default search action
Makhlouf Derdour
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Sabrina Sakraoui, Ahmed Ahmim, Makhlouf Derdour, Marwa Ahmim, Sarra Namane, Imed Ben Dhaou:
FBMP-IDS: FL-Based Blockchain-Powered Lightweight MPC-Secured IDS for 6G Networks. IEEE Access 12: 105887-105905 (2024) - [j22]Amira Bouamrane, Makhlouf Derdour, Ahmed Alksas, Ayman El-Baz:
Hybrid Deep Learning Approach with Feature Engineering for Enhanced Pulmonary Nodule Diagnosis. SN Comput. Sci. 5(7): 890 (2024) - [c30]Sahraoui Abdelatif, Derdour Makhlouf, Kouzou Abdellah:
Enhancing Traffic Forecasting Accuracy with Fuzzy Data Fusion Learning. SSD 2024: 653-659 - [c29]Guerrad Abdelghani, Sahraoui Abdelatif, Makhlouf Derdour:
Improving QoE in IoV: a review of solutions and challenges for MPEG-DASH. PAIS 2024: 1-8 - [c28]Ahmed Arbaoui, Sahraoui Abdelatif, Makhlouf Derdour:
Network Slicing solutions for Internet of Vehicles (IoV) Networks: A Review. PAIS 2024: 1-7 - [c27]Amira Bouamrane, Makhlouf Derdour, Ahmed Alksas, Ayman El-Baz:
A Transfer Learning Framework for Lung Cancer Classification Using EfficientV2-L: Generalizability Assessment. PAIS 2024: 1-6 - [c26]Imed Eddine Bouramoul, Soumia Zertal, Makhlouf Derdour, Imene Zenbout:
Enhancing IoT Security Through Deep learning and Evolutionary Bio-Inspired Intrusion Detection in IoT systems. PAIS 2024: 1-8 - [c25]Yahiaoui Mohammed Elbachir, Derdour Makhlouf, Mohamed Gasmi, Mohammed Mounir Bouhamed, Kouzou Abdellah:
Federated Learning for Multi-institutional on 3D Brain Tumor Segmentation. PAIS 2024: 1-8 - [c24]Abderrazak Khediri, Hamda Slimi, Yahiaoui Ayoub, Makhlouf Derdour, Hakim Bendjenna, Charaf Eddine Ghenai:
Enhancing Machine Learning Model Interpretability in Intrusion Detection Systems through SHAP Explanations and LLM-Generated Descriptions. PAIS 2024: 1-6 - [c23]Rofaida Khemaissia, Makhlouf Derdour, Ala Djeddai:
Blockchain Sharding based Federated Learning Empowered with NFT-based Privacy-Preserving Model Sharing. PAIS 2024: 1-8 - [c22]Mohamed El Amine Kheraifia, Sahraoui Abdelatif, Makhlouf Derdour:
Blockchain-Driven Adaptive Streaming for IoT: Redefining Security in Video Delivery. PAIS 2024: 1-7 - [c21]Nadjem Eddine Menaceur, Sofia Kouah, Makhlouf Derdour:
Adaptive Filtering Strategies for ECG Signal Enhancement: A Comparative Study. PAIS 2024: 1-6 - [c20]Zina Oudina, Makhlouf Derdour, Ahmed Dib, Mohammed Mounir Bouhamed:
Empirical Analysis of the Security Threats and Risks that Drones Face, Represent, and Mitigation. PAIS 2024: 1-8 - [e2]Messaoud Abbas, Makhlouf Derdour, Mohammed Mounir Bouhamed, Saci Medileh, Abdelkamel Ben Ali, Nassira Ghoualmi-Zine:
6th International Conference on Pattern Analysis and Intelligent Systems, PAIS 2024, El Oued, Algeria, April 24-25, 2024. IEEE 2024, ISBN 979-8-3503-5026-5 [contents] - 2023
- [j21]Moustafa Sadek Kahil, Abdelkrim Bouramoul, Makhlouf Derdour:
Big data visual exploration as a recommendation problem. Int. J. Data Min. Model. Manag. 15(2): 133-153 (2023) - [j20]Rofaida Khemaissia, Makhlouf Derdour, Mohamed Amine Ferrag, Mohammed Mounir Bouhamed:
PrSChain: A Blockchain Based Privacy Preserving Approach for Data Service Composition. Informatica (Slovenia) 47(8) (2023) - [c19]Nadjem Eddine Menaceur, Sofia Kouah, Makhlouf Derdour:
IoT-Based Intelligent Medical Decision Support System for Cardiovascular Diseases. NiDS (2) 2023: 122-126 - [c18]Soufiene Boukeloul, Nour El Houda Dehimi, Makhlouf Derdour:
A State-of-the-Art Review of the Mutation Analysis Technique for Testing Multi-agent Systems. NiDS (2) 2023: 230-235 - [c17]Djaber Guassmi, Nour El Houda Dehimi, Makhlouf Derdour:
A State of Art Review on Testing Open Multi-Agent Systems. NiDS (1) 2023: 262-266 - [c16]Zina Oudina, Makhlouf Derdour, Ahmed Dib, Amal Miloud Aouidate Tachouche:
Model Based System Engineering for trust SCADA and ICS Systems in Oil & Gas Industry. PAIS 2023: 1-8 - 2022
- [j19]Zakaria Tolba, Makhlouf Derdour, Mohamed Amine Ferrag, S. M. Muyeen, Mohamed Benbouzid:
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment. IEEE Access 10: 94019-94039 (2022) - [j18]Abdelhakim Zeroual, Mohamed Amroune, Makhlouf Derdour, Atef Bentahar:
Lightweight deep learning model to secure authentication in Mobile Cloud Computing. J. King Saud Univ. Comput. Inf. Sci. 34(9): 6938-6948 (2022) - [c15]Mohamed Gasmi, Makhlouf Derdour, Abdelatif Gahmous:
Transfer Learning for the Classification of Small-Cell and Non-small-Cell Lung Cancer. ISPR 2022: 341-348 - [c14]Zina Oudina, Makhlouf Derdour, Mohammed Mounir Bouhamed:
Testing Cyber-Physical Production System: Test Methods Categorization and dataset. PAIS 2022: 1-8 - [c13]Khadija Rais, Makhlouf Derdour, Mohamed Amroune:
A Blockchain-Based Model for Efficient, Privacy-Preserving Online Medical Diagnoses. PAIS 2022: 1-5 - [c12]Zakaria Tolba, Makhlouf Derdour, Nour El Houda Dehimi:
Machine learning based cryptanalysis techniques: perspectives, challenges and future directions. PAIS 2022: 1-7 - 2021
- [j17]Benmedakhene Nadira, Derdour Makhlouf, Mohamed Amroune:
Personalized Online Learning: Context Driven Massive Open Online Courses. Int. J. Web Based Learn. Teach. Technol. 16(6): 1-15 (2021) - [j16]Fatima Bouakkaz, Makhlouf Derdour:
Maximizing WSN Life Using Power Efficient Grid-Chain Routing Protocol (PEGCP). Wirel. Pers. Commun. 117(2): 1007-1023 (2021) - [c11]Rofaida Khemaissia, Makhlouf Derdour, Ala Djeddai, Mohamed Amine Ferrag:
SDGchain: When Service Dependency Graph Meets Blockchain to Enhance Privacy. IWSPA@CODASPY 2021: 37-43 - 2020
- [j15]Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim, Makhlouf Derdour, Helge Janicke:
RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet 12(3): 44 (2020) - [j14]Sahraoui Abdelatif, Makhlouf Derdour, Nacira Ghoualmi-Zine, Bouchra Marzak:
VANET: A novel service for predicting and disseminating vehicle traffic information. Int. J. Commun. Syst. 33(6) (2020) - [j13]Imad Bouteraa, Makhlouf Derdour, Ahmed Ahmim:
Intrusion detection using classification techniques: a comparative study. Int. J. Data Min. Model. Manag. 12(1): 65-86 (2020) - [j12]Menaceur Sadek, Makhlouf Derdour, Abdelkrim Bouramoul:
Using Query Expansion Techniques and Content-Based Filtering for Personalizing Analysis in Big Data. Int. J. Inf. Technol. Web Eng. 15(2): 77-101 (2020)
2010 – 2019
- 2019
- [j11]Mounir Achouri, Adel Alti, Derdour Makhlouf, Sébastien Laborie, Philippe Roose:
A New Two-Level Clustering Approach for Situations Management in Distributed Smart Environments. Int. J. Ambient Comput. Intell. 10(2): 91-111 (2019) - [j10]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros A. Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet Things J. 6(2): 2188-2204 (2019) - [c10]Ahmed Ahmim, Leandros A. Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke:
A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models. DCOSS 2019: 228-233 - 2018
- [j9]Ahmed Ahmim, Makhlouf Derdour, Mohamed Amine Ferrag:
An intrusion detection system based on combining probability predictions of a tree of classifiers. Int. J. Commun. Syst. 31(9) (2018) - [j8]Sahraoui Abdelatif, Derdour Makhlouf, Philippe Roose:
Smart Traffic Management System for Anticipating Unexpected Road Incidents in Intelligent Transportation Systems. Int. J. Grid High Perform. Comput. 10(4): 67-82 (2018) - [j7]Sahraoui Abdelatif, Derdour Makhlouf, Bouchra Marzak:
A Multi-Objective ACO to Solve the Daily Carpool Problem. Int. J. Strateg. Inf. Technol. Appl. 9(2): 50-60 (2018) - [c9]Imad Bouteraa, Makhlouf Derdour, Ahmed Ahmim:
Intrusion Detection using Data Mining: A contemporary comparative study. PAIS 2018: 1-8 - [c8]Merzoug Soltane, Yudith Cardinale, Rafael Angarita, Philippe Rosse, Marta Rukoz, Derdour Makhlouf, Okba Kazar:
A Self-adaptive Agent-based System for Cloud Platforms. PAIS 2018: 1-8 - [c7]Abdelhakim Zeroual, Mohamed Amroune, Makhlouf Derdour, Abdallah Meraoumia, Atef Bentahar:
Deep authentication model in Mobile Cloud Computing. PAIS 2018: 1-4 - [e1]Mohamed Amroune, Makhlouf Derdour, Ahmed Ahmim:
2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), Tebessa, Algeria, October 24-25, 2018. IEEE 2018, ISBN 978-1-5386-4238-2 [contents] - [i3]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. CoRR abs/1806.09099 (2018) - [i2]Merzoug Soltane, Yudith Cardinale, Rafael Angarita, Philippe Rosse, Marta Rukoz, Derdour Makhlouf, Okba Kazar:
A Self-adaptive Agent-based System for Cloud Platforms. CoRR abs/1810.07622 (2018) - [i1]Ahmed Ahmim, Leandros Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke:
A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models. CoRR abs/1812.09059 (2018) - 2017
- [j6]Menaceur Sadek, Makhlouf Derdour, Abdelkrim Bouramoul:
Personalized Online Analytical Processing in Big Data Context Using User Profile and Search Context. Int. J. Strateg. Inf. Technol. Appl. 8(4): 67-80 (2017) - [c6]Mounir Achouri, Adel Alti, Derdour Makhlouf, Sébastien Laborie, Philippe Roose:
A New Two-Layered Architecture for Efficient Situations Management in Smart Environments. MEDES 2017: 6-13 - 2016
- [c5]Sahraoui Abdelatif, Derdour Makhlouf, Philippe Roose, Djamel Becktache:
Loop Speed Trap Data Collection Method for an Accurate Short-Term Traffic Flow Forecasting. MobiWIS 2016: 56-64 - 2015
- [j5]Derdour Makhlouf, Adel Alti, Mohamed Gasmi, Philippe Roose:
Security architecture metamodel for Model Driven security. J. Innov. Digit. Ecosyst. 2(1-2): 55-70 (2015) - 2014
- [j4]Mohamed Gharzouli, Derdour Makhlouf:
To Implement an Open-MAS Architecture for Semantic Web Services Discovery: What Kind of P2P Protocol Do We Need? Int. J. Agent Technol. Syst. 6(3): 58-71 (2014) - 2012
- [j3]Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nacira Ghoualmi-Zine:
An adaptation platform for multimedia applications CSC (Component, Service, Connector). J. Syst. Inf. Technol. 14(1): 4-22 (2012) - 2011
- [c4]Derdour Makhlouf, Philippe Roose, Marc Dalmau, Ghoualmi Nacera Zine:
CSC (Component, Service, Connector): A Platform for Self-Adaptation of Multimedia Applications. NOTERE 2011: 1-10 - 2010
- [j2]Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nacira Ghoualmi-Zine, Adel Alti:
MMSA: Metamodel Multimedia Software Architecture. Adv. Multim. 2010: 386035:1-386035:17 (2010) - [j1]Derdour Makhlouf, Nacira Ghoualmi-Zine, Philippe Roose, Marc Dalmau, Adel Alti:
UML-profile for multimedia software architectures. Int. J. Multim. Intell. Secur. 1(3): 209-231 (2010) - [c3]Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nacira Ghoualmi-Zine, Adel Alti:
Vers une architecture d'adaptation automatique des applications reparties basées composants. CAL 2010: 1-13 - [c2]Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nacira Ghoualmi-Zine, Adel Alti:
An Adaptation Approach for Component-Based Software Architecture. COMPSAC 2010: 179-187
2000 – 2009
- 2009
- [c1]Derdour Makhlouf, Nacira Ghoualmi-Zine, Philippe Roose, Marc Dalmau:
An Adaptation System for P2P Multimedia Applications. AINA Workshops 2009: 67-72
Coauthor Index
aka: Philippe Rosse
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint