CHOUGDALI Khalid
Email : khalid.chougdali@uit.ac.ma
Institution : National School of Applied Sciences
Laboratory :
📚 Scopus Publications — Total : 77
| Title | Year | 🔗 View |
|---|---|---|
| A Novel Machine Learning-Based Approach for the Automatic Detection of Malware in PE Files | 2026 | 🔗 View |
| Multi-Zone DAG Blockchain with Integrated Zero Trust Security for IoT Data Protection | 2026 | 🔗 View |
| An Enhanced Machine Learning Framework for Network Anomaly Detection | 2025 | 🔗 View |
| YoloMal-XAI: Interpretable Android Malware Classification Using RGB Images and YOLO11 | 2025 | 🔗 View |
| AI-Driven Security for Blockchain-Based Smart Contracts: A GAN-Assisted Deep Learning Approach to Malware Detection | 2025 | 🔗 View |
| Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger | 2025 | 🔗 View |
| Firmware Attestation in IoT Swarms Using Relational Graph Neural Networks and Static Random Access Memory | 2025 | 🔗 View |
| Classifying IoT firmware security threats using image analysis and deep learning | 2025 | 🔗 View |
| Firmware Extraction Methods for IoT Devices: An Overview | 2025 | 🔗 View |
| Android Malware Detection Through CNN Ensemble Learning on Grayscale Images | 2025 | 🔗 View |
| Image-Based Approach for Android Malware Detection Using APK Component Fusion and Deep Learning | 2025 | 🔗 View |
| IOTA-Assisted Self-Sovereign Identity Framework for Decentralized Authentication and Secure Data Sharing | 2025 | 🔗 View |
| Integrating Blockchain and Smart Card Technologies for Secure Healthcare Data Management | 2025 | 🔗 View |
| Enhancing Cybersecurity with Deep Learning: A Study on Intrusion Detection Systems | 2025 | 🔗 View |
| SAE-EDA: Sparse AutoEncoder-Based Feature Extraction and Exponential Discriminant Analysis for Robust Face Recognition | 2025 | 🔗 View |
| Enhanced YOLOv8 Ship Detection Empower Unmanned Surface Vehicles for Advanced Maritime Surveillance | 2024 | 🔗 View |
| Advancing malware classification with hybrid deep learning: A comprehensive analysis using densenet and LSTM | 2024 | 🔗 View |
| A Survey on IOTA Based Technology for Enhanced IoT Security | 2024 | 🔗 View |
| Ensemble Learning Approaches for Enhanced Internet of Things Cyberattacks Detection: a Comparative Study | 2024 | 🔗 View |
| On Reviewing the NTFS Time Information Forgery and Detection | 2024 | 🔗 View |
| Privacy-Preserving and Access Control Scheme for IoT-Based Healthcare Systems Using Ethereum Blockchain | 2024 | 🔗 View |
| Face recognition using Nuclear Norm-based Angle Two-Dimensional Principal Component Analysis | 2024 | 🔗 View |
| Blockchain Based Smart Contract to Enhance Security in Smart City | 2024 | 🔗 View |
| Intrusion Detection System using Transformer Encoder and CNN-BiLSTM in Software-Defined Networks | 2024 | 🔗 View |
| Exploring the Impact of PCA Variants on Intrusion Detection System Performance | 2024 | 🔗 View |
| Blockchain-Enabled Defense Mechanism for Protecting Federated Learning Systems Against Malicious Node Updates | 2024 | 🔗 View |
| Plant Disease Recognition: A Comprehensive Mini Review | 2024 | 🔗 View |
| Reinforcement Learning for Optimized Resource Allocation in 5G URLLC | 2024 | 🔗 View |
| Blockchain Framework Tailored for Agricultural IoTs | 2024 | 🔗 View |
| Face Recognition Based on Fuzzy Connective Fusion of SVD and RWLDA Algorithms | 2024 | 🔗 View |
| Internet of Things Systems Security Based on the Physical Objects: An overview | 2023 | 🔗 View |
| Enhancing Forensic Analysis Using a Machine Learning-based Approach | 2023 | 🔗 View |
| A survey on Machine Learning for IoT Trust Management | 2023 | 🔗 View |
| Hybrid intrusion detection system based on Random forest, decision tree and Multilayer Perceptron (MLP) algorithms | 2023 | 🔗 View |
| An Approach for intrusion detection using machine learning algorithms | 2023 | 🔗 View |
| Improving IoT Botnet Detection Using Ensemble Learning | 2023 | 🔗 View |
| A New Intrusion Detection System Based on Convolutional Neural Network | 2023 | 🔗 View |
| Improved Fusion of SVD and Relevance Weighted LDA Algorithms via Symmetric Sum‑Based Rules for Face Recognition | 2023 | 🔗 View |
| SSHCEth: Secure Smart Home Communications based on Ethereum Blockchain and Smart Contract | 2023 | 🔗 View |
| Real-Time Anomaly Detection in SDN Architecture Using Integrated SIEM and Machine Learning for Enhancing Network Security | 2023 | 🔗 View |
| Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis | 2023 | 🔗 View |
| Network intrusion detection using Machine Learning approach | 2022 | 🔗 View |
| Automatic Forensic Imaging of a Virtual USB Device with Emulated User Interaction | 2022 | 🔗 View |
| Impact of security and privacy risks on the adoption of IoT: A state of the art | 2022 | 🔗 View |
| Security of Internet Of Things Using Machine Learning | 2022 | 🔗 View |
| LWKPCA: A New Robust Method for Face Recognition Under Adverse Conditions | 2022 | 🔗 View |
| Detection of suspicious timestamps in NTFS using volume shadow copies | 2021 | 🔗 View |
| File Slack Handling Tool | 2021 | 🔗 View |
| A new efficient model of quantum image cryptography based on sampled GNEQR storage presentation | 2021 | 🔗 View |
| Robust face recognition based on a new Kernel-PCA using RRQR factorization | 2021 | 🔗 View |
| DeepWTPCA-L1: A New Deep Face Recognition Model Based on WTPCA-L1 Norm Features | 2021 | 🔗 View |
| Fuzzy ℓ2, p-norm based PCA for intrusion detection system | 2020 | 🔗 View |
| Nonlinear ℓ2,p-norm based PCA for anomaly network detection | 2020 | 🔗 View |
| Improved nonlinear fuzzy robust PCA for Anomaly-based intrusion detection | 2020 | 🔗 View |
| Detection of timestamps tampering in ntfs using machine | 2019 | 🔗 View |
| Energy-efficient associations for IoT networks with UAV: A regret matching based approach | 2019 | 🔗 View |
| Face Recognition using Wavelets based Feature Extraction and PCA-L1 norm | 2019 | 🔗 View |
| Social Big Data Mining Framework for Extremist Content Detection in Social Networks | 2019 | 🔗 View |
| Combination of OMPCA and LDA for Anomaly Network Detection | 2019 | 🔗 View |
| New fusion of SVD and Relevance Weighted LDA for face recognition | 2019 | 🔗 View |
| A Network Intrusion Detection Based on Improved Nonlinear Fuzzy Robust PCA | 2018 | 🔗 View |
| An effective network intrusion detection based on truncated mean LDA | 2018 | 🔗 View |
| Combination of R1-PCA and median LDA for anomaly network detection | 2017 | 🔗 View |
| Identifying intrusions in computer networks using robust fuzzy PCA | 2017 | 🔗 View |
| Intrusion detection system using PCA and Fuzzy PCA techniques | 2017 | 🔗 View |
| A median nearest neighbors LDA for anomaly network detection | 2017 | 🔗 View |
| An effective cyber attack detection system based on an improved OMPCA | 2017 | 🔗 View |
| Network intrusion detection system using L1-norm PCA | 2016 | 🔗 View |
| Network intrusion detection system based on Direct LDA | 2016 | 🔗 View |
| Intrusion detection system using PCA and kernel PCA methods | 2016 | 🔗 View |
| Intrusion detection system using PCA and kernel PCA methods | 2016 | 🔗 View |
| Network intrusion detection system using PCA by Lp-norm maximization based on conjugate gradient | 2016 | 🔗 View |
| Kernel relevance weighted discriminant analysis for face recognition | 2010 | 🔗 View |
| Contourlet feature based kernel relevance weighted discriminant analysis for face recognition | 2009 | 🔗 View |
| Fuzzy linear and nonlinear discriminant analysis algorithms for face recognition | 2009 | 🔗 View |
| Kernel weighted scatter-difference-based discriminant analysis for face recognition | 2008 | 🔗 View |
| Using wavelets based feature extraction and relevance weighted LDA for face recognition | 2007 | 🔗 View |
