CHAOUI Habiba
Email : habiba.chaoui@uit.ac.ma
Institution : Higher School of Technology
Laboratory : Scientific Research and Innovation
← Back to laboratory
📚 Scopus Publications — Total : 83
| Title | Year | 🔗 View |
|---|---|---|
| Chain-of-Thought Augmented Fine‑Tuning of a Distilled Llama‑8B Model for SIEM Detection Query Generation | 2025 | 🔗 View |
| Predictive Analytics Leveraging a Machine Learning Approach to Identify Students’ Reasons for Dropping out of University | 2025 | 🔗 View |
| Global Research Trends in AI and Blockchain for Smart Grids: A Bibliometric Analysis with a Focus on Morocco (2014–2024) | 2025 | 🔗 View |
| Enhanced Network Security by Implementing SDN and NFV and New Routing Algorithm | 2025 | 🔗 View |
| ENHANCING IOT SECURITY WITH MACHINE LEARNING: A RANDOM FOREST-BASED APPROACH FOR CYBER-ATTACK DETECTION | 2025 | 🔗 View |
| Analyzing the Attributes of the Moroccan Educational System: A Phase Prior to the Establishment of a Smart Classroom Based on IoT | 2025 | 🔗 View |
| Empowering Healthcare: TinyML for Precise Lung Disease Classification | 2024 | 🔗 View |
| PROPOSED SMART UNIVERSITY MODEL: THE INTEGRATION OF IOT AND FUZZY LOGIC IN SMART CLASSROOM FOR OPTIMIZING THERMAL COMFORT | 2024 | 🔗 View |
| A Systematic Review of Blockchain Applications in Pharmaceutical Supply Chain Traceability and Security | 2024 | 🔗 View |
| Evolving Security for 6G: Integrating Software-Defined Networking and Network Function Virtualization into Next-Generation Architectures | 2024 | 🔗 View |
| Unveiling Blockchain Security and Resilience in the Quantum Age: An Analytical Study of Post-Quantum and Quantum Approaches | 2024 | 🔗 View |
| Enhancing Identity Security in the Metaverse: Solutions Using AI, Blockchain, and NFTs | 2024 | 🔗 View |
| Anomaly-Based Intrusion Detection System To Detect Advanced Persistent Threats: Environmental Sustainability | 2023 | 🔗 View |
| Detecting Unconventional and Malicious Windows Authentication Activities Through Statistical Rarity Assessment | 2023 | 🔗 View |
| SDN/NFV Security Challenges and Proposed Architecture | 2023 | 🔗 View |
| Design of A Distributed Intrusion Detection System for Streaming Data in IoT Environments | 2023 | 🔗 View |
| Enhancing Mobile Security: A Systematic Review of AI and Blockchain Integration Strategies for Effective Analysis | 2023 | 🔗 View |
| Using Clustering Methods to Detect the Revealed Preferences of Moroccans towards the Electric Vehicles: Latent Class Analysis (LCA) and K-Modes Algorithm (K-MA) | 2022 | 🔗 View |
| Advanced IoT Network Topologies to Optimize Medical Monitoring Platforms based on a Constrained and Secured IOT Application Protocol CoAP | 2022 | 🔗 View |
| Performance of OpenFIow-based SDN on IoT network | 2022 | 🔗 View |
| Performance of OpenFlow-based SDN on IoT network | 2022 | 🔗 View |
| Improved IOT/SDN Architecture with the Concept of NFV | 2022 | 🔗 View |
| Challenges and future directions for security and privacy in vehicular fog computing | 2022 | 🔗 View |
| IoT Security in Smart University Systems | 2022 | 🔗 View |
| Applying Advanced Wireless Network Cluster-Tree Topology to Optimize Covid-19 Sanitary Passport Blockchain-Based Security in a Constrained IoT Platform | 2022 | 🔗 View |
| Applying Advanced IoT Network Topologies to Optimize COVID-19 Sanitary Passport Platform Based on CoAP Protocol | 2022 | 🔗 View |
| Applying Lightweight Elliptic Curve Cryptography ECC to Smart Energy IoT Platforms Based on the CoAP Protocol | 2022 | 🔗 View |
| Applying an Enhanced Elliptic Curve Integrated Encryption Scheme ECIES to Enhance Smart Energy IoT Platform Security Based on Constrained Protocol | 2022 | 🔗 View |
| Engaging students to fill surveys using chatbots: University case study | 2021 | 🔗 View |
| Proposal architecture based on Fog Computing allowing real-time analysis in Smart Cities | 2021 | 🔗 View |
| Statistical Study and Intelligent Classroom Proposal Adapted to Students with Speech and Hearing Disabilities | 2021 | 🔗 View |
| An Advanced Encryption Cryptographically-Based Securing Applicative Protocols MQTT and CoAP to Optimize Medical-IOT Supervising Platforms | 2021 | 🔗 View |
| An Optimized Security Vehicular Internet of Things -IoT-Application Layer Protocols MQTT and COAP Based on Cryptographic Elliptic-Curve | 2020 | 🔗 View |
| Ensuring High Availability of Private Cloud Services by Integrating the Ipv6 Protocol | 2020 | 🔗 View |
| Parallel processing using big data and machine learning techniques for intrusion detection | 2020 | 🔗 View |
| Network Traffic Analysis using Big Data and Deep Learning Techniques | 2020 | 🔗 View |
| Runtime API Signature for Fileless Malware Detection | 2020 | 🔗 View |
| Big Data for Internet of Things: A Survey on IoT Frameworks and Platforms | 2020 | 🔗 View |
| Comparative and Analytical Study of Big Data Technologies: A Survey | 2020 | 🔗 View |
| LSTM deep learning method for network intrusion detection system | 2020 | 🔗 View |
| The Integrity of Encryption Keys of European Train Control System Sessions during an Offline Loading | 2019 | 🔗 View |
| Ontology and Semantic Web in Logistic Applications: State of the Art | 2019 | 🔗 View |
| Social network’s security related to healthcare | 2019 | 🔗 View |
| Proposed security by IDS-AM in Android system | 2019 | 🔗 View |
| Security Measures Assessment for Big Data Management Systems | 2019 | 🔗 View |
| Teaching android mobile security | 2019 | 🔗 View |
| A honey net, big data and RNN architecture for automatic security monitoring of information system | 2019 | 🔗 View |
| A machine learning approach: Using predictive analytics to identify and analyze high risks patients with heart disease | 2019 | 🔗 View |
| AES-Present: A new secure IoT-based scheme for Telemedicine and E-Health systems | 2018 | 🔗 View |
| XxTEA-VCLOUD:A security scheme for the vehicular cloud network using a lightweight encryption algorithm | 2018 | 🔗 View |
| Copyright protection in the external private cloud using a multi-agent system and Chebyshev polynomials | 2018 | 🔗 View |
| Recognition based mechanism to detect malicious content in social networks | 2018 | 🔗 View |
| A proposed approach to reduce the vulnerability in a cloud system | 2018 | 🔗 View |
| A novel evolutionary model for improving big data security | 2018 | 🔗 View |
| Big data security proposed solution | 2018 | 🔗 View |
| Improving software automation testing using Jenkins, and machine learning under big data | 2018 | 🔗 View |
| Access control in IoT environments: Feasible scenarios | 2018 | 🔗 View |
| Security against malicious node in the vehicular cloud computing using a software-defined networking architecture | 2017 | 🔗 View |
| Detecting malicious users in social network via collaborative filtering | 2017 | 🔗 View |
| A new approach to mitigate security threats in cloud environment | 2017 | 🔗 View |
| A new secure model for the use of cloud computing in big data analytics | 2017 | 🔗 View |
| Real time processing technologies in big data: Comparative study | 2017 | 🔗 View |
| A security approach based on honeypots: Protecting Online Social network from malicious profiles | 2017 | 🔗 View |
| Application of wireless networks and optical network to NextGen aircrafts | 2016 | 🔗 View |
| What can cause big data being slow? | 2016 | 🔗 View |
| Intrusion detection system based interaction on mobile agents and clust-density algorithm 'IDS-AM-Clust' | 2016 | 🔗 View |
| A security scheme for mobile cloud using multi-agents system | 2016 | 🔗 View |
| Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb | 2016 | 🔗 View |
| A Novel Strong Password Generator for Improving Cloud Authentication | 2016 | 🔗 View |
| A Robust Authentication Scheme for Telecare Medicine Information System | 2016 | 🔗 View |
| Contribution to abnormality detection by use of clust-density algorithm | 2015 | 🔗 View |
| An efficient framework for enhancing user authentication in cloud storage using digital watermark | 2015 | 🔗 View |
| Big data privacy in healthcare moroccan context | 2015 | 🔗 View |
| Out-of-band authentication using image-based one time password in the cloud environment | 2015 | 🔗 View |
| New architecture of IDS based interaction on mobile agents and data mining | 2015 | 🔗 View |
| Big data analysis and query optimization improve hadoop DB performance | 2014 | 🔗 View |
| Stability of the singular discrete time system in the sense of componentwise approach using Drazin inverse theory | 2009 | 🔗 View |
| Data warehouse and the deployment of data mining process to make decision for Leishmaniasis and development of mathematical models for phlebotomine sandflies seasonality in Marrakech city | 2009 | 🔗 View |
| Development of data warehouse for Leishmaniasis and deployment of data mining process to make decision | 2009 | 🔗 View |
| Componentwise stability of the singular discrete time system using the methodology of the Drazin inverse | 2009 | 🔗 View |
| Generalized componentwise stability of non-stationary continuous-time systems with constrained control | 2005 | 🔗 View |
| A robust model reference adaptive control for nonminimum phase systems | 2001 | 🔗 View |
| Robust direct adaptive predictive control based on Laguerre series representation | 2000 | 🔗 View |
