default search action
Bouabid El Ouahidi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Mariam Laatifi, Samira Douzi, Abdelaziz Bouklouz, Hind Ezzine, Jaafar Jaafari, Younes Zaid, Bouabid El Ouahidi, Mariam Naciri:
Machine learning approaches in Covid-19 severity risk prediction in Morocco. J. Big Data 9(1): 5 (2022) - 2021
- [j5]Nabaouia Louridi, Samira Douzi, Bouabid El Ouahidi:
Machine learning-based identification of patients with a cardiovascular defect. J. Big Data 8(1): 133 (2021) - [j4]Ibtissam Benchaji, Samira Douzi, Bouabid El Ouahidi, Jaafar Jaafari:
Enhanced credit card fraud detection based on attention mechanism and LSTM deep model. J. Big Data 8(1): 151 (2021) - 2020
- [j3]Meryem Amar, Bouabid El Ouahidi:
Weighted LSTM for intrusion detection and data mining to prevent attacks. Int. J. Data Min. Model. Manag. 12(3): 308-329 (2020) - [j2]Meryem Amar, Bouabid El Ouahidi:
Hybrid intrusion detection system using machine learning. Netw. Secur. 2020(5): 8-19 (2020)
2010 – 2019
- 2019
- [c15]Meryem Amar, Bouabid El Ouahidi:
A Weighted LSTM Deep Learning for Intrusion Detection. ACOSIS 2019: 170-179 - 2018
- [c14]Ibtissam Benchaji, Samira Douzi, Bouabid El Ouahidi:
Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for Credit Card Fraud Detection. CSNet 2018: 1-5 - [c13]Samira Douzi, Ibtissam Benchaji, Bouabid El Ouahidi:
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules. CSNet 2018: 1-3 - [c12]Meryem Amar, Mouad Lemoudden, Bouabid El Ouahidi:
Advanced Hybrid Technique in Detecting Cloud Web Application's Attacks. MLN 2018: 79-97 - 2017
- [c11]Samira Douzi, Meryem Amar, Bouabid El Ouahidi:
Advanced Phishing Filter Using Autoencoder and Denoising Autoencoder. BDIOT 2017: 125-129 - [c10]Meryem Amar, Samira Douzi, Bouabid El Ouahidi, Mouad Lemoudden:
A novel approach in detecting intrusions using NSLKDD database and MapReduce programming. FNC/MobiSPC 2017: 230-235 - [c9]Samira Douzi, Meryem Amar, Bouabid El Ouahidi, Hicham Laanaya:
Towards A new Spam Filter Based on PV-DM (Paragraph Vector-Distributed Memory Approach). FNC/MobiSPC 2017: 486-491 - 2016
- [c8]Mouad Lemoudden, Meryem Amar, Bouabid El Ouahidi:
A Binary-based MapReduce Analysis for Cloud Logs. ANT/SEIT 2016: 1213-1218 - 2015
- [c7]Mouad Lemoudden, Bouabid El Ouahidi:
Managing cloud-generated logs using big data technologies. WINCOM 2015: 1-7 - 2013
- [c6]Mohammed Erritali, Bouabid El Ouahidi, Daniel Bourget:
Secured Geographic Routing Protocol for Vehicular Ad Hoc Networks (VANETs). NETYS 2013: 311-315 - 2012
- [c5]Rachid Haji, Abderrahim Hasbi, Mohamed Ghallali, Bouabid El Ouahidi:
Towards an adaptive QoS-oriented and secure framework for wireless sensor networks in emergency situations. ICMCS 2012: 1007-1011 - [i3]Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi:
UML modelling of geographic routing protocol "Greedy Perimeter Stateless Routing" for its integration into the "Java Network Simulator". CoRR abs/1203.4827 (2012) - [i2]Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi:
A beaconing approach whith key exchange in vehicular ad hoc networks. CoRR abs/1212.2404 (2012) - 2011
- [i1]Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi:
A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash. CoRR abs/1110.1579 (2011)
2000 – 2009
- 2009
- [j1]Oussama Mohamed Reda, Bouabid El Ouahidi, Daniel Bourget:
Typing rules OCL specification of QoS-capable ODP Computational Interfaces. ARIMA J. 11: 2 (2009) - [c4]Oussama Mohamed Reda, Bouabid El Ouahidi, Daniel Bourget:
2wards QoS-capable ODP computational interfaces. AICCSA 2009: 65-66 - 2006
- [c3]Oussama Mohamed Reda, Bouabid El Ouahidi, Daniel Bourget:
Interaction Signatures and Action Templates in the ODP Computational Viewpoint. EDOC Workshops 2006: 38 - 2002
- [c2]Bouabid El Ouahidi, Mohamed Bouhdadi, Daniel Bourget:
An UML-Based Meta-Language for the QOS-Aware Enterprise Specification of Open Distributed Systems. PRO-VE 2002: 255-264 - 2000
- [c1]Bouabid El Ouahidi, Mohamed Bouhdadi, Daniel Bourget:
The Internet is Challenging the Intelligent Network. ISCC 2000: 800-805
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-10 19:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint