SAADI Chaimae
Email : Chaimae.saadi@uit.ac.ma
Institution : Higher School of Technology
Laboratory : Scientific Research and Innovation
← Back to laboratory
📚 Scopus Publications — Total : 25
| Title | Year | 🔗 View |
|---|---|---|
| Chain-of-Thought Augmented Fine‑Tuning of a Distilled Llama‑8B Model for SIEM Detection Query Generation | 2025 | 🔗 View |
| Enhanced Network Security by Implementing SDN and NFV and New Routing Algorithm | 2025 | 🔗 View |
| Assessing Tourism Prediction Models: A Comparative Study of SARIMA, Random Forest, and LSTM, Considering Nonlinear Trends and the Influence of COVID-19 | 2024 | 🔗 View |
| Evolving Security for 6G: Integrating Software-Defined Networking and Network Function Virtualization into Next-Generation Architectures | 2024 | 🔗 View |
| A Novel Hybrid Approach for Daily Tourism Arrival Forecasting: The PROPHET-Bayesian Gaussian Process-Forward Neural Network Model | 2023 | 🔗 View |
| Tourism in Singapore, prediction model using SARIMA and PROPHET | 2023 | 🔗 View |
| Detecting Unconventional and Malicious Windows Authentication Activities Through Statistical Rarity Assessment | 2023 | 🔗 View |
| Design of A Distributed Intrusion Detection System for Streaming Data in IoT Environments | 2023 | 🔗 View |
| SDN/NFV Security Challenges and Proposed Architecture | 2023 | 🔗 View |
| Ensuring the Integrity of Cloud Computing Against Account Hijacking Using Blockchain Technology | 2022 | 🔗 View |
| Improved IOT/SDN Architecture with the Concept of NFV | 2022 | 🔗 View |
| Performance of OpenFIow-based SDN on IoT network | 2022 | 🔗 View |
| Performance of OpenFlow-based SDN on IoT network | 2022 | 🔗 View |
| Advanced Exploratory Data Analysis for Moroccan Shopping Places in TripAdvisor | 2022 | 🔗 View |
| Named Entity Recognition applied on Moroccan tourism corpus | 2021 | 🔗 View |
| Ensuring High Availability of Private Cloud Services by Integrating the Ipv6 Protocol | 2020 | 🔗 View |
| Runtime API Signature for Fileless Malware Detection | 2020 | 🔗 View |
| Proposed security by IDS-AM in Android system | 2019 | 🔗 View |
| Security Measures Assessment for Big Data Management Systems | 2019 | 🔗 View |
| A proposed approach to reduce the vulnerability in a cloud system | 2018 | 🔗 View |
| A new approach to mitigate security threats in cloud environment | 2017 | 🔗 View |
| Intrusion detection system based interaction on mobile agents and clust-density algorithm 'IDS-AM-Clust' | 2016 | 🔗 View |
| Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb | 2016 | 🔗 View |
| Contribution to abnormality detection by use of clust-density algorithm | 2015 | 🔗 View |
| New architecture of IDS based interaction on mobile agents and data mining | 2015 | 🔗 View |
