Photo

BENATTOU Mohammed

Email : mohammed.benattou@uit.ac.ma

Institution : Faculty of Sciences

Laboratory : Computer Science Research

← Back to laboratory
📚 Scopus Publications — Total : 51
Title Year 🔗 View
A Systematic Review of Deep Learning Mechanisms for Intrusion Detection Systems in Internet of Things Networks 2026 🔗 View
GemSP: An Ensemble Model for User Story Point Estimation Using Gemini Embeddings 2026 🔗 View
Enhanced intrusion detection through dual reduction and robust mean 2025 🔗 View
Efficient Dimensionality Reduction in Intrusion Detection Systems via Weighted Power Mean for PCA and LDA 2024 🔗 View
A robust intrusion detection model based on a combination of PCA-GM and trunced LDA 2023 🔗 View
An Automatic Truncated Mean Approach for PCA In Intrusion Detection Systems 2023 🔗 View
A truncated mean ℓp-LDA approach for intrusion detection system 2021 🔗 View
Formal Model of Conformity Analysis Method of Java Bytecode Programs annotated with BML Specifications 2021 🔗 View
Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks 2019 🔗 View
A cyber network attack detection based on GM Median Nearest Neighbors LDA 2019 🔗 View
Improve R2L attack detection using trimmed PCA 2019 🔗 View
Toward a personalized learning path through a services-oriented approach 2019 🔗 View
Constraint Based Testing and Verification of Java Bytecode Programs 2018 🔗 View
Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs 2018 🔗 View
Toward a Constraint Based Test Case Generation of Parallel BPEL Process 2018 🔗 View
When time meets test 2018 🔗 View
An effective network intrusion detection based on truncated mean LDA 2018 🔗 View
Combination of R1-PCA and median LDA for anomaly network detection 2017 🔗 View
Test case generation for Java Bytecode programs annotated with BML specifications 2017 🔗 View
A median nearest neighbors LDA for anomaly network detection 2017 🔗 View
Implementation of bit error rate model of 16-QAM in aqua-sim simulator for underwater sensor networks 2017 🔗 View
Individualized learning path through a services-oriented approach 2017 🔗 View
An effective cyber attack detection system based on an improved OMPCA 2017 🔗 View
A proposed system for learning paths personalization using learners profiles 2017 🔗 View
New greedy forwarding strategy for UWSNs geographic routing protocols 2016 🔗 View
Network intrusion detection system using L1-norm PCA 2016 🔗 View
Intrusion detection system using PCA and kernel PCA methods 2016 🔗 View
Topology control through depth adjustment and transmission power control for UWSN routing protocols 2016 🔗 View
Intrusion detection system using PCA and kernel PCA methods 2016 🔗 View
Individualization of pedagogical paths via traces analysis 2016 🔗 View
Network intrusion detection system using PCA by Lp-norm maximization based on conjugate gradient 2016 🔗 View
Performance analysis of coding using distributed Turbo codes 2015 🔗 View
A temporal agent based approach for testing open distributed systems 2015 🔗 View
Generating control flow graph from Java card byte code 2015 🔗 View
A JESS AGENT based architecture for testing distributed systems 2014 🔗 View
Contention Window MAC parameters tyning for wireless multimedia Sensor Networks 2013 🔗 View
A formal model of conformity testing of inheritance for object oriented constraint programming 2013 🔗 View
An expert system based architecture for testing distributed systems 2013 🔗 View
A based rules approach for distributed test 2013 🔗 View
A formal model of similarity testing for inheritance in object-oriented software 2012 🔗 View
MAC queue size and energy-efficient of IEEE 802.11e EDCA in Wireless Multimedia Sensor Networks 2012 🔗 View
Energy-efficient MAC protocol based on IEEE 802.11e for Wireless Multimedia Sensor Networks 2012 🔗 View
A rule-based multi-agent system for testing distributed applications 2012 🔗 View
Similarity testing by proof and analysis of partition for object oriented specifications 2012 🔗 View
Test execution control with timing constraints for testing distributed systems 2012 🔗 View
A multi-agent based architecture for distributed testing 2006 🔗 View
Intelligent agents for distributed intrusion detection system 2005 🔗 View
Mobile agents community for distributed intrusion detection systems 2005 🔗 View
Active objects for coordination in distributed testing 2002 🔗 View
Incremental inheritance mechanism and its message evaluation method 1997 🔗 View
Incremental inheritance model for an OODBMS 1997 🔗 View