 Voir
ENHANCING IOT SECURITY WITH MACHINE LEARNING: A RANDOM FOREST-BASED APPROACH FOR CYBER-ATTACK DETECTION 2025 🔗 Voir
Analyzing the Attributes of the Moroccan Educational System: A Phase Prior to the Establishment of a Smart Classroom Based on IoT 2025 🔗 Voir
Empowering Healthcare: TinyML for Precise Lung Disease Classification 2024 🔗 Voir
PROPOSED SMART UNIVERSITY MODEL: THE INTEGRATION OF IOT AND FUZZY LOGIC IN SMART CLASSROOM FOR OPTIMIZING THERMAL COMFORT 2024 🔗 Voir
A Systematic Review of Blockchain Applications in Pharmaceutical Supply Chain Traceability and Security 2024 🔗 Voir
Evolving Security for 6G: Integrating Software-Defined Networking and Network Function Virtualization into Next-Generation Architectures 2024 🔗 Voir
Unveiling Blockchain Security and Resilience in the Quantum Age: An Analytical Study of Post-Quantum and Quantum Approaches 2024 🔗 Voir
Enhancing Identity Security in the Metaverse: Solutions Using AI, Blockchain, and NFTs 2024 🔗 Voir
Anomaly-Based Intrusion Detection System To Detect Advanced Persistent Threats: Environmental Sustainability 2023 🔗 Voir
Detecting Unconventional and Malicious Windows Authentication Activities Through Statistical Rarity Assessment 2023 🔗 Voir
Design of A Distributed Intrusion Detection System for Streaming Data in IoT Environments 2023 🔗 Voir
SDN/NFV Security Challenges and Proposed Architecture 2023 🔗 Voir
Enhancing Mobile Security: A Systematic Review of AI and Blockchain Integration Strategies for Effective Analysis 2023 🔗 Voir
Using Clustering Methods to Detect the Revealed Preferences of Moroccans towards the Electric Vehicles: Latent Class Analysis (LCA) and K-Modes Algorithm (K-MA) 2022 🔗 Voir
Advanced IoT Network Topologies to Optimize Medical Monitoring Platforms based on a Constrained and Secured IOT Application Protocol CoAP 2022 🔗 Voir
Performance of OpenFIow-based SDN on IoT network 2022 🔗 Voir
Performance of OpenFlow-based SDN on IoT network 2022 🔗 Voir
Improved IOT/SDN Architecture with the Concept of NFV 2022 🔗 Voir
Challenges and future directions for security and privacy in vehicular fog computing 2022 🔗 Voir
IoT Security in Smart University Systems 2022 🔗 Voir
Applying Advanced Wireless Network Cluster-Tree Topology to Optimize Covid-19 Sanitary Passport Blockchain-Based Security in a Constrained IoT Platform 2022 🔗 Voir
Applying Advanced IoT Network Topologies to Optimize COVID-19 Sanitary Passport Platform Based on CoAP Protocol 2022 🔗 Voir
Applying Lightweight Elliptic Curve Cryptography ECC to Smart Energy IoT Platforms Based on the CoAP Protocol 2022 🔗 Voir
Applying an Enhanced Elliptic Curve Integrated Encryption Scheme ECIES to Enhance Smart Energy IoT Platform Security Based on Constrained Protocol 2022 🔗 Voir
Engaging students to fill surveys using chatbots: University case study 2021 🔗 Voir
Proposal architecture based on Fog Computing allowing real-time analysis in Smart Cities 2021 🔗 Voir
Statistical Study and Intelligent Classroom Proposal Adapted to Students with Speech and Hearing Disabilities 2021 🔗 Voir
An Advanced Encryption Cryptographically-Based Securing Applicative Protocols MQTT and CoAP to Optimize Medical-IOT Supervising Platforms 2021 🔗 Voir
An Optimized Security Vehicular Internet of Things -IoT-Application Layer Protocols MQTT and COAP Based on Cryptographic Elliptic-Curve 2020 🔗 Voir
Ensuring High Availability of Private Cloud Services by Integrating the Ipv6 Protocol 2020 🔗 Voir
Parallel processing using big data and machine learning techniques for intrusion detection 2020 🔗 Voir
Network Traffic Analysis using Big Data and Deep Learning Techniques 2020 🔗 Voir
Runtime API Signature for Fileless Malware Detection 2020 🔗 Voir
Big Data for Internet of Things: A Survey on IoT Frameworks and Platforms 2020 🔗 Voir
Comparative and Analytical Study of Big Data Technologies: A Survey 2020 🔗 Voir
LSTM deep learning method for network intrusion detection system 2020 🔗 Voir
The Integrity of Encryption Keys of European Train Control System Sessions during an Offline Loading 2019 🔗 Voir
Ontology and Semantic Web in Logistic Applications: State of the Art 2019 🔗 Voir
Social network’s security related to healthcare 2019 🔗 Voir
Proposed security by IDS-AM in Android system 2019 🔗 Voir
Security Measures Assessment for Big Data Management Systems 2019 🔗 Voir
Teaching android mobile security 2019 🔗 Voir
A honey net, big data and RNN architecture for automatic security monitoring of information system 2019 🔗 Voir
A machine learning approach: Using predictive analytics to identify and analyze high risks patients with heart disease 2019 🔗 Voir
AES-Present: A new secure IoT-based scheme for Telemedicine and E-Health systems 2018 🔗 Voir
XxTEA-VCLOUD:A security scheme for the vehicular cloud network using a lightweight encryption algorithm 2018 🔗 Voir
Copyright protection in the external private cloud using a multi-agent system and Chebyshev polynomials 2018 🔗 Voir
Recognition based mechanism to detect malicious content in social networks 2018 🔗 Voir
A proposed approach to reduce the vulnerability in a cloud system 2018 🔗 Voir
A novel evolutionary model for improving big data security 2018 🔗 Voir
Big data security proposed solution 2018 🔗 Voir
Improving software automation testing using Jenkins, and machine learning under big data 2018 🔗 Voir
Access control in IoT environments: Feasible scenarios 2018 🔗 Voir
Security against malicious node in the vehicular cloud computing using a software-defined networking architecture 2017 🔗 Voir
Detecting malicious users in social network via collaborative filtering 2017 🔗 Voir
A new approach to mitigate security threats in cloud environment 2017 🔗 Voir
A new secure model for the use of cloud computing in big data analytics 2017 🔗 Voir
Real time processing technologies in big data: Comparative study 2017 🔗 Voir
A security approach based on honeypots: Protecting Online Social network from malicious profiles 2017 🔗 Voir
Application of wireless networks and optical network to NextGen aircrafts 2016 🔗 Voir
What can cause big data being slow? 2016 🔗 Voir
Intrusion detection system based interaction on mobile agents and clust-density algorithm 'IDS-AM-Clust' 2016 🔗 Voir
A security scheme for mobile cloud using multi-agents system 2016 🔗 Voir
Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb 2016 🔗 Voir
A Novel Strong Password Generator for Improving Cloud Authentication 2016 🔗 Voir
A Robust Authentication Scheme for Telecare Medicine Information System 2016 🔗 Voir
Contribution to abnormality detection by use of clust-density algorithm 2015 🔗 Voir
An efficient framework for enhancing user authentication in cloud storage using digital watermark 2015 🔗 Voir
Big data privacy in healthcare moroccan context 2015 🔗 Voir
Out-of-band authentication using image-based one time password in the cloud environment 2015 🔗 Voir
New architecture of IDS based interaction on mobile agents and data mining 2015 🔗 Voir
Big data analysis and query optimization improve hadoop DB performance 2014 🔗 Voir
Stability of the singular discrete time system in the sense of componentwise approach using Drazin inverse theory 2009 🔗 Voir
Data warehouse and the deployment of data mining process to make decision for Leishmaniasis and development of mathematical models for phlebotomine sandflies seasonality in Marrakech city 2009 🔗 Voir
Development of data warehouse for Leishmaniasis and deployment of data mining process to make decision 2009 🔗 Voir
Componentwise stability of the singular discrete time system using the methodology of the Drazin inverse 2009 🔗 Voir
Generalized componentwise stability of non-stationary continuous-time systems with constrained control 2005 🔗 Voir
A robust model reference adaptive control for nonminimum phase systems 2001 🔗 Voir
Robust direct adaptive predictive control based on Laguerre series representation 2000 🔗 Voir