Mohammed Benattou

Orcid: 0000-0002-9659-5138

According to our database1, Mohammed Benattou authored at least 34 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Dimensionality Reduction in Intrusion Detection Systems via Weighted Power Mean for PCA and LDA.
Proceedings of the 11th International Conference on Wireless Networks and Mobile Communications, 2024

2023
An Automatic Truncated Mean Approach for PCA In Intrusion Detection Systems.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

A robust intrusion detection model based on a combination of PCA-GM and trunced LDA.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

2021
A truncated mean <i>ℓ<sub>p</sub></i>-LDA approach for intrusion detection system.
Int. J. Inf. Comput. Secur., 2021

2019
Toward a Personalized Learning Path through a Services-Oriented Approach.
Int. J. Emerg. Technol. Learn., 2019

Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks.
Int. J. Commun. Syst., 2019

A cyber network attack detection based on GM Median Nearest Neighbors LDA.
Comput. Secur., 2019

Improve R2L Attack Detection Using Trimmed PCA.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

2018
A Model Based Testing Approach for Java Bytecode Programs.
J. Comput., 2018

Improving Network Intrusion Detection Using Geometric Mean LDA.
Int. J. Netw. Secur., 2018

When time meets test.
Int. J. Inf. Sec., 2018

Toward a Constraint Based Test Case Generation of Parallel BPEL Process.
Proceedings of the 6th International Conference on Multimedia Computing and Systems, 2018

Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs.
Proceedings of the 6th International Conference on Multimedia Computing and Systems, 2018

Constraint Based Testing and Verification of Java Bytecode Programs.
Proceedings of the 5th IEEE International Congress on Information Science and Technology, 2018

2017
An effective cyber attack detection system based on an improved OMPCA.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

A Median Nearest Neighbors LDA for Anomaly Network Detection.
Proceedings of the Codes, Cryptology and Information Security, 2017

2016
Implementation of Bit Error Rate Model of 16-QAM in Aqua-Sim Simulator for Underwater Sensor Networks.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

New greedy forwarding strategy for UWSNs geographic routing protocols.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Test case generation for Java Bytecode programs annotated with BML specifications.
Proceedings of the 5th International Conference on Multimedia Computing and Systems, 2016

2015
A temporal agent based approach for testing open distributed systems.
Comput. Stand. Interfaces, 2015

Topology control through depth adjustment and transmission power control for UWSN routing protocols.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2015

Network intrusion detection system using L1-norm PCA.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
A JESS AGENT Based Architecture for Testing Distributed Systems.
J. Inf. Sci. Eng., 2014

Generating control flow graph from Java card byte code.
Proceedings of the Third IEEE International Colloquium in Information Science and Technology, 2014

2013
Contention Window MAC parameters tyning for wireless multimedia Sensor Networks.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

2012
Energy-efficient MAC protocol based on IEEE 802.11e for Wireless Multimedia Sensor Networks.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

A rule-based multi-agent system for testing distributed applications.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

A formal model of similarity testing for inheritance in object-oriented software.
Proceedings of the 2012 Colloquium in Information Science and Technology, 2012

2006
A Multi-Agent Based Architecture For Distributed Testing.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

A Mobile Agent Based Synchronization For Distributed Testing.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications & Conference on Real-Time Computing Systems and Applications, 2006

2002
Active Objects for Coordination in Distributed Testing.
Proceedings of the Object-Oriented. Information Systems, 8th International Conference, 2002

1999
Principles and Tools for Testing Open Distributed Systems.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999

Coordination Issues in Distributed Testing.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1997
Incremental Inheritance Model for an OODBMS.
Proceedings of the Database and Expert Systems Applications, 8th International Conference, 1997


  Loading...