Photo

CHAOUI Habiba

Email : habiba.chaoui@uit.ac.ma

Institution : Higher School of Technology

Laboratory : Scientific Research and Innovation

← Back to laboratory
📚 Scopus Publications — Total : 83
Title Year 🔗 View
Chain-of-Thought Augmented Fine‑Tuning of a Distilled Llama‑8B Model for SIEM Detection Query Generation 2025 🔗 View
Predictive Analytics Leveraging a Machine Learning Approach to Identify Students’ Reasons for Dropping out of University 2025 🔗 View
Global Research Trends in AI and Blockchain for Smart Grids: A Bibliometric Analysis with a Focus on Morocco (2014–2024) 2025 🔗 View
Enhanced Network Security by Implementing SDN and NFV and New Routing Algorithm 2025 🔗 View
ENHANCING IOT SECURITY WITH MACHINE LEARNING: A RANDOM FOREST-BASED APPROACH FOR CYBER-ATTACK DETECTION 2025 🔗 View
Analyzing the Attributes of the Moroccan Educational System: A Phase Prior to the Establishment of a Smart Classroom Based on IoT 2025 🔗 View
Empowering Healthcare: TinyML for Precise Lung Disease Classification 2024 🔗 View
PROPOSED SMART UNIVERSITY MODEL: THE INTEGRATION OF IOT AND FUZZY LOGIC IN SMART CLASSROOM FOR OPTIMIZING THERMAL COMFORT 2024 🔗 View
A Systematic Review of Blockchain Applications in Pharmaceutical Supply Chain Traceability and Security 2024 🔗 View
Evolving Security for 6G: Integrating Software-Defined Networking and Network Function Virtualization into Next-Generation Architectures 2024 🔗 View
Unveiling Blockchain Security and Resilience in the Quantum Age: An Analytical Study of Post-Quantum and Quantum Approaches 2024 🔗 View
Enhancing Identity Security in the Metaverse: Solutions Using AI, Blockchain, and NFTs 2024 🔗 View
Anomaly-Based Intrusion Detection System To Detect Advanced Persistent Threats: Environmental Sustainability 2023 🔗 View
Detecting Unconventional and Malicious Windows Authentication Activities Through Statistical Rarity Assessment 2023 🔗 View
SDN/NFV Security Challenges and Proposed Architecture 2023 🔗 View
Design of A Distributed Intrusion Detection System for Streaming Data in IoT Environments 2023 🔗 View
Enhancing Mobile Security: A Systematic Review of AI and Blockchain Integration Strategies for Effective Analysis 2023 🔗 View
Using Clustering Methods to Detect the Revealed Preferences of Moroccans towards the Electric Vehicles: Latent Class Analysis (LCA) and K-Modes Algorithm (K-MA) 2022 🔗 View
Advanced IoT Network Topologies to Optimize Medical Monitoring Platforms based on a Constrained and Secured IOT Application Protocol CoAP 2022 🔗 View
Performance of OpenFIow-based SDN on IoT network 2022 🔗 View
Performance of OpenFlow-based SDN on IoT network 2022 🔗 View
Improved IOT/SDN Architecture with the Concept of NFV 2022 🔗 View
Challenges and future directions for security and privacy in vehicular fog computing 2022 🔗 View
IoT Security in Smart University Systems 2022 🔗 View
Applying Advanced Wireless Network Cluster-Tree Topology to Optimize Covid-19 Sanitary Passport Blockchain-Based Security in a Constrained IoT Platform 2022 🔗 View
Applying Advanced IoT Network Topologies to Optimize COVID-19 Sanitary Passport Platform Based on CoAP Protocol 2022 🔗 View
Applying Lightweight Elliptic Curve Cryptography ECC to Smart Energy IoT Platforms Based on the CoAP Protocol 2022 🔗 View
Applying an Enhanced Elliptic Curve Integrated Encryption Scheme ECIES to Enhance Smart Energy IoT Platform Security Based on Constrained Protocol 2022 🔗 View
Engaging students to fill surveys using chatbots: University case study 2021 🔗 View
Proposal architecture based on Fog Computing allowing real-time analysis in Smart Cities 2021 🔗 View
Statistical Study and Intelligent Classroom Proposal Adapted to Students with Speech and Hearing Disabilities 2021 🔗 View
An Advanced Encryption Cryptographically-Based Securing Applicative Protocols MQTT and CoAP to Optimize Medical-IOT Supervising Platforms 2021 🔗 View
An Optimized Security Vehicular Internet of Things -IoT-Application Layer Protocols MQTT and COAP Based on Cryptographic Elliptic-Curve 2020 🔗 View
Ensuring High Availability of Private Cloud Services by Integrating the Ipv6 Protocol 2020 🔗 View
Parallel processing using big data and machine learning techniques for intrusion detection 2020 🔗 View
Network Traffic Analysis using Big Data and Deep Learning Techniques 2020 🔗 View
Runtime API Signature for Fileless Malware Detection 2020 🔗 View
Big Data for Internet of Things: A Survey on IoT Frameworks and Platforms 2020 🔗 View
Comparative and Analytical Study of Big Data Technologies: A Survey 2020 🔗 View
LSTM deep learning method for network intrusion detection system 2020 🔗 View
The Integrity of Encryption Keys of European Train Control System Sessions during an Offline Loading 2019 🔗 View
Ontology and Semantic Web in Logistic Applications: State of the Art 2019 🔗 View
Social network’s security related to healthcare 2019 🔗 View
Proposed security by IDS-AM in Android system 2019 🔗 View
Security Measures Assessment for Big Data Management Systems 2019 🔗 View
Teaching android mobile security 2019 🔗 View
A honey net, big data and RNN architecture for automatic security monitoring of information system 2019 🔗 View
A machine learning approach: Using predictive analytics to identify and analyze high risks patients with heart disease 2019 🔗 View
AES-Present: A new secure IoT-based scheme for Telemedicine and E-Health systems 2018 🔗 View
XxTEA-VCLOUD:A security scheme for the vehicular cloud network using a lightweight encryption algorithm 2018 🔗 View
Copyright protection in the external private cloud using a multi-agent system and Chebyshev polynomials 2018 🔗 View
Recognition based mechanism to detect malicious content in social networks 2018 🔗 View
A proposed approach to reduce the vulnerability in a cloud system 2018 🔗 View
A novel evolutionary model for improving big data security 2018 🔗 View
Big data security proposed solution 2018 🔗 View
Improving software automation testing using Jenkins, and machine learning under big data 2018 🔗 View
Access control in IoT environments: Feasible scenarios 2018 🔗 View
Security against malicious node in the vehicular cloud computing using a software-defined networking architecture 2017 🔗 View
Detecting malicious users in social network via collaborative filtering 2017 🔗 View
A new approach to mitigate security threats in cloud environment 2017 🔗 View
A new secure model for the use of cloud computing in big data analytics 2017 🔗 View
Real time processing technologies in big data: Comparative study 2017 🔗 View
A security approach based on honeypots: Protecting Online Social network from malicious profiles 2017 🔗 View
Application of wireless networks and optical network to NextGen aircrafts 2016 🔗 View
What can cause big data being slow? 2016 🔗 View
Intrusion detection system based interaction on mobile agents and clust-density algorithm 'IDS-AM-Clust' 2016 🔗 View
A security scheme for mobile cloud using multi-agents system 2016 🔗 View
Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb 2016 🔗 View
A Novel Strong Password Generator for Improving Cloud Authentication 2016 🔗 View
A Robust Authentication Scheme for Telecare Medicine Information System 2016 🔗 View
Contribution to abnormality detection by use of clust-density algorithm 2015 🔗 View
An efficient framework for enhancing user authentication in cloud storage using digital watermark 2015 🔗 View
Big data privacy in healthcare moroccan context 2015 🔗 View
Out-of-band authentication using image-based one time password in the cloud environment 2015 🔗 View
New architecture of IDS based interaction on mobile agents and data mining 2015 🔗 View
Big data analysis and query optimization improve hadoop DB performance 2014 🔗 View
Stability of the singular discrete time system in the sense of componentwise approach using Drazin inverse theory 2009 🔗 View
Data warehouse and the deployment of data mining process to make decision for Leishmaniasis and development of mathematical models for phlebotomine sandflies seasonality in Marrakech city 2009 🔗 View
Development of data warehouse for Leishmaniasis and deployment of data mining process to make decision 2009 🔗 View
Componentwise stability of the singular discrete time system using the methodology of the Drazin inverse 2009 🔗 View
Generalized componentwise stability of non-stationary continuous-time systems with constrained control 2005 🔗 View
A robust model reference adaptive control for nonminimum phase systems 2001 🔗 View
Robust direct adaptive predictive control based on Laguerre series representation 2000 🔗 View