Photo

BENATTOU Mohammed

Email : mohammed.benattou@uit.ac.ma

Établissement : Faculté des sciences

Laboratoire : Recherche en Informatique

← Retour au laboratoire
📚 Publications Scopus — Total : 51
Titre Année 🔗 Voir
A Systematic Review of Deep Learning Mechanisms for Intrusion Detection Systems in Internet of Things Networks 2026 🔗 Voir
GemSP: An Ensemble Model for User Story Point Estimation Using Gemini Embeddings 2026 🔗 Voir
Enhanced intrusion detection through dual reduction and robust mean 2025 🔗 Voir
Efficient Dimensionality Reduction in Intrusion Detection Systems via Weighted Power Mean for PCA and LDA 2024 🔗 Voir
A robust intrusion detection model based on a combination of PCA-GM and trunced LDA 2023 🔗 Voir
An Automatic Truncated Mean Approach for PCA In Intrusion Detection Systems 2023 🔗 Voir
A truncated mean ℓp-LDA approach for intrusion detection system 2021 🔗 Voir
Formal Model of Conformity Analysis Method of Java Bytecode Programs annotated with BML Specifications 2021 🔗 Voir
Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks 2019 🔗 Voir
A cyber network attack detection based on GM Median Nearest Neighbors LDA 2019 🔗 Voir
Improve R2L attack detection using trimmed PCA 2019 🔗 Voir
Toward a personalized learning path through a services-oriented approach 2019 🔗 Voir
Constraint Based Testing and Verification of Java Bytecode Programs 2018 🔗 Voir
Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs 2018 🔗 Voir
Toward a Constraint Based Test Case Generation of Parallel BPEL Process 2018 🔗 Voir
When time meets test 2018 🔗 Voir
An effective network intrusion detection based on truncated mean LDA 2018 🔗 Voir
Combination of R1-PCA and median LDA for anomaly network detection 2017 🔗 Voir
Test case generation for Java Bytecode programs annotated with BML specifications 2017 🔗 Voir
A median nearest neighbors LDA for anomaly network detection 2017 🔗 Voir
Individualized learning path through a services-oriented approach 2017 🔗 Voir
Implementation of bit error rate model of 16-QAM in aqua-sim simulator for underwater sensor networks 2017 🔗 Voir
An effective cyber attack detection system based on an improved OMPCA 2017 🔗 Voir
A proposed system for learning paths personalization using learners profiles 2017 🔗 Voir
New greedy forwarding strategy for UWSNs geographic routing protocols 2016 🔗 Voir
Network intrusion detection system using L1-norm PCA 2016 🔗 Voir
Intrusion detection system using PCA and kernel PCA methods 2016 🔗 Voir
Topology control through depth adjustment and transmission power control for UWSN routing protocols 2016 🔗 Voir
Intrusion detection system using PCA and kernel PCA methods 2016 🔗 Voir
Individualization of pedagogical paths via traces analysis 2016 🔗 Voir
Network intrusion detection system using PCA by Lp-norm maximization based on conjugate gradient 2016 🔗 Voir
Performance analysis of coding using distributed Turbo codes 2015 🔗 Voir
A temporal agent based approach for testing open distributed systems 2015 🔗 Voir
Generating control flow graph from Java card byte code 2015 🔗 Voir
A JESS AGENT based architecture for testing distributed systems 2014 🔗 Voir
Contention Window MAC parameters tyning for wireless multimedia Sensor Networks 2013 🔗 Voir
A formal model of conformity testing of inheritance for object oriented constraint programming 2013 🔗 Voir
An expert system based architecture for testing distributed systems 2013 🔗 Voir
A based rules approach for distributed test 2013 🔗 Voir
A formal model of similarity testing for inheritance in object-oriented software 2012 🔗 Voir
MAC queue size and energy-efficient of IEEE 802.11e EDCA in Wireless Multimedia Sensor Networks 2012 🔗 Voir
Energy-efficient MAC protocol based on IEEE 802.11e for Wireless Multimedia Sensor Networks 2012 🔗 Voir
A rule-based multi-agent system for testing distributed applications 2012 🔗 Voir
Similarity testing by proof and analysis of partition for object oriented specifications 2012 🔗 Voir
Test execution control with timing constraints for testing distributed systems 2012 🔗 Voir
A multi-agent based architecture for distributed testing 2006 🔗 Voir
Intelligent agents for distributed intrusion detection system 2005 🔗 Voir
Mobile agents community for distributed intrusion detection systems 2005 🔗 Voir
Active objects for coordination in distributed testing 2002 🔗 Voir
Incremental inheritance mechanism and its message evaluation method 1997 🔗 Voir
Incremental inheritance model for an OODBMS 1997 🔗 Voir