BENATTOU Mohammed
Email : mohammed.benattou@uit.ac.ma
Institution : Faculty of Sciences
Laboratory : Computer Science Research
← Back to laboratory
📚 Scopus Publications — Total : 51
| Title | Year | 🔗 View |
|---|---|---|
| A Systematic Review of Deep Learning Mechanisms for Intrusion Detection Systems in Internet of Things Networks | 2026 | 🔗 View |
| GemSP: An Ensemble Model for User Story Point Estimation Using Gemini Embeddings | 2026 | 🔗 View |
| Enhanced intrusion detection through dual reduction and robust mean | 2025 | 🔗 View |
| Efficient Dimensionality Reduction in Intrusion Detection Systems via Weighted Power Mean for PCA and LDA | 2024 | 🔗 View |
| A robust intrusion detection model based on a combination of PCA-GM and trunced LDA | 2023 | 🔗 View |
| An Automatic Truncated Mean Approach for PCA In Intrusion Detection Systems | 2023 | 🔗 View |
| A truncated mean ℓp-LDA approach for intrusion detection system | 2021 | 🔗 View |
| Formal Model of Conformity Analysis Method of Java Bytecode Programs annotated with BML Specifications | 2021 | 🔗 View |
| Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks | 2019 | 🔗 View |
| A cyber network attack detection based on GM Median Nearest Neighbors LDA | 2019 | 🔗 View |
| Improve R2L attack detection using trimmed PCA | 2019 | 🔗 View |
| Toward a personalized learning path through a services-oriented approach | 2019 | 🔗 View |
| Constraint Based Testing and Verification of Java Bytecode Programs | 2018 | 🔗 View |
| Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs | 2018 | 🔗 View |
| Toward a Constraint Based Test Case Generation of Parallel BPEL Process | 2018 | 🔗 View |
| When time meets test | 2018 | 🔗 View |
| An effective network intrusion detection based on truncated mean LDA | 2018 | 🔗 View |
| Combination of R1-PCA and median LDA for anomaly network detection | 2017 | 🔗 View |
| Test case generation for Java Bytecode programs annotated with BML specifications | 2017 | 🔗 View |
| A median nearest neighbors LDA for anomaly network detection | 2017 | 🔗 View |
| Implementation of bit error rate model of 16-QAM in aqua-sim simulator for underwater sensor networks | 2017 | 🔗 View |
| Individualized learning path through a services-oriented approach | 2017 | 🔗 View |
| An effective cyber attack detection system based on an improved OMPCA | 2017 | 🔗 View |
| A proposed system for learning paths personalization using learners profiles | 2017 | 🔗 View |
| New greedy forwarding strategy for UWSNs geographic routing protocols | 2016 | 🔗 View |
| Network intrusion detection system using L1-norm PCA | 2016 | 🔗 View |
| Intrusion detection system using PCA and kernel PCA methods | 2016 | 🔗 View |
| Topology control through depth adjustment and transmission power control for UWSN routing protocols | 2016 | 🔗 View |
| Intrusion detection system using PCA and kernel PCA methods | 2016 | 🔗 View |
| Individualization of pedagogical paths via traces analysis | 2016 | 🔗 View |
| Network intrusion detection system using PCA by Lp-norm maximization based on conjugate gradient | 2016 | 🔗 View |
| Performance analysis of coding using distributed Turbo codes | 2015 | 🔗 View |
| A temporal agent based approach for testing open distributed systems | 2015 | 🔗 View |
| Generating control flow graph from Java card byte code | 2015 | 🔗 View |
| A JESS AGENT based architecture for testing distributed systems | 2014 | 🔗 View |
| Contention Window MAC parameters tyning for wireless multimedia Sensor Networks | 2013 | 🔗 View |
| A formal model of conformity testing of inheritance for object oriented constraint programming | 2013 | 🔗 View |
| An expert system based architecture for testing distributed systems | 2013 | 🔗 View |
| A based rules approach for distributed test | 2013 | 🔗 View |
| A formal model of similarity testing for inheritance in object-oriented software | 2012 | 🔗 View |
| MAC queue size and energy-efficient of IEEE 802.11e EDCA in Wireless Multimedia Sensor Networks | 2012 | 🔗 View |
| Energy-efficient MAC protocol based on IEEE 802.11e for Wireless Multimedia Sensor Networks | 2012 | 🔗 View |
| A rule-based multi-agent system for testing distributed applications | 2012 | 🔗 View |
| Similarity testing by proof and analysis of partition for object oriented specifications | 2012 | 🔗 View |
| Test execution control with timing constraints for testing distributed systems | 2012 | 🔗 View |
| A multi-agent based architecture for distributed testing | 2006 | 🔗 View |
| Intelligent agents for distributed intrusion detection system | 2005 | 🔗 View |
| Mobile agents community for distributed intrusion detection systems | 2005 | 🔗 View |
| Active objects for coordination in distributed testing | 2002 | 🔗 View |
| Incremental inheritance mechanism and its message evaluation method | 1997 | 🔗 View |
| Incremental inheritance model for an OODBMS | 1997 | 🔗 View |
