Photo

IBRAHIMI Khalil

Email : ibrahimi.khalil@uit.ac.ma

Établissement : Faculté des sciences

Laboratoire : Recherche en Informatique

← Retour au laboratoire
📚 Publications Scopus — Total : 71
Titre Année 🔗 Voir
Decentralized Oracles with Threshold Signatures : A Discrete Public Goods Game Model 2025 🔗 Voir
BIVO - A Decentralized Oracle Solution for Data Authenticity in Blockchain-Based IoT Networks 2025 🔗 Voir
Classification of Mammography Images Based on Multifractal Analysis of BIMFs 2025 🔗 Voir
IoT Intrusion Detection Using Machine Learning Classifiers and PCA Dimensionality Reduction for N-BaIoT Dataset 2025 🔗 Voir
Selection of the Discriming Feature Using the BEMD’s BIMF for Classification of Breast Cancer Mammography Image † 2024 🔗 Voir
Fencing Sport Strategy Using Game Theory 2024 🔗 Voir
Intrusion Detection Systems for the Internet of Things Network: Survey on Rare Attacks 2024 🔗 Voir
Enhancing Intrusion Detection Systems Using Machine Learning Classifiers on the CSE-CIC-IDS2018 Dataset 2024 🔗 Voir
Crowdsourcing: Modeling Techniques and Comprehensive Studies 2024 🔗 Voir
Efficient Intrusion Detection: Combining X2Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset 2024 🔗 Voir
Enhanced Intrusion Detection System for Multiclass Classification in UAV Networks 2024 🔗 Voir
Osteoporosis Classification Using Multifractal Features and Neighbourhood Determination of Extrema for BMED 2024 🔗 Voir
The 11th International Conference on Wireless Networks and Mobile Communications; (WINCOM 2024) 2024 🔗 Voir
Deep Learning-Based Traffic Banner Recognition for Enhanced Road Safety in Autonomous Vehicles 2024 🔗 Voir
Algebraic Construction of Non-Primitive BCH Codes on GF(2m) with Minimum Distance Checking for Degrees up to 10 2024 🔗 Voir
Reinforcement Learning for Optimized Resource Allocation in 5G URLLC 2024 🔗 Voir
Secure and Privacy-Preserving E-mobility Service Based on Blockchain and Hybrid Smart Contracts 2023 🔗 Voir
Recent Advances in Data Intensive Applications: Survey 2023 🔗 Voir
IA Applied to IIoT Intrusion Detection: An Overview 2023 🔗 Voir
A Complete Transmitted Message in DTNs with a Stable Coalition in Dynamic Structures 2023 🔗 Voir
Deep Reinforcement Learning-Based Energy Efficiency Optimization for Flying LoRa Gateways 2023 🔗 Voir
Improvement of Anomaly Detection System in the IoT Networks using CNN-LSTM Approach 2023 🔗 Voir
Conditional Generative Adversarial Networks for Rx-to-Tx Translation in Wireless Communication Systems 2023 🔗 Voir
Fractal analysis to BEMD's IMFs: Application CT-Scan 2023 🔗 Voir
Neighborhood Feature Extraction and Haralick Attributes for Medical Image Analysis: Application to Breast Cancer Mammography Image 2023 🔗 Voir
Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks 2022 🔗 Voir
Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game 2022 🔗 Voir
BDREA Betta and Dolphin Pods Routing via Energy Scarcity Aware Protocol for Underwater Acoustic Wireless Sensor Networks (UAWSNs) 2022 🔗 Voir
Improving the IDS for BoT-IoT Dataset-Based Machine Learning Classifiers 2022 🔗 Voir
Analysis of Blockchain Selfish Mining: a Stochastic Game Approach 2022 🔗 Voir
Adversarial Attacks Against IoT Networks using Conditional GAN based Learning 2022 🔗 Voir
Fractal analysis segmentation of medical images: Application to breast cancer mammography image 2022 🔗 Voir
Decentralized Autonomous Underwater Vehicles Distribution for IPv6-UWSN: A Study with Heuristic Methods 2021 🔗 Voir
Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach 2021 🔗 Voir
Hybrid-ARQ Protocols using Iterative Threshold Decoding of OSMLD Product Codes 2021 🔗 Voir
A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies 2020 🔗 Voir
Foreword 2020 🔗 Voir
A deep reinforcement learning based intrusion detection system (drl-ids) for securing wireless sensor networks and internet of things 2020 🔗 Voir
A Framework to Secure Cluster-Header Decision in Wireless Sensor Network Using Blockchain 2020 🔗 Voir
Model to improve the forecast of the content caching based time-series analysis at the small base station 2019 🔗 Voir
Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks 2019 🔗 Voir
Underwater Wireless Sensor Networks: A Survey on Enabling Technologies, Localization Protocols, and Internet of Underwater Things 2019 🔗 Voir
Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN 2018 🔗 Voir
Game Model for Dynamic Cell Association of Macro-User in Two-Tier Cellular Networks 2018 🔗 Voir
MAC Protocol-Based Depth Adjustment and Splitting Mechanism for UnderWater Sensor Network (UWSN) 2018 🔗 Voir
Access and Sharing Contents Through the Social Network: A POMDP Approach 2017 🔗 Voir
Mobility management schemes for real-time traffic and resource allocation in IEEE 802.16e mobile network 2017 🔗 Voir
Foreword 2017 🔗 Voir
Prediction of the content popularity in the 5G network: Auto-regressive, moving-average and exponential smoothing approaches 2017 🔗 Voir
Management of intrusion detection systems based-KDD99: Analysis with LDA and PCA 2017 🔗 Voir
Implementation of bit error rate model of 16-QAM in aqua-sim simulator for underwater sensor networks 2017 🔗 Voir
Best association of macro user in two-tier cellular networks 2017 🔗 Voir
A new data forwarding scheme for DTNs based on coalition game 2017 🔗 Voir
Detection and identification of attacks in Vehicular Ad-Hoc NETwork 2016 🔗 Voir
New greedy forwarding strategy for UWSNs geographic routing protocols 2016 🔗 Voir
Topology control through depth adjustment and transmission power control for UWSN routing protocols 2016 🔗 Voir
Learning gain mechanism to promote the femtocells hybrid access mode 2015 🔗 Voir
A distributed open-close access for Small-Cell networks: A random matrix game analysis 2015 🔗 Voir
A combined throughput and hierarchical strategies for medium access in wireless network 2015 🔗 Voir
Optimizing diffusion time of the content through the social networks: Stochastic learning game 2015 🔗 Voir
Inferring trust relationships in the social network: Evidence theory approach 2014 🔗 Voir
Signaling game-based approach to power control management in wireless networks 2013 🔗 Voir
Energy, QoS and bursts profile management in uplink IEEE 802.16e mobile WiMAX networks 2013 🔗 Voir
Dynamic spectrum allocation with admission control based on cognitive radio for QoS support in multiple wireless network 2012 🔗 Voir
Dynamic spectrum allocation based on cognitive radio for QoS support 2010 🔗 Voir
Mobility management and call admission control for IEEE802.16e wireless networks 2010 🔗 Voir
The uplink capacity evaluation of wireless networks: Spectral analysis approach 2010 🔗 Voir
Adaptive modulation and coding scheme with intra- and inter-cell mobility for HSDPA system 2009 🔗 Voir
IEEE802.16 multi-class capacity including AMC scheme and QoS differentiation for initial and bandwidth request ranging 2008 🔗 Voir
Uplink call admission control in multi-services W-CDMA network 2008 🔗 Voir
Capacity evaluation of multi-service W-CDMA: A spectral analysis approach 2007 🔗 Voir