IBRAHIMI Khalil
Email : ibrahimi.khalil@uit.ac.ma
Institution : Faculty of Sciences
Laboratory : Computer Science Research
← Back to laboratory
📚 Scopus Publications — Total : 71
| Title | Year | 🔗 View |
|---|---|---|
| Decentralized Oracles with Threshold Signatures : A Discrete Public Goods Game Model | 2025 | 🔗 View |
| BIVO - A Decentralized Oracle Solution for Data Authenticity in Blockchain-Based IoT Networks | 2025 | 🔗 View |
| Classification of Mammography Images Based on Multifractal Analysis of BIMFs | 2025 | 🔗 View |
| IoT Intrusion Detection Using Machine Learning Classifiers and PCA Dimensionality Reduction for N-BaIoT Dataset | 2025 | 🔗 View |
| Selection of the Discriming Feature Using the BEMD’s BIMF for Classification of Breast Cancer Mammography Image † | 2024 | 🔗 View |
| Fencing Sport Strategy Using Game Theory | 2024 | 🔗 View |
| Intrusion Detection Systems for the Internet of Things Network: Survey on Rare Attacks | 2024 | 🔗 View |
| Enhancing Intrusion Detection Systems Using Machine Learning Classifiers on the CSE-CIC-IDS2018 Dataset | 2024 | 🔗 View |
| Crowdsourcing: Modeling Techniques and Comprehensive Studies | 2024 | 🔗 View |
| Efficient Intrusion Detection: Combining X2Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset | 2024 | 🔗 View |
| Enhanced Intrusion Detection System for Multiclass Classification in UAV Networks | 2024 | 🔗 View |
| Osteoporosis Classification Using Multifractal Features and Neighbourhood Determination of Extrema for BMED | 2024 | 🔗 View |
| The 11th International Conference on Wireless Networks and Mobile Communications; (WINCOM 2024) | 2024 | 🔗 View |
| Deep Learning-Based Traffic Banner Recognition for Enhanced Road Safety in Autonomous Vehicles | 2024 | 🔗 View |
| Algebraic Construction of Non-Primitive BCH Codes on GF(2m) with Minimum Distance Checking for Degrees up to 10 | 2024 | 🔗 View |
| Reinforcement Learning for Optimized Resource Allocation in 5G URLLC | 2024 | 🔗 View |
| Secure and Privacy-Preserving E-mobility Service Based on Blockchain and Hybrid Smart Contracts | 2023 | 🔗 View |
| Recent Advances in Data Intensive Applications: Survey | 2023 | 🔗 View |
| IA Applied to IIoT Intrusion Detection: An Overview | 2023 | 🔗 View |
| A Complete Transmitted Message in DTNs with a Stable Coalition in Dynamic Structures | 2023 | 🔗 View |
| Deep Reinforcement Learning-Based Energy Efficiency Optimization for Flying LoRa Gateways | 2023 | 🔗 View |
| Improvement of Anomaly Detection System in the IoT Networks using CNN-LSTM Approach | 2023 | 🔗 View |
| Conditional Generative Adversarial Networks for Rx-to-Tx Translation in Wireless Communication Systems | 2023 | 🔗 View |
| Fractal analysis to BEMD's IMFs: Application CT-Scan | 2023 | 🔗 View |
| Neighborhood Feature Extraction and Haralick Attributes for Medical Image Analysis: Application to Breast Cancer Mammography Image | 2023 | 🔗 View |
| Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks | 2022 | 🔗 View |
| Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game | 2022 | 🔗 View |
| BDREA Betta and Dolphin Pods Routing via Energy Scarcity Aware Protocol for Underwater Acoustic Wireless Sensor Networks (UAWSNs) | 2022 | 🔗 View |
| Improving the IDS for BoT-IoT Dataset-Based Machine Learning Classifiers | 2022 | 🔗 View |
| Analysis of Blockchain Selfish Mining: a Stochastic Game Approach | 2022 | 🔗 View |
| Adversarial Attacks Against IoT Networks using Conditional GAN based Learning | 2022 | 🔗 View |
| Fractal analysis segmentation of medical images: Application to breast cancer mammography image | 2022 | 🔗 View |
| Decentralized Autonomous Underwater Vehicles Distribution for IPv6-UWSN: A Study with Heuristic Methods | 2021 | 🔗 View |
| Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach | 2021 | 🔗 View |
| Hybrid-ARQ Protocols using Iterative Threshold Decoding of OSMLD Product Codes | 2021 | 🔗 View |
| A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies | 2020 | 🔗 View |
| Foreword | 2020 | 🔗 View |
| A deep reinforcement learning based intrusion detection system (drl-ids) for securing wireless sensor networks and internet of things | 2020 | 🔗 View |
| A Framework to Secure Cluster-Header Decision in Wireless Sensor Network Using Blockchain | 2020 | 🔗 View |
| Model to improve the forecast of the content caching based time-series analysis at the small base station | 2019 | 🔗 View |
| Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks | 2019 | 🔗 View |
| Underwater Wireless Sensor Networks: A Survey on Enabling Technologies, Localization Protocols, and Internet of Underwater Things | 2019 | 🔗 View |
| Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN | 2018 | 🔗 View |
| Game Model for Dynamic Cell Association of Macro-User in Two-Tier Cellular Networks | 2018 | 🔗 View |
| MAC Protocol-Based Depth Adjustment and Splitting Mechanism for UnderWater Sensor Network (UWSN) | 2018 | 🔗 View |
| Access and Sharing Contents Through the Social Network: A POMDP Approach | 2017 | 🔗 View |
| Mobility management schemes for real-time traffic and resource allocation in IEEE 802.16e mobile network | 2017 | 🔗 View |
| Foreword | 2017 | 🔗 View |
| Prediction of the content popularity in the 5G network: Auto-regressive, moving-average and exponential smoothing approaches | 2017 | 🔗 View |
| Management of intrusion detection systems based-KDD99: Analysis with LDA and PCA | 2017 | 🔗 View |
| Implementation of bit error rate model of 16-QAM in aqua-sim simulator for underwater sensor networks | 2017 | 🔗 View |
| Best association of macro user in two-tier cellular networks | 2017 | 🔗 View |
| A new data forwarding scheme for DTNs based on coalition game | 2017 | 🔗 View |
| Detection and identification of attacks in Vehicular Ad-Hoc NETwork | 2016 | 🔗 View |
| New greedy forwarding strategy for UWSNs geographic routing protocols | 2016 | 🔗 View |
| Topology control through depth adjustment and transmission power control for UWSN routing protocols | 2016 | 🔗 View |
| Learning gain mechanism to promote the femtocells hybrid access mode | 2015 | 🔗 View |
| A distributed open-close access for Small-Cell networks: A random matrix game analysis | 2015 | 🔗 View |
| A combined throughput and hierarchical strategies for medium access in wireless network | 2015 | 🔗 View |
| Optimizing diffusion time of the content through the social networks: Stochastic learning game | 2015 | 🔗 View |
| Inferring trust relationships in the social network: Evidence theory approach | 2014 | 🔗 View |
| Signaling game-based approach to power control management in wireless networks | 2013 | 🔗 View |
| Energy, QoS and bursts profile management in uplink IEEE 802.16e mobile WiMAX networks | 2013 | 🔗 View |
| Dynamic spectrum allocation with admission control based on cognitive radio for QoS support in multiple wireless network | 2012 | 🔗 View |
| Dynamic spectrum allocation based on cognitive radio for QoS support | 2010 | 🔗 View |
| Mobility management and call admission control for IEEE802.16e wireless networks | 2010 | 🔗 View |
| The uplink capacity evaluation of wireless networks: Spectral analysis approach | 2010 | 🔗 View |
| Adaptive modulation and coding scheme with intra- and inter-cell mobility for HSDPA system | 2009 | 🔗 View |
| IEEE802.16 multi-class capacity including AMC scheme and QoS differentiation for initial and bandwidth request ranging | 2008 | 🔗 View |
| Uplink call admission control in multi-services W-CDMA network | 2008 | 🔗 View |
| Capacity evaluation of multi-service W-CDMA: A spectral analysis approach | 2007 | 🔗 View |
