Photo

SAADI Chaimae

Email : Chaimae.saadi@uit.ac.ma

Établissement : Ecole Supérieure de Technologie

Laboratoire : Recherche Scientifique et Innovation

← Retour au laboratoire
📚 Publications Scopus — Total : 25
Titre Année 🔗 Voir
Chain-of-Thought Augmented Fine‑Tuning of a Distilled Llama‑8B Model for SIEM Detection Query Generation 2025 🔗 Voir
Enhanced Network Security by Implementing SDN and NFV and New Routing Algorithm 2025 🔗 Voir
Assessing Tourism Prediction Models: A Comparative Study of SARIMA, Random Forest, and LSTM, Considering Nonlinear Trends and the Influence of COVID-19 2024 🔗 Voir
Evolving Security for 6G: Integrating Software-Defined Networking and Network Function Virtualization into Next-Generation Architectures 2024 🔗 Voir
A Novel Hybrid Approach for Daily Tourism Arrival Forecasting: The PROPHET-Bayesian Gaussian Process-Forward Neural Network Model 2023 🔗 Voir
Tourism in Singapore, prediction model using SARIMA and PROPHET 2023 🔗 Voir
Detecting Unconventional and Malicious Windows Authentication Activities Through Statistical Rarity Assessment 2023 🔗 Voir
Design of A Distributed Intrusion Detection System for Streaming Data in IoT Environments 2023 🔗 Voir
SDN/NFV Security Challenges and Proposed Architecture 2023 🔗 Voir
Ensuring the Integrity of Cloud Computing Against Account Hijacking Using Blockchain Technology 2022 🔗 Voir
Improved IOT/SDN Architecture with the Concept of NFV 2022 🔗 Voir
Performance of OpenFIow-based SDN on IoT network 2022 🔗 Voir
Performance of OpenFlow-based SDN on IoT network 2022 🔗 Voir
Advanced Exploratory Data Analysis for Moroccan Shopping Places in TripAdvisor 2022 🔗 Voir
Named Entity Recognition applied on Moroccan tourism corpus 2021 🔗 Voir
Ensuring High Availability of Private Cloud Services by Integrating the Ipv6 Protocol 2020 🔗 Voir
Runtime API Signature for Fileless Malware Detection 2020 🔗 Voir
Proposed security by IDS-AM in Android system 2019 🔗 Voir
Security Measures Assessment for Big Data Management Systems 2019 🔗 Voir
A proposed approach to reduce the vulnerability in a cloud system 2018 🔗 Voir
A new approach to mitigate security threats in cloud environment 2017 🔗 Voir
Intrusion detection system based interaction on mobile agents and clust-density algorithm 'IDS-AM-Clust' 2016 🔗 Voir
Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb 2016 🔗 Voir
Contribution to abnormality detection by use of clust-density algorithm 2015 🔗 Voir
New architecture of IDS based interaction on mobile agents and data mining 2015 🔗 Voir