Photo

CHOUGDALI Khalid

Email : khalid.chougdali@uit.ac.ma

Institution : National School of Applied Sciences

Laboratory :

📚 Scopus Publications — Total : 77
Title Year 🔗 View
A Novel Machine Learning-Based Approach for the Automatic Detection of Malware in PE Files 2026 🔗 View
Multi-Zone DAG Blockchain with Integrated Zero Trust Security for IoT Data Protection 2026 🔗 View
An Enhanced Machine Learning Framework for Network Anomaly Detection 2025 🔗 View
YoloMal-XAI: Interpretable Android Malware Classification Using RGB Images and YOLO11 2025 🔗 View
AI-Driven Security for Blockchain-Based Smart Contracts: A GAN-Assisted Deep Learning Approach to Malware Detection 2025 🔗 View
Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger 2025 🔗 View
Firmware Attestation in IoT Swarms Using Relational Graph Neural Networks and Static Random Access Memory 2025 🔗 View
Classifying IoT firmware security threats using image analysis and deep learning 2025 🔗 View
Firmware Extraction Methods for IoT Devices: An Overview 2025 🔗 View
Android Malware Detection Through CNN Ensemble Learning on Grayscale Images 2025 🔗 View
Image-Based Approach for Android Malware Detection Using APK Component Fusion and Deep Learning 2025 🔗 View
IOTA-Assisted Self-Sovereign Identity Framework for Decentralized Authentication and Secure Data Sharing 2025 🔗 View
Integrating Blockchain and Smart Card Technologies for Secure Healthcare Data Management 2025 🔗 View
Enhancing Cybersecurity with Deep Learning: A Study on Intrusion Detection Systems 2025 🔗 View
SAE-EDA: Sparse AutoEncoder-Based Feature Extraction and Exponential Discriminant Analysis for Robust Face Recognition 2025 🔗 View
Enhanced YOLOv8 Ship Detection Empower Unmanned Surface Vehicles for Advanced Maritime Surveillance 2024 🔗 View
Advancing malware classification with hybrid deep learning: A comprehensive analysis using densenet and LSTM 2024 🔗 View
A Survey on IOTA Based Technology for Enhanced IoT Security 2024 🔗 View
Ensemble Learning Approaches for Enhanced Internet of Things Cyberattacks Detection: a Comparative Study 2024 🔗 View
On Reviewing the NTFS Time Information Forgery and Detection 2024 🔗 View
Privacy-Preserving and Access Control Scheme for IoT-Based Healthcare Systems Using Ethereum Blockchain 2024 🔗 View
Face recognition using Nuclear Norm-based Angle Two-Dimensional Principal Component Analysis 2024 🔗 View
Blockchain Based Smart Contract to Enhance Security in Smart City 2024 🔗 View
Intrusion Detection System using Transformer Encoder and CNN-BiLSTM in Software-Defined Networks 2024 🔗 View
Exploring the Impact of PCA Variants on Intrusion Detection System Performance 2024 🔗 View
Blockchain-Enabled Defense Mechanism for Protecting Federated Learning Systems Against Malicious Node Updates 2024 🔗 View
Plant Disease Recognition: A Comprehensive Mini Review 2024 🔗 View
Reinforcement Learning for Optimized Resource Allocation in 5G URLLC 2024 🔗 View
Blockchain Framework Tailored for Agricultural IoTs 2024 🔗 View
Face Recognition Based on Fuzzy Connective Fusion of SVD and RWLDA Algorithms 2024 🔗 View
Internet of Things Systems Security Based on the Physical Objects: An overview 2023 🔗 View
Enhancing Forensic Analysis Using a Machine Learning-based Approach 2023 🔗 View
A survey on Machine Learning for IoT Trust Management 2023 🔗 View
Hybrid intrusion detection system based on Random forest, decision tree and Multilayer Perceptron (MLP) algorithms 2023 🔗 View
An Approach for intrusion detection using machine learning algorithms 2023 🔗 View
Improving IoT Botnet Detection Using Ensemble Learning 2023 🔗 View
A New Intrusion Detection System Based on Convolutional Neural Network 2023 🔗 View
Improved Fusion of SVD and Relevance Weighted LDA Algorithms via Symmetric Sum‑Based Rules for Face Recognition 2023 🔗 View
SSHCEth: Secure Smart Home Communications based on Ethereum Blockchain and Smart Contract 2023 🔗 View
Real-Time Anomaly Detection in SDN Architecture Using Integrated SIEM and Machine Learning for Enhancing Network Security 2023 🔗 View
Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis 2023 🔗 View
Network intrusion detection using Machine Learning approach 2022 🔗 View
Automatic Forensic Imaging of a Virtual USB Device with Emulated User Interaction 2022 🔗 View
Impact of security and privacy risks on the adoption of IoT: A state of the art 2022 🔗 View
Security of Internet Of Things Using Machine Learning 2022 🔗 View
LWKPCA: A New Robust Method for Face Recognition Under Adverse Conditions 2022 🔗 View
Detection of suspicious timestamps in NTFS using volume shadow copies 2021 🔗 View
File Slack Handling Tool 2021 🔗 View
A new efficient model of quantum image cryptography based on sampled GNEQR storage presentation 2021 🔗 View
Robust face recognition based on a new Kernel-PCA using RRQR factorization 2021 🔗 View
DeepWTPCA-L1: A New Deep Face Recognition Model Based on WTPCA-L1 Norm Features 2021 🔗 View
Fuzzy ℓ2, p-norm based PCA for intrusion detection system 2020 🔗 View
Nonlinear ℓ2,p-norm based PCA for anomaly network detection 2020 🔗 View
Improved nonlinear fuzzy robust PCA for Anomaly-based intrusion detection 2020 🔗 View
Detection of timestamps tampering in ntfs using machine 2019 🔗 View
Energy-efficient associations for IoT networks with UAV: A regret matching based approach 2019 🔗 View
Face Recognition using Wavelets based Feature Extraction and PCA-L1 norm 2019 🔗 View
Social Big Data Mining Framework for Extremist Content Detection in Social Networks 2019 🔗 View
Combination of OMPCA and LDA for Anomaly Network Detection 2019 🔗 View
New fusion of SVD and Relevance Weighted LDA for face recognition 2019 🔗 View
A Network Intrusion Detection Based on Improved Nonlinear Fuzzy Robust PCA 2018 🔗 View
An effective network intrusion detection based on truncated mean LDA 2018 🔗 View
Combination of R1-PCA and median LDA for anomaly network detection 2017 🔗 View
Identifying intrusions in computer networks using robust fuzzy PCA 2017 🔗 View
Intrusion detection system using PCA and Fuzzy PCA techniques 2017 🔗 View
A median nearest neighbors LDA for anomaly network detection 2017 🔗 View
An effective cyber attack detection system based on an improved OMPCA 2017 🔗 View
Network intrusion detection system using L1-norm PCA 2016 🔗 View
Network intrusion detection system based on Direct LDA 2016 🔗 View
Intrusion detection system using PCA and kernel PCA methods 2016 🔗 View
Intrusion detection system using PCA and kernel PCA methods 2016 🔗 View
Network intrusion detection system using PCA by Lp-norm maximization based on conjugate gradient 2016 🔗 View
Kernel relevance weighted discriminant analysis for face recognition 2010 🔗 View
Contourlet feature based kernel relevance weighted discriminant analysis for face recognition 2009 🔗 View
Fuzzy linear and nonlinear discriminant analysis algorithms for face recognition 2009 🔗 View
Kernel weighted scatter-difference-based discriminant analysis for face recognition 2008 🔗 View
Using wavelets based feature extraction and relevance weighted LDA for face recognition 2007 🔗 View