Said Benkirane
YOU?
Author Swipe
View article: A Comprehensive Survey of Contemporary Anomaly Detection Methods for Securing Smart IoT Systems
A Comprehensive Survey of Contemporary Anomaly Detection Methods for Securing Smart IoT Systems Open
View article: A Robust Security Detection Strategy for Next Generation IoT Networks
A Robust Security Detection Strategy for Next Generation IoT Networks Open
View article: An efficient intrusion detection system for IoT security using CNN decision forest
An efficient intrusion detection system for IoT security using CNN decision forest Open
The adoption and integration of the Internet of Things (IoT) have become essential for the advancement of many industries, unlocking purposeful connections between objects. However, the surge in IoT adoption and integration has also made i…
View article: Enhanced IDS with Deep Learning for IoT-Based Smart Cities Security
Enhanced IDS with Deep Learning for IoT-Based Smart Cities Security Open
Cyberattacks against highly integrated Internet of Things (IoT) servers, apps, and telecoms infrastructure are rapidly increasing when issues produced by IoT networks go unnoticed for an extended period. IoT interface attacks must be evalu…
View article: Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing
Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing Open
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics, such as scalability and flexibility. However, despite these advantages, security concerns remain a significant challenge for cloud providers. CC introd…
View article: A Novel Machine Learning Approach for Solar Radiation Estimation
A Novel Machine Learning Approach for Solar Radiation Estimation Open
Solar irradiation (Rs) is the electromagnetic radiation energy emitted by the Sun. It plays a crucial role in sustaining life on Earth by providing light, heat, and energy. Furthermore, it serves as a key driver of Earth’s climate and weat…
View article: FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs
FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs Open
Vehicular ad hoc networks (VANETs) are used for vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications. They are a special type of mobile ad hoc networks (MANETs) that can share useful information to improve road traff…
View article: Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques Open
Cloud computing (CC) is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services. In addition, it aims to strengthen systems and make them useful. Regardless…
View article: An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security Open
Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in industrial sectors. It is designed to implicate embedded technologies in manufacturing fields to enhance their operations. However, IIoT invol…
View article: Accurate Solar Radiation Forecasting using an Effective Time Series with Feature Selection
Accurate Solar Radiation Forecasting using an Effective Time Series with Feature Selection Open
Solar rays on earth surface are essential for water resources, environmental and agricultural issues. They severely impact plant growth, global temperatures, mean sea levels, and climatic extremes. The most critical challenge in renewable …
View article: Adapted Speed System in a Road Bend Situation in VANET Environment
Adapted Speed System in a Road Bend Situation in VANET Environment Open
Today, road safety remains a serious concern for governments around the world. In fact, approximately 1.35 million people die and 2–50 million are injured on public roads worldwide each year. Straight bends in road traffic are the main cau…
View article: DEIGASe: Deep Extraction and Information Gain for an Optimal Anomaly Detection in IoT-based Smart Cities
DEIGASe: Deep Extraction and Information Gain for an Optimal Anomaly Detection in IoT-based Smart Cities Open
A smart city architecture involves the integration of information and communication technology with gadgets across a system in order to boost connectivity for residents. As a result of ongoing data collection to improve service to customer…
View article: A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security
A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security Open
Due to the development of cloud computing and Internet of Things (IoT) environments, such as healthcare systems, telecommunications and Industry 4.0 or Industrial IoT (IIoT) many daily services are transformed. Therefore, Security issues b…
View article: A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality Open
Due to the recent advancements in the Internet of things (IoT) and cloud computing technologies and growing number of devices connected to the Internet, the security and privacy issues are important to be resolved and protect the data and …
View article: Intelligent Management of Traffic Crossroads in VANETs Environment Using Multi-Agent Systems
Intelligent Management of Traffic Crossroads in VANETs Environment Using Multi-Agent Systems Open
In recent years, Vehicular Ad hoc Networks (VANETs) have become one of the most relevant wireless technologies.They constitute one of the most promising approaches for the implementation of intelligent transportation systems (ITS) which is…
View article: Adapted Speed Mechanism for Collision Avoidance in Vehicular Ad hoc Networks Environment
Adapted Speed Mechanism for Collision Avoidance in Vehicular Ad hoc Networks Environment Open
The disrespect of the safety distance between vehicles is the cause of several road accidents. This distance cannot certainly be estimated at random because of some physical rules to be calculated. The more speed gets higher, the more stop…
View article: Scalability Aware Energy Consumption and Dissipation Models for Wireless Sensor Networks
Scalability Aware Energy Consumption and Dissipation Models for Wireless Sensor Networks Open
Most of Wireless Sensor Networks researches focus on reducing the amount of energy consumed by nodes and network to increase the network lifetime. Thus, several papers have been presented and published to optimize energy consumption in eac…
View article: A New Approach for Big Data Gathering in Dynamic Wireless Sensor Networks
A New Approach for Big Data Gathering in Dynamic Wireless Sensor Networks Open
Big data refers to huge amount of data that we can't handle using our traditional programming concerns. Wireless Sensor Networks is one of the main contributors of big data. Data dissemination and data gathering are two important operation…