default search action
Mohammed Benattou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Archi Taha, Mohammed Benattou:
Efficient Dimensionality Reduction in Intrusion Detection Systems via Weighted Power Mean for PCA and LDA. WINCOM 2024: 1-6 - 2023
- [c24]Archi Taha, Mohammed Benattou:
A robust intrusion detection model based on a combination of PCA-GM and trunced LDA. WINCOM 2023: 1-6 - [c23]Archi Taha, Mohammed Benattou:
An Automatic Truncated Mean Approach for PCA In Intrusion Detection Systems. WINCOM 2023: 1-6 - 2021
- [j9]Zyad Elkhadir, Mohammed Benattou:
A truncated mean ℓp-LDA approach for intrusion detection system. Int. J. Inf. Comput. Secur. 16(3/4): 355-374 (2021)
2010 – 2019
- 2019
- [j8]Zyad Elkhadir, Mohammed Benattou:
A cyber network attack detection based on GM Median Nearest Neighbors LDA. Comput. Secur. 86: 63-74 (2019) - [j7]Mohammed Jouhari, Khalil Ibrahimi, Hamidou Tembine, Mohammed Benattou, Jalel Ben-Othman:
Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks. Int. J. Commun. Syst. 32(13) (2019) - [j6]Mohamed Bendahmane, Brahim El Falaki, Mohammed Benattou:
Toward a Personalized Learning Path through a Services-Oriented Approach. Int. J. Emerg. Technol. Learn. 14(15): 52-66 (2019) - [c22]Zyad Elkhadir, Archi Taha, Mohammed Benattou:
Improve R2L Attack Detection Using Trimmed PCA. CommNet 2019: 1-5 - 2018
- [j5]Jean-Louis Lanet, Hélène Le Bouder, Mohammed Benattou, Axel Legay:
When time meets test. Int. J. Inf. Sec. 17(4): 395-409 (2018) - [j4]Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou:
Improving Network Intrusion Detection Using Geometric Mean LDA. Int. J. Netw. Secur. 20(5): 820-826 (2018) - [j3]Safaa Achour, Mohammed Benattou:
A Model Based Testing Approach for Java Bytecode Programs. J. Comput. 13(9): 1098-1114 (2018) - [c21]Safaa Achour, Mohammed Benattou:
Constraint Based Testing and Verification of Java Bytecode Programs. CIST 2018: 64-69 - [c20]Safaa Achour, Mohammed Benattou:
Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs. ICMCS 2018: 1-6 - [c19]Sara Serbout, Mohammed Benattou:
Toward a Constraint Based Test Case Generation of Parallel BPEL Process. ICMCS 2018: 1-6 - 2017
- [c18]Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou:
A Median Nearest Neighbors LDA for Anomaly Network Detection. C2SI 2017: 128-141 - [c17]Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou:
An effective cyber attack detection system based on an improved OMPCA. WINCOM 2017: 1-6 - 2016
- [c16]Safaa Achour, Mohammed Benattou:
Test case generation for Java Bytecode programs annotated with BML specifications. ICMCS 2016: 605-610 - [c15]Mohammed Jouhari, Khalil Ibrahimi, Mohammed Benattou, Abdellatif Kobbane:
New greedy forwarding strategy for UWSNs geographic routing protocols. IWCMC 2016: 388-393 - [c14]Mohammed Jouhari, Khalil Ibrahimi, Mohammed Benattou:
Implementation of Bit Error Rate Model of 16-QAM in Aqua-Sim Simulator for Underwater Sensor Networks. UNet 2016: 123-134 - 2015
- [j2]Salma Azzouzi, Mohammed Benattou, My El Hassan Charaf:
A temporal agent based approach for testing open distributed systems. Comput. Stand. Interfaces 40: 23-33 (2015) - [c13]Khalid Chougdali, Zyad Elkhadir, Mohammed Benattou:
Network intrusion detection system using L1-norm PCA. IAS 2015: 118-122 - [c12]Mohammed Jouhari, Khalil Ibrahimi, Mohammed Benattou:
Topology control through depth adjustment and transmission power control for UWSN routing protocols. WINCOM 2015: 1-5 - 2014
- [j1]My El Hassan Charaf, Mohammed Benattou, Salma Azzouzi:
A JESS AGENT Based Architecture for Testing Distributed Systems. J. Inf. Sci. Eng. 30(5): 1619-1634 (2014) - [c11]Achkar Amine, Mohammed Benattou, Jean-Louis Lanet:
Generating control flow graph from Java card byte code. CIST 2014: 206-212 - 2013
- [c10]Hicham Touil, Youssef Fakhri, Mohammed Benattou:
Contention Window MAC parameters tyning for wireless multimedia Sensor Networks. AICCSA 2013: 1-4 - 2012
- [c9]Khalid Benlhachmi, Mohammed Benattou:
A formal model of similarity testing for inheritance in object-oriented software. CIST 2012: 38-42 - [c8]Hicham Touil, Youssef Fakhri, Mohammed Benattou:
Energy-efficient MAC protocol based on IEEE 802.11e for Wireless Multimedia Sensor Networks. ICMCS 2012: 53-58 - [c7]My El Hassan Charaf, Mohammed Benattou, Salma Azzouzi:
A rule-based multi-agent system for testing distributed applications. ICMCS 2012: 967-972
2000 – 2009
- 2006
- [c6]Mohammed Benattou:
A Mobile Agent Based Synchronization For Distributed Testing. PDPTA 2006: 88-93 - [c5]Mohammed Benattou:
A Multi-Agent Based Architecture For Distributed Testing. SEKE 2006: 495-498 - 2002
- [c4]Mohammed Benattou, Jean-Michel Bruel:
Active Objects for Coordination in Distributed Testing. OOIS 2002: 348-357
1990 – 1999
- 1999
- [c3]Omar Rafiq, Leo Cacciari, Mohammed Benattou:
Coordination Issues in Distributed Testing. PDPTA 1999: 793-799 - [c2]Mohammed Benattou, Leo Cacciari, Régis Pasini, Omar Rafiq:
Principles and Tools for Testing Open Distributed Systems. IWTCS 1999: 77-92 - 1997
- [c1]Mohammed Benattou, Lotfi Lakhal:
Incremental Inheritance Model for an OODBMS. DEXA 1997: 68-80
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint